نتایج جستجو برای: onion farm
تعداد نتایج: 43825 فیلتر نتایج به سال:
Nested symmetric encryption is a well-known technique for low-latency communication privacy. But just what problem does this technique aim to solve? In answer, we provide a provable-security treatment for onion authenticated-encryption (onion-AE). Extending the conventional notion for authenticated-encryption, we demand indistinguishability from random bits and time-of-exit authenticity verific...
In a recent work [Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], Schneider et al. proposed a new measure for network robustness and investigated optimal networks with respect to this quantity. For networks with a power-law degree distribution, the optimized networks have an onion structure-high-degree vertices forming a core with radially decreasing degrees and an over-representation of edges wi...
An insight into the balanced crop nutrition and efficient irrigation will be rewarding to attain profitable bulb yield of shallow-rooted high nutrient requiring aggregatum onion. To develop fertilizer prescription equations(FPEs) for onion under drip fertigation by encompassing Soil Test Crop Response approach (STCR), a field experiment was conducted in Palaviduthi soil series with 15 treatment...
Response of Weed Management Practices on Growth, Yields and Economics of Rabi Onion (Allium cepa L.)
The present investigation entitled, “Studies on weed management in Rabi onion (Allium cepa L.)” was carried out at the Vegetable Research Farm of Chandra Shekhar Azad University Agriculture & Technology, Kanpur (U.P.) during season 2021with objectives relative efficacy herbicides and hand weeding control onion. experiment laid Randomized Block Design for nine treatments with three replicati...
This review outlines the potential for developing a reliable transformation system for onions (Allium cepa). A summary of the onion tissue culture literature is presented along with descriptions of the gene transfer systems available. The most suitable regulatory sequences and selective genes that could be used for onion transformation are described, together with the problems which may be enco...
In this study, the effects of benomyl, a systemic fungicide were investigated in the mitotic cell division in onion (Allium cepa) root tip cells during germination. For this aim, different concentrations (1, 2, 5, 10 and 20 mM) of benomyl solutions were used. All the concentrations used caused several abnormalities in mitotic cell divisions and the mitotic frequency in the onion root tip cells ...
This paper utilizes a comparative case study design to examine a regional onion market. The particular case of onion markets is used to understand perishable product supply chains. The site for the study is Dubai, United Arab Emirates. Results from a sixmonth field study are outlined. In particular, the findings suggest that firms should examine adding additional destinations to their supply ch...
Tor is a communications infrastructure widely used for unfettered and anonymous access to Internet websites. Tor is also used to access sites on the .onion virtual domain. The focus of .onion use and discussion has traditionally been on the offering of hidden services, services that separate their reachability from the identification of their IP addresses. We argue that Tor’s .onion system can ...
This study was purposed to investigate the effect of onion or beet on plasma and liver lipids, erythrocyte Na efflux channels and platelet aggregation in simvastatin (SIM) treated hypercholesterolemic rats. Forty Sprague Dawley rats were divided into four groups and fed 0.5% cholesterol based diets containing 2 mg/kg BW simvastatin or simvastatin with 5% onion or beet powder. Plasma total chole...
Trust-based onion routing employs users’ own trust to circumvent compromised onion routers. However, it runs a high risk of being deanonymized by the inference attacks based on a priori trust relationships. In this paper, we first observe that the onion routers with higher trust degrees (e.g., those that are trusted by more other users) are more effective in defending against the inference atta...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید