Academic literature on the topic 'Activity of attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Activity of attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Activity of attack"

1

Adhana, Finandito, and I. Ketut Gede Suhartana. "Deteksi Serangan Denial of Service di Situs Web dengan Wireshark Menggunakan Metode IDS Berbasis Anomali." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 4 (February 4, 2020): 375. http://dx.doi.org/10.24843/jlk.2020.v08.i04.p02.

Full text
Abstract:
Denial of Service (DoS) attacks are increasingly dangerous. This DoS attack works by sending data packets continuously so that the target being attacked cannot be operated anymore. DoS attacks attack the most websites, thus making the website inaccessible. An anomaly based intrusion detection system (IDS) is a method used to detect suspicious activity in a system or network on the basis of anomaly pattern arising from such interference. Wireshark is software used to analyze network traffic packets that have various kinds of tools for network professionals.
APA, Harvard, Vancouver, ISO, and other styles
2

Ouchani, Samir, and Gabriele Lenzini. "Generating attacks in SysML activity diagrams by detecting attack surfaces." Journal of Ambient Intelligence and Humanized Computing 6, no. 3 (March 18, 2015): 361–73. http://dx.doi.org/10.1007/s12652-015-0269-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

D'Andrea, Giovanni, Antonio R. Cananzi, Moreno Toldo, and Francesco Ferro-Milone. "Platelet Activity in Cluster Headache." Cephalalgia 6, no. 3 (September 1986): 163–67. http://dx.doi.org/10.1046/j.1468-2982.1986.0603163.x.

Full text
Abstract:
Platelets are known to be activated in common or classic migraine both during the attack and in headache-free periods. Platelet behavior is less well known in cluster headache. We have investigated beta-thromboglobulin (b-TG) and platelet factor four (PF4) plasma levels, markers of in vivo platelet activation, in patients during remission and during bouts of cluster headache with and without pain. The results indicated that statistically significantly higher levels of b-TG and PF4 occur in the patients during the remission period when compared with the control subjects. Such high levels seemed to persist between paroxysmal episodes in cluster periods. However, during the attacks of cluster headache b-TG and PF4 plasma levels decreased by 42% and 50%, respectively, in comparison with plasma concentrations measured outside of attack. Thus, although platelet activation also occurs in patients with cluster headache, the attack as such seems to be characterized by a marked reduction in platelet activation.
APA, Harvard, Vancouver, ISO, and other styles
4

Tsien, Yu Lei, and Rong Li Gai. "User Activity Based Application-Layer DoS/DDoS Attack Defense Algorithm." Applied Mechanics and Materials 742 (March 2015): 693–97. http://dx.doi.org/10.4028/www.scientific.net/amm.742.693.

Full text
Abstract:
In application-layer DoS/DDoS attacks, malicious users attack the victim server by sending lots of legitimate requesting packages, which overwhelm the server bottleneck resources. Normal user’s request thus may not be satisfied. The traditional intrusion detection systems for network-layer cannot effectively identify this attack, and recent researches on this kind of attack are mainly for Web servers. This paper proposed a new defense algorithm based on user activity for topic-based Pub/Sub communication servers in mobile push notification systems. Users consuming system bottleneck resources the most can get high scores and thus are considered overactive. With some resource retaken strategy, overactive users’ connections will be dropped according to system performance level. Therefore, the system can get rid of latent threatens. Experiments indicated that this algorithm can identify normal and abnormal users well.
APA, Harvard, Vancouver, ISO, and other styles
5

Sheleme, Mihret, and R. Rajesh Sharma. "Cyber-attack and Measuring its Risk." IRO Journal on Sustainable Wireless Systems 3, no. 4 (December 29, 2021): 219–25. http://dx.doi.org/10.36548/jsws.2021.4.002.

Full text
Abstract:
In this short research, cyber-attack and the well-known attacking methods are discussed. Moreover, how many attacks were made in 2021 compared to the attacks in the previous year is found, to determine how fast this malicious activity is growing and the reasons which motivate such cyber-attacks are studied. The risk measurement methods are also discussed in this article based on some previous research. The conclusions are made on the suitable solution for cyber-attack, reviewed based on the point of view of different research.
APA, Harvard, Vancouver, ISO, and other styles
6

Hambach, Anke, Stefan Evers, Oliver Summ, Ingo W. Husstedt, and Achim Frese. "The impact of sexual activity on idiopathic headaches: An observational study." Cephalalgia 33, no. 6 (February 19, 2013): 384–89. http://dx.doi.org/10.1177/0333102413476374.

Full text
Abstract:
Background Headache associated with sexual activity is a well-known primary headache disorder. In contrast, some case reports in the literature suggest that sexual activity during a migraine or cluster headache attack might relieve the pain in at least some patients. We performed an observational study among patients of a tertiary headache clinic. Methods A questionnaire was sent to 800 unselected migraine patients and 200 unselected cluster headache patients. We asked for experience with sexual activity during a headache attack and its impact on headache intensity. The survey was strictly and completely anonymous. Results In total, 38% of the migraine patients and 48% of the patients with cluster headache responded. In migraine, 34% of the patients had experience with sexual activity during an attack; out of these patients, 60% reported an improvement of their migraine attack (70% of them reported moderate to complete relief) and 33% reported worsening. In cluster headache, 31% of the patients had experience with sexual activity during an attack; out of these patients, 37% reported an improvement of their cluster headache attack (91% of them reported moderate to complete relief) and 50% reported worsening. Some patients, in particular male migraine patients, even used sexual activity as a therapeutic tool. Conclusions The majority of patients with migraine or cluster headache do not have sexual activity during headache attacks. Our data suggest, however, that sexual activity can lead to partial or complete relief of headache in some migraine and a few cluster headache patients.
APA, Harvard, Vancouver, ISO, and other styles
7

Bruni, O., PM Russo, C. Violani, and V. Guidetti. "Sleep and Migraine: An Actigraphic Study." Cephalalgia 24, no. 2 (February 2004): 134–39. http://dx.doi.org/10.1111/j.1468-2982.2004.00657.x.

Full text
Abstract:
The aim of the study was to evaluate sleep of children with migraine during the interictal period and the modifications of sleep which precede, are concomitant with, or follow migraine attacks. Eighteen patients with migraine without aura were compared with a group of 17 healthy age-matched children. Sleep parameters were monitored for two full weeks by means of actigraphs and self-report diaries. Headache diaries were also filled out in order to evaluate the occurrence and the characteristics of migraine attacks. Fifty-seven attacks were recorded during the monitoring period. During the interictal period, sleep parameters of children suffering from migraine did not differ from those of controls; only sleep onset latency was slightly prolonged in the migraine group. Timing of the attack affected nocturnal motor activity which presented the lowest values on the night preceding the attack, indicating a decrease in cortical activation during sleep preceding migraine attacks. Further studies should clarify if the observed reduction in nocturnal motor activity close to the attack is related to neurotransmitter imbalance.
APA, Harvard, Vancouver, ISO, and other styles
8

Imaizumi, Mitsuhiro, and Mitsutaka Kimura. "Reliability Evaluation of a Server System Considering Signature Update." International Journal of Reliability, Quality and Safety Engineering 28, no. 01 (June 30, 2020): 2150003. http://dx.doi.org/10.1142/s0218539321500030.

Full text
Abstract:
Cyber attack on the Internet has become a problem in recent years, and it has been becoming more sophisticated and complicated. As one of schemes to detect cyber attack, IDS has been widely used. IDS can detect cyber attack based on the signature which is the pattern of cyber attack and so on. There are signature-based and anomaly-based detection methods in terms of IDS. Signature detection compares activity and behavior to signatures of known attacks. Signatures need to be updated regularly to detect a new type of attacks. This paper considers extended stochastic models for a server system with signature update. The server has the function of IDS. In this model, we consider type II error where IDS judges the occurrence of cyber attack erroneously when it occurs. We assume that the check with signature update is performed at [Formula: see text]th check or every [Formula: see text] checks. We obtain the expected costs until cyber attack is detected and discuss the optimal policies which minimize them. Finally, numerical examples are given.
APA, Harvard, Vancouver, ISO, and other styles
9

Jitprapaikulsan, Jiraporn, James P. Fryer, Masoud Majed, Carin Y. Smith, Sarah M. Jenkins, Philippe Cabre, Shannon R. Hinson, et al. "Clinical utility of AQP4-IgG titers and measures of complement-mediated cell killing in NMOSD." Neurology - Neuroimmunology Neuroinflammation 7, no. 4 (May 28, 2020): e727. http://dx.doi.org/10.1212/nxi.0000000000000727.

Full text
Abstract:
ObjectiveTo investigate whether aquaporin-4–immunoglobulin G (AQP4-IgG) titers and measures of complement-mediated cell killing are clinically useful to predict the occurrence of relapse, relapse severity, and/or disability in neuromyelitis optica spectrum disorder (NMOSD).MethodsWe studied 336 serial serum specimens from 82 AQP4-lgG–seropositive patients. NMOSD activity at blood draw was defined as preattack (24 [7.1%], drawn within 30 days preceding an attack), attack (108 [32.1%], drawn on attack onset or within 30 days after), or remission (199 [59.2%], drawn >90 days after attack onset and >30 days preceding a relapse). For each specimen, we documented the attack type and severity and immunotherapy status. Complement-mediated cell killing was quantitated by flow cytometry using an M23-AQP4 cell-based assay.ResultsThe estimated logarithmic means of AQP4-IgG titers in preattack, attack, and remission samples were 3.302, 3.657, and 3.458, respectively, p = 0.21. Analyses of 81 attack/remission pairs in 42 patients showed no significant titer differences (3.736 vs 3.472, p = 0.15). Analyses of 13 preattack/attack pairs in 9 patients showed no significant titer differences (3.994 vs 3.889, p = 0.67). Of 5 patients who converted to seronegative status, 2 continued to have attacks. Titers for major and minor attacks (n = 70) were not significantly different (3.905 vs 3.676, p = 0.47). Similarly, measures (titers) of complement-mediated cell killing were not significantly associated with disease course, attack severity, or disability at 5 years.Conclusions and relevanceAQP4-IgG titer and complement-mediated cell killing lack significant prognostic or predictive utility in NMOSD. Although titers may drop in the setting of immunotherapy, seroconversion to negative status does not preclude ongoing clinical attacks.Classification of evidenceThis study provides Class II evidence that in patients with NMOSD, AQP4-IgG titers and measures of complement-mediated cell killing activity do not predict relapses, relapse severity, or disability.
APA, Harvard, Vancouver, ISO, and other styles
10

Babar, Sachin D., Neeli R. Neeli R, and Ramjee Prasad. "Activity Modelling and Countermeasures on Jamming Attack." Journal of Cyber Security and Mobility 2, no. 1 (2013): 1–23. http://dx.doi.org/10.13052/jcsm2245-1439.211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Activity of attack"

1

Meela, Moraba Macdonald. "Evaluation of alien invasive weedy plants for activity against plant pathogenic fungi." Diss., University of Pretoria, 2009. http://hdl.handle.net/2263/23195.

Full text
Abstract:
Plant fungal pathogens are a major threat to food security worldwide. The most important method of protecting plants against fungal attack is the use of fungicides, but the development of resistance towards synthetic fungicides is of great concern. Moreover, the health risks associated with the use of chemical fungicides increase the need to search for safe, efficacious and environmentally friendly fungicides. Plants produce antifungal agents by secondary metabolism to protect themselves from fungal attack, and therefore many plant species have substantial antifungal activity. The use of plant extracts could enable the development of inexpensive and environmentally acceptable fungicides based on locally available natural products. This study was undertaken to investigate weedy and invasive plant species for antifungal activity against plant pathogens in order to develop a useful product using a widely available resource. Acetone leaf extracts of seven invasive species (Chromoleana odorata, Ipomoea alba, Tecoma stans, Passiflora suberosa, Passiflora subpeltata, Aristolochia sp, Solanum seaforthianum) were screened against eight plant fungal pathogens viz Rhizoctonia solani, Fusarium oxysporium, Penicillum janthinellum, Penicillum expansum, Aspergillus parasiticus, Aspergillus niger, Pythium ultimum and Phytophthora nicotiana, using microdilution assay and bioautography. The acetone extract of Tecoma stans had reasonable antifungal activity with an average minimal inhibitory concentration (MIC) value against all the fungi of 550 ìg/ml and clear zones on bioautograms indicating inhibition of fungal growth of a compounds with an Rf of 0.082 in BEA against several of the fungal pathogens. Due to the clear compound on bioautography and availability of Tecoma stans, this species was selected for further work. Bioassay-guided fractionation of the leaves of the Tecoma stans dichloromethane (DCM) extract obtained from solvent-solvent fractionation resulted in one major compound, oleanolic acid. The isolated compound had antifungal activity with an average MIC value of 130 ìg/ml against the 10 plant pathogenic fungi and clear bands with an Rf value of 0.082 on bioautograms, indicating fungal growth inhibition. It was surprising that the MIC value of the crude DCM extract was as high as that of the only compound with antifungal activity based on bioautography. These results clearly indicated the possibility of synergisms especially since the average total activity of the extract was nearly 6.5 times higher than that of oleanolic acid with total activity values of 60154 ml for the extract and 9262 ml for oleanolic acid. Cellular cytotoxicity of DCM extract and oleanolic acid was investigated using tetrazoliumbased colorimetric assay (MTT) on Vero monkey kidney cells. The toxicity of the extract and oleanolic acid was determined by LC50 values. The DCM extract and oleanolic acid were toxic with and LC50 of 0.413 mg/ml and 0.129 mg/ml respectively, lower than that of berberine the toxic compound used as control. However therapeutic index which can be defined here as the LC50 in (ìg/ml)/MIC in (ìg/ml), indicated that though the extract and oleanolic acid were toxic, they could be used under controlled conditions against infections of certain of the fungal pathogens. The crude extract had a high therapeutic index value of 21 against microorganisms T. harzianum, R. solani, F. oxysporium and P. expansum; and oleanolic acid had high therapeutic index values of 16 and 64 of against T. harzianum and R.solani respectively. This high therapeutic index value of crude extract and oleanolic acid means that, crude extract and oleanolic acid may be used for treatment of infections by these tested fungi with very little toxicity under controlled conditions. Oleanolic acid had very low antibacterial activity (MIC >250 ìg/ml). against two Grampositive (Staphylococcus aureus, ATCC 29213 and Enterococcus faecalis, ATCC 29212) and two Gram-negative bacteria (Escherichia coli, ATCC 27853 and Pseudomonas aeruginosa, ATCC 25922). Animal pathogenic fungi were more resistant than the plant fungal pathogens. Based on the good activity of the DCM crude extract, the surprising selectivity in activity against different fungi coupled with reasonably good therapeutic indexes and the wide availability of T stans leaves opens up the possibility that a commercial product to protect plants against certain pathogens may be developed from T. stans leaves. Copyright
Dissertation (MSc (Veterinary Science))--University of Pretoria, 2008.
Paraclinical Sciences
unrestricted
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Kelly Lynne. "Individual Differences in Activity and Responses to a Predator Attack in Juvenile Smallmouth Bass (Micropterus Dolomieui)." Bowling Green State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1182192767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.
Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
4

Quilliam, Richard S. "The role of cell wall invertase activity in source-sink relations in vegetative tissues of Arabidopsis thaliana and in response to wounding and pathogen attack." Thesis, University of Sheffield, 2007. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.752717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Palm, Emelie, and Sara Josefsson. "Fysisk aktivitet, rörelserädsla och livskvalitet hos individer som genomgått hjärtinfarkt och/eller hjärtoperation." Thesis, Uppsala universitet, Fysioterapi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-337629.

Full text
Abstract:
Sammanfattning Bakgrund: Hjärt -och kärlsjukdom är den vanligaste folksjukdomen i Sverige. Fler män än kvinnor drabbas och c:a 20% av de som drabbats lider utav rörelserädsla. Fysisk aktivitet är en viktig del i primär- och sekundärprevention. Livskvaliteten kan påverkas negativt efter hjärt-och kärlsjukdom. Syfte: Syftet var att studera samband mellan självskattad fysisk aktivitet, självskattad rörelserädsla och självskattad livskvalitet hos individer som drabbats av hjärtinfarkt och/eller genomgått hjärtoperation. Syftet var även att studera om det fanns några könsskillnader avseende rörelserädsla och livskvalitet i denna patientgrupp. Metod: Studien var en icke-experimentell kvantitativ tvärsnittsstudie där enkäter lagt grunden till beskrivande, korrelerande och jämförande design. Resultat: 29 deltagare medverkade. Totalt 19% av deltagarna led av rörelserädsla. Det förekom ingen skillnad mellan könen i median avseende varken rörelserädsla eller livskvalitet. Korrelationskoefficienten var 0,387 (p = 0,07) mellan fysisk aktivitet och livskvalitet i hela gruppen. Sambandet mellan rörelserädsla och livskvalitet var r = -0,460 (p = 0,03). Konklusion: Resultatet stämmer överens med tidigare forskning avseende andelen individer som lider utav rörelserädsla. Inga skillnader påvisades mellan fysisk aktivitet och livskvalitet men ett måttligt negativt samband förelåg mellan rörelserädsla och livskvalitet.
APA, Harvard, Vancouver, ISO, and other styles
6

Bajan, Pierre-Marie. "Simulation d'activités et d'attaques : application à la cyberdéfense." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL014/document.

Full text
Abstract:
Alors que l'importance des infrastructures ne fait que croître, les systèmes de détections et de traitements des attaques sont majoritairement faits pour remonter un seul type des deux grands formats d'attaques : les attaques de masses. Les attaques ciblées quant à elle, bien que d'une grande dangerosité de par leur spécificité et des profondeurs atteintes dans les systèmes, restent traités avec une certaine inefficacité par les systèmes informatiques. Pourtant il y a des équipements remontants des informations et des alertes mais les opérateurs souvent peu entraînés à la gestion des incidents se retrouvent engloutis par la quantité d'informations qu'ils leur sont remontés. Le principe de cette thèse serait de fournir des outils permettant la formation des opérateurs et un meilleur traitement des informations remontées. On approcherait le problème de la manière suivante : on va tout d'abord émuler le système informatique d'une petite entreprise avec ces différents utilisateurs et ces services informatiques. Cela servira à générer les données d'un comportement normal et régulier du système mais également le comportement d'une attaque. Une fois le système est émulé et les données sont générées on va se servir de ces données pour simuler le système selon les besoins que nous avons de la simulation. Cette simulation sera plus légère que l'émulation et sera capable de passage à l'échelle et une modification plus dynamique de l'architecture et du comportement du système. Le but étant d'avoir un outil léger et adaptable capable de simuler différents comportements et conditions d'un système d'entreprise pour être utiliser pour faire des formations d'opérateurs et des tests d'utilisation plus complet d'outil de sécurité. Le tout sera supervisé par la console de contrôle de simulation qui va gérer la simulation mais également recevoir les informations de chaque composant et de la console opérateur. Le contrôle de la simulation inclue la capacité de créer des incidents et problèmes dans le système mais également de créer des attaques à l'encontre du système
The concern over the security of the infrastructure of a company is only growing deeper and became a source of worries for companies. They use different systems to detect and deal with attack but those systems are usually made to detect one type only of the two main type of attack: attacks made to target the largest amount of people possible. Targeted attacks are rarer but more dangerous as it penetrates deep into a system and are very specifics. However the systems used to deal with it are proved of limited efficiency. Even when they send alerts and news to the operator, there is just to much information going along with it making the often ill-trained operators unable to react and overwhelm by massive information. The goal of this thesis is to create a tool that would help to form operator but also help to test more efficiently security systems. We'll approach the problem by first emulating the infrastructure and services of a small company with its different users and services. It will be use to create the data of the regular operations and interactions of a company during normal activity but also under attack. Once the system is emulated and we collected the necessary data, we will start to simulate the system according to what we need the simulation for. This simulation would need less resources than the emulation and will be scalable and capable to be dynamically change according to the needs. The aim is to have a light tool capable to simulate different behaviors and different type of realist simulation of a system to help improve the formation of operators and also test security devices more fully. The whole would be supervised by a console of control of the simulation who will receive the information of the simulated elements and the simulated operator console. It would have the capacity to create incidents and problems into the systems along with attacks
APA, Harvard, Vancouver, ISO, and other styles
7

Hammi, Badis. "Vers une détection à la source des activités malveillantes dans les clouds publics : application aux attaques de déni de service." Thesis, Troyes, 2015. http://www.theses.fr/2015TROY0023/document.

Full text
Abstract:
Le cloud computing, solution souple et peu couteuse, est aujourd'hui largement adopté pour la production à grande échelle de services IT. Toutefois, des utilisateurs malveillants tirent parti de ces caractéristiques pour bénéficier d'une plate-forme d'attaque prête à l'emploi dotée d'une puissance colossale. Parmi les plus grands bénéficiaires de cette conversion en vecteur d’attaque, les botclouds sont utilisés pour perpétrer des attaques de déni de service distribuées (DDoS) envers tout tiers connecté à Internet.Si les attaques de ce type, perpétrées par des botnets ont été largement étudiées par le passé, leur mode opératoire et leur contexte de mise en œuvre sont ici différents et nécessitent de nouvelles solutions. Pour ce faire, nous proposons dans le travail de thèse exposé dans ce manuscrit, une approche distribuée pour la détection à la source d'attaques DDoS perpétrées par des machines virtuelles hébergées dans un cloud public. Nous présentons tout d'abord une étude expérimentale qui a consisté à mettre en œuvre deux botclouds dans un environnement de déploiement quasi-réel hébergeant une charge légitime. L’analyse des données collectées permet de déduire des invariants comportementaux qui forment le socle d'un système de détection à base de signature, fondé sur une analyse en composantes principales. Enfin, pour satisfaire au support du facteur d'échelle, nous proposons une solution de distribution de notre détecteur sur la base d'un réseau de recouvrement pair à pair structuré qui forme une architecture hiérarchique d'agrégation décentralisée
Currently, cloud computing is a flexible and cost-effective solution widely adopted for the large-scale production of IT services. However, beyond a main legitimate usage, malicious users take advantage of these features in order to get a ready-to-use attack platform, offering a massive power. Among the greatest beneficiaries of this cloud conversion into an attack support, botclouds are used to perpetrate Distributed Denial of Service (DDoS) attacks toward any third party connected to the Internet.Although such attacks, when perpetrated by botnets, have been extensively studied in the past, their operations and their implementation context are different herein and thus require new solutions. In order to achieve such a goal, we propose in the thesis work presented in this manuscript, a distributed approach for a source-based detection of DDoS attacks perpetrated by virtual machines hosted in a public cloud. Firstly, we present an experimental study that consists in the implementation of two botclouds in a real deployment environment hosting a legitimate workload. The analysis of the collected data allows the deduction of behavioural invariants that form the basis of a signature based detection system. Then, we present in the following a detection system based on the identification of principal components of the deployed botclouds. Finally, in order to deal with the scalability issues, we propose a distributed solution of our detection system, which relies on a mesh peer-to- peer architecture resulting from the overlap of several overlay trees
APA, Harvard, Vancouver, ISO, and other styles
8

Ocampo, Mascaró Javier, Salazar Vera Jimena Silva, and Costa Bullón Abilio da. "Correlación entre conocimientos sobre consecuencias de la obesidad y grado de actividad física en universitarios." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2015. http://hdl.handle.net/10757/621624.

Full text
Abstract:
Introducción. El objetivo del presente estudio es determinar si existe correlación entre los conocimientos sobre las consecuencias de la obesidad y el grado de actividad física de las personas. Métodos. Se realizó un estudio transversal analítico durante los años 2013 y 2014. Participaron 215 alumnos de pregrado seleccionados por conveniencia no relacionados a carreras del campo de la salud en una universidad de Lima, Perú. Se evaluó el grado de actividad física utilizando el International Physical Activity Questionnaire (IPAQ) y el nivel de conocimientos sobre consecuencias de la obesidad utilizando la escala Obesity Risk Knowledge-10 (ORK-10). También, se consignó las fuentes de información de donde obtuvieron el conocimiento para responder dicho cuestionario. Resultados. La mediana de edad fue 20 (rango intercuartílico=4) y 63% eran mujeres. De acuerdo al IPAQ, 53,9% realizaban actividad física alta, 35,4%, moderada y 10,7%, leve. Se encontró una correlación muy baja (rs=0,06) entre el puntaje del ORK-10 y la cantidad de equivalentes metabólicos/minuto consumidos por semana, pero no era significativa (p=0,38). Las personas informadas por medios de comunicación y por personal de salud obtuvieron mayores puntajes en el ORK- 10 que quienes se informaron por otras vías (p<0,05). Conclusiones. La correlación entre los conocimientos sobre consecuencias de la obesidad y el grado de actividad física es muy baja. Es necesario utilizar enfoques multidisciplinarios que incluyan todos los determinantes de la realización de actividad física para poder lograr cambios en la conducta de la población.
APA, Harvard, Vancouver, ISO, and other styles
9

Liao, Zhe Hui, and 廖哲輝. "A Method to Defend Against Activity Hijacking Attack by Using Shared-memory Side Channel." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/6vy494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Бігун, Олеся Вікторівна. "Еколого-фауністичні особливості родини Culicidae у Херсонській області." Магістерська робота, 2020. https://dspace.znu.edu.ua/jspui/handle/12345/4175.

Full text
Abstract:
Бігун О. В. Еколого-фауністичні особливості родини Culicidae у Херсонській області : кваліфікаційна робота магістра спеціальності 101 "Екологія" / наук. керівник В. В. Горбань. Запоріжжя : ЗНУ, 2020. 73 с.
UA : Робота виконана на 73 сторінках, 26 рисунки, 2 таблиці, 58 літературних джерел, з них 6 іноземною мовою. Об’єкт дослідження: кровосисні комарі Херсонської області. Предмет дослідження: еколого-фауністичні особливості родини Culicidae. Методи дослідження: загальноприйняті ентомологічні методи збору, лабораторного аналізу та статистичної обробки. Метою кваліфікаційної роботи було вивчення еколого-фауністичні особливості родини Culicidae Херсонської області. Теоретично та експериментально визначено: видовий склад кровосисних комарів та їх масовість, домінуючі види кровосисних комарів, сезонну та річну динаміку чисельності комарів, профілактичні заходи щодо зменшення чисельності кровосисних комарів. Новизна та актуальність досліджень полягає у тому, що подібні дослідження дозволять прогнозувати поширення кровосисними комарами небезпечних трансмісивних захворювань у Херсонській області. Значущість роботи полягає в тому, що отримані результати можуть будь використані ентомологами районних, міських санітарно-епідеміологічними станціями для ефективного проведення заходів з обмеження чисельності кровосисних комарів на території Херсонської області.
EN : Work is executed on 73 pages, 26 рисунки, 2 tables, 58 literary sources, from them 6 by a foreign language. The object of the research is bloodsucking mosquitoes of the Kherson area. The subject of the study is ecologo-faunistic features of family of Culicidae. Research methods: the generally accepted methods of entomologist of collection, labtest and statistical treatment. The purpose of the qualification work is a study ecologo-faunistic features of family of Culicidae of the Kherson area. Theoretically and experimentally determined: specific composition of bloodsucking mosquitoes and their mass character, dominant types of bloodsucking mosquitoes, seasonal and annual dynamics of quantity of mosquitoes, prophylactic measures in relation to reduction to the quantity of bloodsucking mosquitoes. A novelty and actuality of researches consist in that similar researches will allow to forecast distribution of dangerous трансмісивних diseases bloodsucking mosquitoes in the Kherson area. Meaningfulness of work consists in that the got results can be used by the entomologists of district, municipal the санітарно-епідеміологічними stations for effective realization of measures on the limit of quantity of bloodsucking mosquitoes on territory of the Kherson area.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Activity of attack"

1

Brown, Kevin. Mass attack: A short novel. Peterborough: First & Best in Education, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shah, Alpa. Savage attack: Tribal insurgency in India. New Delhi: Social Science Press, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Global economic crisis and attack on working class: A document containing thousands of facts, reasons, reports, statistics, analysis, inferences and solutions on global economic crisis. Kolkata: Breehi Prakashani & Sirs Publication, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Streek, Barry. Right-wing attacks . Cape Town, South Africa: Barry Streek, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Baryshnikov, Nikolay. Fundamentals of professional intercultural communication. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1391408.

Full text
Abstract:
The textbook examines the fundamental problems of professional intercultural communication, outlines the main components of the professional competence of a specialist in intercultural communication, his personal qualities necessary for successful professional activity. The author's concept of attack strategies and self-defense strategies in the communicative battles of professionals is presented. Meets the requirements of the federal state educational standards of higher education of the latest generation. For students studying in the areas of training and specialties: 45.03.02 "Linguistics": profiles "Theory and practice of intercultural communication" and "Theory and methodology of teaching foreign languages and cultures"; 45.05.01 "Translation and translation studies"; 41.03.05 "International relations"; 41.06.01 "Political sciences and regional studies". It is also of interest to specialists in the field of intercultural communication.
APA, Harvard, Vancouver, ISO, and other styles
6

Lutherer, Lorenz Otto. Targeted: The anatomy of an animal rights attack. Norman: University of Oklahoma Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Simon, Yves René Marie. The Ethiopian campaign and French political thought. Notre Dame, Ind: University of Notre Dame Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

The Ethiopian campaign and French political thought. Notre Dame, Ind: University of Notre Dame Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Simon, Yves René Marie. The Ethiopian campaign and French political thought. Notre Dame, Ind: University of Notre Dame Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1943-, Gamble Michael, ed. Making sense of senselessness. Boston: McGraw-Hill, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Activity of attack"

1

Pedras, M. Soledade C. "Fungal Attack and Cruciferous Defenses: Tricking Plant Pathogens." In The Biological Activity of Phytochemicals, 127–39. New York, NY: Springer New York, 2010. http://dx.doi.org/10.1007/978-1-4419-7299-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

DeBusk, Robert F. "Risk of Heart Attack After Sexual Activity." In Heart Disease and Erectile Dysfunction, 279–88. Totowa, NJ: Humana Press, 2004. http://dx.doi.org/10.1007/978-1-59259-748-2_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hostiadi, Dandy Pramana, Tohari Ahmad, and Waskitho Wibisono. "A New Approach to Detecting Bot Attack Activity Scenario." In Advances in Intelligent Systems and Computing, 823–35. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73689-7_78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Miu, TungNgai, Chenxu Wang, Daniel Xiapu Luo, and Jinhe Wang. "Modeling User Browsing Activity for Application Layer DDoS Attack Detection." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 747–50. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59608-2_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Seveau, Stephanie. "Multifaceted Activity of Listeriolysin O, the Cholesterol-Dependent Cytolysin of Listeria monocytogenes." In MACPF/CDC Proteins - Agents of Defence, Attack and Invasion, 161–95. Dordrecht: Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-8881-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gauld, Nicola. "‘I attack this work of art deliberately’." In Museum Activism, 369–79. Abingdon, Oxon ; New York, NY : Routledge, 2019. | Series: Museum meanings: Routledge, 2019. http://dx.doi.org/10.4324/9781351251044-35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tasmin, Mahbuba, Sharif Uddin Ruman, Taoseef Ishtiak, Arif-ur-Rahman Chowdhury Suhan, Redwan Hasif, Shahnawaz Zulminan, and Rashedur M. Rahman. "Assessment of Deep Learning Models for Human Activity Recognition on Multi-variate Time Series Data and Non-targeted Adversarial Attack." In Advances in Intelligent Systems Research and Innovation, 129–59. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78124-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Scheaffer, Richard L., Ann Watkins, Mrudulla Gnanadesikan, and Jeffrey A. Witmer. "Application: Does Aspirin Help Prevent Heart Attacks? The Physician’s Health Study." In Activity-Based Statistics, 238–43. New York, NY: Springer New York, 1996. http://dx.doi.org/10.1007/978-1-4757-3843-8_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Frediani, Emiliano. "Variazioni in tema di linguaggio e giustizia amministrativa di fronte al regime." In Studi e saggi, 73–98. Florence: Firenze University Press, 2021. http://dx.doi.org/10.36253/978-88-5518-455-7.03.

Full text
Abstract:
The paper focuses on the issue of the impact of the Fascist regime’s own language on the activity of the administrative judge. After recalling the problem of the context in which the language of the administrative judge is framed, the investigation highlights some possible “symptoms” of a “sensibility” to be assessed on the level of stylistic and expressive formulas. If, in some cases, this language has been the subject of a particular criticism and attack, in others cases it is possible to highlight how a certain assonance emerges indirectly with the typical speech of the regime. In this perspective, it can be recognized that the linguistic “charm” of the regime, while not affecting the independence of judgment of the administrative judge, had a certain impact on the style of some decisions of the Italian Council of State. An analysis conducted on some paradigmatic cases is able to identify, with regard to a part of the jurisprudence developed after the Thirties, a real “climax” on the linguistic and expressive level.
APA, Harvard, Vancouver, ISO, and other styles
10

Stockemer, Daniel. "The Trajectory of Attac France." In The Micro and Meso Levels of Activism, 77–99. London: Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137264329_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Activity of attack"

1

Chen, Xihui, Andrzej Mizera, and Jun Pang. "Activity tracking: A new attack on location privacy." In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Li, Teng Wei, Jianfeng Ma, Shui Yu, and Chao Yang. "Inference Attack in Android Activity based on Program Fingerprint." In 2018 IEEE Conference on Communications and Network Security (CNS). IEEE, 2018. http://dx.doi.org/10.1109/cns.2018.8433169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tøndel, Inger Anne, Jostein Jensen, and Lillian Røstad. "Combining Misuse Cases with Attack Trees and Security Activity Models." In 2010 International Conference on Availability, Reliability, and Security (ARES). IEEE, 2010. http://dx.doi.org/10.1109/ares.2010.101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hekmati, Arvin, Eugenio Grippo, and Bhaskar Krishnamachari. "Large-scale Urban IoT Activity Data for DDoS Attack Emulation." In SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3485730.3493695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Srinivasan, Vijay, John Stankovic, and Kamin Whitehouse. "Protecting your daily in-home activity information from a wireless snooping attack." In the 10th international conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1409635.1409663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lin, Yen-Chen, Zhang-Wei Hong, Yuan-Hong Liao, Meng-Li Shih, Ming-Yu Liu, and Min Sun. "Tactics of Adversarial Attack on Deep Reinforcement Learning Agents." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/525.

Full text
Abstract:
We introduce two tactics, namely the strategically-timed attack and the enchanting attack, to attack reinforcement learning agents trained by deep reinforcement learning algorithms using adversarial examples. In the strategically-timed attack, the adversary aims at minimizing the agent's reward by only attacking the agent at a small subset of time steps in an episode. Limiting the attack activity to this subset helps prevent detection of the attack by the agent. We propose a novel method to determine when an adversarial example should be crafted and applied. In the enchanting attack, the adversary aims at luring the agent to a designated target state. This is achieved by combining a generative model and a planning algorithm: while the generative model predicts the future states, the planning algorithm generates a preferred sequence of actions for luring the agent. A sequence of adversarial examples is then crafted to lure the agent to take the preferred sequence of actions. We apply the proposed tactics to the agents trained by the state-of-the-art deep reinforcement learning algorithm including DQN and A3C. In 5 Atari games, our strategically-timed attack reduces as much reward as the uniform attack (i.e., attacking at every time step) does by attacking the agent 4 times less often. Our enchanting attack lures the agent toward designated target states with a more than 70% success rate. Example videos are available at http://yclin.me/adversarial_attack_RL/.
APA, Harvard, Vancouver, ISO, and other styles
7

Takemori, Kazuya, Dennis Arturo Ludeña Romaña, Shinichiro Kubota, Kenichi Sugitani, and Yasuo Musashi. "Detection of NS Resource Record Based DNS Query Request Packet Traffic and SSH Dictionary Attack Activity." In 2009 Second International Conference on Intelligent Networks and Intelligent Systems (ICINIS). IEEE, 2009. http://dx.doi.org/10.1109/icinis.2009.69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Löfdahl, Jan-Olof. "Cost Effective Maintenance of Gas Turbine Machinery in Swedish Navy Fast Surface Attack Ships." In ASME 1998 International Gas Turbine and Aeroengine Congress and Exhibition. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/98-gt-148.

Full text
Abstract:
This paper is a summary of 35 years experience from maintenance, overhaul and repair of the ROLLS-ROYCE Marine PROTEUS Gas Turbine in the Swedish Navy. The 54 installed PROTEUS Gas Turbines in 18 ships have accumulated nearly 300 000 running hours. The reliability has steadily improved thanks to careful monitoring and intensive improvement programs. The initial, less than 500 hours average between engine removals has been extended to nearly 3000 hours as of today. Also the number of catastrophic engine failures has decreased. Although the Spare Parts prices and the Labor Costs per hour have increased over the years the maintenance cost per fired Gas Turbine hour has decreased. The paper describes the technical and economical aspects together with the cost reducing efforts. The information derives from the Swedish Navy Maintenance and Failure Reporting System, named “MARIS”, and from the VOLVO overhaul workshop annual technical and economical activity report.
APA, Harvard, Vancouver, ISO, and other styles
9

Romero, Maximiliano, Giuseppe Andreoni, and Silvia Piardi. "Sailing as Stroke Rehabilitation Strategy." In Applied Human Factors and Ergonomics Conference. AHFE International, 2022. http://dx.doi.org/10.54941/ahfe100726.

Full text
Abstract:
Stroke (brain attack), is a serious global public health problem and the main cause of many forms of disability. The majority of stroke survivors are mostly left with motor (muscle movement or mobility) impairments. Although remarkable developments have been made in drug treatment, post-stroke care continues to rely on rehabilitation interventions mostly. On the other hand, the presence of post-stroke depression has been associated with decreases in functional recovery, social activity and cognition. Therefore, this project aims to improve the quality of people’s lives after a stroke by introducing sailing as outdoor mobility rehabilitation. It is intended to increase the patients’ motivation and engagement in the rehabilitation process by a more enjoyable and relaxing intervention than the existing ones especially for long term periods. The project, based on a haptic system installed on the deck of NYTEC 28 sailing boat, aim to monitoring rehab process development in post-stroke during normal sailing activity.
APA, Harvard, Vancouver, ISO, and other styles
10

Teshima, G., R. Harris, R. Keck, A. Meunier, J. Burnier, and B. Keyt. "CHARACTERIZATION OF LIMITED PROTEOLYTIC DIGESTS OF TISSUE PLASMINOGEN ACTIVATOR." In XIth International Congress on Thrombosis and Haemostasis. Schattauer GmbH, 1987. http://dx.doi.org/10.1055/s-0038-1644375.

Full text
Abstract:
Tissue plasminogen activator (tPA) is a single chain glycoprotein of 527 amino acids consisting of structural domains homologous to other plasma proteins ("finger","epidermal growth factor", "kringles" and "protease"). Unlike zymogens of other serine proteases, tPA in the single chain form (1-527), has amidolytic and fibrinolytic activity. However, the amidolytic activity is enhanced when tPA is cleaved by plasmin at the Arg275-Ile276 bond to yield the disulfide bonded two chain form. We used trypsin to study the structure and function of tPA by limited digestion. Aliquots of tPA (1 mg/ml) were digested at pH 7 with varying amounts of trypsin (1:10,000, 1:1000, 1:100 and 1:10; enzyme to substrate ratio). The dilute solutions of trypsin (1:10,000) were effective at completely converting one chain tPA to the two chain form, but little additional proteolysis was observed on SDS-PAGE. The proteolytic fragments of tPA were isolated by reduction and carboxymethylation (RCM), SDS gel electrophoresis and reversed phase HPLC. The RCM polypeptides were identified by amino acid composition and sequence. Specific antisera were prepared against peptide antigens of tPA including (1-27), (1-275), (276-527) and (502525). Immunoblotting experiments with the tryptic digests of tPA indicated that the region (1-275) is more susceptible to proteolytic attack than the protease (275-527). Specific cleavage sites were identified at positions 7, 10, 27 and 40. Partially digested tPA preparations were tested for enzymatic activity as determined by hydrolysis of the peptide substrate S-2288 or by clot lysis. Limited proteolysis at the amino terminus was correlated with significant loss of fibrinolytic . activity but minimal effect on the amidolytic activity. Increased tryptic digestion resulted in complete loss of amidolytic activity and significant reduction in antigenic activity as determined by polyclonal anti-tPA ELISA. These results areconsistent with the amino terminal "finger" domain being in part responsible for the fibrin-binding specificity of tPA. Limited tryptic digest of tPA, cleaves first at Arg-275, then subsequently cleaves the "finger" with associated loss of fibrinolytic activity.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Activity of attack"

1

Prusky, Dov, Noel T. Keen, and Stanley Freeman. Elicitation of Preformed Antifungal Compounds by Non-Pathogenic Fungus Mutants and their Use for the Prevention of Postharvest Decay in Avocado Fruits. United States Department of Agriculture, January 1996. http://dx.doi.org/10.32747/1996.7570573.bard.

Full text
Abstract:
C. gloeosporioides attacks unripe avocado fruits in the orchard. Germinated spores produce appressoria that germinate and breach the cuticle, but the resultant subcuticular hyphae become quiescent and do not develop further until fruit is harvested and ripens. Resistance of unripe avocado to attach by C. gloeosporioides is correlated with the presence of fungitoxic concentrations of the preformed antifungal compound, 1-acetoxy-2-hydroxy-4-oxoheneicosa-12, 15 diene in the pericarp of unripe fruits. The objective of this proposal was to study the signal transduction process by which elicitors induce resistance in avocado. It was found that abiotic elicitors, infection of avocado fruit with C. gloeosporioides or treatment of avocado cell suspension with cell-wall elicitor induced a significant production of reactive oxygen species (ROS). Ripe and unripe fruit tissue differ with regard to the ROS production. The unripe, resistant fruit are physiologically able to react and to produce high levels of ROS and increased activity of H+ATPase that can enhance the phenylpropanoid pathway ad regulate the levels of the antifungal compound-diene, inhibit fungal development, resulting in its quiescence. Interestingly, it was also found that growth regulators like cytokinin could do activation of the mechanism of resistance. Postharvest treatments of cytokinins strongly activated the phenylpropanoid pathway and induce resistance. We have developed non-pathogenic strains of C. gloeosporioides by Random Enzyme Mediated Integration and selected a hygromycin resistance, non-pathogenic strain Cg-142 out of 3500 transformants. This non-pathogenic isolate activates H+ATPase and induces resistance against Colletotrichum attack. As a basis for studying the importance of PL in pathogenicity, we have carried out heterologous expression of pel from C. gloeosporioides in the non-pathogenic C. magna and determine the significant increase in pathogenicity of the non-pathogenic strain. Based on these results we can state that pectate lyase is an important pathogenicity factor of C. gloeosporioides and found that fungal pathogenicity is affected not by pel but by PL secretion. Our results suggest that PH regulates the secretion of pectate lyase, and support its importance as a pathogenicity factor during the attack of avocado fruit by C. gloeosporioides . This implicates that if these findings are of universal importance in fungi, control of disease development could be done by regulation of secretion of pathogenicity factors.
APA, Harvard, Vancouver, ISO, and other styles
2

Ahern, Kenneth. The Importance of Psychology in Economic Activity: Evidence from Terrorist Attacks. Cambridge, MA: National Bureau of Economic Research, February 2018. http://dx.doi.org/10.3386/w24331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Avni, Adi, and Kirankumar S. Mysore. Functional Genomics Approach to Identify Signaling Components Involved in Defense Responses Induced by the Ethylene Inducing Xyalanase Elicitor. United States Department of Agriculture, December 2009. http://dx.doi.org/10.32747/2009.7697100.bard.

Full text
Abstract:
Plant-microbe interactions involve a large number of global regulatory systems, which are essential for plants to protect themselves against pathogen attack. An ethylene-inducing xylanase (EIX) of Trichoderma viride is a potent elicitor of plant defense responses, like hypersensitive response (HR), in specific cultivars of tobacco (Nicotiana tabacum) and tomato (Lycopersicon esculentum). The central goal of this proposal was to investigate the molecular mechanisms that allow plants to specifically activate defense responses after EIX treatment. We proposed to identify cellular signaling components involved in the induction of HR by the EIX elicitor. The molecular genetic analysis of the signal transduction pathway that modulates hypersensitive responses is an important step in understanding the induction of plant defense responses. The genes that mediate LeEIX2-EIX dependent activation of resistance mechanisms remain to be identified. We used two approaches to identify the cellular signaling components that induce HR mediated by the EIX elicitor. In the first approach, we performed a yeast two-hybrid screening using LeEix2 as bait to identify plant proteins that interact with it. In the second approach, we used virus-induced gene silencing (VIGS) for a high-throughput screen to identify genes that are required for the induction of LeEIX2-EIX mediated HR. VIGS will also be used for functional characterization of genes that will be identified during the yeast two-hybrid screen. This investigation will shed light on cellular processes and signaling components involved in induction of general plant defense against pathogens and will provide the basis for future biotechnological approaches to improve plant resistance to pathogens. Several genes were indentified by the two approaches. We used the VIGS and yeast two hybrid approaches to confirm that activity of the genes initially identified by different procedure. Two genes inhibit the induction of HR by the fungal elicitor in the different systems; Tobacco-Harpin binding protein 1 and cyclopropyl isomerase.
APA, Harvard, Vancouver, ISO, and other styles
4

Ryan, Mark David, Greg Hearn, Marion McCutcheon, Stuart Cunningham, and Katherine Kirkwood. Australian Cultural and Creative Activity: A Population and Hotspot Analysis: Albany and Denmark. Queensland University of Technology, September 2021. http://dx.doi.org/10.5204/rep.eprints.213126.

Full text
Abstract:
Located a 45-minute drive apart from each other in WA’s Great Southern Region, Albany and Denmark attract creative practitioners who are drawn to the region’s natural beauty and country lifestyle. A regional services hub, Albany has a robust creative services presence with a legacy media sector that functions as a hub for public and commercial media organisations servicing Great Southern and the Wheatbelt. Denmark, while a much smaller town, is renowned nationally as an enclave for locally, nationally, and internationally acclaimed artists and creatives.
APA, Harvard, Vancouver, ISO, and other styles
5

Prusky, Dov, Lisa Vaillancourt, and Robert Fluhr. Host Ammonification by Postharvest Pathogens and its Contribution to Fungal Colonization and Symptom Development. United States Department of Agriculture, December 2006. http://dx.doi.org/10.32747/2006.7592640.bard.

Full text
Abstract:
Postharvest decay of fruits and vegetables caused by pathogenic and saprophytic fungi significantly impairs the quality and quantity of fresh produce brought to market. Consequently, there is considerable interest in identifying factors that determine the susceptibility of these commodities to pathogen infection. Insidious postharvest decays remain quiescent during fruit growth and harvest, but activate during the postharvest period. A key response to the physiological changes occurring during fruit ripening is the initiation of ammonium secretion by the pathogen. Ammonium ions at the infection site (ammonification) have subsequent effects on both the pathogen and the host. An accompanying alkalinization process resulting from ammonia accumulation contributes to pathogenicity, since some important fungal virulence factors, (such as pectate lyase in Colletotrichum sp.), are significantly expressed only under alkaline conditions. In this proposal, investigated the mechanisms by which ammonification and alkalinization of infected tissues by the pathogen affect the host’s defense response to fungal attack, and instead increase compatibility during postharvest pathogen-host interactions. Our hypotheses were:1) that host signals, including ripening-related changes, induce secretion of ammonia by the pathogen; 2) that ammonia accumulation, and the resultant environmental alkalinization regulate the expression of fungal virulence genes that are essential for postharvest rot development; 3) that ammonification enhanced fungal colonization, by “suppression of host responses”, including production of reactive oxygen species, activation of superoxide, and polyphenol oxidase production. Our objectives were: to analyze: 1) factor(s) which activate the production and secretion of ammonia by the fungus; 2) fungal gene(s) that play role(s) in the ammonification process; 3) the relationship between ammonification and the activation of host defense response(s) during pathogen colonization; and 4) analyze hostgene expression in alkalinized regions of fruits attacked by hemibiotrophic fungi.
APA, Harvard, Vancouver, ISO, and other styles
6

Kerrigan, Susan, Phillip McIntyre, and Marion McCutcheon. Australian Cultural and Creative Activity: A Population and Hotspot Analysis: Bendigo. Queensland University of Technology, 2020. http://dx.doi.org/10.5204/rep.eprints.206968.

Full text
Abstract:
Bendigo, where the traditional owners are the Dja Dja Wurrung people, has capitalised on its European historical roots. Its striking architecture owes much to its Gold Rush past which has also given it a diverse cultural heritage. The creative industries, while not well recognised as such, contribute well to the local economy. The many festivals, museums and library exhibitions attract visitors from the metropolitan centre of Victoria especially. The Bendigo Creative Industries Hub was a local council initiative while the Ulumbarra Theatre is located within the City’s 1860’s Sandhurst Gaol. Many festivals keep the city culturally active and are supported by organisations such as Bendigo Bank. The Bendigo Writers Festival, the Bendigo Queer Film Festival, The Bendigo Invention & Innovation Festival, Groovin the Moo and the Bendigo Blues and Roots Music Festival are well established within the community. A regional accelerator and Tech School at La Trobe University are touted as models for other regional Victorian cities. The city has a range of high quality design agencies, while the software and digital content sector is growing with embeddeds working in agriculture and information management systems. Employment in Film, TV and Radio and Visual Arts has remained steady in Bendigo for a decade while the Music and Performing Arts sector grew quite well over the same period.
APA, Harvard, Vancouver, ISO, and other styles
7

Sessa, Guido, and Gregory B. Martin. molecular link from PAMP perception to a MAPK cascade associated with tomato disease resistance. United States Department of Agriculture, January 2012. http://dx.doi.org/10.32747/2012.7597918.bard.

Full text
Abstract:
The research problem: The detection of pathogen-associated molecular patterns (PAMPs) by plant pattern recognition receptors (PRRs) is a key mechanism by which plants activate an effective immune response against pathogen attack. MAPK cascades are important signaling components downstream of PRRs that transduce the PAMP signal to activate various defense responses. Preliminary experiments suggested that the receptor-like cytoplasmickinase (RLCK) Mai5 plays a positive role in pattern-triggered immunity (PTI) and interacts with the MAPKKK M3Kε. We thus hypothesized that Mai5, as other RLCKs, functions as a component PRR complexes and acts as a molecular link between PAMP perception and activation of MAPK cascades. Original goals: The central goal of this research was to investigate the molecular mechanisms by which Mai5 and M3Kε regulate plant immunity. Specific objectives were to: 1. Determine the spectrum of PAMPs whose perception is transmitted by M3Kε; 2. Identify plant proteins that act downstream of M3Kε to mediate PTI; 3. Investigate how and where Mai5 interacts with M3Kε in the plant cell; 4. Examine the mechanism by which Mai5 contributes to PTI. Changes in research directions: We did not find convincing evidence for the involvement of M3Kε in PTI signaling and substituted objectives 1 and 3 with research activities aimed at the analysis of transcriptomic profiles of tomato plants during the onset of plant immunity, isolation of the novel tomato PRR FLS3, and investigation of the involvement of the RLCKBSKs in PTI. Main achievements during this research program are in the following major areas: 1. Functional characterization of Mai5. The function of Mai5 in PTI signaling was demonstrated by testing the effect of silencing the Mai5 gene by virus-induced gene silencing (VIGS) experiments and in cell death assays. Domains of Mai5 that interact with MAPKKKs and subcellular localization of Mai5 were analyzed in detail. 2. Analysis of transcriptional profiles during the tomato immune responses to Pseudomonas syringae (Pombo et al., 2014). We identified tomato genes whose expression is induced specifically in PTI or in effector-triggered immunity (ETI). Thirty ETI-specific genes were examined by VIGS for their involvement in immunity and the MAPKKK EPK1, was found to be required for ETI. 3. Dissection of MAP kinase cascades downstream of M3Kε (Oh et al., 2013; Teper et al., 2015). We identified genes that encode positive (SGT and EDS1) and negative (WRKY1 and WRKY2) regulators of the ETI-associated cell death mediated by M3Kε. In addition, the MKK2 MAPKK, which acts downstream of M3Kε, was found to interact with the MPK3 MAPK and specific MPK3 amino acids involved interaction were identified and found to be required for induction of cell death. We also identified 5 type III effectors of the bacterial pathogen Xanthomonaseuvesicatoria that inhibited cell death induced by components of ETI-associated MAP kinase cascades. 4. Isolation of the tomato PRR FLS3 (Hind et al., submitted). FLS3, a novel PRR of the LRR-RLK family that specifically recognizes the flagellinepitope flgII-28 was isolated. FLS3 was shown to bind flgII-28, to require kinase activity for function, to act in concert with BAK1, and to enhance disease resistance to Pseudomonas syringae. 5. Functional analysis of RLCKs of the brassinosteroid signaling kinase (BSK) family.Arabidopsis and tomato BSKs were found to interact with PRRs. In addition, certain ArabidospsisBSK mutants were found to be impaired in PAMP-induced resistance to Pseudomonas syringae. Scientific and agricultural significance: Our research activities discovered and characterized new molecular components of signaling pathways mediating recognition of invading pathogens and activation of immune responses against them. Increased understanding of molecular mechanisms of immunity will allow them to be manipulated by both molecular breeding and genetic engineering to produce plants with enhanced natural defense against disease.
APA, Harvard, Vancouver, ISO, and other styles
8

Keinan, Ehud. Asian Chemists speak with one voice. AsiaChem Magazine, November 2020. http://dx.doi.org/10.51167/acm00001.

Full text
Abstract:
Dear Reader, the newly born AsiaChem magazine echoes the voice of the Federation of Asian Chemical Societies (FACS). We believe that this biannual, free-access magazine will attract worldwide attention because it comprises diverse articles on cutting-edge science, history, essays, interviews, and anything that would interest the broad readership within the chemical sciences. All articles are authored by scientists who were born in Asian countries or actively working in Asia. Thus, eight FACS countries, including Australia, China, India, Israel, Jordan, South Korea, Taiwan, and Turkey, are represented in this inaugural issue.
APA, Harvard, Vancouver, ISO, and other styles
9

BELENIUK, VASILY. INFLUENCE OF EDUCATIONAL MEASURES ON INCREASING THE INTEREST OF YOUTH IN SCIENTIFIC ACTIVITIES, ON THE EXAMPLE OF IMPLEMENTATION OF THE “SCHOOL OF YOUNG SCIENTISTS”. Science and Innovation Center Publishing House, 2021. http://dx.doi.org/10.12731/2658-4034-2021-12-1-2-33-40.

Full text
Abstract:
The issues of increasing interest among young people in scientific activity not only retain their relevance, but have become increasingly acute in recent years. Today, there is a pronounced decline in the level of prestige of scientific specialties, and those who are ready to work in this field, as a rule, initially have attitudes focused on the American and European scientific markets. To attract young people to science-intensive projects, “schools”, “forums” and “conferences” are held annually, aimed at creating a favorable information environment and creating comfortable conditions for self-realization. After testing among the participants of the School for Young Scientists held in the Krasnoyarsk Territory, statistically significant differences were established, which make it possible to draw a conclusion about the effectiveness of such events in terms of youth awareness of scientific and innovative activities in general, as well as in the Krasnoyarsk Territory.
APA, Harvard, Vancouver, ISO, and other styles
10

Thomas, Catherine, and Lynne Koontz. 2020 national park visitor spending effects: Economic contributions to local communities, states, and the nation. National Park Service, May 2021. http://dx.doi.org/10.36967/nrr-2286547.

Full text
Abstract:
The National Park Service (NPS) manages the Nation’s most iconic destinations that attract millions of visitors from across the Nation and around the world. Trip-related spending by NPS visitors generates and supports economic activity within park gateway communities. This report summarizes the annual economic contribution analysis that measures how NPS visitor spending cycles through local economies, generating business sales and supporting jobs and income. In 2020, the National Park System received over 237 million recreation visits (down 28% from 2019). Visitors to national parks spent an estimated $14.5 billion in local gateway regions (down 31% from 2019). The estimated contribution of this spending to the national economy was 234,000 jobs, $9.7 billion in labor income, $16.7 billion in value added, and $28.6 billion in economic output. The lodging sector saw the highest direct effects, with $5 billion in economic output directly contributed to this sector nationally. The restaurants sector saw the next greatest effects, with $3 billion in economic output directly contributed to this sector nationally. Results from the Visitor Spending Effects report series are available online via an interactive tool. Users can view year-by-year trend data and explore current year visitor spending, jobs, labor income, value added, and economic output effects by sector for national, state, and local economies. The interactive tool is available at https://www.nps.gov/subjects/socialscience/vse.htm.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography