نتایج جستجو برای: green tiger prawn

تعداد نتایج: 145922  

Journal: :Vision Research 2007
B. Perry J. S. George

The roles of rod and cone input and of dopamine in the generation of oscillatory potentials were studied in tiger salamander retina. Under scotopic conditions, oscillations were elicited with a green, but not a red stimulus. With mesopic background illumination, both stimuli caused oscillations. Addition of quinpirole to a mesopic retina eliminated oscillations while SKF-38393 had no effect. Si...

2004
Martin Forst Nuria Bertomeu Berthold Crysmann Frederik Fouvry Silvia Hansen-Schirra Valia Kordoni

In this paper we discuss the construction, features and intended uses of the TiGer DB. The TiGer DB is a dependency bank derived from the TiGer Treebank containing predicate-argument relations and several grammatical features which can be considered as semantically meaningful. It is produced semi-automatically by the conversion of the TiGer treebank into an LFG f-structure bank, which then in t...

2015
Andreas Wilting Alexandre Courtiol Per Christiansen Jürgen Niedballa Anne K. Scharf Ludovic Orlando Niko Balkenhol Heribert Hofer Stephanie Kramer-Schadt Jörns Fickel Andrew C. Kitchener

Although significantly more money is spent on the conservation of tigers than on any other threatened species, today only 3200 to 3600 tigers roam the forests of Asia, occupying only 7% of their historical range. Despite the global significance of and interest in tiger conservation, global approaches to plan tiger recovery are partly impeded by the lack of a consensus on the number of tiger sub...

2007
Sebastiaan Indesteege Bart Preneel

The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on finding collisions. In this paper we describe a preimage attack on the compression function of Tiger-12, i.e., Tiger reduced to 12 rounds out of 24, with a complexity of 2 compression function evaluations. We show how this can be used to construct second preimages with complexity 2 and first preimages with co...

Journal: :Khulna University studies 2022

A field survey through questionnaire was conducted in rice-prawn (Macrobrachium rosenbergii)-fish culture ghers six villages of Khulna, Satkhira and Bagerhat districts south-west Bangladesh during March to December, 2008 assess present practices. About 10-25% the total area land converted for building canals dikes remaining were used rice cultivation. Boro with prawn fish appeared have positive...

2018
Christoph Langer Julia Riehle Helge Wuttig Stephanie Dürrwald Helmut Lange Alexander Samol Norbert Frey Marcus Wiemer

INTRODUCTION Transradial coronary angiography (TRC) can be performed with a one-catheter approach for the right and left coronary ostium (R/LCO). We investigated the performance of a special diagnostic catheter widely used for the one-catheter-approach, the Tiger (Tiger II, TerumoTM). METHODS In a dual center registry we analyzed 1412 TRC-procedures exclusively performed by experienced TRC-op...

2006
Florian Mendel Bart Preneel Vincent Rijmen Hirotaka Yoshida Dai Watanabe

Tiger is a cryptographic hash function with a 192-bit hash value which was proposed by Anderson and Biham in 1996. At FSE 2006, Kelsey and Lucks presented a collision attack on Tiger reduced to 16 (out of 24) rounds with complexity of about 2. Furthermore, they showed that a pseudo-near-collision can be found for a variant of Tiger with 20 rounds with complexity of about 2. In this article, we ...

Rapid industrialization along with advanced agricultural activities led to the contamination in aquatic environment with heavy metals. Heavy metals ultimately pass into human body through having aquatic animals like fish, prawn and crab. In this study, accumulation of heavy metals (zinc, copper, iron, cadmium and lead) in various organs of four commonly consumed fish (Euthynnus affinis...

2007
Florian Mendel Vincent Rijmen

Tiger is a cryptographic hash function with a 192-bit hash value. It was proposed by Anderson and Biham in 1996. Recently, weaknesses have been shown in round-reduced variants of the Tiger hash function. First, at FSE 2006, Kelsey and Lucks presented a collision attack on Tiger reduced to 16 and 17 (out of 24) rounds with a complexity of about 2 and a pseudo-near-collision for Tiger reduced to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید