期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
More than mimicry? Evaluating scope for flicker-fusion as a defensive strategy in coral snake mimics 被引量:1
1
作者 Georgia C. TITCOMB David W. KIKUCHI David W. PFENNIG 《Current Zoology》 SCIE CAS CSCD 2014年第1期123-130,共8页
Coral snakes and their mimics often have brightly colored banded patterns, generally associated with warning colora- tion or mimicry. However, such color patterns have also been hypothesized to aid snakes in escaping ... Coral snakes and their mimics often have brightly colored banded patterns, generally associated with warning colora- tion or mimicry. However, such color patterns have also been hypothesized to aid snakes in escaping predators through a "flicker-fusion" effect. According to this hypothesis, banded color patterns confuse potential predators when a snake transitions from resting to moving because its bands blur together to form a different color. To produce this motion blur, a moving snake's bands must transition faster than the critical flicker-fusion rate at which a predator's photoreceptors can refresh. It is unknown if coral snakes or their mimics meet this requirement. We tested this hypothesis by measuring the movement speed and color pat- terns of two coral snake mimics, Lampropeltis triangulum campbelli and L. elapsoides, and comparing the frequency of color transitions to the photoreceptor activity of the avian eye. We found that snakes often produced a motion blur, but moving snakes created a blurring effect more often in darker conditions, such as sunrise, sunset, and nighttime when these snakes are often active. Thus, at least two species of coral snake mimics are capable of achieving flicker-fusion, indicating that their color patterns may confer an additional defense aside from mimicry 展开更多
关键词 Coral snake mimicry Flicker-fusion effect CFF Kingsnake defensive strategy
原文传递
Navigating AI Cybersecurity: Evolving Landscape and Challenges
2
作者 Maryam Roshanaei Mahir R. Khan Natalie N. Sylvester 《Journal of Intelligent Learning Systems and Applications》 2024年第3期155-174,共20页
The rapid integration of artificial intelligence (AI) into critical sectors has revealed a complex landscape of cybersecurity challenges that are unique to these advanced technologies. AI systems, with their extensive... The rapid integration of artificial intelligence (AI) into critical sectors has revealed a complex landscape of cybersecurity challenges that are unique to these advanced technologies. AI systems, with their extensive data dependencies and algorithmic complexities, are susceptible to a broad spectrum of cyber threats that can undermine their functionality and compromise their integrity. This paper provides a detailed analysis of these threats, which include data poisoning, adversarial attacks, and systemic vulnerabilities that arise from the AI’s operational and infrastructural frameworks. This paper critically examines the effectiveness of existing defensive mechanisms, such as adversarial training and threat modeling, that aim to fortify AI systems against such vulnerabilities. In response to the limitations of current approaches, this paper explores a comprehensive framework for the design and implementation of robust AI systems. This framework emphasizes the development of dynamic, adaptive security measures that can evolve in response to new and emerging cyber threats, thereby enhancing the resilience of AI systems. Furthermore, the paper addresses the ethical dimensions of AI cybersecurity, highlighting the need for strategies that not only protect systems but also preserve user privacy and ensure fairness across all operations. In addition to current strategies and ethical concerns, this paper explores future directions in AI cybersecurity. 展开更多
关键词 AI Cybersecurity Adversarial Attacks defensive Strategies Ethical AI
下载PDF
A cooperative detection game:UAV swarm vs.one fast intruder
3
作者 XIAO Zhiwen FU Xiaowei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第6期1565-1575,共11页
This paper studies a special defense game using unmanned aerial vehicle(UAV)swarm against a fast intruder.The fast intruder applies an offensive strategy based on the artificial potential field method and Apollonius c... This paper studies a special defense game using unmanned aerial vehicle(UAV)swarm against a fast intruder.The fast intruder applies an offensive strategy based on the artificial potential field method and Apollonius circle to scout a certain destination.As defenders,the UAVs are arranged into three layers:the forward layer,the midfield layer and the back layer.The co-defense mechanism,including the role derivation method of UAV swarm and a guidance law based on the co-defense front point,is introduced for UAV swarm to co-detect the intruder.Besides,five formations are designed for comparative analysis when ten UAVs are applied.Through Monte Carlo experiments and ablation experiment,the effectiveness of the proposed co-defense method has been verified. 展开更多
关键词 cooperative detection game unmanned aerial vehicle(UAV)swarm fast intruder defensive strategy co-defense mechanism.
下载PDF
Factors inducing morphological transition in harmful algal bloom-forming species Phaeocystis globosa with emphasis on predator chemical cue
4
作者 Xiao YANG Pingping SHEN Ke LI 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2023年第4期1537-1546,共10页
The microalga Phaeocystis globosa is recognized as a harmful alga and also one of the few keystone phytoplankton genera that shape the structure and function of marine ecosystems.P.globosa possess a complex polymorphi... The microalga Phaeocystis globosa is recognized as a harmful alga and also one of the few keystone phytoplankton genera that shape the structure and function of marine ecosystems.P.globosa possess a complex polymorphic life cycle,exhibiting phase alternation between free-living cells of approximately 3-6μm in diameter and gelatinous colonies(palmelloid stage)reaching several millimeters.The knowledge on the factors that induced the morphological transition of P.globosa in the last two decades was reviewed.Emphasis is given to infochemicals,an additional biological factor induced by predator,with the attempt to reveal a relevant mechanism of induced morphological defense. 展开更多
关键词 Phaeocystis globosa POLYMORPHISMS harmful algal blooms defense strategies INFOCHEMICAL
下载PDF
Historical Analogy: Japan's Road Toward War and Japan's Postwar Road
5
作者 Wang Xiaoran C. X. George Wei 《Cultural and Religious Studies》 2016年第9期553-563,共11页
In 1931, Japan launched the Sept. 18th attack against China. Ever since, there have been many different views over the origin of Japan's road toward war, which mostly concern with Japan's land policy. This paper hol... In 1931, Japan launched the Sept. 18th attack against China. Ever since, there have been many different views over the origin of Japan's road toward war, which mostly concern with Japan's land policy. This paper holds that Japan's land policy was an evolving one and it transformed along the change of its supporters and implementers during different stages. It is mostly a contention about the different strategies on Manchuria and Mongol; the northward or the southward advance faction; the orientations of the radical military occupation or the moderate economic occupation. Interestingly, the development of Japan's postwar policy toward China, especially in the recent years, resembles the evolvement of Japan's land policy in the 19th century. They both show tendency from the economic effort to the military activity. 展开更多
关键词 Japan's land policy imperial defense strategy Shidehara diplomacy financial occupation
下载PDF
Cascading failure analysis of power flow on wind power based on complex network theory 被引量:12
6
作者 Yushu SUN Xisheng TANG 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2014年第4期411-421,共11页
Cascading failure is a potential threat in power systems with the scale development of wind power,especially for the large-scale grid-connected and long distance transmission wind power base in China.This introduces a... Cascading failure is a potential threat in power systems with the scale development of wind power,especially for the large-scale grid-connected and long distance transmission wind power base in China.This introduces a complex network theory(CNT)for cascading failure analysis considering wind farm integration.A cascading failure power flow analysis model for complex power networks is established with improved network topology principles and methods.The network load and boundary conditions are determined to reflect the operational states of power systems.Three typical network evaluation indicators are used to evaluate the topology characteristics of power network before and after malfunction including connectivity level,global effective performance and percentage of load loss(PLL).The impacts of node removal,grid current tolerance capability,wind power instantaneous penetrations,and wind farm coupling points on the power grid are analyzed based on the IEEE 30 bus system.Through the simulation analysis,the occurrence mechanism and main influence factors of cascading failure are determined.Finally,corresponding defense strategies are proposed to reduce the hazards of cascading failure in power systems. 展开更多
关键词 Complex network theory(CNT) Cascading failure Wind power Power flow analysis model Defense strategies
原文传递
Attack and Defense Strategies in Complex Networks Based on Game Theory 被引量:4
7
作者 LI Yapeng DENG Ye +1 位作者 XIAO Yu WU Jun 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2019年第6期1630-1640,共11页
To investigate the attack and defense strategies in complex net works,the authors propose a two-player zero-sum static game model with complete information which considers attack and defense strategies simultaneously.... To investigate the attack and defense strategies in complex net works,the authors propose a two-player zero-sum static game model with complete information which considers attack and defense strategies simultaneously.The authors assume that both the attacker and defender have two typical strategies:Targeted strategy and random strategy.The authors explore the Nash equilibriums of the attacker-defender game and demonstrate that when the attacker's attack resources are not so significantly abundant as the defender's resources,there exists a pure-strategy Nash equilibrium in both model net works and real-world net works,in which the defender protects the hub t arge ts with large degrees preferentially,while the attacker prefers selecting the targets randomly.When the attack resources are much higher than defense resources,both the attacker and the defender adopt the targeted strategy in equilibriums.This paper provides a new theoretical framework for the study of attack and defense st rat egies in complex net works. 展开更多
关键词 Attack and defense strategies attacker-defender game complex net works Nash equilibriums
原文传递
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks 被引量:3
8
作者 Xiao-song ZHANG Ting CHEN +1 位作者 Jiong ZHENG Hua LI 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第2期119-129,共11页
It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon en-gender serious threats to the Internet infrastructures. These latent threats stimulate activities of model... It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon en-gender serious threats to the Internet infrastructures. These latent threats stimulate activities of modeling and analysis of the proactive P2P worm propagation. Based on the classical two-factor model,in this paper,we propose a novel proactive worm propagation model in unstructured P2P networks (called the four-factor model) by considering four factors:(1) network topology,(2) countermeasures taken by Internet service providers (ISPs) and users,(3) configuration diversity of nodes in the P2P network,and (4) attack and defense strategies. Simulations and experiments show that proactive P2P worms can be slowed down by two ways:improvement of the configuration diversity of the P2P network and using powerful rules to reinforce the most connected nodes from being compromised. The four-factor model provides a better description and prediction of the proactive P2P worm propagation. 展开更多
关键词 Proactive peer-to-peer (P2P) worm propagation modeling Network topology Configuration diversity Attack and defense strategies Four-factor model
原文传递
To eat or not to eat-relationship of lichen herbivory by snails with secondary compounds and field frequency of lichens
9
作者 Steffen Boch Markus Fischer Daniel Prati 《Journal of Plant Ecology》 SCIE 2015年第6期642-650,共9页
Aims The biochemical defense of lichens against herbivores and its rela-tionship to lichen frequency are poorly understood.Therefore,we tested whether chemical compounds in lichens act as feeding defense or rather as ... Aims The biochemical defense of lichens against herbivores and its rela-tionship to lichen frequency are poorly understood.Therefore,we tested whether chemical compounds in lichens act as feeding defense or rather as stimulus for snail herbivory among lichens and whether experimental feeding by snails is related to lichen fre-quency in the field.Methods In a no-choice feeding experiment,we fed 24 lichen species to snails of two taxa from the Clausilidae and Enidae families and compared untreated lichens and lichens with compounds removed by acetone rinsing.Then,we related experimental lichen consump-tion with the frequency of lichen species among 158 forest plots in the field(schwäbische alb,germany),where we had also sampled snail and lichen species.Important findings In five lichen species,snails preferred treated samples over untreated controls,indicating chemical feeding defense,and vice versa in two species,indicating chemical feeding stimulus.Interestingly,com-pared with less frequent lichen species,snails consumed more of untreated and less of treated samples of more frequent lichen spe-cies.removing one outlier species resulted in the loss of a significant positive relationship when untreated samples were analyzed separately.However,the interaction between treatment and lichen frequency remained significant when excluding single species or including snail genus instead of taxa,indicating that our results were robust and that lumping the species to two taxa was justified.our results imply lichen-feeding snails to prefer frequent lichens and avoid less frequent ones because of secondary compound rec-ognition.This supports the idea that consumers adapt to the most abundant food source. 展开更多
关键词 acetone rinsing biodiversity exploratories defense strategies GASTROPODA herbivore resistance lichenivory mollusk grazing plant-animal interaction
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部