نتایج جستجو برای: passive defense

تعداد نتایج: 146155  

Journal: :The Journal of infectious diseases 2011
Ya-Shu Huang Morly Fisher Ziyad Nasrawi Zehava Eichenbaum

BACKGROUND The worldwide burden of the Group A Streptococcus (GAS) primary infection and sequelae is considerable, although immunization programs with broad coverage of the hyper variable GAS are still missing. We evaluate the streptococcal hemoprotein receptor (Shr), a conserved streptococcal protein, as a vaccine candidate against GAS infection. METHODS Mice were immunized intraperitoneally...

2005
David M. Nicol Michael Liljenstam

The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block or slow a worm, or detect and filter it. Active defenses take the battle to the worm—trying to eliminate or isolate infected hosts, and/or automatically and actively patch susceptible but as-yet-uninfected hosts, without the k...

Journal: :The Journal of experimental biology 2013
Bryan J Cole Amro Hamdoun David Epel

ATP-binding cassette transporters protect cells via efflux of xenobiotics and endogenous byproducts of detoxification. While the cost of this ATP-dependent extrusion is known at the molecular level, i.e. the ATP used for each efflux event, the overall cost to a cell or organism of operating this defense is unclear, especially as the cost of efflux changes depending on environmental conditions. ...

2004
David M. Nicol Michael Liljenstam

The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block or slow a worm, or detect and filter it. Active defenses take the battle to the worm—trying to eliminate or isolate infected hosts, and/or automatically and actively patch susceptible but as-yet-uninfected hosts, without the k...

2013
Tao Wang Ian Goldberg

Website fingerprinting attacks allow a local, passive eavesdropper to identify a web browsing client’s destination web page by extracting noticeable and unique features from her traffic. Such attacks magnify the gap between privacy and security — a client who encrypts her communication traffic may still have her browsing behaviour exposed to lowcost eavesdropping. Previous authors have shown th...

Journal: :پژوهش های روانشناسی بالینی و مشاوره 0
محدّثه نامجو سیّد موسی کافی منصور حکیم جوادی مسعود غلامعلی لواسانی سیّده رقیه آتشکار

abstract in this study the relationship among perfectionism, defense styles and depression symptoms was studied. participants were 426 undergraduate students from the university of guilan (264 females, 162 males), who were selected through randomized clustering multistage method. all participants were asked to complete the multidimensional perfectionism scale (hewitt & flett, 1991), the defense...

Journal: :Annals OR 2011
Gary M. Gaukler Chenhua Li Rory Cannaday Sunil S. Chirayath Yu Ding

This paper proposes a layered container inspection system for detecting illicit nuclear materials using radiography information. We argue that the current inspection system, relying heavily on the Automated Targeting System (ATS) and passive radiation detectors, is inherently incapable of reliably detecting shielded radioactive materials, especially highly enriched uranium (HEU). This motivates...

2001
David A. Fay Allen M. Waxman Jacques G. Verly Michael I. Braun Joseph P. Racamato

∗ This work was sponsored by the Defense Advanced Research Projects Agency under Air Force contract F19628-00-C-0002. Opinions, interpretations, conclusions, and recommendations are those of the authors and are not necessarily endorsed by the United States Government. Abstract We have extended our previous capabilities for fusion of multiple passive imaging sensors to now include 3D imagery obt...

Background and Objective. In recent decades, vulnerability assessment in urban land uses such as historic building in order to increase their resilience and resistance to various human and natural hazards has received more attention. Due to the special geographic condition and special topography of the region, Khansar historical land uses are exposed to all kind of disaster and damages and a co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید