نتایج جستجو برای: horse

تعداد نتایج: 14847  

2012
Christian Krieg Edgar Weippl

Malicious hardware is a fairly new research topic that has attracted the interest of the scientific community. Therefore, numerous approaches have been proposed in the last years to counter the threat of so-called hardware Trojans. This chapter describes malicious hardware in the context of the security of hardware infrastructure components. Network infrastructure plays a vital role in our ever...

Journal: :iranian journal of veterinary medicine 2014
majid masoudifard alireza vajhi shahram mansouri mohammad molazem alireza bahonar

the akhal-teke is an ancient horse originat-ing from asia where it was used by nomadic tribes and used as a warhorse. lameness examinations require proper interpretation of clinical and radiographic findings. therefore, understanding of normal radiographic findings of the foot is necessary. although the radiographic appearance of the normal foot must be understood to recognize abnormalities ,th...

2010
Rob Pilsworth Rod A. W. Rosychuk

Journal: :Animal genetics 2003
B Wallner G Brem M Müller R Achmann

The phylogenetic relationship between Equus przewalskii and E. caballus is often a matter of debate. Although these taxa have different chromosome numbers, they do not form monophyletic clades in a phylogenetic tree based on mtDNA sequences. Here we report sequence variation from five newly identified Y chromosome regions of the horse. Two fixed nucleotide differences on the Y chromosome clearl...

2002
Rohit Parikh

Two horsemen are on a forest path chatting about something. A passerby M , the mischief maker, comes along and having plenty of time and a desire for amusement, suggests that they race against each other to a tree a short distance away and he will give a prize of $100. However, there is an interesting twist. He will give the $100 to the owner of the slower horse. Let us call the two horsemen Bi...

Journal: :J. Computing in Higher Education 2010
Lawrence Baines Leigh Chiarelott

2012

Hardware design houses are increasingly outsourcing designs to be manufactured by cheaper fabrication facilities due to economic factors and market forces. This raises the question of trustable manufactured products for highly sensitive applications. One such type of trust issue is the possible incorporation of Trojan circuits into the IC with the goal of tampering with IC reliability and haste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید