http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Variation in Salt Tolerance within a Batch of Acacia salicina Seeds
Rehman, Shafiq,Deghayes, A-H.,Bourne, W. F.,Harris, P. J. C.,Rha, Eui Shik 한국국제농업개발학회 2002 韓國國際農業開發學會誌 Vol.14 No.1
Seeds of Acacia salicina Lindl., germinated in the presence of 2000 mol m^-3 NaCl (tolerant), seeds that failed to germinate in NaCl but germinated after washing in distilled water (sensitive), and seeds germinated in distilled water (unselected) were transplanted to a greenhouse. After 1 week, they were treated with 0, 100 or 200 mol m^-3 NaCl in half-strength Hoagland's solution for 5 weeks. Plants from tolerant seeds grew larger without, but not with, salt stress, and suffered lower mortality in NaCl. In order to select for salt tolerance at the seedling stage, 6 week-old plants were treated with NaCl solutions increasing to 200 mol m^-3 over 3 weeks, and then divided into tall (tolerant) and short (sensitive) plants. These were treated with NaCl in the greenhouse as above. Selection of plants on the basis of their height under stress provided plants with greater survival and less reduction in growth when subsequently exposed to NaCl stress. However, it is unclear whether the procedures employed selected for physiological salt tolerance or merely for general plant vigour.
Inverse Relationship Between Boron Toxicity Tolerance and Boron Contents of Barley Seed and Root
Rehman, Shafiq,Park, Tae Il,Kim, Young Jin,Seo, Yong Weon,Yun, Song Joong Taylor Francis 2006 Journal of plant nutrition Vol.29 No.10
<P> A filter-paper bioassay method was used to investigate the differential response of 23 barley (Hordeum vulgare L.) genotypes to boron (B) toxicity. Two-day-old seedlings with equal radicles were treated with 10 (B10) or 100 (B100) ppm B for 10 d. Root and shoot growth was not affected by B10, but root growth was significantly reduced by B100. The shoot growth at B100 was either unaffected or affected to a smaller extent than the root. A significant inverse correlation was found between B content of seed and seed germination, and between root growth and B contents of root and shoot under B100. The barley genotypes with lower B contents in seeds had a higher germination, longer root length, and accumulated less B in roots and shoots when treated with B100. The B-tolerant genotypes with longer roots had lower B contents in their seed, root, and shoot and vice versa. These results suggest that a great variation exists among barley genotypes in response to high B application. There was no difference between naked (uncovered) and covered varieties in response to B100. The B tolerance could be attributed to the lower B content of seed and lower uptake or accumulation of B in the root and shoot.</P>
Potassium Distribution in the Apical Region of Rice Root
Rehman Shafiq,Park Moung-Ryoul,Ashraf Muhammad,Yun Song-Joong The Korean Society of Crop Science 2006 Korean journal of crop science Vol.51 No.4
Potassium (K) distribution in rice (Oryza sativa L.) root was studied by confocal laser microscopy, using potassium sensitive fluorescent dye potassium-binding benzofuran isophthalate (PBFI). Significantly high intensity of K-specific fluorescence was detected at the root cap region followed by meristematic and basal regions. A negligible or fainted fluorescence was observed at the root hairs area. These results suggest that K is heavily distributed in the apical area of rice root, which may be required in higher concentration for division and extension of cells, as it is the rapidly growing region of the root, moreover, may also be involved in water uptake by creating osmotic gradient across membranes.
Shafiq Ul Rehman,Selvakumar Manickam 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.4
Most IPv6 security issues are still the same as IPv4; IPv6 has its own unique design characteristics that have additional impact to system and network security, as well as the potential impact on policies and procedures. Address autoconfiguration is a key feature of the IPv6 protocol stack that allow hosts to generate own addresses using a confluence of information from other hosts and information from router advertisement. Duplicate Address Detection (DAD) is a process that is part of address autoconfiguration that is used to check if the addresses generated has already been configured. Nevertheless, the design of DAD process is vulnerable to Denial of Service (DoS) attack leaving hosts unconfigured. For example, any host can reply to Neighbor Solicitations (NS) for a temporary address, causing the other host to consider it as a duplicate and eventually reject the address. Various mechanisms such as SeND and SAVI has been introduced to address such attacks, but these techniques were not very effective as there were still possibilities of DoS attacks to be carried out. As such, a new mechanism is needed to more effectively prevent DoS attacks on DAD process. In this paper, we present a detailed design and development of a novel mechanism that can address the shortfalls of existing prevention techniques.
Shafiq Ul Rehman,Selvakumar Manickam 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.11
In addition to addressing the scarcity of IP address space, Internet Protocol version 6 (IPv6) also addressed some of the shortcomings of Internet Protocol version 4(IPv4). These include neighbor discovery, address auto-configuration, and others. Many of this message exchange are done via the Internet Control Message Protocol (ICMP) and the use of this protocol in the IPv6 paradigm, i.e. ICMPv6 plays a bigger role compared to ICMPv4. One of the key process that is carried during neighbor discovery process is to check if the address generated already exists. This process is called the Duplicate Address Detection (DAD). Nevertheless, the design of this process has led to a severe security vulnerability allowing attackers to easily carry out Denial-of-Service (DoS) attack by causing every address generated to be a duplicate leading to new hosts unable to join the network. Various techniques and mechanisms have been introduced to address this vulnerability such as NDPMon, SeND, and SAVA. Nevertheless, these techniques are either not robust or have performance implications vis-à-vis with the DAD DoS detection and mitigation. In this paper, we put forward a novel framework that is able to detect, mitigate DoS attacks while being light-weight at the same time.