Search results for "ATTAC"
showing 10 items of 610 documents
Dual attachment pairs in categorically-algebraic topology
2011
[EN] The paper is a continuation of our study on developing a new approach to (lattice-valued) topological structures, which relies on category theory and universal algebra, and which is called categorically-algebraic (catalg) topology. The new framework is used to build a topological setting, based in a catalg extension of the set-theoretic membership relation "e" called dual attachment, thereby dualizing the notion of attachment introduced by the authors earlier. Following the recent interest of the fuzzy community in topological systems of S. Vickers, we clarify completely relationships between these structures and (dual) attachment, showing that unlike the former, the latter have no inh…
Volatile-mediated foraging behaviour of three parasitoid species under conditions of dual insect herbivore attack
2016
Infochemicals play an important role in structuring intra-and interspecific interactions. Many parasitoid wasp species rely on herbivory or oviposition-induced plant volatiles (HIPVs/OIPVs) to locate their herbivorous hosts, and must cope with variation in the volatile blends due to factors such as plant/host species, herbivore density or attack by several herbivores. However, little is known about how dual herbivory or changes in herbivore density affect multiple parasitoid species, each attacking a different herbivore, in the same system. In a natural system, we investigated the effect of dual attack on the ability of three parasitoid species to differentiate between volatiles induced by …
Does trait-based joint species distribution modelling reveal the signature of competition in stream macroinvertebrate communities?
2021
1. The occupancy and abundance of species are jointly driven by local factors, such as environmental characteristics and biotic interactions, and regional‐scale factors, such as dispersal and climate. Recently, it has been shown that biotic interactions shape species occupancies and abundances beyond local extents. However, for small ectothermic animals, particularly for those occurring in freshwater environments, the importance of biotic interactions remains understudied. Species‐to‐species associations from joint species distribution models (i.e. species associations while controlling for environmental characteristics) are increasingly used to draw hypotheses of which species possibly sho…
Weak effects of geolocators on small birds: A meta-analysis controlled for phylogeny and publication bias
2020
Abstract Currently, the deployment of tracking devices is one of the most frequently used approaches to study movement ecology of birds. Recent miniaturization of light‐level geolocators enabled studying small bird species whose migratory patterns were widely unknown. However, geolocators may reduce vital rates in tagged birds and may bias obtained movement data. There is a need for a thorough assessment of the potential tag effects on small birds, as previous meta‐analyses did not evaluate unpublished data and impact of multiple life‐history traits, focused mainly on large species and the number of published studies tagging small birds has increased substantially. We quantitatively reviewe…
An invasive insect herbivore disrupts plant volatile-mediated tritrophic signalling
2017
Plants respond to insect attack by emission of volatile organic compounds, which recruit natural enemies of the attacking herbivore, constituting an indirect plant defence strategy. In this context, the egg parasitoid Trissolcus basalis is attracted by oviposition-induced plant volatiles emitted by Vicia faba plants as a consequence of feeding and oviposition by the pentatomid host Nezara viridula. However, this local tritrophic web could be affected by the recent invasion by the alien pentatomid bug Halyomorpha halys, an herbivore that shares the same environments as native pentatomid pests. Therefore, we investigated in laboratory conditions the possible impact of H. halys on the plant vo…
Specifications for carbonate content quantification in recent marine sediments using Rock-Eval pyrolysis
2019
11 pages; International audience; The amount of CaCO3 in sediments and/or sedimentary rocks is usually measured by calcimetry while the nature of the carbonates is determined by X-ray diffraction. Recently, a carbonate recognition method based on the results of Rock-Eval pyrolysis was proposed in 2014 by Pillot et al. [1]. Rock-Eval pyrolysis is also widely used for the characterization of recent sediments. However, later in 2015 Baudin et al. [2] noticed that some of the characteristics of recent sediments tended to produce different results from those of more classical Rock-Eval analyses, causing bias in interpretations.In this study, the thermal stability of fossil and recent marine carb…
Aircraft wing rock oscillations suppression by simple adaptive control
2020
Abstract Roll angular motion of the modern aircraft operating in non-linear flight modes with a high angle of attack often demonstrates the limit cycle oscillations, which is commonly known as the wing rock phenomenon. Wing rock dynamics are represented by a substantially non-linear model, with parameters varying over a wide range, depending on the flight conditions (altitude, Mach number, payload mass, etc.) and angle of attack. A perspective approach of the wing rock suppression lies in the adaptation methods. In the present paper an application of the simple adaptive control approach with the Implicit Reference Model (IRM) is proposed and numerically studied. The IRM adaptive controller …
Secure and efficient verification for data aggregation in wireless sensor networks
2017
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
2020
Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…
Deep in the Dark: A Novel Threat Detection System using Darknet Traffic
2019
This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…