نتایج جستجو برای: chaff

تعداد نتایج: 571  

Journal: :Annals of Clinical Biochemistry: International Journal of Laboratory Medicine 2006

Journal: :The British journal of nutrition 1980
R G Redman R C Kellaway J Leibholz

1. Expt 1. Five 150 kg steers with ruminal, abomasal and ileal cannulas were given 3000 g oaten chaff daily plus pelleted supplement with no added nitrogen (diet A) of 50 g N/d as urea (diet B), casein (diet C), casein and formaldehyde-treated casein (HCHO-casein) (50:50 w/w; diet D) and HCHO-casein (diet E), in a 5 x 5 Latin square design. The basal diet and supplement were fed in eight equal ...

2007
Sungju Lee Daesung Moon Yongwha Chung

Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features, i.e., adding “chaff” minutiae into the original minutiae set. Also, solutions to the most challenging issue in applying the fuzzy vault to fingerprint(i....

Journal: :Plant physiology 2008
Jessica Bertheloot Pierre Martre Bruno Andrieu

In monocarpic species, during the reproductive stage the growing grains represent a strong sink for nitrogen (N) and trigger N remobilization from the vegetative organs, which decreases canopy photosynthesis and accelerates leaf senescence. The spatiotemporal distribution of N in a reproductive canopy has not been described in detail. Here, we investigated the role of the local light environmen...

Journal: :Parallel Computing 2006
Wahid Chrabakh Richard Wolski

In this paper, we present GridSAT – a distributed and high performance complete satisfiability solver – and its application to a set of complex and previously unsolved satisfiability problems. Based on the sequential Chaff [32] algorithm, we combine new distributed clause “learning” techniques with an efficient and autonomous grid implementation both to speed the time to solution and to solve p...

Journal: :JoWUA 2011
Giovanni Di Crescenzo Abhrajit Ghosh Abhinay Kampasi Rajesh Talpade Yin Zhang

Network attackers frequently use a chain of compromised intermediate nodes to attack a target machine and maintain anonymity. This chain of nodes between the attacker and the target is called a stepping stone chain. Various classes of algorithms have been proposed to detect stepping stones, timing correlation based algorithms being a recent one that is attracting significant research interest. ...

Journal: :Journal of Production and Industrial Engineering 2022

Solar energy is a renewable energy. Earth continuously intercepts solar power of about 1.78 x 1011 MW. By using converging devices may be converted into other form Use in agricultural field essential now-a-days. photovoltaic system converts directly electrical cell [3]. Increasing wind velocity improved the generated by panel [6]. The main aim this paper experimental study and testing operated ...

Journal: :The British journal of nutrition 1994
P M Harris J Lee B R Sinclair B P Treloar M P Gurnsey

Sheep fed on either a low (500 g lucern (Medicago sativa) chaff/d; L) or high (1100 g lucerne chaff/d; H) intake had measurements made, using arterio-venous techniques, of blood flow and energy metabolite and cysteine utilization in the skin. Sheep on the H intake had significantly increased skin blood flow (P = 0.014) and oxygen uptake (P = 0.05). Although the H sheep had higher skin blood flo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید