نتایج جستجو برای: defense behavior

تعداد نتایج: 690602  

ژورنال: بیهوشی و درد 2019
Besharat, Mohammad Ali, Borjali, Ahmad, Farahani, Hojjatollah, Pahlevan, Marzieh,

 Aims and background: Chronic pain, is one of the psychosomatic disease that a lot of people meet throughout their life. The aim of this study was to determine the mediation role of alexithymia between ego defense styles and the intensity of pain that percipience by the patients with chronic pain. Materials and methods: The method of the study was the correlation, and the statistical universe w...

2015
Fengshan Yang Yuliang Zhang Qixing Huang Guohua Yin Kayla K. Pennerman Jiujiang Yu Zhixin Liu Dafei Li Anping Guo

Corn defense systems against insect herbivory involve activation of genes that lead to metabolic reconfigurations to produce toxic compounds, proteinase inhibitors, oxidative enzymes, and behavior-modifying volatiles. Similar responses occur when the plant is exposed to methyl jasmonate (MeJA). To compare the defense responses between stalk borer feeding and exogenous MeJA on a transcriptional ...

Afrooz Mousavi, Hamid Yaghubi, Mohammad Vaez Mousavi

Introduction: Defense mechanisms represent a crucial component of our capacity to maintain emotional homeostasis. The present study is carried out with the purpose of determining the predictability of psychological health and sport success by defense mechanisms used by elite athletes. Materials & Methods: A sample of 385 (285 male and 100 female) elite at...

2010
Mark Boddy Robert Goldman Stefan Edelkamp Martin Michalowski

In this paper, we describe a toolset for managing the configuration and management of large-scale networks. In particular, we focus on managing limited processing and communication resources for coordinated network cyber-defense applications. Our implementation encompasses the complete cycle, from initial network modeling and extraction of the relevant constraints, through translation into a fo...

2011
Mila Dalla Preda Cinzia Di Giusto

The defense of computer systems from malicious software attacks, such as viruses and worms, is a key aspect of computer security. The analogy between malicious software and biological infections suggested us to use the κcalculus, a formalism originally developed for the analysis of biological systems, for the formalization and analysis of malicious software. By modeling the different actors inv...

2005
Zhenke Yang Leon Rothkrantz

This work is focused on implementing situation switching in an AIBO robot inside an unpredictable environment. The goal is to achieve intelligent situation dependent reactive behavior without modifying the underlying planning algorithm. The focus is on visible intelligent behavior for a robot. Our ideas are illustrated using a benchmark experiment featuring an AIBO in a maze. The implementation...

2001
Reginald B. Cocroft

The allocation of parental investment is a potential source of conflict within broods whenever offspring are able obtain differential access to the parental resource. Unlike the provisioning of food, parental antipredator behavior is usually considered a resource that benefits all offspring simultaneously. In the thornbug treehopper (Umbonia crassicornis), offspring form aggregations in exposed...

Background: Researches on attachment theory shows that attachment styles influence marital adjustment. However, some psychological factors moderate this correlation. The present study was aimed to examine the moderating role of defense mechanisms in the association between attachment styles and levels of marital adjustment. Methods: This descriptive-correlational study collected data from a co...

Journal: :Acta neurobiologiae experimentalis 1981
S M Brudzyński

The effects of intrahypothalamic carbachol microinjections were investigated in unprovoked cats. The carbachol evoked mydriasis, attention, vocalization, and piloerection, i.e. features of a typical defense were usually concomitant in evoked response, while the clear-cut aggressive or escape patterns appeared only once. No basic differences were observed in the set of manifestations induced by ...

2009
Xiaosong Zhang Ting Chen Jiong Zheng Hua Li

Nowadays, the security of P2P networks is alarming ascribing to worms which propagate by exploiting common vulnerabilities in P2P software. Taking account of the topology of P2P networks and the behavior of worms, this paper models the propagation of active worms in unstructured P2P networks. Simulations indicate that propagation of worms in P2P networks is much faster than that in un-P2P netwo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید