نتایج جستجو برای: 2005

تعداد نتایج: 139644  

Journal: :The Journal of experimental biology 2012
Arvind Santhanakrishnan Makani Dollinger Christina L Hamlet Sean P Colin Laura A Miller

Quantifying the flows generated by the pulsations of jellyfish bells is crucial for understanding the mechanics and efficiency of their swimming and feeding. Recent experimental and theoretical work has focused on the dynamics of vortices in the wakes of swimming jellyfish with relatively simple oral arms and tentacles. The significance of bell pulsations for generating feeding currents through...

2014
Alex Villanueva Pavlos Vlachos Shashank Priya

The development of a rowing jellyfish biomimetic robot termed as "Robojelly", has led to the discovery of a passive flexible flap located between the flexion point and bell margin on the Aurelia aurita. A comparative analysis of biomimetic robots showed that the presence of a passive flexible flap results in a significant increase in the swimming performance. In this work we further investigate...

Journal: :IJCCBS 2016
Howard Chivers

In 2008 EUROCONTROL published Information and Communications Technology (ICT) Security Guidance to Air Navigation Service Providers (ANSPs), to assist them in complying with regulatory security requirements. This included a visualisation tool which allowed the consistency of control sets to be reviewed and communicated: consistency being the degree to which more sophisticated controls were supp...

2009
Aggeliki Tsohou Spyros Kokolakis Costas Lambrinoudakis Stefanos Gritzalis

The need for common understanding and agreement of functional and non-functional requirements is well known and understood by information system designers. This is necessary for both: designing the “correct” system and achieving interoperability with other systems. Security is maybe the best example of this need. If the understanding of the security requirements is not the same for all involved...

2011
Ingo Müller Jun Han Jean-Guy Schneider Steven Versteeg

The ISO 27001 standard specifies an information security management system (ISMS) as a means to implement security best practices for IT systems. Organisations that implement an ISMS typically experience various challenges such as enforcing a common vocabulary, limiting human errors and integrating existing management tools and security mechanisms. However, ISO 27001 does not provide guidance o...

2010
Danijel Milicevic Matthias Goeken

Information security risks threaten the ability of organizations of reaching their operational and strategic goals. Increasing diversification of the information security landscapes makes addressing all risks a challenging task. Information security standards have positioned themselves as generic solutions to tackle a broad range of risks and try to guide security managers in their endeavors. H...

2004
LIISA KAARINA SIMOLA

ODC 232.315 015.28 The ultrastructure of three parts (endos.vernz, rootlets and cotyledorrs) of aged seeds o f Pinus sylvestris L. has been studied. In dry seeds no clear differences resulting from ageing are seen as compared with resting living cells, but during imbibition clear differences are evident. Inhibition of development of the D N A containing structures, mitochondria and plastids, wa...

Journal: :Journal of economic entomology 2011
Michael D Ulyshen Richard W Mankin Yigen Chen Jian J Duan Therese M Poland Leah S Bauer

The biological control agent Tetrastichus planipennisi Yang (Hymenoptera: Eulophidae) is a gregarious larval endoparasitoid of the emerald ash borer, Agrilus planipennis Fairmaire (Coleoptera: Buprestidae), an invasive cambium-feeding species responsible for recent, widespread mortality of ash (Fraxinus spp.) in North America. T. planipennisi is known to prefer late-instar emerald ash borer, bu...

Journal: :Information 2016
Kristian Beckers Jürgen Dürrwang Dominik Holling

The automotive industry has successfully collaborated to release the ISO 26262 standard for developing safe software for cars. The standard describes in detail how to conduct hazard analysis and risk assessments to determine the necessary safety measures for each feature. However, the standard does not concern threat analysis for malicious attackers or how to select appropriate security counter...

2002
IMEN DJEMAI

In any hosteparasitoid interaction, the detection of the host in its microhabitat is a crucial step in the interaction that has a major influence on the parasitoid’s fitness. We used bioassays to investigate whether the parasitoid Sympiesis sericeicornis (Hymenoptera: Eulophidae) uses the vibrations of its host Phyllonorycter sp. gr. blancardella (Lepidoptera: Gracillariidae) to detect it in th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید