نتایج جستجو برای: ssh
تعداد نتایج: 1254 فیلتر نتایج به سال:
Satellite altimetric data from September 1992 to January 2002 and hydrographic data from 1927 to 1999 reveal the presence of low-frequency variability of sea surface height (SSH) within the Japan/East Sea (JES). SSH interannual variability amounting to approximately 15 cm is in phase with the Pacific Decadal Oscillation (PDO), with higher SSH, warmer, fresher surface (upper 200 dbar) layer duri...
Growth regulation associated with dormancy is an essential element in plant's life cycle that leads to changes in expression of large number of genes. Forward and reverse suppression subtractive hybridization (SSH) libraries were developed to identify and characterize the genes associated with bud (banjhi) dormancy in tea (Camellia sinensis (L.) O. Kuntze). Efficiency of subtraction was confirm...
This thesis illustrates and examines the gap that exists between theoretical and practical cryptography. Provable security is a useful tool which allows cryptographers to perform formal security analyses within a strict mathematical framework. Unfortunately, the formal modelling of provable security sometimes fails to match how particular schemes or protocols are implemented in real life. We ex...
The development of guidelines on research ethics for social science and humanities (SSH) takes place in the scientific field, marked by disputes aimed at the establishment of hegemonic scientific standard. In Brazil, the National Health Council is responsible for approving these guidelines, which involve certain specificities. Based on the authors' experience in the SSH Working Group of the Nat...
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses from users’ address lists or mail archives. We examine how host addresses harvested from Secure Shell (SSH) clients’ known hosts files can aid those attacking SSH servers. Each user’s known hosts file contains the names...
abstract in this study, three groups of honey [natural honey; honey produced by the supplementary feeding of bees with saccharose syrup (ssh) and heat and acid (88 _ċ 2 h; 0.1% hcl) treated saccharose syrup honey (issh)] were produced and physicochemical (water content, ph, free acidity, ash, hmf, diastase activity, sucrose, protein and viscosity), microbiological and sensory properties of th...
Bone morphogenic proteins (BMPs) are involved in axon pathfinding, but how they guide growth cones remains elusive. In this study, we report that a BMP7 gradient elicits bidirectional turning responses from nerve growth cones by acting through LIM kinase (LIMK) and Slingshot (SSH) phosphatase to regulate actin-depolymerizing factor (ADF)/cofilin-mediated actin dynamics. Xenopus laevis growth co...
Molecular biology tools can be used to monitor and optimize biological treatment systems, but the application of nucleic acid-based tools has been hindered by the lack of available sequences for environmentally relevant biodegradation genes. The objective of our work was to extend an existing molecular method for eukaryotes to prokaryotes, allowing us to rapidly identify differentially expresse...
INTRODUCTION AND PURPOSE Diffusion weighted imaging (DWI) has been proven to be valuable in the diagnosis of middle ear cholesteatoma. The aims of our study were to evaluate the advantage of multi-shot turbo spin echo (MSh TSE) DWI compared to single-shot echo-planar (SSh EPI) DWI for the diagnosis of cholesteatoma. MATERIAL AND METHODS Thirty-two patients with clinical suspicion of unilatera...
Virtual private networks (VPNs) [1] [6] provide low-cost and secure access between hosts and/or networks. IPsec, TLS/SSL and SSH are popular technologies used to create VPNs. This article will point out some of the differences and limitations of using IPsec, TLS/SSL or SSH as VPN-solution.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید