Academic literature on the topic 'Tactile defens'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Tactile defens.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Tactile defens"

1

Pintus, Eliana, Stefania Uccheddu, Knut H. Røed, Javier Pérez Gonzaléz, Juan Carranza, Mauri Nieminen, and Øystein Holand. "Flexible mating tactics and associated reproductive effort during the rutting season in male reindeer (Rangifer tarandus, L. 1758)." Current Zoology 61, no. 5 (October 1, 2015): 802–10. http://dx.doi.org/10.1093/czoolo/61.5.802.

Full text
Abstract:
Abstract Polygynous males can change their mating tactics across their lifetime, but information is scarce on the flexibility of this trait within a given season and the relative costs and benefits of using different tactics. Here, we monitored individually marked male reindeer Rangifer tarandus and classified their mating tactics as harem-defense, sneaking, or mixed. The costs of the male reproductive effort were assessed using both direct (i.e. percentage of body mass lost) and indirect measures (i.e. activity patterns such as feeding, standing, and walking), while mating group size and reproductive success were recorded as mating effort benefits. Our results show that reindeer males may switch between the harem-defense and sneaking tactics throughout the same breeding season, providing further support to the notion that reproductive tactics are flexible in ungulates. The costs and benefits of male mating effort vary according to the mating tactic, reaching the highest values in harem-holders and the lowest values in sneaking males. Moreover, males who switched between the sneaking tactic and the harem-defence tactic tended to achieve higher mating success than males who consistently used the least costly tactic. Indeed, all harem-holders successfully sired offspring, whereas only two out of three mixed-tactic males sired one calf, and sneaking males did not sire any calves. In conclusion, our results show that reindeer males can modulate their mating efforts during the same breeding season by switching between the most costly harem-defense tactic and the least costly sneaking tactic, suggesting individual solutions to the balance between reproductive effort and mating opportunities.
APA, Harvard, Vancouver, ISO, and other styles
2

Tripp, Joel A., Ni Y. Feng, and Andrew H. Bass. "Behavioural tactic predicts preoptic-hypothalamic gene expression more strongly than developmental morph in fish with alternative reproductive tactics." Proceedings of the Royal Society B: Biological Sciences 285, no. 1871 (January 17, 2018): 20172742. http://dx.doi.org/10.1098/rspb.2017.2742.

Full text
Abstract:
Reproductive success relies on the coordination of social behaviours, such as territory defence, courtship and mating. Species with extreme variation in reproductive tactics are useful models for identifying the neural mechanisms underlying social behaviour plasticity. The plainfin midshipman ( Porichthys notatus ) is a teleost fish with two male reproductive morphs that follow widely divergent developmental trajectories and display alternative reproductive tactics (ARTs). Type I males defend territories, court females and provide paternal care, but will resort to cuckoldry if they cannot maintain a territory. Type II males reproduce only through cuckoldry. We sought to disentangle gene expression patterns underlying behavioural tactic, in this case ARTs, from those solely reflective of developmental morph. Using RNA-sequencing, we investigated differential transcript expression in the preoptic area-anterior hypothalamus (POA-AH) of courting type I males, cuckolding type I males and cuckolding type II males. Unexpectedly, POA-AH differential expression was more strongly coupled to behavioural tactic than morph. This included a suite of transcripts implicated in hormonal regulation of vertebrate social behaviour. Our results reveal that divergent expression patterns in a conserved neuroendocrine centre known to regulate social-reproductive behaviours across vertebrate lineages may be uncoupled from developmental history to enable plasticity in the performance of reproductive tactics.
APA, Harvard, Vancouver, ISO, and other styles
3

Grenier, Jonathan, Bradley Pomeroy, and Andrew Reffett. "When Do Auditor Defense Tactics Increase Rather Than Decrease Perceived Auditor Negligence?" Current Issues in Auditing 6, no. 2 (August 1, 2012): P7—P12. http://dx.doi.org/10.2308/ciia-50280.

Full text
Abstract:
SUMMARY In cases of alleged audit failure, audit firms and/or their defense teams can make statements intended to decrease jurors' assessments of auditor negligence. For example, Cornell et al. (2009) find that expressing sympathy for the victims of undetected fraud successfully decreases mock jurors' assessments of auditor negligence. Extending this research, Grenier et al. (2012) report the results of an experiment indicating that the effectiveness of defense tactics depends on their perceived credibility, and that credibility depends on at least two prevalent situational factors: the importance of the client to the audit firm and the source of the defense tactic (i.e., the national office or the local office that conducted the audit). Specifically, mock jurors perceive auditor defense tactics to be credible (not credible) when client importance is low (high), and when implemented by the firm's national (local) office. Hence, when client importance is low, defense tactics successfully decrease negligence assessments if implemented by the firm's national office, but “backfire” and increase negligence assessments when client importance is high, regardless of the defense tactic's source (national versus local office). Audit firms should therefore use caution when deciding whether to use defense tactics, particularly in negligence suits involving clients that could be perceived as highly important to the audit firm. This article summarizes Grenier et al. (2012) by discussing its motivation, method, results, and practical implications.
APA, Harvard, Vancouver, ISO, and other styles
4

Goyes, David Rodríguez. "‘Tactics Rebounding’ in the Colombian Defence of Seed Freedom." International Journal for Crime, Justice and Social Democracy 7, no. 1 (March 1, 2018): 91–107. http://dx.doi.org/10.5204/ijcjsd.v7i1.425.

Full text
Abstract:
This article investigates the Red de Semillas Libres de Colombia [Colombian Network of Free Seeds] movement, since its inception to date (2013-2016). The study, developed within the framework of green criminology and with a focus on environmental justice, draws on ethnographic observations of Red de Semillas and semi-structured interviews with group members. I explore processes of repertoire appropriation developed by social movements. The main argument advanced is that the Red de Semillas experienced a case of ‘tactics rebound’, in which tactics deployed at the global level shaped local tactics, bringing a set of problematic consequences. The article starts by summarising key explorations of repertoires of contention and connecting them with framing theory propositions. My interest is to locate processes of tactic appropriation in the context of collective action frames. I situate this theory in a study of the organisation and the tactics it used to elucidate how the concept of ‘collective action frame hierarchies’ can be used to explain instances of ‘tactics rebounding’.
APA, Harvard, Vancouver, ISO, and other styles
5

Grenier, Jonathan, Bradley Pomeroy, and Andrew Reffett. "Speak Up or Shut Up? The Moderating Role of Credibility on Auditor Remedial Defense Tactics." AUDITING: A Journal of Practice & Theory 31, no. 4 (June 1, 2012): 65–83. http://dx.doi.org/10.2308/ajpt-50217.

Full text
Abstract:
SUMMARY In cases of alleged audit failure, auditors can make general statements regarding the quality of their work, or other statements intended to decrease juror assessments of auditor negligence. In this study, we examine how the perceived credibility of these remedial defense tactics moderates their effect on juror assessments of auditor negligence in cases of undetected fraud. We predict and find experimental evidence that remedial tactics result in lower negligence assessments when such tactics are perceived to be credible, but “backfire” (i.e., result in higher negligence assessments) when perceived as not credible. We also predict and find that credibility is compromised either when client importance is high, or when a remedial tactic is implemented by an audit firm's local (as opposed to national) office. As such, we find that remedial tactics result in lower negligence assessments when client importance is low and the tactics are implemented by a firm's national office, but result in higher negligence assessments when client importance is high, irrespective of the tactic's source (local versus national). Data Availability: Available upon request.
APA, Harvard, Vancouver, ISO, and other styles
6

Elkington, Michael, Even Almas, Ben Ward-Cherrier, Nick Pestell, J. Lloyd, Carwyn Ward, and Nathan Lepora. "Real time defect detection during composite layup via Tactile Shape Sensing." Science and Engineering of Composite Materials 28, no. 1 (January 1, 2021): 1–10. http://dx.doi.org/10.1515/secm-2021-0001.

Full text
Abstract:
Abstract In this study an automated composite layup end effector is presented which is the first to be able to find defects in real time during layup using tactile shape sensing. Based around an existing sensor concept developed by the Bristol Robot Laboratory known as the ‘TacTip’, a new end effector is developed, replacing the soft gel core of the original sensor was replaced by a much firmer elastomer, enabling it to apply up to 400N of compaction force. In this paper it is shown to successfully detect typical defects such as wrinkles, foreign objects, layup errors or incorrect material types while simultaneously compacting preimpregnated composite materials over complex mould shapes.
APA, Harvard, Vancouver, ISO, and other styles
7

Gardner, Timothy M., Timothy P. Munyon, Peter W. Hom, and Rodger W. Griffeth. "When Territoriality Meets Agency: An Examination of Employee Guarding as a Territorial Strategy." Journal of Management 44, no. 7 (May 4, 2016): 2580–610. http://dx.doi.org/10.1177/0149206316642272.

Full text
Abstract:
Do managers behave territorially toward their employees? Despite accumulating evidence demonstrating the prevalence of territoriality over nonagentic organizational resources, key questions remain regarding the extent to which psychological ownership and territorial behavior occur within supervisor-subordinate relationships. To explore this question, we drew on territoriality and mate-guarding theory to ascertain how and why managers might utilize one form of territoriality, anticipatory defenses, toward their employees. In a four-study investigation, we find that managers consistently engage in two forms of anticipatory defense tactics, persuasion and nurturing, that are intended to defend ownership claims over their employees and limit employee defection. Our results demonstrate a positive relationship between psychological ownership of subordinates and employee guarding directed toward those subordinates. We also find that managers engage in employee guarding more when they anticipate an employee is likely to defect, and they adapt guarding tactics in response to the subordinate’s general mental ability. Collectively, our results identify the motivations and conditions under which supervisors act territorially toward agentic subordinates, contributing to theory in territoriality and downward social influence.
APA, Harvard, Vancouver, ISO, and other styles
8

Tokunaga, Robert S., and Krystyna S. Aune. "Cyber-Defense: A Taxonomy of Tactics for Managing Cyberstalking." Journal of Interpersonal Violence 32, no. 10 (June 16, 2015): 1451–75. http://dx.doi.org/10.1177/0886260515589564.

Full text
Abstract:
Cyberstalking research has revealed information about who is perpetrating what offense to whom. This study adds to research on cyberstalking by exploring how victims respond to the unwanted pursuit. The reflections of cyberstalking victims were content analyzed to answer research questions about different risk management behaviors, their effectiveness, and their relationship with specific cyberstalking behaviors. Findings indicated that victims used seven general management tactics of which ignore/avoidance, active technological disassociation, and help seeking were the most common. Using technology to move away from pursuers was reported as the most effective tactic for managing the unwanted relational pursuit. The results also suggested that victims’ management responses were associated with the type of behaviors experienced.
APA, Harvard, Vancouver, ISO, and other styles
9

Smith, Chad C., and Michael J. Ryan. "Tactic-dependent plasticity in ejaculate traits in the swordtail Xiphophorus nigrensis." Biology Letters 7, no. 5 (April 20, 2011): 733–35. http://dx.doi.org/10.1098/rsbl.2011.0286.

Full text
Abstract:
In species with alternative reproductive tactics, males that sneak copulations often have larger, higher quality ejaculates relative to males that defend females or nest sites. Ejaculate traits can, however, exhibit substantial phenotypic plasticity depending on a male's mating role in sperm competition, which may depend on the tactic of his competitor. We tested whether exposure to males of different tactics affected sperm number and quality in the swordtail Xipophorus nigrensis , a species with small males that sneak copulations and large males that court females. Sperm swimming speed was higher when the perceived competitor was small than when the competitor was large. Plasticity, however, was only exhibited by small males. Sperm number and viability were invariant between social environments. Our results suggest sperm quality is role-dependent and that plastic responses to the social environment can differ between male reproductive tactics.
APA, Harvard, Vancouver, ISO, and other styles
10

Arias, José L., and Francisco Javier Castejón. "Review of the Instruments Most Frequently Employed to Assess Tactics in Physical Education and Youth Sports." Journal of Teaching in Physical Education 31, no. 4 (October 2012): 381–91. http://dx.doi.org/10.1123/jtpe.31.4.381.

Full text
Abstract:
Investigators’ increased interest in teaching game tactics requires generalizable assessment instruments that are appropriate to whatever is needed by the tactic. This literature review aims to provide information about the instruments most frequently used to assess tactics in youth sports. We found that very few studies used instruments that fulfilled the criteria required by this review. The most frequently used tool was The Game Performance Assessment Instrument, followed by the Team Sport Assessment Procedure. Some other instruments, labeled Nonhabitual instruments, were only used sporadically. The instruments were mainly used in invasion and net/wall games. Each instrument defined a set of components and indexes to quantify the assessment, but only the Game Performance Assessment Instrument allows the assessment of the attack and the defense both of the player who possesses the ball and the player who does not. Suggestions were proposed for instruments to be used for assessing tactics.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Tactile defens"

1

Ardnell, Ann, and Ylva Franzén. "Berör mig : men på mina villkor, en studie om hur pedagoger arbetar med beröring i förskolan." Thesis, Linköping University, Department of Thematic Studies, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2292.

Full text
Abstract:

Artikelserien "Hudhunger" som Dagens Nyheter publicerat under våren 2004 har varit en inspiration för oss när vi har skrivit vår uppsats. Serien har belyst begreppet beröring och dess betydelse för oss människor. I litteraturgenomgången presenterar vi först begreppet beröring kopplat till barnkonventionen och förskolans läroplan, varför beröring är så viktigt för oss leveande varelser genom hela livet. Vi tar även upp vad beröringsbrist kan leda till och dess effekter. Vidare presenterar vi hur beröringskänslighet, eller taktilt försvar kan yttra sig och hur man kan arbeta med dessa barn som har dessa svårigheter. Det kan också finnas misstänktsamhet vid beröring av barn. I det avsnittet presenterar vi varför beröring är viktigt för att motverka dessa misstänksamheter då barnen bygger upp mer förståelse för bra och dålig beröring. Slutligen tar vi upp om det finns någon skillnade mellan pojkar och flickor, hur de upplever beröing, enligt forskare.

I vår undersökning har vi gjort en enkät genom kvalitativ metod där vi undersökte hur pedagoger arbetar med beröring i förskolan. Undersökningen är gjord på fyra olika förskolor i två mellanstora städer i Sverige. Resultatet visar att de pedagoger som besvarat vår enkät har kunskap om beröring och beröringskänslighet. Samt att de har en positiv syn då de arbetar aktivt med beröring i form av exempelvis massage och taktila lekar. Vi anser att beröring ska vara en naturlig del i förskolans verksamhet och att vår uppsats uppmärksammar vikten av beröring och ett fortsatt arbete med beröring.

APA, Harvard, Vancouver, ISO, and other styles
2

Galindez, Kyle R. "Defend Mother Earth! And Sign My Petition? Metaphors, Tactics, and Environmental Movement Organizations." University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1398698983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Johansson, Markus, and Martin Torstensson. "Hostile Takeovers : The Power of the Prey." Thesis, Jönköping University, JIBS, Business Administration, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1321.

Full text
Abstract:

Takeovers are used as a mean for companies to grow and gain entry to new markets. Hos-tile takeovers, apart from the friendly takeovers, is when an acquirer tries to takeover a corporation against the will of management, shareholders and board of directors of the target company. All listed companies run the risk of being a target for a hostile takeover, and to-day many companies are trying to involve actions protecting them from possible threats. Lacking protection can evolve into a costly defense program with actions with fictitious names such as White knight, Pac-man and Poison pills. The purpose with this thesis is to describe and analyze hostile takeovers and hostile takeover attempts in Sweden, and the defense tactics involved in the process.

In this thesis a deductive approach will be used, where theories are used as guidance when searching for explanations. On the basis of the defense tactics described in the theory empirical data has been gathered with the purpose of seeing if the expectations reflect reality, and conclusions about their efficiency. The thesis has used a quantitative research method where the focus is on what, where and when. The aim of the thesis is to classify targeted features and count them, with the intent to construct statistical models with an underlying purpose of explaining what is observed.

The most frequently used defense tactic used by the target company in a hostile takeover in the Swedish market is to attack the logic of the bid. Around 56 percent of the targets in a hostile takeover or a hostile takeover attempt have used this defense tactic to avoid a hos-tile takeover. The aim with an implemented defense tactic is to avoid a hostile bid or making it impossible for the hostile bidder to proceed with the bid and close the deal. The White knight and White squire defense tactic is the most successful defense tactic when it comes to not finalizing the hostile bid, in 90 percent of the cases the deal is not closed if the target chooses to use a White knight as a defense tactic. A secondary objective with a defense tactic is to force the hostile bidder to increase the bid and pay more for the target company. In the Swedish market, the use of Corporate restructuring as a defense tactic has made the hostile bidder to increase the bid in 67 percent of the cases and the use of Positive public information has forced the hostile bidder to increase the bid in more than half of the cases.

The question why these defense tactics are the most frequently used strategies, is explained by two variables. The first one is the cost and simplicity variable, where Attack the logic of the bid and Public information ends up. These defense tactics are cost efficient and can be seen as natural step for the target company when deciding not to approve of the offer made by the acquirer. The second variable is the proven efficiency, where the target knows if implementing this defense tactic the risk of being acquired by the hostile bidder is relatively low, a good example of this is the White knight defense.

APA, Harvard, Vancouver, ISO, and other styles
4

Speller, Ian Andrew. "The role of amphibious warfare in British defence policy, 1945-1964." Thesis, King's College London (University of London), 1996. https://kclpure.kcl.ac.uk/portal/en/theses/the-role-of-amphibious-warfare-in-british-defence-policy-19451964(bba1d1e4-f1ec-4bd8-b2a7-04a39d61a5f2).html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Buckley, John Dale. "The development of RAF coastal command trade defence strategy, policy and doctrine 1919-1945." Thesis, Lancaster University, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.317333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huseynov, Elshad. "Legal aspects of takeover defence tactics : a comparative analysis between the English and the US systems." Thesis, Institute of Advanced Legal Studies, 2017. http://sas-space.sas.ac.uk/6699/.

Full text
Abstract:
The primary objective of this research is to make a critical analysis of the current methods of defences for preventing undue acquisitions of small to medium companies by large companies. Although these defences have been practised by the commercial community for a very long time, it is maintained that their effectiveness should still be questioned. The protection of the minority shareholders in a company is one of the reasons for using these defences but, in reality, either they are squeezed out or they themselves surrender to the acquiring company. Most of the published works tend to support the current defence tactics, but in this research an attempt has been made to demonstrate how these techniques have become rather ineffective and the means by which they may be strengthened. This research also demonstrates that from a societal standpoint the rationale behind acquisitions should be reviewed. As this process simply creates unemployment and most of the merged companies feel rather uncomfortable after acquisitions and mergers. The issue of the protection of the minority shareholders should be taken very seriously so that small shareholders may be encouraged to contribute to the capital formation process in small to medium size corporate entities. The protection of the minority shareholders should also be considered as a part of the concept of corporate social responsibility.
APA, Harvard, Vancouver, ISO, and other styles
7

Lorcy, Maryvonne. "Strategie et tactique dans la procedure criminelle du xviiieme siecle d'apres les archives judiciaires bretonnes." Rennes 1, 1987. http://www.theses.fr/1987REN11030.

Full text
Abstract:
Les notions de strategie et de tactique, definis par clausewitz, peuvent etre transposees a la procedure criminelle. C'est sous cet angle, avec l'etude des forces en presence, des moyens tactiques mis en oeuvre et de la finalite poursuivie, que nous examinons la procedure criminelle suivie en bretagne, au xviiieme siecle. Une premiere phase revele les enquetes menees par la victime. Celle-ci prefere souvent agir par elle-meme, en dehors de tout contexte processuel, et trouve l'appui actif des tiers. Le premier moment capital de l'instance judiciaire met en presence du juge chacun des temoins de l'information. L'analyse des temoignages permet d'etablir leur sincerite et leur transcription minutieuse, a charge et a decharge. L'interrogatoire de l'accuse est un autre moment decisif de la strategie judiciaire. La pratique se revele en harmonie avec la doctrine. L'immense majorite des interrogatoires est exemple de tout caractere captieux et de toute question piegee. C'est exceptionnellement que l'interrogateur tend a forcer l'aveu. Les differents types de defense ont ete degages; et leur analyse montre que l'accuse breton, qu'il adopte une defense primaire ou sophistiquee, se defend avec une forte opiniatrete. Nous estimons, pour conclure, que la strategie visait essentiellement a la recherche de la verite.
APA, Harvard, Vancouver, ISO, and other styles
8

Barbosa, João Paulo dos Santos Almeida. "A organização do jogo em andebol-estudo comparativo do processo ofensivo em equipas de alto nível, em função da relação numérica ataque-defesa." Master's thesis, Instituições portuguesas -- UP-Universidade do Porto, 1999. http://dited.bn.pt:80/29088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Alusi, A. S. A. "The practical use of dynamic optimisation in operational research : a study of the role of system dynamics simulation and heuristic optimisation in operational research and its application as an advanced technique for policy design in defence models." Thesis, University of Bradford, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.233647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alissa, Louise M. "Effect of reproductive site limitation on the intensity of sexual selection and the quality of paternal care: a meta-analysis." Universidade de São Paulo, 2018. http://www.teses.usp.br/teses/disponiveis/41/41134/tde-23102018-090541/.

Full text
Abstract:
The availability of reproductive sites is a major factor shaping the behavior of males and females in species with resource-based mating systems. Using a meta-analytic approach, we tested five predictions directly or indirectly derived from the mating system theory. We expected that reproductive site limitation would lead to: (1) intense male-male competition for resource possession; (2) high variance in male reproductive success, generating high values of opportunity for sexual selection; (3) high intensity of selection on male traits related to resource possession; (4) high sperm competition risk; and (5) low quality of paternal care. We compiled information from observational and experimental studies that compared the reproductive behavior of individuals of the same species under low and high reproductive site limitation. We found that, when reproductive sites are limited, there is a slight increase in male-male competition, with higher rates of nest takeover and agonistic interactions, and a slight increase in the selection gradient on male traits, with successful males tending to be larger than unsuccessful males. Reproductive site limitation has no consistent effect on the opportunity for sexual selection and on the sperm competition risk. However, territorial males invest more in gonads and lose less paternity when reproductive sites are limited. There is also no clear effect of reproductive site limitation on the quality of paternal care, but few studies have addressed this subject. Taken together, our findings indicate that predictions on how reproductive site limitation affects several aspects of resource-based mating systems have weak empirical support. These predictions do not consider the plasticity in the mating tactics of males and females, which make them too simplistic. Moreover, since the original proposition of the mating system theory, our understanding of sperm competition increased a lot. We now know that accurate predictions on the intensity and direction of sexual selection should take into account both pre- and post-copulatory processes. Finally, the interplay between sexual selection and parental care is complex, and the original framework of mating system theory does not provide sufficient elements to derive clear and taxonomically broad predictions
A disponibilidade de sítios reprodutivos influencia tanto o comportamento de machos quanto de fêmeas em espécies cujo sistema de acasalamento depende da defesa de recursos. Usando uma abordagem meta-analítica, testamos cinco previsões direta ou indiretamente relacionadas à teoria de sistemas de acasalamento. Esperávamos que a limitação de sítios reprodutivos promoveria: (1) aumento na competição masculina pela posse de recursos; (2) aumento na variância do sucesso reprodutivo dos machos, gerando valores alto de oportunidade para a seleção sexual; (3) aumento da intensidade da seleção sobre características masculinas relacionadas à posse de recursos; (4) aumento no risco de competição espermática e (5) diminuição da qualidade do cuidado paternal. Compilamos informações de estudos observacionais e experimentais que compararam o comportamento reprodutivo de indivíduos da mesma espécie em situação de alta e baixa disponibilidade de sítios reprodutivos. Encontramos que, quando os sítios reprodutivos são escassos, há um ligeiro aumento na competição masculina, com maiores taxas de roubo de ninhos e interações agonísticas, e um ligeiro aumento no gradiente de seleção sobre características masculinas, com machos bem sucedidos tendendo a ser maiores do que machos mal sucedidos em monopolizar recursos. A disponibilidade de sítios reprodutivos não teve nenhum efeito consistente sobre a oportunidade para a seleção sexual e o risco de competição espermática. Entretanto, machos territoriais investiram mais em gônadas e perderam menos paternidade quando os sítios reprodutivos eram escassos. Não encontramos nenhum efeito da disponibilidade de sítios reprodutivos sobre a qualidade do cuidado paternal. Em conjunto, nossos resultados indicam que as previsões sobre como a disponibilidade de sítios reprodutivos influencia diversos aspectos de sistemas de acasalamento baseados na defesa de recursos têm fraco respaldo empírico. Tais previsões não consideram a plasticidade nas táticas de acasalamento de machos e fêmeas, tornando-as demasiadamente simplistas. Adicionalmente, desde a formulação original da teoria de sistemas de acasalamento, nossa compreensão sobre competição espermática aumentou. Sabemos atualmente que previsões acuradas sobre a intensidade e direção da seleção sexual devem levar em consideração processos pré- e pós-copulatórios. Finalmente, a interconexão entre seleção sexual e cuidado parental é complexa e a teoria original de sistemas de acasalamento não provê elementos suficientes para a construção de previsões claras e de amplo escopo taxonômico
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Tactile defens"

1

McConnell, James G. Comparative negligence defense tactics. New York: Wiley Law Publications, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

International, Pacific Productions. Hands off! tactics. [Ontario, Canada]: Pacific Productions International, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gambordella, Theodore L. Tonfa tactics: A strategy for total defense. Boulder, Colo: Paladin Press, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Johnstone, A. K. UFO defense tactics: Weather shield to chemtrails. Surrey, B.C: Hancock House Publishers, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Janicot, Didier. Judo: Techniques and tactics. New York: Sterling Pub. Co., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cleland, John M. Self defence: Armed and unarmed tactics. Toronto: Griffin House, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zeese, Kevin B. Drug law: Strategies and tactics. Deerfield, IL: Clark Boardman Callaghan, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

National Lawyers Guild. Massachusetts Chapter. Legal tactics: Self-defense for tenants in Massachusetts. Edited by Spriggs Marshall T and Harak Charlie. Boston, MA: Massachusetts Poverty Law Center, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yakovick, Yuri. Sicilian attacks: Powerful charges & typical tactics. Alkmaar, Netherlands: New in Chess, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Insurance Defense Tactics Seminar (1993 Seattle, Wash.). The Washington Defense Trial Lawyers proudly present the 1993 Insurance Defense Tactics Seminar. [Seattle, Wash: WDTL, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Tactile defens"

1

Flanagan, Stephen J. "Changes in Concepts and Tactics." In NATO’s Conventional Defences, 83–96. London: Palgrave Macmillan UK, 1988. http://dx.doi.org/10.1007/978-1-349-19484-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kirk, John A. "Tactics: Non-violence, Violence and Armed Self-defence." In Martin Luther King, Jr and the Civil Rights Movement, 82–109. London: Macmillan Education UK, 2007. http://dx.doi.org/10.1007/978-0-230-20781-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Karber, Phillip A. "MILITARY RATIONALE AND OPERATIONAL ROBUSTNESS: The Impact of Emerging Technology and Experimental Tactics on the Future of Infantry." In Modeling and Analysis of Conventional Defense in Europe, 167–92. Boston, MA: Springer US, 1986. http://dx.doi.org/10.1007/978-1-4613-2175-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reuter, Emmanuelle, and Florian Ueberbacher. "Corporate Strategies to Defend Social Irresponsibility: A Typology of Symbolic and Substantive Tactics." In Corporate Social Responsibility and Corporate Change, 221–39. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15407-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Raffa, Kenneth F. "Devising Pest Management Tactics Based on Plant Defense Mechanisms, Theoretical and Practical Considerations." In Molecular Aspects of Insect-Plant Associations, 301–27. Boston, MA: Springer US, 1986. http://dx.doi.org/10.1007/978-1-4613-1865-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fengling, Wang, and Wang Zhiqiang. "Explore and Analyse of Computer Network Security Technique and Defence Tactics." In Communications in Computer and Information Science, 262–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23993-9_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Soeters, Joseph. "Economics, Logistics, and (Human Resources) Management in Military Sciences." In Handbook of Military Sciences, 1–16. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-02866-4_67-1.

Full text
Abstract:
AbstractThis chapters aims to introduce the section on economics, logistics, and (human resources) management in military sciences. The military is best known for its successes, or the lack thereof, on the battlefield. In this context, topics such as tactics, military leadership, and command and emotions like courage and persistence are often studied. Less well familiar is the idea that military success and defeat are highly dependent on the way the military organization has been structured, prepared, trained, and equipped before the real action starts. Similarly, it is underestimated how much military performance depends on financial means, logistics, and human resources during the action. The idea that economics, logistics, personnel policies, and management are only relevant in peacetime conditions is simply wrong. This chapter uses historical examples and insights from current management theory and research to make this clear, and, at the same time, introduces which topics will be reviewed in the other chapters of the section on management, economics and logistics. These issues play at the national level but certainly also in the international arena where the different allies and competitors meet.
APA, Harvard, Vancouver, ISO, and other styles
8

"Neighborhood Defense Tactics." In Neighborhood Defenders, 115–45. Cambridge University Press, 2019. http://dx.doi.org/10.1017/9781108769495.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Conteh, Nabie Y., and DeAngela “Dee” Sword. "The Dynamics of Social Engineering and Cybercrime in the Digital Age." In Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention, 144–49. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6504-9.ch011.

Full text
Abstract:
Social engineering attacks have emerged to become one of the most problematic tactics used against businesses today. Social engineers employ both human-based and computer-based tactics to successfully compromise their targeted networks. This chapter will discuss the basics of social engineering and what it means today. It will explain some common attack methods like baiting, phishing, pretexting, quid pro quo, tailgating, and dumpster diving. It will then highlight the impact social engineering has had on the rise in cybercrime and why threat actors have grown more innovative. Finally, this chapter will discuss what multi-layer defense or defense in depth is and offer countermeasures that can be enforced to defend against social engineering attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Schulze, Franz-Joseph. "Rethinking Continental Defense: Coalition Defense Structure, Tactics, and Technologies." In Nato, 115–25. Routledge, 2019. http://dx.doi.org/10.4324/9780429035746-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Tactile defens"

1

Castle, Heidi, and Trevor D. Dobbins. "Tactile displays for enhanced performance and safety." In Defense and Security, edited by Darrel G. Hopper. SPIE, 2004. http://dx.doi.org/10.1117/12.578108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barber, Daniel, Stephanie Lackey, Lauren Reinerman-Jones, and Irwin Hudson. "Visual and tactile interfaces for bi-directional human robot communication." In SPIE Defense, Security, and Sensing, edited by Robert E. Karlsen, Douglas W. Gage, Charles M. Shoemaker, and Grant R. Gerhart. SPIE, 2013. http://dx.doi.org/10.1117/12.2015956.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saleheen, Firdous, Vira Oleksyuk, Amrita Sahu, and Chang-Hee Won. "Non-invasive mechanical properties estimation of embedded objects using tactile imaging sensor." In SPIE Defense, Security, and Sensing, edited by Brian M. Cullum and Eric S. McLamore. SPIE, 2013. http://dx.doi.org/10.1117/12.2015803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Miah, Suruz, Bao Nguyen, Davide Spinello, and Wail Gueaieb. "Maritime air defence firing tactics." In 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA). IEEE, 2014. http://dx.doi.org/10.1109/cisda.2014.7035639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mengoni, Maura, Barbara Colaiocco, Michele Germani, and Margherita Peruzzini. "Design of a Novel Human-Computer Interface to Support HCD Application." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28975.

Full text
Abstract:
The importance of Human-Centered Design (HCD) drives research toward the development of new UIs (User Interfaces) in order to predict human interaction with products at the early design stages. Virtual Reality (VR) allows carrying out usability tests on virtual prototypes to investigate users’ cognitive and affective response. Application problems regard with the reproduction of synaesthesia qualities in order to make the information processing similar to the one obtained by real sensory stimulation. While visualization technologies seem to be mature enough to overcome the above mentioned limitation, tactile devices are still far from properly simulating materials properties. In this context, the present work aims at structuring and applying a systematic approach to conceive, define and develop a novel VR-based technology, called I-perTouch. The goal is to stimulate the skin mechanoreceptors to generate a meaningful tactile sensation about materials softness, friction and roughness. The system can be also integrated with imaging and sound technologies to create a multi-sensorial product experience. The preliminary architecture results from the analysis of human tactile perception and the benchmark of available simulation devices and techniques. This paper contributes to discuss current issues of existing VR-based technologies in supporting HCD applications and to address technical developments toward the creation of a reliable system for texture perception.
APA, Harvard, Vancouver, ISO, and other styles
6

Dargahi, Javad, and Shahram Payandeh. "Surface texture measurement by combining signals from two sensing elements of a piezoelectric tactile sensor." In Aerospace/Defense Sensing and Controls, edited by Belur V. Dasarathy. SPIE, 1998. http://dx.doi.org/10.1117/12.303672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chiroiu, Venturia, Ligia Munteanu, and Cornel Mihai Nicolescu. "A Shape Description Model by Using Sensor Data From Touch." In ASME 2003 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/detc2003/vib-48337.

Full text
Abstract:
In this paper we consider the problem of recognizing the shape of a 3D object using tactile sensing by a dexterous robot hand. Our approach uses multiple fingers to slide along the surface of the object. From the sensing contact points we extracts a number of 3D points belonging to the surface of the object. The unknown surface Γ of the object is determined by using an “n-ellipsoid” model (Bonnet [1]). The set of parameters that define the surface Γ is determined such that the n-ellipsoid best fits the set of data points.
APA, Harvard, Vancouver, ISO, and other styles
8

Bharati, P. Vijaya, S. Koteswara Rao, and A. Rama Krishna. "Generation and analysis of tactics for anti-torpedo defense system." In 2013 IEEE Conference on Information & Communication Technologies (ICT). IEEE, 2013. http://dx.doi.org/10.1109/cict.2013.6558125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wrightsman, Bruce, and Michael Everts. "Pedagogy of Practice." In AIA/ACSA Intersections Conference. ACSA Press, 2015. http://dx.doi.org/10.35483/acsa.aia.inter.15.21.

Full text
Abstract:
The day-to-day practice of architecture must navigate within a system of contexts often replete with competing values dictated through external forces by clients and patrons to effectively execute the work. This requires the process of design and construction to respond to constant tactile adjustments made by the demands of clients, codes, budgets, etc. to address the landscape of contingency. Every project, decisions are made about quality of materials versus reality of budget and time constraints or owner-prescribed values and requirements versus site and building code constraints. Engaging these conflicts defines the profession of architecture.
APA, Harvard, Vancouver, ISO, and other styles
10

Lianjun, Cao, Wang Wen, Duan Wenjun, and Ma Xiao. "Security Analysis and Defense Tactics of Electricity Market Business Management System." In 2006 International Conference on Power System Technology. IEEE, 2006. http://dx.doi.org/10.1109/icpst.2006.321735.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Tactile defens"

1

JOINT CHIEFS OF STAFF WASHINGTON DC. Joint Tactics, Techniques, and Procedures for Base Defense. Fort Belvoir, VA: Defense Technical Information Center, July 1996. http://dx.doi.org/10.21236/ada434132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

JOINT CHIEFS OF STAFF WASHINGTON DC. Joint Tactics, Techniques, and Procedures for Foreign Internal Defense (FID). Fort Belvoir, VA: Defense Technical Information Center, April 2004. http://dx.doi.org/10.21236/ada434396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

DEFENSE SCIENCE BOARD WASHINGTON DC. Defense Science Board 1996 Summer Study Task Force On Tactics and Technology for 21st Century Military Superiority. Volume 2, Part 1. Supporting Materials. Fort Belvoir, VA: Defense Technical Information Center, October 1996. http://dx.doi.org/10.21236/ada432459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography