نتایج جستجو برای: tiger bush

تعداد نتایج: 8999  

2006
John Kelsey Stefan Lucks

We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 2 compression function invocations. This extends to a collision-finding attack on 17 rounds of the Tiger hash function in time of about 2 compression function invocations. Another attack generates circular near-collisions, for 20 rounds of Tiger with work less than that of 2 compression f...

2014
Carl G. Meyer Joseph M. O'Malley Yannis P. Papastamatiou Jonathan J. Dale Melanie R. Hutchinson James M. Anderson Mark A. Royer Kim N. Holland

Tiger sharks (Galecerdo cuvier) are apex predators characterized by their broad diet, large size and rapid growth. Tiger shark maximum size is typically between 380 & 450 cm Total Length (TL), with a few individuals reaching 550 cm TL, but the maximum size of tiger sharks in Hawaii waters remains uncertain. A previous study suggested tiger sharks grow rather slowly in Hawaii compared to other r...

2005
Richard Damania Randy Stringer K. Ullas Karanth Brad Stith

The tiger (Panthera tigris) is classiŽ ed as endangered and populations continue to decline. This paper presents a formal economic analysis of the two most imminent threats to the survival of wild tigers: poaching tigers and hunting their prey. A model is developed to examine interactions between tigers and farm households living in and around tiger habitats. The analysis extends the existing l...

2015
Danna Yu Jiayong Zhang Peng Li Rongquan Zheng Chen Shao

he Chinese tiger frog Hoplobatrachus rugulosus is widely distributed in southern China, Malaysia, Myanmar, Thailand, and Vietnam. It is listed in Appendix II of CITES as the only Class II nationally-protected frog in China. The bred tiger frog known as the Thailand tiger frog, is also identified as H. rugulosus. Our analysis of the Cyt b gene showed high genetic divergence (13.8%) between wild ...

Journal: :Genome 2004
S Kirankumar T J Pandian

Interspecific androgenetic rosy barb (Puntius conchonius) was generated using its cadaveric (-20 degrees C) or fresh sperm to activate nuclear genome inactivated oocytes of gray tiger barb (Puntius tetrazona). UV irradiation was used to inactivate nuclear genome of tiger barb oocytes. Thermal shock restored diploidy of rosy barb in the oocytes of tiger barb. Survival of androgenotes was 14% or ...

1996
Roger L. Haskin Frank B. Schmuck

Tiger Shark is a parallel file system for IBM’s AIX operating system. It is designed to support interactive multimedia, particularly large-scale systems such as interactive television (ITV). Tiger Shark scales across the entire RS/ 6000 product line, from small desktop machines to the SP2 parallel supercomputer. Tiger Shark’s primary features are support for continuoustime data, scalability, hi...

2012
Patlolla Anuradha Reddy Digpal Singh Gour Maradani Bhavanishankar Kanika Jaggi Shaik Mohammed Hussain Katakam Harika Sisinthy Shivaji

BACKGROUND Majority of the tiger habitat in Indian subcontinent lies within high human density landscapes and is highly sensitive to surrounding pressures. These forests are unable to sustain healthy tiger populations within a tiger-hostile matrix, despite considerable conservation efforts. Ranthambore Tiger Reserve (RTR) in Northwest India is one such isolated forest which is rapidly losing it...

2010
Harold Bennett Dennis Burke David Lutzer

In this paper we study an example-machine Bush(S, T ) where S and T are disjoint dense subsets of R. We find some topological properties that Bush(S, T ) always has, others that it never has, and still others that Bush(S, T ) might or might not have, depending upon the choice of the disjoint dense sets S and T . For example, we show that every Bush(S, T ) has a point-countable base, is heredita...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید