365 research outputs found

    Comparação de sondas de neutrons com métodos não nucleares na estimativa da água no solo em condições de campo

    Get PDF
    The neutron moisture gauge is compared with the gravimetric-core soil sampling technique, tensiometers and resistance blocks in relation to stability, Held variability, spatial dependence and number of samples needed at a given level of significance. The variance of field water content measurements with neutron moisture gauges is lower than that of the gravimetric sampling, which therefore requires 2 to 6 times as many samples as the number of measuring sites of the gauges to attain the same level of significance. The space dependence of the measurements made with the subsurface gauge varied depending on the average field soil water content. No space dependence was evident when the water content was lower than 0.2 cm³.cm-3 (50% saturation). Measurements with the tensiometers and resistance blocks manifested no spatial dependence and therefore randomly selected measuring sites can be adapted to Held research work where these methods are to be utilized. Soil water content measurements estimated with neutron moisture gauges showed well defined temporal stability (i.e., the lowest, average and the highest soil water content measurements occur at the same field site) which implies that soil water status of an entire field can be assessed with measurements limited to few locations. Measurements with both tensiometers and the resistance blocks are time variant (i.e., the site giving field average water content changes spatially in time) owing to their relatively smaller measuring domains (i.e., scale of the area which can be represented by a single measurement) as compared to neutron gauges. Therefore it is not possible to define the measuring sites of the tensiometers and resistance blocks as to assess soil water status of the entire field, as it could be done with the neutron gauge.A sonda de neutrons é comparada com a amostragem gravimétrica, com a tensiometria e com o uso de blocos de resistência, em relação à estabilidade, variabilidade do campo, dependência espacial e múmero de amostras necessárias levando em conta determinado nível de significância. A variância das medidas de umidade do solo obtidas por sonda de neutrons é menor do que para a amostragem gravimétrica, que requer um número de amostras 2 a 6 vezes maior em relação à sonda de neutrons dentro de um mesmo nível de significância. A dependência espacial das medidas feitas com sondas de profundidade variou de acordo com os níveis de umidade do solo. Nenhuma dependência espacial ficou evidente para umidades menores que 0,2 cm³.cm³ (50% da saturação). Medidas com tensiômetros e blocos de resistência não manifestaram dependência espacial e, por isso, a escolha das parcelas para medida facilmente se adaptam a esquemas experimentais nos quais estes métodos podem ser utilizados. Medidas de umidade de solo obtidas por sondas de neutrons mostraram uma estabilidade temporal bem definida (isto é, os valores menor, médio e mais alto de umidade do solo ocorrem na mesma posição no campo experimental) o que significa que o estado da umidade do solo de um campo relativamente grande pode ser determinado através de um número limitado de medidas. Medidas com tensiômetros e blocos de resistência são variáveis no tempo (isto é, a parcela que indica a umidade média do campo varia espacialmente no tempo) devido a seus domínios de medida relativamente menores (isto é, tamanho da área que pode ser representada por uma única medida) em comparação com sondas de neutrons. Por isso não é possível definir posições de medidas para tensiômetros e blocos de resistência para caracterização da umidade do solo do campo todo, da forma como foi possível para sondas de neutrons

    Yield Response and N-fertilizer recovery of rainfed wheat growing in the Mediterranean region

    Get PDF
    Yield response and isotopic N-fertilizer recovery of rainfed wheat were assessed as influenced by fertilizer rate and timing. A popular bread wheat cultivar, Seri 82, was planted in a 4-year experiment from 1994/1995 to 1997/1998. Urea fertilizer was applied at rates of 0-240 N ha-1 in two split applications. Fertilizer-N recovery and residual N remaining in the soil after wheat harvest were measured using 15N-labelled fertilizers. The highest wheat grain yield ranged from 4.9 to 6.9 t ha-1 with 240 kg N ha-1 fertilizer. The 4-year results showed that wheat benefited least from the fertilizer applied near planting. N-fertilizer recovery was higher from fertilizer applied during tillering compared with application at emergence. The results suggest that applying one-third or less of the total N at planting and applying the remained at tillering can minimize leaching risks. Another befit of this strategy would be an overall increase in N-fertilizer recovery. Residual fertilizer-N left in soil after wheat harvest was proportional to N application rates and mainly confined t the upper 40 cm depth. 15N recovery by wheat at maturity was 50-60%, indicating that 40-50% of fertilizer-N remained in the soil or was lost. Over 95% of total fertilizer application to wheat could be accounted for in the wheat crop or soil after harvest at the 240 kg N ha-1 rate. The results, therefore, suggest that leaching losses of fertilizer-N below 90 cm were not likely during the growing season for rainfed what grown on these heavy-textured soils (Palexerollic Chromoxeret) of the Mediterranean region

    Experience Report on the Challenges and Opportunities in Securing Smartphones Against Zero-Click Attacks

    Full text link
    Zero-click attacks require no user interaction and typically exploit zero-day (i.e., unpatched) vulnerabilities in instant chat applications (such as WhatsApp and iMessage) to gain root access to the victim's smartphone and exfiltrate sensitive data. In this paper, we report our experiences in attempting to secure smartphones against zero-click attacks. We approached the problem by first enumerating several properties we believed were necessary to prevent zero-click attacks against smartphones. Then, we created a security design that satisfies all the identified properties, and attempted to build it using off-the-shelf components. Our key idea was to shift the attack surface from the user's smartphone to a sandboxed virtual smartphone ecosystem where each chat application runs in isolation. Our performance and usability evaluations of the system we built highlighted several shortcomings and the fundamental challenges in securing modern smartphones against zero-click attacks. In this experience report, we discuss the lessons we learned, and share insights on the missing components necessary to achieve foolproof security against zero-click attacks for modern mobile devices

    Leksikon Tradisi ka Sawah di Kanagarian Air Dingin Kecamatan Lembah Gumanti Kabupaten Solok Tinjauan Semantik

    Get PDF
    Objek dari penelitian ini adalah leksikon tradisi ka sawah di kanagarian Air Dingin Kecamatan Lembah Gumanti Kabupaten Solok. Penelitian ini bertujuan untuk mengklasifikasi dan menjelaskan makna kosakata serta proses morfologis. Teori yang digunakan dalam penelian ini adalah teori semantik, teori morfologi. Metode dan teknik penelitian adalah metode dan teknik yang dikemukakan oleh Sudaryanto (1993) yaitu: 1). Metode dan teknik penyedian data yaitu metode simak dan teknik dasar yang digunakan yaitu teknik sadap dengan teknik lanjutan yaitu (SBLC) dan teknik catat; 2) metode dan teknik analisis data yaitu metode padan translasional dengan teknik dasar (PUP) dan teknik lanjut yaitu (HBB). Metode agih yang digunakan yaitu metode referensial dan teknik dasar (BUL) dengan teknik lanjutan yaitu teknik ganti; 3) metode dan teknik penyajian hasil analisis data yaitu metode informal dan formal. Dari hasil analisis data ditemukan 21 kosakata tahapan ka sawah yaitu turun kabanda, sumanyan, mambucuik, lambiari, mamangkua, malunyah, mambucuik, malumua, batanam, basiang, manggaro, manyabik, maangkuik, manambun, mairiak, mangirai, jarami, maangin, maangek, manjamua dan terdapat 185 kosakata yang mengalami proses morfologis seperti: 1) afiksasi yaitu prefiks {ba-}, {di-}, {mam-}, {maN-}, {mang-}, {many-}, {ma-}, {sa-}, {ta-}, {paN-}, {pang-}, dan {pa-}; sufiks {-an} dan {-i} konfliks {ba-an}, {ba-i}, {di-an}, {di-i}, {ma-an}, {ma-i}, {mam-an}, {mam-i}, {maN-an}, {maN-i}, {mang-an}, {many-an}, {many-i}, {ta-an}, dan {ta-i}; 2) pemajemukan; 3) pengulangan yaitu pengulangan yang berkombinasi dengan pembubuhan afiks {ba-} dan {mam-}. Kata kunci : leksikon, morfologi, semantik, ka sawah

    Prospex:ProtocolSpecificationExtraction

    Get PDF
    Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specificationsare very useful in a numberof security-related contexts, forexample, to perform deep packet inspectionand black-box fuzzing, or to quickly understand custom botnet command and control (C&C) channels. Since manual reverse engineering is a time-consuming and tedious process, a number of systems have been proposed that aim to automate this task. These systems either analyze network traffic directly or monitor the execution of the application that receivestheprotocolmessages.While previoussystemsshow thatprecise message formatscanbe extractedautomatically, they do not provide a protocol specification. The reason is that they do not reverse engineerthe protocol state machine. In this paper, we focus on closing this gap by presenting a system that is capable of automatically inferring state machines. This greatly enhances the results of automatic protocol reverse engineering, while further reducing the need for human interaction. We extend previous work that focuses on behavior-based message format extraction, and introduce techniques for identifying and clustering different types of messages not only based on their structure, but also accordingto the impact of each message on server behavior. Moreover, we present an algorithm for extracting the state machine. We have applied our techniques to a number of real-world protocols, including the command and control protocol used by a malicious bot. Our results demonstrate that we are able to extract format specifications for different types of messages and meaningful protocol state machines. We use these protocol specifications to automatically generate input for a stateful fuzzer, allowing us to discover security vulnerabilities in real-world applications. 1
    • …
    corecore