منابع مشابه
A Response of Alfalfa to Borax.
O of the greatest difficulties experienced in developing a wellbalanced system of agriculture in the southeastern states is associated with a soil peculiarity that has heretofore made it impractical to use lime except at limited rates of application. For some time liming has been known to promote a deficiency of available manganese on extensive areas, but the soils involved are generally relati...
متن کاملRespiratory effects of borax dust.
The relation of respiratory symptoms, pulmonary function, and abnormalities of chest radiographs to estimated exposures of borax dust has been investigated in a cross sectional study of 629 actively employed borax workers. Ninety three per cent of the eligible workers participated in the study and exposures ranged from 1.1 mg/m3 to 14.6 mg/m3. Symptoms of acute respiratory irritation such as dr...
متن کاملHigh efficient Perovskite solar cells base on Niobium Doped TiO2 as a Buffer Layer
Here, the effect of lightly Niobium doped TiO2 layer on the performance of perovskite solar cells has been studied by using solar cell capacitance simulator (SCAPS). N addition, the effects of Niobium concentration, buffer film thickness and operating temperature on the performance of the perovskite solar cell are investigated. For doping level of 3.0 mol% into the TiO2 layer, cell efficiency o...
متن کاملRAD: A Compile-Time Solution to Buffer Overflow Attacks
This paper presents a solution to the notorious buffer overflow attack problem. Using this solution, users can prevent attackers from compromising their systems by changing the return address to execute injected code, which is the most common method used in buffer overflow attacks. Buffer overflow attacks can occur in almost any kind of programs and is one of the most common vulnerabilities tha...
متن کاملA Solution to Open Standard of PKI
PKI (Public Key Infrastructure) is fundamental for many security applications on the network. However, there are so many di erent kinds of PKI at current stage and they are not compatible. To solve the problem, we propose to implement the authority of authentication veri cation service systems as personal autonomous software agents, called security agents. In this paper, we introduce its concep...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1944
ISSN: 0028-0836,1476-4687
DOI: 10.1038/154577a0