نتایج جستجو برای: bad mouthing attack

تعداد نتایج: 110943  

Journal: :Memory & cognition 2012
Noah D Forrin Colin M Macleod Jason D Ozubko

Words that are read aloud are more memorable than words that are read silently. The boundaries of this production effect (MacLeod, Gopie, Hourihan, Neary, & Ozubko, Journal of experimental psychology: learning, memory, and cognition, 36, 671-685, 2010) have been found to extend beyond speech. MacLeod and colleagues demonstrated that mouthing also facilitates memory, leading them to speculate th...

Journal: :American journal of primatology 2002
Tatyana Humle Tetsuro Matsuzawa

We present a detailed study of ant-dipping among the wild chimpanzees (Pan troglodytes verus) of Bossou, in southeastern Guinea, West Africa. Observations suggest a strong influence of prey (Dorylusspp.) characteristics, including aggressiveness and/or gregariousness, on tool length and technique employed by the chimpanzees. Bossou chimpanzees exhibit two ant-dipping techniques: 1) direct mouth...

2015
Jingwen Liang Lalitha Sankar Kory Hedman

The electric power system is one of the largest, most complicated, and most important cyber-physical systems in the world. The link between the cyber and physical level is the Supervisory Control and Data Acquisition (SCADA) systems and Energy Management Systems (EMS). Their functions include monitoring the real-time system operation through state estimation (SE), controlling the system to oper...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده علوم پایه 1392

مطالعات زیادی در مورد اثرات زیستی الکترومغناطیس که نظیر تکثیر، تمایز، آسیب مغزی، قطعه شدن dna، مهاجرت نورونی و نوروژنز در سیستم عصبی مرکزی می باشد، وجود دارد. پروموتر مرگ مرتبط با bcl-2 (bad) یک عضو پرو آپوپتوتیکی از خانواده ی ژن bcl-2 می باشد که در آغاز آپوپتوزیس دخالت می کندbad . یک عضو از خانواده bh3می باشد که زیرگروهی از خانواده یbcl-2 است. این عضو برخلاف سایر اعضای خانواده ی bcl-2 شامل انت...

Journal: :Journal of deaf studies and deaf education 2009
Karen Emmorey Robin Thompson Rachael Colvin

An eye-tracking experiment investigated where deaf native signers (N = 9) and hearing beginning signers (N = 10) look while comprehending a short narrative and a spatial description in American Sign Language produced live by a fluent signer. Both groups fixated primarily on the signer's face (more than 80% of the time) but differed with respect to fixation location. Beginning signers fixated on...

Journal: :IEEE Access 2021

This paper proposes a blockchain based trust management method for agents in multi-agent system (MAS). In this work, three objectives are achieved: trust, cooperation and privacy. The of depends on the credibility evaluators, which is verified using proposed methods distortion, consistency reliability. To enhance between agents, tit-3-for-tat (T3FT) repeated game strategy developed. more forgiv...

Journal: :Infant behavior & development 2014
Caroline N Coffield Estelle M Y Mayhew Jeannette M Haviland-Jones Arlene S Walker-Andrews

The effect of odor on cognitive and emotional processes has been studied in adults and children, but less so in infants. In this study twenty-seven six-month-olds were presented with a video while in either an odor (pine or baby-powder) or a no odor control condition. The video was a 92-s audiovisual presentation of a woman expressing happiness and sadness, with the order of emotion counterbala...

2006
Bogdan Carbunar Radu Sion

Reputation systems aggregate mutual feedback of interacting peers into a “reputation” metric for each participant. This is then available to prospective service “requesters” (clients) for the purpose of evaluation and subsequent selection of potential service “providers” (servers). For a reputation framework to be effective, it is paramount for both the individual feedback and the reputation st...

Journal: :Ad Hoc Networks 2015
Hui Lin Li Xu Xinyi Huang Wei Wu Yijie Huang

Mobile cloud computing (MCC) is an emerging technology that has gained ever-increasing popularity, which makes the generation and large-scale collection of private personal data possible. However, new security issues arise when MCC offers big data analytics and management services. In particular, there is an absence of fine-grained secure access control model to protect privacy information from...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید