| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910452728003321 |
|
|
Autore |
Verner Dorte |
|
|
Titolo |
Increasing resilience to climate change in the agricultural sector of the Middle East [[electronic resource] ] : the cases of Jordan and Lebanon / / Dorte Verner ... [et al.] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Washington, D.C., : World Bank, c2013 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (171 p.) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Agriculture and state - Jordan |
Agriculture and state - Lebanon |
Climatic changes - Government policy - Jordan |
Climatic changes - Government policy - Lebanon |
Crops and climate - Jordan |
Crops and climate - Lebanon |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Contents; Acknowledgments; Executive Summary; Actions to Increase Resilience Are Needed in Jordan and Lebanon; A Participatory Process Can Be Used to Build Climate Resilience; Jordan and Lebanon Are Getting Hotter, Drier, and Experiencing More Climate Variability; Developing Action Plans Is a Key Step in Addressing Climate Change; Tables; Table O.1: Summary of Action Plans for Lebanon and Jordan; More Timely and Accessible Meteorological Information Is Needed to Increase Resilience; Important Policies Can Be Implemented in Both Countries to Build Resilience; Road Map of This Report |
Map 2.3: Accumulated Rainfall Totals (Millimeters) Based on Monthly GPCP for the Decade 1998-2007Map 2.4: Winter (December-January-February) Rainfall Totals (Millimeters) in 2007-08 (Left Panel, Positive NAO) and 2009-10 (Right Panel, Negative NAO); Map 2.5: Accumulated Rainfall Totals (Millimeters) from Daily TRMM for the Decade 1998-2007; Observed Climate Trends; Figures; Figure 2.1: Observed and Re-Scaled TRMM Daily Rainfall at Kamishli (Upper) and Amman (Lower); |
|
|
|
|
|
|
|
|
|
|
|
Figure 2.2: Observed and TRMM Rainfall Totals at Kamishli (Left) and Amman (Right Panel) 1998-99 |
Figure 2.3: Annual Mean Temperatures for Selected Stations in the HadCRUT3 ArchiveFigure 2.4: Annual Precipitation Totals for Selected Sites in the GHCN Archive; Map 2.6: Trend in Annual Cool Days (TX10p), Cool Nights (TN10p), Hot Days (TX90p), and Hot Nights (TN90p) for the Periods 1950-2003 and 1970-2003; Climate Model Projections; Map 2.7: Temperature and Precipitation Changes Over Africa from the MMD-A1B Simulations; Statistical Downscaling Model; Figure 2.5: Downscaled and Observed Daily Mean Temperature at Amman for 1999-2000 |
Figure 2.6: Hindcasts of Winter Mean Temperatures (Left Panel) and Estimated Return Periods for Daily Mean Temperatures (Right Panel) at AmmanFigure 2.7: Observed (Black Line) and Downscaled (Grey Line) Distributions of Wet-Day Totals at Amman for the Period 1961-2000.; Figure 2.8: Observed (Black) and Downscaled (Grey) Monthly RainfallMetrics at Amman for the Period 1961-2000: Wet-Day Probability(Top Left), Total Rainfall (Top Right), 95th Percentile Wet-DayTotal (Bottom Left) and Mean Dry-Spell Duration (Bottom Light) |
Figure 2.9: Observed and SDSM Hindcast Daily Mean Temperature (Left) and Winter Growing Degree Days (Right) at Kfardane, Lebanon |
|
|
|
|
|
|
Sommario/riassunto |
|
This publication aims to assist countries in understanding the specific challenges and opportunities posed by climate change in the agricultural sector in order to increase climate resilience and adapt to climate change. The report presents local-level priorities, informed by stakeholder input, to build agricultural resilience in both countries. The objectives of this study are threefold: 1) to improve the understanding of climate change projections and impacts on rural communities and livelihoods in selected regions of Jordan and Lebanon, specifically the Jordan River Valley and Lebanon's Bek |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996466026803316 |
|
|
Titolo |
Selected Areas in Cryptography [[electronic resource] ] : 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers / / edited by Helena Handschuh, Anwar Hasan |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2005.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XI, 354 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 3357 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Operating systems (Computers) |
Management information systems |
Computer science |
Algorithms |
Computer communication systems |
Application software |
Cryptology |
Operating Systems |
Management of Computing and Information Systems |
Algorithm Analysis and Problem Complexity |
Computer Communication Networks |
Information Systems Applications (incl. Internet) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and author index. |
|
|
|
|
|
|
Nota di contenuto |
|
Stream Cipher Cryptanalysis -- An Improved Correlation Attack on A5/1 -- Extending the Resynchronization Attack -- A New Simple Technique to Attack Filter Generators and Related Ciphers -- Side-Channel Analysis -- On XTR and Side-Channel Analysis -- Provably Secure Masking of AES -- Block Cipher Design -- Perfect Diffusion Primitives for Block Ciphers -- Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results -- FOX : A New Family of Block |
|
|
|
|
|
|
|
|
|
|
|
Ciphers -- Efficient Implementations -- A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue -- Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity -- Modular Number Systems: Beyond the Mersenne Family -- Efficient Doubling on Genus Two Curves over Binary Fields -- Secret Key Cryptography I -- About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations) -- A Subliminal Channel in Secret Block Ciphers -- Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes -- Cryptanalysis -- Cryptanalysis of a White Box AES Implementation -- Predicting Subset Sum Pseudorandom Generators -- Collision Attack and Pseudorandomness of Reduced-Round Camellia -- Cryptographic Protocols -- Password Based Key Exchange with Mutual Authentication -- Product Construction of Key Distribution Schemes for Sensor Networks -- Deterministic Key Predistribution Schemes for Distributed Sensor Networks -- On Proactive Secret Sharing Schemes -- Secret Key Cryptography II -- Efficient Constructions of Variable-Input-Length Block Ciphers -- A Sufficient Condition for Optimal Domain Extension of UOWHFs. |
|
|
|
|
|
|
Sommario/riassunto |
|
SAC 2004 was the eleventh in a series of annual workshops on Selected Areas in Cryptography. This was the second time that the workshop was hosted by the University of Waterloo, Ontario, with previous workshops being held at Queen’sUniversityinKingston(1994,1996,1998and1999),CarletonUniversity in Ottawa (1995, 1997 and 2003), the Fields Institute in Toronto (2001) and Memorial University of Newfoundland in St. John’s (2002). The primary intent of the workshop was to provide a relaxed atmosphere in which researchers in cryptography could present and discuss new work on selected areas of current interest. This year’s themes for SAC were: – Design and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream - phers, hash functions, and MAC algorithms. – E?cient implementation of cryptographic systems in public and symmetric key cryptography. – Cryptographic solutions for mobile (web) services. A record of 117 papers were submitted for consideration by the program committee. After an extensive review process, 25 papers were accepted for p- sentation at the workshop (two of these papers were merged). Unfortunately, many good papers could not be accommodated this year. These proceedings contain the revised versions of the 24 accepted papers. The revised versions were not subsequently checked for correctness. Also, we were very fortunate to have two invited speakers at SAC 2004. • Eli Biham arranged for some breaking news in his talk on “New Results on SHA-0 and SHA-1.” This talk was designated as the Sta?ord Tavares L- ture. |
|
|
|
|
|
|
|
| |