نتایج جستجو برای: grain security

تعداد نتایج: 239212  

2004
Arvid Hawk

MANAGEMENT OF GRAIN QUALITY AND SECURITY IN WORLD MARKEETS Officers Chairman ..................................................................................................................Dirk Maier, Purdue University, IN Vice Chairman...........................................................Marvin Paulsen, University of Illinois at Urbana-Champaign, IL Secretary ..............................

2014
Xiao Wang Marija Vignjevic Dong Jiang Susanne Jacobsen Bernd Wollenweber

Drought stress occurring during the reproductive growth stage leads to considerable reductions in crop production and has become an important limiting factor for food security globally. In order to explore the possible role of drought priming (pre-exposure of the plants to mild drought stress) on the alleviation of a severe drought stress event later in development, wheat plants were subjected ...

2010
Simon Knellwolf Willi Meier María Naya-Plasencia

Non-linear feedback shift registers are widely used in lightweight cryptographic primitives. For such constructions we propose a general analysis technique based on differential cryptanalysis. The essential idea is to identify conditions on the internal state to obtain a deterministic differential characteristic for a large number of rounds. Depending on whether these conditions involve public ...

2017
Vahid Amin Ghafari Honggang Hu Ying Chen

A few lightweight stream ciphers were introduced for hardware applications in the eSTREAM project. In FSE 2015, while presenting a new idea (i.e. the design of stream ciphers with the shorter internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Unfortunately, Sprout is insecure. Because Grain-v1 is the lightest cipher i...

Journal: :IACR Cryptology ePrint Archive 2014
Yongzhuang Wei Enes Pasalic Fengrong Zhang W. Wu

A novel internal state recovery attack on the whole Grain family of ciphers is proposed in this work. It basically uses the ideas of BSW sampling along with employing a weak placement of the tap positions of the driving LFSRs. The currently best known complexity trade-offs are obtained, and due to the structure of Grain family these attacks are also key recovery attacks. It is shown that the in...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

2010
Nicholas J. Macias Peter M. Athanas

Unique characteristics of biological systems are described, and similarities are made to certain computing architectures. The security challenges posed by these characteristics are discussed. A method of securely isolating portions of a design using introspective capabilities of a fine-grain self-configurable device is presented. Experimental results are discussed, and plans for future work are...

2012
Leanid Krautsevich Fabio Martinelli Artsiom Yautsiukhin

We describe our model for the behaviour of an attacker. In the model, the attacker has uncertain knowledge about a computer system. Moreover, the attacker tries different attack paths if initially selected ones cannot be completed. The model allows finer-grain analysis of the security of computer systems. The model is based on Markov Decision Processes theory for predicting possible attacker’s ...

Journal: :زراعت دیم ایران 0
مجید عبدلی دانشجوی دکتری دانشگاه مراغه عزت اله اسفندیاری دانشیار دانشگاه مراغه

due to extent of zinc (zn) deficiency in soils of iran and its deficiency in human diet, this study investigated the effect of zn sulfate foliar applications (non-foliar application, 0.5 g/l at stem elongation stage, 0.5 g/l at stem elongation and grain filling stages, 0.5 g/l at stem elongation and 2 g/l at grain filling stages) on yield and its components (farm sector) and influence of grain ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید