نتایج جستجو برای: protection agent

تعداد نتایج: 428050  

Journal: :Toxicology and applied pharmacology 2008
Donald M Maxwell Irwin Koplovitz Franz Worek Richard E Sweeney

A structure-activity analysis was used to evaluate the variation in oxime efficacy of 2-PAM, obidoxime, HI-6 and ICD585 against nerve agents. In vivo oxime protection and in vitro oxime reactivation were used as indicators of oxime efficacy against VX, sarin, VR and cyclosarin. Analysis of in vivo oxime protection was conducted with oxime protective ratios (PR) from guinea pigs receiving oxime ...

2005
Mohammed S. Alam Abhishek Gupta Jake Wires Son Thanh Vuong

With the rapid growth of the Internet and the ever-increasing security problems associated with its popularity, the need for protection against unwanted intruders has become imperative. Antivirus software, intrusion detection systems, spyware detectors, and mal-ware detectors are some of the protection mechanisms available to users today. The diversity of these manifold systems suggests the nee...

Journal: :CoRR 2000
Igor Sobrado

A one-time pad (OTP) based cipher to insure both data protection and integrity when mobile code arrives to a remote host is presented. Data protection is required when a mobile agent could retrieve confidential information that would be encrypted in untrusted nodes of the network; in this case, information management could not rely on carrying an encryption key. Data integrity is a prerequisite...

2006
Igor V. Kotenko Alexander Ulanov

The paper considers the software simulation tool DDoSSim which has been developed for comprehensive investigation of Internet DDoS attacks and defense mechanisms. This tool can be characterized by three main peculiarities: agent-oriented approach to simulation, packet-based imitation of network security processes, and open library of different DDoS attacks and defense mechanisms. DDoSSim allows...

2000
Kanna Rajan Douglas E. Bernard Gregory Dorais Edward B. Gamble Bob Kanefsky James Kurien William Millar Nicola Muscettola P. Pandurang Nayak Nicolas F. Rouquette Benjamin D. Smith William Taylor Yu-Wen Tung

On May 17th 1999, the Remote Agent (RA) became the first Artificial Intelligence based closed loop autonomous control system to take control of a spacecraft. The RA commanded NASA’s New Millennium Deep Space One spacecraft when it was 65 million miles away from earth. For a period of one week this system commanded DS1’s Ion Propulsion System, its camera, its attitude control and navigation syst...

2005
U. Rüppel

The field of fire protection engineering is characterized by the cooperation of experts and by the distribution of knowledge resources. The availability of relevant knowledge in all states of the planning process is the basis for a high product quality and for optimal conditions for the rescue of persons. Hence, this project aims to create a knowledge based planning environment that offers mult...

Journal: :Journal of the American Academy of Dermatology 2004
Maritza A Middelkamp-Hup Madhu A Pathak Concepcion Parrado David Goukassian Francisca Rius-Díaz Martín C Mihm Thomas B Fitzpatrick Salvador González

BACKGROUND UV radiation induces damage to human skin. Protection of skin by an oral photoprotective agent would have substantial benefits. Objective We investigated the photoprotective effect of oral administration of an extract of the natural antioxidant Polypodium leucotomos (PL). METHODS A total of 9 healthy participants of skin types II to III were exposed to varying doses of artificial U...

2003
GEORGE W. BUCHMAN

The mechanism by which nitrite inhibits outgrowing spores of Bacillus cereus T was examined by using techniques developed earlier for nitrite analogs. The morphological stage of inhibition, cooperativity effects, effect of pH on inhibition, kinetics of protection against iodoacetate incorporation into membrane sulfhydryl groups, and protection against the bacteriocidal effect of carboxymethylat...

2012
R. Haghighat H. Yarahmadi

A mobile agent is a software which performs an action autonomously and independently as a person or an organizations assistance. Mobile agents are used for searching information, retrieval information, filtering, intruder recognition in networks, and so on. One of the important issues of mobile agent is their security. It must consider different security issues in effective and secured usage of...

Journal: :JCS 2014
S. Chakaravarthi V. Ramachandran

The Hyper Text Transfer Protocol (HTTP) protocol plays a vital role in Web Services Security. Though the HTTPs provide excellent security, they are not flexible enough to allow caches. HTTPi provides high integrity and low security whereas HTTPs provide low integrity and high security. The goal of WS activity is to build up set of technologies in order to direct WS to their complete prospective...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید