|
|
|
Rakesh Dawar, Vishwanath Rohidas Yalamalle, Ram Swaroop Bana, Ramanjit Kaur, Yashbir Singh Shivay, Anil K. Choudhary, Teekam Singh, Samrath Lal Meena, Dunna Vijay, H. P. Vijayakumar, Vipin Kumar and Achchhelal Yadav
Little mallow (Malva parviflora L.) is a notorious weed that causes substantial yield losses in winter crops. For effective weed management and seed testing, a deeper understanding of seed dormancy, germination behavior, and dormancy-breaking methods is ...
ver más
|
|
|
|
|
|
|
Ricardo P. Arciniega-Rocha, Vanessa C. Erazo-Chamorro, Paúl D. Rosero-Montalvo and Gyula Szabó
An erroneous squat movement might cause different injuries in amateur athletes who are not experts in workout exercises. Even when personal trainers watch out for the athletes? workout performance, light variations in ankles, knees, and lower back moveme...
ver más
|
|
|
|
|
|
|
Somasundaram Jayaraman, Meenakshi Sahu, Nishant K. Sinha, Monoranjan Mohanty, Ranjeet S. Chaudhary, Brijesh Yadav, Lalit K. Srivastava, Kuntal M. Hati, Ashok K. Patra and Ram C. Dalal
Conservation agriculture (CA), comprising of minimum soil disturbance and crop residue retention (>30%), with a diversified cropping system, has become increasingly popular around the world. It is recognized as a sustainable practice to improve soil heal...
ver más
|
|
|
|
|
|
|
Markynti S. Lyngdoh, Naorem Janaki Singh, D. Thakuria, Vishram Ram, Lala I. P. Ray, K. Mamocha Singh
Pág. Page:7 - 19Abstract
|
|
|
|
|
|
|
?.Y. Gorchakov
Pág. 65 - 69
This paper proposes a parallel implementation of the method of non-uniform coverings, designed for computing systems with shared memory. The method of non-uniform coverings is one of the most well-known deterministic methods for solving global optimizati...
ver más
|
|
|
|
|
|
|
Sambhawika Srivastava,Manish Kumar,Ram S. Singh,Birendra N. Rai,Rajesh K. Mall,Tirthankar Banerjee
Pág. 95 - 113
The first ever long-term measurement of black carbon (BC) aerosols over an urban location at the central Indo-Gangetic Plain (IGP) is presented. Both short- and long-term variations in BC during the period 2009-2013 are discussed with specific emphasis o...
ver más
|
|
|
|
|
|
|
HanBit Kim, Seokhie Hong and HeeSeok Kim
A masking method is a widely known countermeasure against side-channel attacks. To apply a masking method to cryptosystems consisting of Boolean and arithmetic operations, such as ARX (Addition, Rotation, XOR) block ciphers, a masking conversion algorith...
ver más
|
|
|
|
|
|
|
Jinsheng Zhang, Qiumao Ma, Wensheng Zhang and Daji Qiao
This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to protect a client?s access pattern to outsourced data. TSKT-ORAM organizes each of the server storages as a k-ary tree and adopts XOR-based private information ...
ver más
|
|
|
|
|
|
|
Finbarr G. Horgan, Thanga Suja Srinivasan, Jagadish S. Bentur, Ram Kumar, K. Vasanta Bhanu, Preetinder Singh Sarao, Ho Van Chien, Maria Liberty P. Almazan, Carmencita C. Bernal, Angelee Fame Ramal, Jedeliza B. Ferrater and Shou-Horng Huang
-
|
|
|
|
|
|
|
Gizem Hülür, Nilam Ram, Sherry L. Willis, K. Warner Schaie and Denis Gerstorf
|
|
|
|