نتایج جستجو برای: rao nam cryptosystem

تعداد نتایج: 16923  

Journal: :Toxicological sciences : an official journal of the Society of Toxicology 2004
Melissa A Haendel Fred Tilton George S Bailey Robert L Tanguay

Sodium metam (NaM), a dithiocarbamate, is a general agricultural biocide applied prior to planting for the elimination of nematodes, soil pathogens, and weeds. There is a remarkable paucity of information about the mechanism of action and the risk that dithiocarbamates may pose to developing vertebrates. We have characterized NaM toxicity during early life stage exposure in zebrafish. Zebrafish...

2012
Lynn S. Kimsey

The chrysidid genus Loboscelidia is reviewed and 11 new species are described, including Loboscelidia cinnamonea (Borneo), Loboscelidia fulgens (Viet Nam), Loboscelidia fulva (Thailand), Loboscelidia incompleta (India), Loboscelidia kafae (Borneo), Loboscelidia laminata (Viet Nam), Loboscelidia meifungae (Borneo), Loboscelidia nasiformis (Thailand), Loboscelidia nitidula (Thailand), Loboscelidi...

2008
Hideki Okamoto Tomoko Matsui Hiromichi Kawanami Hiroshi Saruwatari Kiyohiro Shikano

We investigate a novel method for speaker verification with non-audible murmur (NAM) segments. NAM is recorded using a special microphone placed on the neck and is hard for other people to hear. We have already reported a method based on a support vector machine (SVM) using NAM segments to use a keyword phrase effectively. To further exploit keyword-specific features, we introduce a global alig...

2016
Xi-Feng Zhang Sangiliyandi Gurunathan

Graphene has been shown much interest, both in academics and industry due to its extraordinary physical, chemical, and biological proprieties. It shows great promises in biotechnological and biomedical applications as an antibacterial and anticancer agent, nanocarrier, sensor, etc. However, many studies demonstrated the toxicity of graphene in several cell lines, which is an obstacle to its use...

Journal: :J. UCS 2001
Egon Börger Diego Sona

In an attempt to capture the fundamental features that are common to neural networks, we define a parameterized Neural Abstract Machine (NAM ) in such a way that the major neural networks in the literature can be described as natural extensions or refinements of the NAM . We illustrate the refinement for feedforward networks with back-propagation training. The NAM provides a platform and progra...

1999
Deborah Estrin Mark Handley John Heidemann Steven McCanne Ya Xu Haobo Yu

Protocol design requires understanding state distributed across many nodes, complex message exchanges, and with competing traÆc. Traditional analysis tools (such as packet traces) too often hide protocol dynamics in a mass of extraneous detail. This paper presents nam , a network animator that provides packet-level animation and protocol-speci c graphs to aid the design and debugging of new net...

2017
Sophie Bouchet Marcus O Olatoye Sandeep R Marla Ramasamy Perumal Tesfaye Tesso Jianming Yu Mitch Tuinstra Geoffrey P Morris

Adaptation of domesticated species to diverse agroclimatic regions has led to abundant trait diversity. However, the resulting population structure and genetic heterogeneity confounds association mapping of adaptive traits. To address this challenge in sorghum [Sorghum bicolor (L.) Moench]-a widely adapted cereal crop-we developed a nested association mapping (NAM) population using 10 diverse g...

2004
Panikos Heracleous Yoshitaka Nakajima Akinobu Lee Hiroshi Saruwatari Kiyohiro Shikano

In this paper, we introduce the Stethoscopic Non-Audible Murmur (NAM) microphone, and we focus on its application in automatic speech recognition systems. The NAM microphone is attached behind the talker’s ear, and can capture very quietly uttered murmur (NAM speech). It is applicable in automatic speech recognition systems, when privacy is important in human-machine communication. Moreover, si...

2004
Bin Zhang Hongjun Wu Dengguo Feng Feng Bao

In this paper we break a knapsack based two-lock cryptosystem proposed at ICICS’03 [7]. The two-lock cryptosystem is a commutative encryption algorithm that is very useful for the construction of the general t-out-of-n oblivious transfers and millionaire protocol. However, our analysis shows that the proposed knapsack based two-lock cryptosystem is extremely insecure. The serious flaw is that t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید