supported by the National Key Basic Research Development Program of China (973 Program, Grant No.2010CB429002);the National Natural Science Foundation of China (Grant No. 50979033);the Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions, the Special Research Funding of State Key Laboratory of Hydrology-Water Resources and Hydraulic Engineering (Grant No. 2009585812);Scotland-China Higher Education Research Partnership for PhD Studies (Grant No. [2010]6044)
Based on a wave bottom boundary layer model and a sediment advection-diffusion model, seven turbulence schemes are compared regarding their performances in prediction of near-bed sediment suspension beneath waves abov...
This work is funded by the National BasicResearch Program of China (973 Program) underGrant 2007CB311203.
Cryptography is an important technology for information security. It mainly includes symmetric and asymmetric cryptographic algorithms and protocols. For the symmetric cryptographic algorithms, it is easy to deduce de...