نتایج جستجو برای: passive defence
تعداد نتایج: 87139 فیلتر نتایج به سال:
information system (CCIS) will be an integrated, networked information communication and processing system interconnecting human operators, intelligent computing systems, distributed sensor systems, and piloted and autonomous platforms. Military units, sensors, weapons and communications will have to be capable of rapid force projection to counter various threats, as well as of performing surpr...
minoo ’s ahriman is a term for discovering ahriman in the world of minoo: a world where it’s creatures are invisible, undesirable, and without a body . in this article, minoo’s ahriman in the avesta and the pahlavi texts are surveyed. in gahan, ahriman exists as the evil nature as opposed to the good nature that leads to his creation in the haftha. in new avesta the minavi existence continues w...
Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to stop all the vulnerabilities. In order to represent preferences among possible countermeasures of a given attack, defence trees are enriched with conditional preferences, obtaining a new structure called CP-defence tree....
A cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks is outlined. The authors demonstrate that it feasible use small, low-cost, yet highly attack-resistant security chips as measurement nodes, enhanced with an event-triggered moving target defence (MTD), offer effective security. At the cyber layer, proposed solution based on...
(L1) C causes E iff C stands in the ancestral of influence to E. (L2) C influences E iff (i) C and E are actual distinct events and (ii) there is a substantial range of C1, C2, ... of different not-toodistant alterations of C and a range E1, E2, of alterations of E, at least some of which differ, such that if C1 had occurred, E1 would have occurred, if C2 had occurred, E2 would have occurred an...
Common mycorrhizal networks (CMNs) link multiple plants together. We hypothesized that CMNs can serve as an underground conduit for transferring herbivore-induced defence signals. We established CMN between two tomato plants in pots with mycorrhizal fungus Funneliformis mosseae, challenged a 'donor' plant with caterpillar Spodoptera litura, and investigated defence responses and insect resistan...
Signal-based induced indirect defence refers to herbivore-induced production of plant volatiles that attract carnivorous natural enemies of herbivores. Relationships between direct and indirect defence strategies were studied using tritrophic systems consisting of six sympatric willow species, willow leaf beetles (Plagiodera versicolora), and their natural predators, ladybeetles (Aiolocaria hex...
Hosts have evolved a diverse range of defence mechanisms in response to challenge by infectious organisms (parasites and pathogens). Whether defence is through avoidance of infection, control of the growth of the parasite once infected, clearance of the infection, tolerance to the disease caused by infection or innate and/or acquired immunity, it will have important implications for the populat...
PURPOSE The purpose of this study was to identify a path diagram for the influence of family, personality, sexual abuse, drug abuse, coping strategies, and aggressive impulsiveness on aggression, and to develop a sublimation program for Korean adolescent's aggression. METHOD Data was collected by self-report questionnaires. Subjects consisted of 2,111 adolescents. A proportional stratified ra...
In order to avoid both starvation and disease, animals must allocate resources between energy reserves and immune defence. We investigate the optimal allocation. We find that animals with low reserves choose to allocate less to defence than animals with higher reserves because when reserves are low it is more important to increase reserves to reduce the risk of starvation in the future. In gene...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید