نتایج جستجو برای: defense behavior
تعداد نتایج: 690602 فیلتر نتایج به سال:
BACKGROUND Plants respond to herbivore damage with the release of volatile organic compounds (VOCs). This indirect defense can cause ecological costs when herbivores themselves use VOCs as cues to localize suitable host plants. Can VOCs reliably indicate food plant quality to herbivores? METHODOLOGY We determined the choice behavior of herbivorous beetles (Chrysomelidae: Gynandrobrotica guerr...
In Stackelberg security games, a defender must allocate scarce resources to defend against a potential attacker. The optimal defense involves the randomization of scarce security resources, yet how attackers perceive the risk given randomized defense is not well understood. We conducted an experiment where attackers chose whether to attack or not attack targets protected by randomized defense s...
The popularity of reactive worms, whose attacking behavior inherits characteristics from both active worms and passive worms, has brought great threat to P2P networks in recent years. Most existing defense models only focus on the effects of P2P churn on reactive worm's propagation, but neglect the impact of user behaviors on the spread of worms. This paper proposes a defense model of reactive ...
This paper examines theory and behavior in a two-player game of siege, sequential attack and defense. The attacker’s objective is to successfully win at least one battle while the defender’s objective is to win every battle. Theoretically, the defender either folds immediately or, if his valuation is sufficiently high and the number of battles is sufficiently small, then he has a constant incen...
Inking by marine molluscs such as sea hares, cuttlefish, squid, and octopuses is a striking behavior that is ideal for neuroecological explorations. While inking is generally thought to be used in active defense against predators, experimental evidence for this view is either scant or lacks mechanistic explanations. Does ink act through the visual or chemical modality? If inking is a chemical d...
In Stackelberg security games, a defender must allocate scarce resources to defend against a potential attacker. The optimal defense involves the randomization of scarce security resources, yet how attackers perceive the risk given randomized defense is not well understood. We conducted an experiment where attackers chose whether to attack or not attack targets protected by randomized defense s...
after 11 september attack, anticipatory self defense has obtained specific situation in the doctrine ,of western states. these countries with financial and military power are seeking to justify this doctrine. this type of defense is contrary to article 51 of the charter of united nations that expresses the concept of self defense. in this paper, the authors are going to verify and show that thi...
This study investigated the association between Iranian university students' perception of their fathers and their object-relation and defense mechanism. Participants were 438 students between 18-22 years from Allameh Tabatabae University, who agreed to fill the Fatherhood Scale out (Dick, 2004), Bell object relation inventory and defense mechanism style, and defense style questionnaire (DSQ-40...
Background & Aims: One of the important dimension of health is mental health. Men in order to confront stresses, have used defense mechanisms for life-long. Defenses play an important role in mental health. Each mental disturbance relates with a given maladaptive defense mechanism. In this study the relation between the mental health and defense mechanisms of the bachelor students of Urmia Univ...
Background: The aim of the present study was to investigate the mediating role of defense mechanisms in the relationship between behavioral brain systems and Alexithymia in students of Sari Farhangian University. Method: The statistical population of this study was all students of Farhangian University of Sari in the academic year of 2018-2019. From this statistical population, a sample of 2...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید