منابع مشابه
Comparing ovulation synchronization protocols for artificial insemination in the scimitar-horned oryx (Oryx dammah).
Ovarian response and pregnancy success in scimitar-horned oryx (n=28) were compared, following treatment with two synchronization protocols and fixed-time artificial insemination (AI) with frozen-thawed semen. Each oryx received two injections of 500 microg of prostaglandin-F(2alpha) analogue (PGF(2alpha)-only) 11 days apart, and half received PGF(2alpha) in combination with an intravaginal pro...
متن کاملSignavio-Oryx Academic Initiative
Since 2007 we have seen increasing interest in using the Oryx process modeling framework1 by academics. Many universities already use the platform in teaching to model, analyze, and simulate processes. While many courses focus on BPMN, also Petri nets and EPCs are used, all of which are supported by the system. The Signavio-Oryx Academic Initiative (SOAI) is a joint project of academic and indu...
متن کاملSelective brain cooling in Arabian oryx (Oryx leucoryx): a physiological mechanism for coping with aridity?
Selective brain cooling is a thermoregulatory effector proposed to conserve body water and, as such, may help artiodactyls cope with aridity. We measured brain and carotid blood temperature, using implanted data loggers, in five Arabian oryx (Oryx leucoryx) in the desert of Saudi Arabia. On average, brain temperature was 0.24±0.05°C lower than carotid blood temperature for four oryx in April. S...
متن کاملSerological survey for bovine bacterial and viral pathogens in captive Arabian oryx (Oryx leucoryx Pallas, 1776).
Tests for antibodies to bovine bacterial and viral pathogens were conducted on 239 sera from 128 Arabian oryx (Oryx leucoryx) from seven locations (Taif, Riyadh and Mahazat as Said, Saudi Arabia; San Diego, United States of America [USA]; Shaumari, Jordan; Qatar; and Bahrain). No antibodies to Pasteurella multocida type E or epizootic haemorrhagic disease 1 virus were found. Antibodies to Bruce...
متن کاملCryptanalysis of ORYX
We present an attack on the ORYX stream cipher that requires only 25–27 bytes of known plaintext and has time complexity of 2. This attack directly recovers the full 96 bit internal state of ORYX, regardless of the key schedule. We also extend these techniques to show how to break ORYX even under a ciphertext-only model. As the ORYX cipher is used to encrypt the data transmissions in the North ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Oryx
سال: 1998
ISSN: 0030-6053,1365-3008
DOI: 10.1046/j.1365-3008.1998.d01-49.x