نتایج جستجو برای: enhancing biological control
تعداد نتایج: 1815061 فیلتر نتایج به سال:
Conservation biological control emphasizes the preservation and enhancement of natural enemies and is the cornerstone of all approaches to biological control. This review critically examines recent and current research efforts in conservation biological control by predators and parasitoids of Bemisia tabaci worldwide. A large number of natural enemy species have been identified from many agricu...
Der Beitrag befasst sich mit biometrischen Authentifizierungsverfahren zwischen Wahrung von Persönlichkeitsrechten einerseits und der Eignung zum Nachweis von Authentizität im elektronischen Rechtsverkehr insbesondere bei der Verwendung elektronischer Signaturen andererseits. Ein Vergleich mit herkömmlichen Authentifizierungsmechanismen wie dem Prinzip Besitz und Wissen ergibt entscheidende Sch...
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics challenging. As a result, redundant new me...
It sounds good when knowing the privacy enhancing technologies 6th international workshop pet 2006 cambridge uk june 28 3
Generating production-quality plans is an essential element in transforming planners from research tools into real-world applications. However most research on planning so far has concentrated on methods for constructing sound and complete planners that find a satisficing solution, and on how to find such solution in an efficient way. Similarly most of the work to date on automated control-know...
Over the last twenty years, there has been a tremendous growth in the amount of data collected about individuals. Most existing privacy enhancing technologies could not prevent privacy breach effectively, since the real threat is not the control of private data access but the control of usage. While "access control" is well understood, how to achieve "usage control" is still unclear. In the onl...
BACKGROUND Doping is a highly relevant problem in sport, even in adolescent athletes. Knowledge of the psychological factors that influence doping susceptibility in young elite athletes remains sparse. OBJECTIVES This study investigated the predictive potential of different health-psychological constructs and well-being on doping susceptibility. The main hypotheses to be tested were positive ...
The rights of an Internet user acting anonymously conflicts with the rights of a Server victim identifying the malicious user. The ERPINA protocol, introduced in this paper, allows an honest user communicating anonymously with a Server through a PET, while the identity of a dishonest user is revealed. Prior research failed to distinguish objectively between an honest user and an attacker; and a...
Risk control plays an important role at privacy protection. Article 17 (1) of the Directive 95/46/EC (DPD) requires that the controller must implement appropriate technical and organizational measures to protect personal data. ICT offers solutions in the shape of privacy protection for users, consumers and citizens. The application of ICT to protect privacy has become widely known under the nam...
We applied the strength-energy model of self-control to understand the relationship between self-control and young athletes' behavioral responses to taking illegal performance-enhancing substances, or "doping." Measures of trait self-control, attitude and intention toward doping, intention toward, and adherence to, doping-avoidant behaviors, and the prevention of unintended doping behaviors wer...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید