نتایج جستجو برای: in exploited area

تعداد نتایج: 17016384  

Journal: :CoRR 2015
Guillaume Corriveau Raynald Guilbault Antoine Tahan Robert Sabourin

A B S T R A C T Numerous genotypic diversity measures (GDMs) are available in the literature to assess the convergence status of an evolutionary algorithm (EA) or describe its search behavior. In a recent study, the authors of this paper drew attention to the need for a GDM validation framework. In response, this study proposes three requirements (monotonicity in individual varieties, twinning,...

2015
Idan Morad Asaf Shabtai

the source, destination and nature of an attack. This can be done by enabling SSH tunneling to act as a proxy through which the malicious traffic is transmitted (e.g., leaking sensitive data, or command and control communications). As a case in point, the Flame virus detected in 2012 used SSL and SSH for stealing sensitive information and the Duqu virus detected in 2011 used SSH port forwarding...

Journal: :علوم گیاهان زراعی ایران 0
صادق شهبازی دورباش کارشناس ارشد بیوتکنولوژی کشاورزی بخش دانه های روغنی مؤسسه تحقیقات کشاورزی دیم کشور (مراغه) خشنود علیزاده دیزج دانشیار پژوهشی، مؤسسه تحقیقات کشاورزی دیم کشور (مراغه) بهزاد صادق زاده استادیار پژوهشی مؤسسه تحقیقات کشاورزی دیم کشور (مراغه) وحید فتحی رضایی دانشجوی کارشناسی ارشد دانشگاه تبریز و محقق مؤسسه تحقیقات کشاورزی دیم کشور (مراغه)

genetic diversity is one of principle factors to succeed in breeding programs, so its determination is vital in the using of plant genetic resources. with the aim of evaluation of genetic diversity among safflower landraces, 20 lines (14 iranian and 6 foreign lines) were studied for phenotypic and genotypic variations using agro-morphological traits and rapd markers. field study was conducted i...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی علوم پایه زنجان - دانشکده فیزیک 1392

in the first part of this thesis we explored wetting and its dynamics for small droplets. first, we showed how a simple feature of water droplets on a surface, i.e. laplace pressure, can be exploited to build a micropump. we investigated capillary pumping in microchannels both experimentally and numerically. putting two droplets of different sizes at the in/outlet of a microchannel, will ge...

2005
Thomas Edward Reid McCallum

Ant algorithms were first written about in 1991 and since then they have been applied to many problems with great success. During these years the algorithms themselves have been modified for improved performance and also been influenced by research in other fields. Since the earliest Ant algorithms, heuristics and local search have been the primary knowledge sources. This thesis asks the questi...

2007
Tara Marshall Howard I. Browman C. Tara Marshall

Evolutionary theory predicts that selective harvesting will shift the frequency of genes for heritable traits towards those that express well-adapted phenotypes (Law 2007, this Theme Section). Applying this logic, commercial fisheries that select on the basis of size could reasonably be expected to favor the genotype for maturation at smaller sizes (and/or younger ages), given that rapidly matu...

Journal: :Proceedings of the Royal Society B: Biological Sciences 2007

Journal: :Journal of Applied Ecology 2023

An increase in exploited species within marine reserves is often expected to benefit adjacent fished areas through the movement or ‘spill-over’ of across reserve boundaries. However, harvest at and near boundaries can also decrease abundances inside reserves, forming ‘edge-effects’. Spatial analysis gradients abundance have been used interpret extents edge-effects spill-over. While shape these ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید