نتایج جستجو برای: grain security

تعداد نتایج: 239212  

2009
Fangfang Chen Chunlu Wang Zhihong Tian Shuyuan Jin Tianle Zhang

Attack graph is an integral part of modeling the overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at the whole network, which makes the process of AGG complex and non-scalable. In this paper, we...

2017
Prabhu Pingali Bhaskar Mittra Andaleeb Rahman

Food Policy, in much of Asia, has been slow to transition from its historic focus on staple grain self-sufficiency to a more integrated approach to nutrition security. Research and policy discussions continue to focus on hunger and calorie deficiency rather than on the need for a balanced diets to address chronic micronutrient malnutrition and the emerging problems of over weight and obesity. S...

Journal: :Journal of Development and Agricultural Economics 2015

2012
Kunwar Singh Vaisla

Role-based access control models have attracted appreciable research interest in past time due to their providing some flexibility to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, we explains the drawbacks of RBAC96 model in the aspect of the authorization, access rules and fine-grain access controls in t...

2008
Yliès Falcone Jean-Claude Fernandez Laurent Mounier

Runtime enforcement is a powerful technique to ensure that a program will respect a given security policy. We extend previous works on this topic in several directions. Firstly, we propose a generic notion of enforcement monitors based on a memory device and finite sets of control states and enforcement operations. Moreover, we specify their enforcement abilities w.r.t. the general safety-progr...

2015
Xuejun Dai Yuhua Huang Lu Chen Tingting Lu Sheng Zhao

A new lightweight stream cipher, SVH, is proposed. The design targets hardware environments where gate count, power consumption and memory is very limited. It is based on dual pseudo-random transformation and output feedback. The block of key size is 64 bits and SVH can achieve sufficient security margin against known attacks, such as linear cryptanalysis, differential cryptanalysis, impossible...

Journal: :Journal of experimental botany 2011
M John Foulkes Gustavo A Slafer William J Davies Pete M Berry Roger Sylvester-Bradley Pierre Martre Daniel F Calderini Simon Griffiths Matthew P Reynolds

A substantial increase in grain yield potential is required, along with better use of water and fertilizer, to ensure food security and environmental protection in future decades. For improvements in photosynthetic capacity to result in additional wheat yield, extra assimilates must be partitioned to developing spikes and grains and/or potential grain weight increased to accommodate the extra a...

Journal: :Environmental science & technology 2011
Morgan E Gallagher William C Hockaday Caroline A Masiello Sieglinde Snapp Claire P McSwiney Jeffrey A Baldock

Concerns about energy security and climate change have increased biofuel demand, particularly ethanol produced from cellulosic feedstocks (e.g., food crop residues). A central challenge to cropping for cellulosic ethanol is the potential environmental damage from increased fertilizer use. Previous analyses have assumed that cropping for carbohydrate in residue will require the same amount of fe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید