نتایج جستجو برای: ephemeral stream

تعداد نتایج: 60704  

Journal: :Revue scientifique et technique 2006
E M E Abu-Elzein A I Al-Afaleq F M T Housawi A M Al-Basheir

A nationwide study was conducted in Saudi Arabia to determine if bovine ephemeral fever (BEF) was present in cattle between 1993 and 1995. The study had two components: the first was establishment of sentinel herds of cattle in some localities, the second was to conduct a nationwide serological survey. The results indicated that Saudi Arabia was free of BEF during the period of study and that t...

Journal: :The Onderstepoort journal of veterinary research 1969
A Theodoridis

THEODORIDIS, A. Fluorescent antibody studies on ephemeral fever virus. Onderstepoort J. vet. Res., 36 (2) , 187-190, 1969. The preparation and use of a highly wecific fluorescein-conjugated antiserum against bovine ~phemeral fever virus are described. The demonstration of fluorescent cytoplasmic inclusions IS a dependable diagnostic test. The test also revealed cross reactions between the vir u...

2015
Antoine Boutet Stéphane Frénot Frédérique Laforest Pascale Launay Nicolas Le Sommer Yves Mahéo Damien Reimert

The C3PO project promotes the development of new kind of social networks called Spontaneous and Ephemeral Social Networks (SESNs) dedicated to happenings such as cultural or sport events. SESNs rely on both opportunistic networks formed dynamically by the mobile devices of event attendees, and on an event-based communication model. Therefore, user can exchange digital contents with the other me...

Journal: :IACR Cryptology ePrint Archive 2009
Qingfeng Cheng Chuangui Ma

Recently, Dario Fiore and Rosario Gennaro proposed the IB-KA protocol, which was inspired by MQV protocol. They provide a full proof of security of IB-KA protocol using techniques developed by Krawczyk in the Canetti-Krawczyk model. They designed the IB-KA protocol with some security properties such as perfect forward secrecy, reflection attack resilience, and key compromise impersonation resil...

Journal: :Archives of environmental contamination and toxicology 2008
W W Stephens M T Moore J L Farris J L Bouldin C M Cooper

The watershed approach, currently used to assess regional streams in the United States, emphasizes least-disturbed reference conditions. Consideration of extensive wadable drainage systems found in Arkansas and Mississippi deltas challenges concepts of disturbance within a landscape of historic agricultural land use. Seventeen wadable drainage ditch sites in Arkansas and Mississippi deltas were...

M.R. Seyfi Abad Shapouri M.T. Beigi Nassiri R. Pasandideh,

Epitope-G1 of bovine ephemeral fever virus (BEFV) G glycoprotein has been genetically and antigenically conserved among various isolates of BEFV and only reacts with anti-BEFV neutralising antibodies. Therefore, it is a candidate antigen for development of the enzyme linked immunosorbent assay (ELISA) for serological identification bovine ephemeral fever (BEF)-infected animals. The aim of this ...

Journal: Desert 2018
A. Goudie

In drylands, both dust storms and ephemeral salt lakes (playas) are common. Observations using remote sensing and ground studies have shown that these playas can be major sources of saline dust storms. Some basins have recently become desiccated as a result of water abstraction by humans, and these have become significant sources of dust. The timing and amounts of dust emissions depends on such...

Journal: :IACR Cryptology ePrint Archive 2016
Mojahed Mohamed Xiaofen Wang Xiaosong Zhang

Design secure Authenticated Key Exchange (AKE) protocol without NAXOS approach is remaining as an open problem. NAXOS approach [4] is used to hide the secret ephemeral key from an adversary even if the adversary in somehow may obtain the ephemeral secret key. Using NAXOS approach will cause two main drawbacks, (i) leaking of the static secret key which will be used in computing the exponent of ...

2005
Justin F. Costelloe Rodger B. Grayson Thomas A. McMahon

Australian arid zone ephemeral rivers are typically unregulated and maintain a high level of biodiversity and ecological health. Understanding the ecosystem functions of these rivers requires an understanding of their hydrology. These rivers are typified by highly variable hydrological regimes and a paucity, often a complete absence, of hydrological data to describe these flow regimes. A daily ...

2009
Minkyu Kim Atsushi Fujioka Berkant Ustaoglu

LaMacchia, Lauter and Mityagin [15] proposed the extended Canetti-Krawczyk (eCK) model and an AKE protocol, called NAXOS. Unlike previous security models, the adversary in the eCK model is allowed to obtain ephemeral secret information related to the test session, which makes the security proof difficult. To overcome this NAXOS combines an ephemeral private key x with a static private key a to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید