Search results for "Defence"
showing 10 items of 472 documents
Cowbird versus cuckoo hosts: a comparative study of learned nest defense
2005
One of the best example of coevolutionaru adaptations is that of the interactions between avian brood parasites and their hosts. Brood parasites lay their eggs in nests of other specieis and leave the job of caring for their young with the hosts. Hosts of brood parasites tend to suffer high reproductive costs as often they raise few of no young of their own, an effect of being parasitizes. For this reason, many hosts have evolved strategies that reduces the cost of parasitism.
Emerging Standards and the Hybrid Model for Organizing Scientific Events During and After The COVID-19 Pandemic
2020
AbstractSince the beginning of 2020, the coronavirus disease (COVID-19) pandemic has dramatically influenced almost every aspect of human life. Activities requiring human gatherings have either been postponed, canceled, or held completely virtually. To supplement lack of in-person contact, people have increasingly turned to virtual settings online, advantages of which include increased inclusivity and accessibility and a reduced carbon footprint. However, emerging online technologies cannot fully replace in-person scientific events. In-person meetings are not susceptible to poor Internet connectivity problems, and they provide novel opportunities for socialization, creating new collaboratio…
Effect of the orientation on the photooxidation behaviour of polymer films
2016
Abstract The effect of the orientation on the photooxidation of polymers is quite controversial. Both improvement of the photo-resistance along the oriented direction and worsening of the photooxidation kinetic have been reported. In this work the effect of the orientation has been investigated on films of PE, PP and PET with different degree of orientation and crystallinity. The results show that the photo-stability, measured from the decay of the elongation at break curve as a function of the irradiation time, improves in the more oriented direction, but this is more and more relevant with increasing the crystallinity degree. It has been hypothesized that the reinforcing action of the ori…
The good, the bad and the ugly: images of the foreigner in contemporary criminal law
2018
Since the end of the Second World War, the criminal law of Western states has tried to legitimate itself, in basically democratic-republican terms, as primarily addressed towards citizens. During approximately the last 20 years, however, new dimensions of criminal law have emerged, which refer paradigmatically (not to the citizen, but) to the foreigner and subject him/her to worse legal treatment than that which is considered legitimate when either citizens or ‘good’ foreigners are concerned. Next to the ideal-type of the citizen criminal law (also applicable, by assimilation, to the ‘good’ foreigner) a criminal law for ‘ugly’ mass-foreigners (crimmigration) and one for ‘bad’ foreigners (en…
Developing and Validating a Behavioural Model of Cyberinsurance Adoption
2021
Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Behaviour (TPB) as well as factors in relation to risk propensity and price. During the experiment, participants were given the opportunity to purchase different cybersecurity measures and cyberinsurance products before performing an online task. Participants likelihood of suffering a cyberattack was dependent upon their adoption of cybersecurity me…
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
2020
Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine Learning models used in a cloud data platform service. Adversarial examples are malicious inputs to ML-models that provide erroneous model outputs while appearing to be unmodified. This kind of attack can fool the classifier and can prevent ML-models from generalizing well and from learning high-level representation; instead, the ML-model learns superficial dataset regularity. This study focuses on investigating, detecting, and preventing adversarial attacks towards a cloud dat…
Fontaines (Saône-et-Loire). Place de l’Église [notice archéologique]
2019
Le village actuel de Fontaines, situé à environ 8 km au N.-O. de Chalon-sur-Saône, se développe sur 1,5 km de long selon un unique axe E-O, depuis la montagne Saint-Hilaire à l’ouest, occupée au Néolithique puis durant l’Antiquité tardive et le haut Moyen Âge, jusqu’à l’église paroissiale Saint-Just, à l’est. Malgré une emprise limitée et contrainte par de nombreux réseaux existants, l’opération a permis de documenter l’environnement immédiat de l’église, occupé depuis l’Antiquité jusqu’à nos jours.
The nasus gland: A new gland in soldiers of Angularitermes (Termitidae, Nasutitermitinae)
2015
Termites have developed many exocrine glands, generally dedicated to defence or communication. Although a few of these glands occur in all termite species, or represent synapomorphies of larger clades, others are morphological innovations of a single species, or a few related species. Here, we describe the nasus gland, a new gland occurring at the base of the nasus of Angularitermes soldiers. The nasus gland is composed of class 1, 2, and 3 secretory cells, a rare combination that is only shared by the sternal and tergal glands of some termites and cockroaches. The ultrastructural observations suggest that the secretion is produced by class 2 and 3 secretory cells, and released mostly by cl…
Le impugnazioni ordinarie: tra efficienza e snellimento
2023
The paper analyses numerous changes introduced by the so called "Cartabia reform" to the appeal and to the proceedings in front of the Supreme Court. A complex reform aimed at reducing the duration of appeal proceedings that raises some concerns on the guarantees side.
A synthesis of deimatic behaviour
2022
Deimatic behaviours, also referred to as startle behaviours, are used against predators and rivals. Although many are spectacular, their proximate and ultimate causes remain unclear. In this review we aim to synthesise what is known about deimatic behaviour and identify knowledge gaps. We propose a working hypothesis for deimatic behaviour, and discuss the available evidence for the evolution, ontogeny, causation, and survival value of deimatic behaviour using Tinbergen's Four Questions as a framework. Our overarching aim is to direct future research by suggesting ways to address the most pressing questions in this field. peerReviewed