Search results for " Atta"
showing 10 items of 579 documents
Dual attachment pairs in categorically-algebraic topology
2011
[EN] The paper is a continuation of our study on developing a new approach to (lattice-valued) topological structures, which relies on category theory and universal algebra, and which is called categorically-algebraic (catalg) topology. The new framework is used to build a topological setting, based in a catalg extension of the set-theoretic membership relation "e" called dual attachment, thereby dualizing the notion of attachment introduced by the authors earlier. Following the recent interest of the fuzzy community in topological systems of S. Vickers, we clarify completely relationships between these structures and (dual) attachment, showing that unlike the former, the latter have no inh…
Volatile-mediated foraging behaviour of three parasitoid species under conditions of dual insect herbivore attack
2016
Infochemicals play an important role in structuring intra-and interspecific interactions. Many parasitoid wasp species rely on herbivory or oviposition-induced plant volatiles (HIPVs/OIPVs) to locate their herbivorous hosts, and must cope with variation in the volatile blends due to factors such as plant/host species, herbivore density or attack by several herbivores. However, little is known about how dual herbivory or changes in herbivore density affect multiple parasitoid species, each attacking a different herbivore, in the same system. In a natural system, we investigated the effect of dual attack on the ability of three parasitoid species to differentiate between volatiles induced by …
Does trait-based joint species distribution modelling reveal the signature of competition in stream macroinvertebrate communities?
2021
1. The occupancy and abundance of species are jointly driven by local factors, such as environmental characteristics and biotic interactions, and regional‐scale factors, such as dispersal and climate. Recently, it has been shown that biotic interactions shape species occupancies and abundances beyond local extents. However, for small ectothermic animals, particularly for those occurring in freshwater environments, the importance of biotic interactions remains understudied. Species‐to‐species associations from joint species distribution models (i.e. species associations while controlling for environmental characteristics) are increasingly used to draw hypotheses of which species possibly sho…
An invasive insect herbivore disrupts plant volatile-mediated tritrophic signalling
2017
Plants respond to insect attack by emission of volatile organic compounds, which recruit natural enemies of the attacking herbivore, constituting an indirect plant defence strategy. In this context, the egg parasitoid Trissolcus basalis is attracted by oviposition-induced plant volatiles emitted by Vicia faba plants as a consequence of feeding and oviposition by the pentatomid host Nezara viridula. However, this local tritrophic web could be affected by the recent invasion by the alien pentatomid bug Halyomorpha halys, an herbivore that shares the same environments as native pentatomid pests. Therefore, we investigated in laboratory conditions the possible impact of H. halys on the plant vo…
Specifications for carbonate content quantification in recent marine sediments using Rock-Eval pyrolysis
2019
11 pages; International audience; The amount of CaCO3 in sediments and/or sedimentary rocks is usually measured by calcimetry while the nature of the carbonates is determined by X-ray diffraction. Recently, a carbonate recognition method based on the results of Rock-Eval pyrolysis was proposed in 2014 by Pillot et al. [1]. Rock-Eval pyrolysis is also widely used for the characterization of recent sediments. However, later in 2015 Baudin et al. [2] noticed that some of the characteristics of recent sediments tended to produce different results from those of more classical Rock-Eval analyses, causing bias in interpretations.In this study, the thermal stability of fossil and recent marine carb…
Aircraft wing rock oscillations suppression by simple adaptive control
2020
Abstract Roll angular motion of the modern aircraft operating in non-linear flight modes with a high angle of attack often demonstrates the limit cycle oscillations, which is commonly known as the wing rock phenomenon. Wing rock dynamics are represented by a substantially non-linear model, with parameters varying over a wide range, depending on the flight conditions (altitude, Mach number, payload mass, etc.) and angle of attack. A perspective approach of the wing rock suppression lies in the adaptation methods. In the present paper an application of the simple adaptive control approach with the Implicit Reference Model (IRM) is proposed and numerically studied. The IRM adaptive controller …
Secure and efficient verification for data aggregation in wireless sensor networks
2017
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…
Integrating refugees into higher education – the impact of a new online education program for policies and practices
2018
Gaining access to higher education (HE) is a serious concern for refugees. Although studies on the integration and success of refugees in HE are scarce, the challenges associated with this issue as...
Deep in the Dark: A Novel Threat Detection System using Darknet Traffic
2019
This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…
Modelli di parenting multipli e benessere interpersonale. Una rassegna teorica sull’evoluzione del sistema motivazionale diadico verso il network del…
2016
Models of multiple parenting and interpersonal wellbeing. A theoretical review on the evolution of the dyadic motivational system toward the network of care A theoretical analysis on the evolution of the dyadic parenting model toward the multiple attachment perspective is presented. In particular, looking beyond the monotropic perspective (Bowlby, 1969), a theoretical framework about the integration model as a support of the elasticity of the Internal Working Models is highlighted. Based on these studies, the continuity in the quality of the attachment representations would remain in function also of the changes inside the care environment, in its aspects of risk and protection as well as o…