Academic literature on the topic 'Hole interception'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hole interception.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hole interception"

1

Kendra, Paul E., Wayne S. Montgomery, Teresa I. Narvaez, and Daniel Carrillo. "Comparison of Trap Designs for Detection of Euwallacea nr. fornicatus and Other Scolytinae (Coleoptera: Curculionidae) That Vector Fungal Pathogens of Avocado Trees in Florida." Journal of Economic Entomology 113, no. 2 (November 19, 2019): 980–87. http://dx.doi.org/10.1093/jee/toz311.

Full text
Abstract:
Abstract Laurel wilt and Fusarium dieback are vascular diseases caused by fungal symbionts of invasive ambrosia beetles (Coleoptera: Curculionidae: Scolytinae). Both diseases threaten avocado trees in Florida. Redbay ambrosia beetle, Xyleborus glabratus, is the primary vector of the laurel wilt pathogen, Raffaelea lauricola, but in recent years this symbiont has been transferred laterally to at least nine other species of ambrosia beetle, which now comprise a community of secondary vectors. Dieback disease, caused by Fusarium spp. fungi, is spread by shot hole borers in the Euwallacea fornicatus species complex. In this study, we conducted field tests in Florida avocado groves to compare efficacy of four trap designs for detection of Scolytinae. Treatments included an 8-funnel Lindgren trap, black 3-vane flight interception trap, green 3-vane interception trap, white sticky panel trap, and an unbaited sticky panel (control). In two tests targeting E. nr. fornicatus and X. glabratus, traps were baited with a two-component lure (α-copaene and quercivorol). In a test targeting other species, traps were baited with a low-release ethanol lure. For E. nr. fornicatus, sticky panels and black interception traps captured significantly more beetles than Lindgren traps; captures with green traps were intermediate. With ethanol-baited traps, 20 species of bark/ambrosia beetle were detected. Trap efficacy varied by species, but in general, sticky traps captured the highest number of beetles. Results indicate that sticky panel traps are more effective for monitoring ambrosia beetles than Lindgren funnel traps, the current standard, and may provide an economical alternative for pest detection in avocado groves.
APA, Harvard, Vancouver, ISO, and other styles
2

Wentasari, Risa, and Adriyade Reshi Gusta. "Karakteristik Iklim Mikro Serta Pertumbuhan Pada Beberapa Sistem Tanam Jagung Dengan Pola Tanam Tumpang Sari Dan Tanam Tunggal." Jurnal Penelitian Pertanian Terapan 18, no. 3 (January 10, 2020): 199. http://dx.doi.org/10.25181/jppt.v18i3.1507.

Full text
Abstract:
The purpose of this study is to know the characteristics of microclimate and the growth ofcorn and soybean on single row, doble row, twin row, and twin row seed system inpoliculture and monoculture pattern. The research was arranged in Randomized BlockDesign with two factors (1) planting system consisting of 4 treatments (Sigle Row (SR) (25x75cm) Doble Row (DR) (20x 20x 80cm), Twin Row (TR) (20x10x 80 cm), and Twin Seed (TS)(40 x 75cm (2 seed in 1 planting hole)) and (2) Cropping Pattern (Polikulture (TS) (100 cmof corn line distance)) and monokulture (TT), with 3 replications. Data analysis was doneby F test (1% and 5%) and BNT (5%). Conclusions: Microclimatic characteristics (a) LightInterception (%) at morning of middle plant canopy, midday and afternoon in the middle andlower part of the canopy are not significantly different. There is a significant difference inmorning light interception at the bottom of the plant canopy, the lowest light interception isTTSR treatment. Temperature (oC) there was significant difference of temperature due to treatment. the TTTS treatment had the highest average temperature under the plant canopy(26.30 o C) and the center of the plant canopy (29.40 o C). Relative humidity (%) did not give a significantly different response to the treatment.
APA, Harvard, Vancouver, ISO, and other styles
3

Collins, D. W., J. Robinson, E. G. Hancock, L. M. Maddison, and J. Stephens. "Thysanoptera caught by emergence trapping from oak trees at Hamilton High Parks, South Lanarkshire, including Hoplothrips semicaecus (Uzel) new to Scotland." Glasgow Naturalist 27, no. 2 (2020): 9–14. http://dx.doi.org/10.37208/tgn27205.

Full text
Abstract:
A survey of the saproxylic invertebrate fauna of the Cadzow oaks parkland, South Lanarkshire, Scotland, part of the Hamilton High Parks Site of Special Scientific Interest, was undertaken between April 2017 and April 2018, with additional prior test trapping having started in August 2016. Several different search methodologies were utilised, including Owen emergence traps, flight interception traps, hollow tree traps, and rot hole traps. Large numbers of a non-target group of insects - thrips (Order Thysanoptera) - were noted in some of the traps from the first batch to be examined and separated out for analysis. A total of 370 individuals from eight species was identified, with 85.1% of these thrips being collected by three Owen emergence traps, a novel methodology for determining the presence, or abundance, of dispersing Thysanoptera. The majority (92.4%) of the thrips represented two fungal-feeding phlaeothripid species, Hoplothrips pedicularius and H. semicaecus. This is the first report of H. semicaecus from Scotland.
APA, Harvard, Vancouver, ISO, and other styles
4

Chittibabu, Y., CH Anuradha, and Sri Rama Chandra P. Murty. "Fuzzy Trust Based Energy Aware Multipath Secure Data Collection in Wireless Sensor Network." Journal of Computational and Theoretical Nanoscience 16, no. 2 (February 1, 2019): 669–75. http://dx.doi.org/10.1166/jctn.2019.7788.

Full text
Abstract:
Wireless Sensor Network (WSN) is the most promising inventions that can find its application in diverse fields such as army surveillance and forest fire detection. Multi-hop routing is followed in WSN, and the greatest security with effect to identity deception is produced through replaying routing information. An inevitable role is played by trust in the sensor network in case of military and other applications. Serious research work is being conducted on secured data aggregation. Longestablished cryptographic trust-aware routing protocols which are being used currently have become outdated, and their proficiency in tackling the situation is not much satisfactory. This ultimately results in increased complexity, poor link quality and high overhead when it comes to a number of cryptographic methods. This work deals with fuzzy logic based trust evaluation technique that can acquire secured routing. Direct Random Propagation (DRP) protocol and fuzzy logic are used in calculating the trust of the nodes. Flooding attack and black hole are proposed, and it eliminates the attack. The threshold value is compared with trust value. The ultimate result shows that the method that is proposed provides lesser interception probability, packet loss and end-to-end delay.
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Shasha, Tao Deng, Yang Zhang, Yuning Li, Weijie Yin, Qi Chen, and Zewen Liu. "Solar-blind ultraviolet detection based on TiO2 nanoparticles decorated graphene field-effect transistors." Nanophotonics 8, no. 5 (April 26, 2019): 899–908. http://dx.doi.org/10.1515/nanoph-2019-0060.

Full text
Abstract:
AbstractSensitive solar-blind ultraviolet (UV) photodetectors are important to various military and civilian applications, such as flame sensors, missile interception, biological analysis, and UV radiation monitoring below the ozone hole. In this paper, a solar-blind UV photodetector based on a buried-gate graphene field-effect transistor (GFET) decorated with titanium dioxide (TiO2) nanoparticles (NPs) was demonstrated. Under the illumination of a 325-nm laser (spot size ~2 μm) with a total power of 0.35 μW, a photoresponsivity as high as 118.3 A/W was obtained, at the conditions of zero gate bias and a source-drain bias voltage of 0.2 V. This photoresponsivity is over 600 times higher than that of a recently reported solar-blind UV photodetector based on graphene/vertical Ga2O3 nanowire array heterojunction (0.185 A/W). Experiments showed that the photoresponsivity of the TiO2 NPs decorated GFET photodetectors can be further enhanced by increasing the source-drain bias voltage or properly tuning the gate bias voltage. Furthermore, the photoresponse time of the TiO2 NPs decorated GFET photodetectors can also be tuned by the source-drain bias and gate bias. This study paves a simple and feasible way to fabricate highly sensitive, cost-efficient, and integrable solar-blind UV photodetectors.
APA, Harvard, Vancouver, ISO, and other styles
6

Mateos, B., and S. Schnabel. "Rainfall interception by Holm Oaks in Mediterranean open woodland." Cuadernos de Investigación Geográfica 27 (June 30, 2001): 27. http://dx.doi.org/10.18172/cig.1111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

NOREM, JAMES H., and JAMES E. SPENCER. "Pin–Hole Luminosity Monitor with Feedback." International Journal of Modern Physics A 20, no. 31 (December 20, 2005): 7379–91. http://dx.doi.org/10.1142/s0217751x05031198.

Full text
Abstract:
Previously, the generalized luminosity [Formula: see text] was defined and calculated for all incident channels based on an NLC e+e- design. Alternatives were then considered to improve the differing beam-beam effects in the e-e-, eγ and γγ channels. Regardless of the channel, there was a large flux of outgoing, high energy photons that were produced from the beam-beam interaction e.g. beamstrahlung that needs to be disposed of and whose flux depended on [Formula: see text]. One approach to this problem is to consider it a resource and attempt to take advantage of it by disposing of these straight–ahead photons in more useful ways than simply dumping them. While there are many options for monitoring the luminosity, any method that allows feedback and optimization in real time and in a non-intercepting and non-interfering way during normal data taking is extremely important – especially if it provides other capabilities such as high resolution tuning of spot sizes and can be used for all incident channels without essential modifications to their setup. Our "pin-hole" camera appears to be such a device if it can be made to work with high energy photons in ways that are compatible with the many other constraints and demands on space around the interaction region. The basis for using this method is that it has, in principle, the inherent resolution and bandwidth to monitor the very small spot sizes and their stabilities that are required for very high, integrated luminosity. While there are many possible, simultaneous uses of these outgoing photon beams, we limit our discussion to a single, blind, proof-of-principle experiment that was done on the FFTB line at SLAC to certify the concept of a camera obscura for high energy photons.
APA, Harvard, Vancouver, ISO, and other styles
8

Pitsoulis, Athanassios, and Soeren C. Schwuchow. "Coercion, Credibility, and Mid-Air Interceptions of Military Planes." Peace Economics, Peace Science and Public Policy 20, no. 4 (December 1, 2014): 697–707. http://dx.doi.org/10.1515/peps-2014-0040.

Full text
Abstract:
AbstractPointing out the remarkable levels of hostile interaction in the air space over contested territory between states like China and Japan or Greece and Turkey we argue that air space incursions can be interpreted as a rational strategy with ultimately political aims. In our interpretation deliberate intrusions of military aircraft into sensitive air space serve as an indirect risk-generating mechanism, as they will trigger scrambles of the opposed government’s air force which may escalate into a military crisis. We derive testable hypotheses from a game-theoretic model, which we developed in earlier work to explore the strategic logic behind this risk-generating mechanism more rigorously. In order to test whether the model’s predictions regarding the effect of short-term economic developments on the states’ interaction hold, we built a database of daily event observations from the Hellenic National Defence General Staff reports of the last 4 years, containing time series data of Turkish intrusions into Greek-claimed air space and the number of dogfights between Greek and Turkish fighter planes. What we find is that not only Greek engagements of Turkish intruders but also massed, provocative Turkish intrusions have become significantly less likely after the onset of the Greek economic crisis. These findings are well in line with the predictions of the model and thus supportive of our theory.
APA, Harvard, Vancouver, ISO, and other styles
9

Burhan, Ahmad S., and Fehmieh R. Nawaya. "Preventive and interceptive orthodontic needs among Syrian children." Journal of the Egyptian Public Health Association 91, no. 2 (June 2016): 90–94. http://dx.doi.org/10.1097/01.epx.0000483238.83501.60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Robertson, MJ, and F. Giunta. "Responses of spring wheat exposed to pre-anthesis water stress." Australian Journal of Agricultural Research 45, no. 1 (1994): 19. http://dx.doi.org/10.1071/ar9940019.

Full text
Abstract:
Spring wheat cv. Yecora 70 was exposed to soil water deficits during three phases between emergence and anthesis: early (22 days after sowing to terminal spikelet), mid (terminal spikelet to anthesis) and late (early boot to anthesis). The objective was to quantify the effects of water stress on partitioning of above-ground biomass to the spike, the ratio between kernel number and anthesis spike weight, canopy expansion, radiation interception and phenology. This information can be used to test the assumptions used when modelling wheat growth and yield under water-limiting conditions. The extension rate of the lamina and pseudostem was reduced when more than 50% of the extractable soil water had been extracted from the root-zone, independent of the stage when stress was imposed. Stress reduced biomass accumulation more through a reduction of the amount of radiation intercepted than reduced radiation-use efficiency. The reduction in the amount of radiation intercepted was due to lower leaf area index, as the radiation extinction coefficient was similar under stress and non-stress conditions. Stress treatments reduced spike biomass at anthesis to 58-94% of that in the well-watered control, but had little effect on the pattern of biomass partitioning to the spike and the proportion of anthesis biomass as spike. Stress after terminal spikelet reduced the ratio of kernel number to anthesis spike weight by 50%, suggesting that reduced kernel number under stress may not be solely due to a restricted assimilate supply. This study showed that current assumptions are valid regarding the response of wheat to pre-anthesis stress in terms of canopy expansion, radiation interception and biomass partitioning to the spike. However, the constancy of the ratio of kernel number to anthesis spike weight was shown not to hold under water stress.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hole interception"

1

Ali, Abdulkahhar. "Etudes electrochimique et chromatographique de la photooxydation des alcools primaires aliphatiques sur des suspensions de catalyseurs a base de dioxyde de titane." Poitiers, 1988. http://www.theses.fr/1988POIT2262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Trevizan, Flávia Cristina. "Conhecimentos fortuitos no processo penal: critérios de admissibilidade." Universidade de São Paulo, 2013. http://www.teses.usp.br/teses/disponiveis/2/2137/tde-25102016-085954/.

Full text
Abstract:
O presente trabalho tem por objeto o estudo dos conhecimentos obtidos de forma fortuita, através da realização legal de um meio de obtenção de prova autorizado judicialmente, que não se reportam ao crime cuja investigação legitimou a medida restritiva. A fim de viabilizar essa abordagem foi necessário rever alguns conceitos relacionados à noção de prova no processo penal, que se colocam como pontos de partida para o enfrentamento do assunto. Na sequência, os conhecimentos fortuitos são inseridos no tema da obtenção da prova criminal, ligada à proteção da intimidade e da privacidade, tendo como foco principal a interceptação das comunicações telefônicas e a busca domiciliar. Para tanto, toma-se em consideração o princípio da especialidade da prova, que justifica que a limitação a direitos fundamentais esteja restrita e vinculada à apuração do crime que ensejou tal intervenção, motivo pelo qual o direito ao sigilo das comunicações e o direito à inviolabilidade da intimidade e do domicílio são analisados sob a perspectiva do panorama constitucional e legal brasileiro. A questão passa necessariamente pela análise do tema no Direito Comparado e pelo levantamento das diversas manifestações encontradas na doutrina e na jurisprudência nacional sobre a problemática, sobretudo em razão do silêncio legislativo quanto à solução jurídica da questão no ordenamento pátrio. Assim, após afastar as teses que defendem a negação absoluta dos conhecimentos fortuitos ou sua valoração sem restrições, conclui pela necessidade de se delimitar as fronteiras entre os conhecimentos imputados à própria investigação e aqueles que, inversamente, se levam em conta de conhecimentos fortuitos, socorrendo-se para tanto de um critério objetivo que concretize essa distinção. Isto porque, dela dependerá o tratamento a ser conferido aos conhecimentos obtidos em investigação de crime diverso, no que se refere à sua admissibilidade no processo e sua valoração pelo julgador como elemento de prova, apto à demonstração do delito casualmente descoberto, ou sua eventual utilização como mera notícia de crime formadora de indício. Por fim, são enfrentadas questões específicas suscitadas durante o desenvolvimento do estudo, e que colocam à prova o critério adotado.
The present paper has as its aim the study of knowledge obtained from fortuitous way through a legal means of obtaining evidence legally authorized, that does not relate to the crime which investigation legitimized the restraint measure. In order to make this approach it was necessary to review some concepts related to the notion of evidence in criminal proceedings, which arise as starting points for the confrontation of the subject. In the continuation, the fortuitous knowledge is inserted into the topic of obtaining criminal evidence, linked to the protection of privacy and intimacy, having as its main focus the interception of telephone communications and home search. To do so, it is taken into account the principle of specialty of evidence, which justifies that limiting the fundamental rights is restricted and tied to the investigation of the crime that resulted in such an intervention, which is why the right to confidentiality of communications and the right to inviolability of domicile and intimacy are analyzed from the perspective of constitutional and legal Brazilian panorama. The question goes necessarily through by examining the topic in Comparative Law and the survey of various manifestations found in doctrine and national case law on the issue, especially in view of the legislative silence as to the legal solution of the matter in land use. So, after removing the arguments defending the absolute denial of the fortuitous knowledge or its valuation without restrictions, it is concluded by the need to delimit the boundaries between imputed knowledge to the research itself and those that, conversely, are taken into account of fortuitous knowledge, helping to as much of an objective criterion that achieves this distinction. This is because from it will depend the treatment to be given to information obtained in the investigation of crime, as regards its admissibility in the process and its valuation by the Court as evidence to the demonstration of the offense or its possible use discovered fortuitously as mere forming crime news clue. Finally, specific issues are faced raised during the development of the study, and that put to the test the adopted criterion.
APA, Harvard, Vancouver, ISO, and other styles
3

Perlman, Leon Joseph. "Legal and regulatory aspects of mobile financial services." Thesis, 2012. http://hdl.handle.net/10500/13362.

Full text
Abstract:
The thesis deals with the emergence of bank and non-bank entities that provide a range of unique transaction-based payment services broadly called Mobile Financial Services (MFS) to unbanked, underserved and underbanked persons via mobile phones. Models of MFS from Mobile Network Operators (MNOs), banks, combinations of MNOs and banks, and independent Mobile Financial Services Providers are covered. Provision by non-banks of ‘bank-type’ services via mobile phones has been termed ‘transformational banking’ versus the ‘additive banking’ services from banks. All involve the concept of ‘branchless banking’ whereby ‘cash-in/cash out’ services are provided through ‘agents.’ Funds for MFS payments may available through a Stored Value Product (SVP), particularly through a Stored Value Account SVP variant offered by MNOs where value is stored as a redeemable fiat- or mobile ‘airtime’-based Store of Value. The competitive, legal, technical and regulatory nature of non-bank versus bank MFS models is discussed, in particular the impact of banking, payments, money laundering, telecommunications, e-commerce and consumer protection laws. Whether funding mechanisms for SVPs may amount to deposit-taking such that entities could be engaged in the ‘business of banking’ is discussed. The continued use of ‘deposit’ as the traditional trigger for the ‘business of banking’ is investigated, alongside whether transaction and paymentcentric MFS rises to the ‘business of banking.’ An extensive evaluation of ‘money’ based on the Orthodox and Claim School economic theories is undertaken in relation to SVPs used in MFS, their legal associations and import, and whether they may be deemed ‘money’ in law. Consumer protection for MFS and payments generally through current statute, contract, and payment law and common law condictiones are found to be wanting. Possible regulatory arbitrage in relation to MFS in South African law is discussed. The legal and regulatory regimes in the European Union, Kenya and the United States of America are compared with South Africa. The need for a coordinated payments-specific law that has consumer protections, enables proportional risk-based licensing of new non-bank providers of MFS, and allows for a regulator for retail payments is recommended. The use of trust companies and trust accounts is recommended for protection of user funds. | vi
Public, Constitutional and International Law
LLD
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Hole interception"

1

Arnold, J. Douglas, and Zach Metson. Awesome Sega Genesis Secrets 4. Lahaina, HI: Sandwich Islands Publishing, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arnold, J. Douglas, and Zach Meston. Awesome Sega Genesis Secrets 3. Lahaina, HI: Sandwich Islands Publishing, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prima. Official Sega Genesis: Power Tips Book, Volume 3. Rocklin, CA: Prima Publishing, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tom, Badgett, ed. Official Sega Genesis and Game Gear strategies, 2ND Edition. Toronto: Bantam Books, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sandler, Corey. Official Sega Genesis and Game Gear strategies, 3RD Edition. New York: Bantam Books, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Official Sega Genesis and Game Gear Strategies, '94 Edition. New York, NY: Random House, Electronic Publishing, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Hole interception"

1

Copeland, Jack. "Intercept!" In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0014.

Full text
Abstract:
A top-secret cryptographic dictionary compiled by Bletchley Park in 1944 defined ‘Y Service’ as ‘The organisation responsible for the interception of all enemy and neutral radio transmissions’. The job description was succinct, the task huge. The Y Service staff who intercepted and recorded the German and Japanese transmissions are unsung heroes of the attack on the enemy codes. Many of them were women. Their difficult and painstaking work was less glamorous than codebreaking, but without Y the Bletchley cryptanalysts would have had nothing to decrypt. Chapter 2 sketches the growth of the Y Service between the wars, including the establishment of the Royal Navy intercept site at Flowerdown, the Royal Air Force site at Cheadle, and the Army site at Chatham (see photograph 40). These and other military sites in the UK tended to focus on Morse transmissions. Curiously, the interception of the non-Morse transmissions associated with Fish fell at first to the London Police. Collaboration between the Foreign Office signals interception programme and Scotland Yard’s Metropolitan Police wireless service began in 1926 (‘wireless’ means ‘radio’). The Police wireless service, which started life in an attic at Scotland Yard, was originally set up to develop wireless for police vehicles; from 1926 the police operators had the additional brief of intercepting material of interest to the Foreign Office. In 1930 the Foreign Office started to finance the police Y section, which in turn became increasingly involved in the development of experimental equipment for Y work. Following successes against European traffic, the police operators received carte blanche to investigate ‘any curious type of transmission’. In the mid-1930s the section expanded and was relocated to buildings in the grounds of the Metropolitan Police Nursing Home at Denmark Hill in south London. Police operators first intercepted German non-Morse transmissions in 1932, on a link between Berlin and Moscow. These transmissions, which went on for ten months, were clearly experimental, and the police monitored them in conjunction with the Post Office’s Central Telegraph Office. It seems that the pre-war transmissions were unenciphered. Y’s first wartime encounter with non-Morse transmissions came in the latter half of 1940, when two stations broadcasting enciphered teleprinter code were intercepted.
APA, Harvard, Vancouver, ISO, and other styles
2

Reich, Simon, and Peter Dombrowski. "Navigating the Proliferation Security Initiative and Informal Sponsorship." In The End of Grand Strategy. Cornell University Press, 2018. http://dx.doi.org/10.7591/cornell/9781501714627.003.0007.

Full text
Abstract:
This chapter examines an informal variant of a sponsorship strategy. It focuses on the case of the Proliferation Security Initiative (PSI), a global campaign designed to combat the smuggling of nuclear, biological and chemical materials and related component parts. The chapter begins with an vignette involving the interception of a North Korean vessel on the high seas suspected of carrying missile technology by a member of the US’ Seventh Fleet – and the vessel’s return to its home port. The chapter then describes and explains the military importance of the PSI, the informal coalition’s (numbering 130 states) rejection of American leadership, and yet the pivotal role nonetheless played by the US Navy in collaboration with a variety of countries.
APA, Harvard, Vancouver, ISO, and other styles
3

Mahoney, Ewing. "The Guilty Secret." In MI5, the Cold War, and the Rule of Law, 205–29. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198818625.003.0008.

Full text
Abstract:
This chapter studies the use of the controversial surveillance method called ‘Special Facilities’ (SF), the use of which historically MI5 to this day seems keen to conceal. SF was the code name for telephonic electronic eavesdropping, and sometimes for the use of microphones by MI5 for covert purposes in any circumstances. SF in this former sense was often, but not always, used in conjunction with a telephone interception, which was almost invariably set up at the telephone exchange, or at least outside the target’s home or office. The legal questions raised by the use of SF were never properly addressed until 1989. At the heart of it, however, is the question of whether the placing and use of covert listening devices was lawful.
APA, Harvard, Vancouver, ISO, and other styles
4

Mahoney, Ewing. "Conclusion." In MI5, the Cold War, and the Rule of Law, 448–74. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198818625.003.0015.

Full text
Abstract:
This concluding chapter addresses the significance of examining the legal history record to better understand the nature, influences, and values of contemporary institutions. It is important to know, for example, why the modern law on the interception of communications contains the unique and eccentric power of the Home Secretary rather than a judge to issue warrants to authorize the opening of mail and the tapping of phones. The historical record also more clearly casts light on the close relationship between the Security Service and the government, which by virtue of this procedure not only knows about but also authorizes MI5 targets and operations, raising doubts about the operational independence of MI5. Moreover, the experience of the past helps in assessing problems of the present. In particular, it gives credibility and continuity to complaints about the use and abuse of surveillance powers and the corruption of the criminal justice system for political ends.
APA, Harvard, Vancouver, ISO, and other styles
5

"William Parkhurst." In The Burley Manuscript, edited by Peter Redford. Manchester University Press, 2016. http://dx.doi.org/10.7228/manchester/9781526104489.003.0004.

Full text
Abstract:
Gives a biography, the first to appear in print, of the manuscripts compiler, who was born in 1581, and had an early association with the Earl of Essex, probably accompanying him on the ill-fated Irish expedition of 1599. From this period until 1619, when he was knighted, he was in the service of the Crown, much of the time in association with Sir Henry Wotton, ambassador for many years to Venice, and also to the court of Savoy. During all that service, he was also a secret agent, intercepting correspondence and carrying out other duties. Several home appointments followed, including that of joint Warden of the Mint, which he held until the onset of the Civil War. He took the King’s side, and transferred to the Oxford Mint, but when the war was lost suffered years of relative hardship. He was reinstated at the Restoration, and died in 1667,
APA, Harvard, Vancouver, ISO, and other styles
6

Ginor, Isabella, and Gideon Remez. "The Soviet Regulars Move In." In The Soviet-Israeli War, 1967-1973, 135–50. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190693480.003.0011.

Full text
Abstract:
The personnel of the Soviet expeditionary force to Egypt was carefully selected, screened (for Jews and other undesirable element) and trained for desert warfare, in parallel with Egyptian crews who were ultimately to take over the weapons. The MiG-21 fighters of interceptor squadrons were transported to Egypt in a new airlift. Meanwhile Israeli air attacks foiled foiled Egyptian attempts to station SAMs along the Suez Canal, and a Soviet-made radar station was lifted by an Israeli heliborne raid, Yet-inconclusive testimonies indicate that a Soviet tank force was landed at Alexandria to protect the “Kavkaz” formations. The Israeli “depth bombings” caused casualties among the Soviet advisers, exacerbating Moscow’s motivation to counter them. The first report from a newly recruited Israeli spy, Ashraf Marwan, established the false version of a secret visit by Nasser to Moscow – the first instance of his actual operation as an Egyptian double agent. Soviet and Egyptian naval units failed to intercept five Israeli missile boats that evaded the French embargo to sail home.
APA, Harvard, Vancouver, ISO, and other styles
7

"Pacific Salmon: Ecology and Management of Western Alaska’s Populations." In Pacific Salmon: Ecology and Management of Western Alaska’s Populations, edited by Thomas P. Quinn. American Fisheries Society, 2009. http://dx.doi.org/10.47886/9781934874110.ch39.

Full text
Abstract:
<em>Abstract.</em>—Pioneering scientists pointed out that conservation and management of salmon for human use and as a component of ecosystems depends on understanding their population structure. Many current controversies regarding exploitation rates, interceptions, and resuscitation of depleted populations hinge on issues of population structure. This paper examines the range of spatial scales over which salmon population structure can be defined, using Bristol Bay sockeye salmon <em>Oncorhynchus nerka </em>as the example. The region’s geology has created similar spawning habitats associated with different lakes, revealing the extent to which evolutionary processes repeat themselves. The life history patterns of the salmon reflect both genetic adaptations to their local environment, facilitated by homing to their natal site for spawning, and also the capability to respond to changing environmental conditions. This combination of variables may explain why similar environmental conditions result in different patterns of population dynamics among the lake systems, giving the Bristol Bay system as a whole more stability than is seen in any single lake. At still finer spatial scales, investigations show that sockeye salmon home not only to specific streams but even to habitat patches within a stream. Nevertheless, records of the presence of other salmon species, notably Chinook <em>O. tshawytscha</em>, chum <em>O. keta</em>, and pink salmon <em>O. gorbuscha</em>, seem to indicate more dynamic population structure, including straying and the possible establishment of new populations in streams where sockeye salmon are numerically dominant. The understanding of these patterns and processes stems largely from a well-conceived and persistent long term program of research and monitoring, and this provides lessons and cautions for research and management in systems where information is less extensive, such as in the Arctic-Yukon-Kuskokwim region.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hole interception"

1

Balachandra and Nisha P. Shetty. "Interception of black-hole attacks in mobile AD-HOC networks." In 2016 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2016. http://dx.doi.org/10.1109/inventive.2016.7830125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dakur, Aditya, and Shruthi Dakur. "Eavesdropping and interception security hole and its solution over VoIP service." In 2014 IEEE Global Conference on Wireless Computing and Networking (GCWCN). IEEE, 2014. http://dx.doi.org/10.1109/gcwcn.2014.7030837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cristiano, Carlo, and Marco Pirrone. "EFFICIENT PETROPHYSICAL UNCERTAINTY PROPAGATION VIA DATA-DRIVEN ANALYTICS." In 2021 SPWLA 62nd Annual Logging Symposium Online. Society of Petrophysicists and Well Log Analysts, 2021. http://dx.doi.org/10.30632/spwla-2021-0038.

Full text
Abstract:
Risk-mitigation strategies are most effective when the major sources of uncertainty are determined through dedicated and in-depth studies. In the context of reservoir characterization and modeling, petrophysical uncertainty plays a significant role in the risk assessment phase, for instance in the computation of volumetrics. The conventional workflow for the propagation of the petrophysical uncertainty consists of physics-based model embedded into a Monte Carlo (MC) template. In detail, open-hole logs and their inherent uncertainties are used to estimate the important petrophysical properties (e.g. shale volume, porosity, water saturation) with uncertainty through the mechanistic model and MC simulations. In turn, model parameter uncertainties can be also considered. This standard approach can be highly time-consuming in case the physics-based model is complex, unknown, difficult to reproduce (e.g. old/legacy wells) and/or the number of wells to be processed is very high. In this respect, the aim of this paper is to show how a data-driven methodology can be used to propagate the petrophysical uncertainty in a fast and efficient way, speeding-up the complete process but still remaining consistent with the main outcomes. In detail, a fit-for-purpose Random Forest (RF) algorithm learns through experience how log measurements are related to the important petrophysical parameters. Then, a MC framework is used to infer the petrophysical uncertainty starting from the uncertainty of the input logs, still with the RF model as a driver. The complete methodology, first validated with ad-hoc synthetic case studies, has been then applied to two real cases, where the petrophysical uncertainty has been required for reservoir modeling purposes. The first one includes legacy wells intercepting a very complex lithological environment. The second case comprises a sandstone reservoir with a very high number of wells, instead. For both scenarios, the standard approach would have taken too long (several months) to be completed, with no possibility to integrate the results into the reservoir models in time. Hence, for each well the RF regressor has been trained and tested on the whole dataset available, obtaining a valid data-driven analytics model for formation evaluation. Next, 1000 scenarios of input logs have been generated via MC simulations using multivariate normal distributions. Finally, the RF regressor predicts the associated 1000 petrophysical characterization scenarios. As final outcomes of the workflow, ad-hoc statistics (e.g. P10, P50, P90 quantiles) have been used to wrap up the main findings. The complete data-driven approach took few days for both scenarios with a critical impact on the subsequent reservoir modeling activities. This study opens the possibility to quickly process a high number of wells and, in particular, it can be also used to effectively propagate the petrophysical uncertainty to legacy well data for which conventional approaches are not an option, in terms of time-efficiency.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography