نتایج جستجو برای: defence against ahriman

تعداد نتایج: 565004  

Journal: :international journal of architecture and urban development 2014
hamed akhgar reza shaker ardekani hossein zabihi

spatial planning in border areas in iran because of long borders and settling more than half ofthe provinces in the country's international borders with neighbouring countries play particular role in the planningsystem. this article aims to clarify the position of border areas spatial planning in the country planning system,identifying its elements, elucidating how these elements relate to othe...

Journal: :Journal of plant physiology 2005
Wuling Lin Xiangyang Hu Wenqing Zhang W John Rogers Weiming Cai

To investigate the mechanisms whereby treatment with chitosan (CHN) is observed to increase the capacity of plants to resist pathogens, CHNs of different molecular weights (MWs) prepared by enzyme hydrolysis were used to treat rice cells in suspension culture and also rice seedlings. The results obtained with cultured cells showed that in this material CHN treatment could trigger a set of defen...

Journal: :IJWMC 2007
Francesco Palmieri Ugo Fiore

While much recent research concentrates on propagation models, the defence against worms is largely an open problem. Classical containment strategies, based on manual application of traffic filters, will be almost totally ineffective in the wide area since the worms are able to spread at rates that effectively preclude any human-directed reaction. Consequently, developing an automated, flexible...

Journal: :TECHNOLOGIES OF INTELLECT DEVELOPMENT 2022

The purpose of the article is identification main resources subjectness to create and maintain a system successful psychological defence personality during war. Research methods. research uses theoretical analysis modern sources on topic research, synthesis, comparison generalization data from scientific sources, design-technological Results. mechanisms informational pressure war in context app...

2009
GREGORY LEVITIN Gregory Levitin

The paper presents a generalized model of damage caused to a complex multistate series-parallel system by intentional attacks. The model takes into account the defence strategy that presumes separation and protection of system elements and deployment of false targets. The defence strategy optimization methodology is suggested, based on the assumption that the attacker tries to maximize the expe...

Journal: :The New phytologist 2014
Marcia González-Teuber Martin Kaltenpoth Wilhelm Boland

Mutualistic ants are commonly considered as an efficient indirect defence against herbivores. Nevertheless, their indirect protective role against plant pathogens has been scarcely investigated. We compared the protective role against pathogens of two different ant partners, a mutualistic and a parasitic ant, on the host plant Acacia hindsii (Fabaceae). The epiphytic bacterial community on leav...

Journal: :The Journal of general virology 1978
U C Chaturvedi P Tandon A Mathur A Kumar

Serum obtained from mice 3 to 5 weeks after the third i.p. dose of dengue type 2 virus (DV) protected recipient mice against intracerebral challenge with DV, whereas the serum obtained after 1 and 2 weeks provided minimum protection. Adoptive intravenous transfer of immune spleen cells obtained from mice 1 to 5 weeks after immunization did not protect recipient mice against even a small dose (1...

2008
Gülay Öke Günel Georgios Loukas

In recent years, Denial of Service attacks have evolved into a predominant network security threat. In our previous work, we identified the necessary building blocks for an effective defence mechanism and suggested ways to integrate them. Here, we present the results of this integration on the DoS-resilience of a real networking testbed which runs the Self-Aware CPN routing protocol. The incomi...

Journal: :CoRR 2013
Gaurav Soni Kamlesh Chandravanshi

Security is one of the major issue in wired and wireless network but due to the presence of centralized administration not difficult to find out misbehavior in network other than in Mobile Ad hoc Network due to the absence of centralized management and frequently changes in topology security is one of a major issue in MANET. Only prevention methods for attack are not enough. In this paper a new...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید