نتایج جستجو برای: unauthorized exploiters

تعداد نتایج: 4344  

Journal: :IEEE Transactions on Software Engineering 2012

ژورنال: طلوع بهداشت یزد 2016
ایزدی, فرخنده, تقی پور ظهیر, شکوه, حاجی محمدی, بهادر, شیبانی, محمد تقی, صادقی نژاد, جواد, فلاح زاده, حسین, میرجلیلی, اقدس,

Introduction: Nowadays the consumption of meat and animal carcasses in most countries is increasing. Regarding to economic values ​​of meat, usage of unauthorized tissues in minced meat by jobbers is probable. Therefore; the present study was performed in order to detect unauthorized tissues in minced meat. Methods: In this study, a total of 20 samples of trade frozen minced meat was purchas...

Journal: :MONET 2009
Bo Yan Guanling Chen Jie Wang Hongda Yin

Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection solutions do not work well for detecting r...

Journal: :International Business Research 2021

This paper is built on the fundamental of Jorgensen and Sorge considering a differential game about fishery problem. In reality, exploiters can be many because non-excludability common resource. Thus, we expand former two players model to N find more different equilibriums in scenario. Through this, want some guidance for changing resource stock. Further control overexploitation.

2014
John D Styrsky

Exploiters of protection mutualisms are assumed to represent an important threat for the stability of those mutualisms, but empirical evidence for the commonness or relevance of exploiters is limited. Here, I describe results from a manipulative study showing that an orb-weaver spider, Eustala oblonga, inhabits an ant-acacia for protection from predators. This spider is unique in the orb-weaver...

Journal: :Proceedings. Biological sciences 2016
Brian S Steidinger James D Bever

Plants in multiple symbioses are exploited by symbionts that consume their resources without providing services. Discriminating hosts are thought to stabilize mutualism by preferentially allocating resources into anatomical structures (modules) where services are generated, with examples of modules including the entire inflorescences of figs and the root nodules of legumes. Modules are often co...

Journal: :Molecular ecology 2013
Domancar Orona-Tamayo Natalie Wielsch Alejandro Blanco-Labra Ales Svatos Rodolfo Farías-Rodríguez Martin Heil

Myrmecophytic Acacia species produce food bodies (FBs) to nourish ants of the Pseudomyrmex ferrugineus group, with which they live in an obligate mutualism. We investigated how the FBs are protected from exploiting nonmutualists. Two-dimensional gel electrophoresis of the FB proteomes and consecutive protein sequencing indicated the presence of several Kunitz-type protease inhibitors (PIs). PIs...

1999
STEFAN J. JOHANSSON

In Multi-Agent Systems (MAS), agents are acting individually and/or in cooperation with other agents in order to fulfill goals set by the initiators of them and thereby maximize some expected utilities. We argue that all form of cooperation is based on an expected raise of some present or future utility and that it should be modelled from a value-perspective. That is, there is no reason for an ...

Journal: :journal of rangeland science 2015
mohammad reza shahraki naghmeh gholami baghi mohsen sharafatmandrad bahareh behmanesh

rangelands are the main sources of forage for livestock feeding by localpeople. beside forage production, rangeland ecosystems provide many other goods andservices such as medicinal plants, recreation, soil and water conservation, wildlife habitat,fishing, hunting, hiking, etc. nevertheless, there are no much information about the waythat local communities think about the rangelands goods and s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید