نتایج جستجو برای: tor grypus

تعداد نتایج: 8028  

2010
ruth h. leeney annette c. broderick cheryl mills

This study investigated the phenology, patterns of haul-out habitat use and distribution of the grey seal around Cornwall and the Isles of Scilly. A full census of the coast was carried out by boat over 4 days, in order to make a full count of seals hauled out and close to the coast, and to document all haul-out sites. Regular land-based surveys were made of three haul-out sites in Cornwall, to...

2015
William D Bowen Cornelia E den Heyer Jim I McMillan Sara J Iverson

Offspring size affects survival and subsequent reproduction in many organisms. However, studies of offspring size in large mammals are often limited to effects on juveniles because of the difficulty of following individuals to maturity. We used data from a long-term study of individually marked gray seals (Halichoerus grypus; Fabricius, 1791) to test the hypothesis that larger offspring have hi...

Journal: :Transportation Research Part F-traffic Psychology and Behaviour 2022

During automated driving (SAE Level 3), drivers can delegate control of the vehicle and monitoring road to an system. They may then devote themselves tasks other than gradually lose situational awareness (SA). This could result in difficulty regaining when system requires it. In this simulator study, level SA was manipulated through time spent performing a non-driving task (NDRT), which alterna...

Aghaei Bahmanbeglou, Neda, Amirahmadi, Mousa, Sherafati Moghadam, Mohammad,

Background: AMPK and P53 proteins regulate the TOR protein in the TORC1 complex, which regulates many physiological processes. The aim of this study was to evaluate the effect of AMPK and P53 proteins on the TOR pathway following endurance training in the left ventricle of the heart of diabetic rats by streptozotocin and nicotinamide. Methods: In this experimental study, 12 head two-month-old ...

Journal: :PoPETs 2016
Mauro Conti Stephen Crane Tommaso Frassetto Andrei Homescu Georg Koppen Per Larsen Christopher Liebchen Mike Perry Ahmad-Reza Sadeghi

Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI in...

ژورنال: اکوبیولوژی تالاب 2015
عبدی, اسماعیل, علیشاهی, مجتبی, محمدیان, تکاور,

در این تحقیق سمیت حاد سم علف‌کش آترزین در چهار گونه­ی ماهی بومی استان خوزستان، شامل ماهی بنی  Mesopotamichthys sharpeyi ، شیربت Tor  grypus، عنزه Luciobarbus  esocinus و گطان Luciobarbus  xanthopterus موردبررسی قرار گرفت (پاییز 1392، آزمایشگاه بخش بهداشت و بیماری­های آبزیان دانشکده دامپزشکی، دانشگاه شهید چمران اهواز). بدین منظور از روش استاندارد OECD (Organization for Economic Cooperation and D...

2009
Prithula Dhungel Moritz Steiner Ivica Rimac Volker Hilt Keith W. Ross

Although Tor is the most widely used system for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which are sensitive to latency, it is critical to reduce delays in Tor. To take an important step in this direction, we seek an in-depth understanding of delays in Tor. By taking snapshots of the entire Tor network within a...

Journal: :Annals and Magazine of Natural History 1874

2009

Methods Fly stocks All crosses were carried out at 25oC under standard conditions. tor mutants were obtained by crossing tor with tor mutants. tor is the strongest constitutively activated tor mutation. pgc null mutant allele corresponds to the P-element insertion EY7794 (Martinho et al., 2004). pgc and tor double mutants stocks were obtained by recombination with tor or tor mutant alleles, and...

Journal: :MATEC web of conferences 2021

Based on Tor, an anonymous DDoS attack is proposed, and the attacker of this very difficult to trace due strong anonymity Tor. Through conducting experiments in different network environment making analyzation security, results demonstrate effectiveness attack, strategy defense also discussed.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید