نتایج جستجو برای: ssh

تعداد نتایج: 1254  

2004
Arnold L. Gordon Claudia F. Giulivi

Satellite altimetric data from September 1992 to January 2002 and hydrographic data from 1927 to 1999 reveal the presence of low-frequency variability of sea surface height (SSH) within the Japan/East Sea (JES). SSH interannual variability amounting to approximately 15 cm is in phase with the Pacific Decadal Oscillation (PDO), with higher SSH, warmer, fresher surface (upper 200 dbar) layer duri...

Journal: :Plant physiology and biochemistry : PPB 2011
Thirugnanasambantham Krishnaraj Prabu Gajjeraman Senthilkumar Palanisamy Suresh Ramraj Subhas Chandrabose Abul Kalam Azad Mandal

Growth regulation associated with dormancy is an essential element in plant's life cycle that leads to changes in expression of large number of genes. Forward and reverse suppression subtractive hybridization (SSH) libraries were developed to identify and characterize the genes associated with bud (banjhi) dormancy in tea (Camellia sinensis (L.) O. Kuntze). Efficiency of subtraction was confirm...

2010
Gaven James Watson Steven Galbraith

This thesis illustrates and examines the gap that exists between theoretical and practical cryptography. Provable security is a useful tool which allows cryptographers to perform formal security analyses within a strict mathematical framework. Unfortunately, the formal modelling of provable security sometimes fails to match how particular schemes or protocols are implemented in real life. We ex...

Journal: :Ciencia & saude coletiva 2015
Iara Coelho Zito Guerriero Maria Lúcia Magalhães Bosi

The development of guidelines on research ethics for social science and humanities (SSH) takes place in the scientific field, marked by disputes aimed at the establishment of hegemonic scientific standard. In Brazil, the National Health Council is responsible for approving these guidelines, which involve certain specificities. Based on the authors' experience in the SSH Working Group of the Nat...

2006
Stuart E. Schechter Jaeyeon Jung Will Stockwell Cynthia D. McLain

Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses from users’ address lists or mail archives. We examine how host addresses harvested from Secure Shell (SSH) clients’ known hosts files can aid those attacking SSH servers. Each user’s known hosts file contains the names...

Journal: :علوم و فنون زنبور عسل 0

abstract   in this study, three groups of honey [natural honey; honey produced by the supplementary feeding of bees with saccharose syrup (ssh) and heat and acid (88 _ċ 2 h; 0.1% hcl) treated saccharose syrup honey (issh)] were produced and physicochemical (water content, ph, free acidity, ash, hmf, diastase activity, sucrose, protein and viscosity), microbiological and sensory properties of th...

Journal: :The Journal of Cell Biology 2007
Zhexing Wen Liang Han James R. Bamburg Sangwoo Shim Guo-li Ming James Q. Zheng

Bone morphogenic proteins (BMPs) are involved in axon pathfinding, but how they guide growth cones remains elusive. In this study, we report that a BMP7 gradient elicits bidirectional turning responses from nerve growth cones by acting through LIM kinase (LIMK) and Slingshot (SSH) phosphatase to regulate actin-depolymerizing factor (ADF)/cofilin-mediated actin dynamics. Xenopus laevis growth co...

Journal: :Applied and environmental microbiology 2008
Susan K De Long Kerry A Kinney Mary Jo Kirisits

Molecular biology tools can be used to monitor and optimize biological treatment systems, but the application of nucleic acid-based tools has been hindered by the lack of available sequences for environmentally relevant biodegradation genes. The objective of our work was to extend an existing molecular method for eukaryotes to prokaryotes, allowing us to rapidly identify differentially expresse...

2015
A. Elefante M. Cavaliere C. Russo G. Caliendo M. Marseglia D. Cicala D. Piccolo A. Di Lullo L. Brunetti A. Palma M. Iengo A. Brunetti

INTRODUCTION AND PURPOSE Diffusion weighted imaging (DWI) has been proven to be valuable in the diagnosis of middle ear cholesteatoma. The aims of our study were to evaluate the advantage of multi-shot turbo spin echo (MSh TSE) DWI compared to single-shot echo-planar (SSh EPI) DWI for the diagnosis of cholesteatoma. MATERIAL AND METHODS Thirty-two patients with clinical suspicion of unilatera...

2004
Ole Martin Dahl

Virtual private networks (VPNs) [1] [6] provide low-cost and secure access between hosts and/or networks. IPsec, TLS/SSL and SSH are popular technologies used to create VPNs. This article will point out some of the differences and limitations of using IPsec, TLS/SSL or SSH as VPN-solution.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید