Results 21 to 30 of about 50,359 (255)
Relatório de Progresso da Implementação do PANA II - ANO 2005 [PDF]
O presente relatório diz respeito a implementação do Segundo Plano de Acção Nacional para o Ambiente – PANA II, referente ao ano de 2005, com a seguinte estrutura: Introdução, Enquadramento, Estado da execução, Balanço Orçamental e ...
DGA, Coordenação
core +3 more sources
Transformator merupakan peralatan utama dalam pemasokan listrik dari unit pembangkitan menuju konsumen. Oleh karena itu, perlu perhatian khusus dalam pemeliharaan kinerja transformator agar tidak terjadi kerusakan pada transformator.
Abdul Syakur, Wildan Lazuardi
doaj +1 more source
Field tests and computational simulations of the explosion of buried charges
Modelling buried explosion is a matter of concern for vehicle protection. Indeed, in the battlefield, Improvised Explosive Devices (IEDs) are one of the major threats for land vehicles and, more specifically, for their underbelly.
Roger Eve +2 more
doaj +1 more source
An Evaluation of DGA Classifiers [PDF]
Domain Generation Algorithms (DGAs) are a popular technique used by contemporary malware for command-and-control (C&C) purposes. Such malware utilizes DGAs to create a set of domain names that, when resolved, provide information necessary to establish a link to a C&C server.
Sivaguru, R. +5 more
openaire +3 more sources
General Diffusion Analysis: How to Find Optimal Permutations for Generalized Type-II Feistel Schemes
Type-II Generalized Feistel Schemes are one of the most popular versions of Generalized Feistel Schemes. Their round function consists in applying a classical Feistel transformation to p sub-blocks of two consecutive words and then shifting the k = 2p ...
Victor Cauchois +2 more
doaj +1 more source
Dental general anaesthetic receipt among Australians aged 15+ years, 1998–1999 to 2004–2005
Background Adults receive dental general anaesthetic (DGA) care when standard dental treatment is not possible. Receipt of DGA care is resource-intensive and not without risk.
Roberts-Thomson Kaye F, Jamieson Lisa M
doaj +1 more source
The cardinality of the augmentation category of a Legendrian link [PDF]
We introduce a notion of cardinality for the augmentation category associated to a Legendrian knot or link in standard contact R^3. This `homotopy cardinality' is an invariant of the category and allows for a weighted count of augmentations, which we ...
Ng, Lenhard +3 more
core +1 more source
Command and control (C2) servers are used by attackers to operate communications. To perform attacks, attackers usually employee the Domain Generation Algorithm (DGA), with which to confirm rendezvous points to their C2 servers by generating various ...
Fangli Ren +3 more
doaj +1 more source
Conormal bundles, contact homology and knot invariants [PDF]
We summarize recent work on a combinatorial knot invariant called knot contact homology. We also discuss the origins of this invariant in symplectic topology, via holomorphic curves and a conormal bundle naturally associated to the knot.Comment: This is ...
Ng, Lenhard
core +5 more sources
Global transcriptional profiling of tyramine and d-glucuronic acid catabolism in Salmonella
Salmonella has evolved various metabolic pathways to scavenge energy from the metabolic byproducts of the host gut microbiota, however, the precise metabolic byproducts and pathways utilized by Salmonella remain elusive.
Raquel Burin, Devendra H. Shah
doaj +1 more source

