The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Real-time comprehensive evaluation of economic performance on thermal power plant unit is helpful to improve benefits of power plant. Due to the complexity of power plant, this paper proposes a three-layer evaluation framework to solve the real-time economic evaluation problem. The top layer only has a comprehensive evaluation objective. The second layer is block layer with four economic blocks, in...
The stochastic process of a financial market is influenced by decisions of investors. The behavior of the investors somehow determines the movement pattern of the market. On the other hand, the movement observed in market can also have impact on the decision-making process of investors. This makes it possible for every kind of decisions to have a tendency to compete with other decisions on the probability...
The paper firstly reveals the characteristics of linear structure for cryptographic function over finite field, which is quiet different from that over prime field, and some examples are presented to support the result. Then a class of functions taking all vectors as their linear structures is suggested, which are called generalized affine functions and have the similar properties with that of affine...
As an example of the research on zhejiang local agricultural management, this paper analyzes the research results and summarizes the different agricultural management characteristics. From overall tracking of “farmland to table” process and grasping the key of management, thinking the problems of security and standardization on produce quality management information. At last, it combines with our...
Survey of rural residents, according to information acquisition status of rural information resource status and service, and puts forward the problem of low efficiency based on cloud computing information sharing platform design ideas and solutions.
In order to analyze the impact on the security of cryptographic algorithm produced by the linear approximations of addition modulo 2n with XOR, this paper firstly translates the operation of addition modulo 2n into vector Boolean function with dimension of n. The component functions can be obtained through a recurrence formula which does not require a recall of the carry function. Then we explore...
The paper firstly reveals the relationship between the cryptographic function over finite field and vector function over its prime field. Then a class of functions taking all vectors as their linear structures is suggested, which are the weakest functions over finite field even if the algebraic degree is high. At last, the cryptographic properties of logical function over finite field and the corresponding...
The theory and practice of Media design talent cultivation have made effected and attempted by Zhejiang Shuren University, base on Interaction new media experimental class, for capacity-building objective of innovation-based “seven dimensions”, implement open teaching organizational activities and management, explore Multiple Talent Cultivation value orientation of media design Talent Cultivation...
Forest pests, fires and deforestation, are known as the three forest disasters. And the severity of forest pest infection has increased in recent decades. Therefore, it's becoming more important to have strategic approach toward forest pest control. After decades of research, we have accumulated and summed up a wealth of forest pest data. We need to process these data efficiently, and make sure that...
The paper reveals the relationship between degenerate criterion and Chrestenson spectra of cryptographic functions over finite field. Two examples are proposed to show how we can decide whether a cryptographic function is degenerate through the support of its Chrestenson spectra, which can make us construct cryptographic function to resist substitution attacks by a new function with fewer variables.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.