-
41
Mimic storage scheme based on regenerated code
Published 2018-04-01“…Aiming to solve security threats in the cloud storage system due to static storage architecture and storage mode,a mimic storage scheme based on regenerated code was proposed.The scheme used network coding scheme to store the data in the cloud data node,and used mimicry transformation mechanism based on regeneration code to change data storage state dynamically according to the random time-varying factors,which could guarantee data integrity and data availability continuously.The mimicry transformation mechanism is a random,time-varying and dynamic scheme,which increases the uncertainty of storage system.It blocks and interferes with the attack chain,increases the difficulty and cost of the attack operation,and improves the security and reliability of the system.…”
Get full text
Article -
42
An In Vitro Model of Gastric Inflammation and Treatment with Cobalamin
Published 2017-01-01Get full text
Article -
43
Pipevine Swallowtail, Blue Swallowtail Battus philenor (Linnaeus 1771) (Insecta: Lepidoptera: Papilionidae: Papilioninae: Troidini)
Published 2017-03-01“…The article also discusses the butterfly’s mimicry, pollination biology, and the ecological significance of its interactions with host plants and predators. …”
Get full text
Article -
44
Black and yellow lichen moth (suggested common name) Lycomorpha pholus (Drury) (Insecta: Lepidoptera: Noctuidae: Arctiinae: Lithosiini)
Published 2010-08-01“…It describes this lichen moth common in the Neotropics — synonymy, distribution, description, life cycle, hosts, and mimicry. Includes references. Published by the UF Department of Entomology and Nematology, August 2010. …”
Get full text
Article -
45
SIX ASIDES ON ART & LIES
Published 2019-10-01“…The phrase has stuck with me, spurring a long-standing interest in mimicry – the relationship between survival and calculated obscurity. …”
Get full text
Article -
46
Black and yellow lichen moth (suggested common name) Lycomorpha pholus (Drury) (Insecta: Lepidoptera: Noctuidae: Arctiinae: Lithosiini)
Published 2010-08-01“…It describes this lichen moth common in the Neotropics — synonymy, distribution, description, life cycle, hosts, and mimicry. Includes references. Published by the UF Department of Entomology and Nematology, August 2010. …”
Get full text
Article -
47
L’utilisation des rituels et des routines par les enseignants novices. Un exemple de mobilisation des apports de la formation initiale
Published 2023-01-01“…These professional gestures, which are learned mainly through mimicry during internships, question the integrative work-study program of the Haute école pédagogique du canton de Vaud. …”
Get full text
Article -
48
Endogenous security architecture of Ethernet switch based on mimic defense
Published 2020-05-01“…Aiming at the unknown vulnerabilities and unknown backdoor security threats faced by Ethernet switches,a switch endogenous security architecture based on mimicry defense theory was proposed.The theoretical basis,construction mode and security mechanism of the architecture ware introduced,the algorithm strategy and security improvement effect of TAMA algorithm were proposed and analyzed,a prototype of mimic switch was designed and implemented,and the security tests of white box stuffing and attack chain were carried out.Theoretical analysis and test results show that the architecture has good unknown vulnerabilities and unknown backdoor defense capabilities in various attack scenarios.…”
Get full text
Article -
49
À l’écoute des adaptations de Madame Bovary
Published 2009-01-01“…Theoretically, there is nothing easier for the filmmaker than to reproduce on the screen this sonorous mimicry of the realist text. However, an analysis of the soundtrack of various adaptations reveals an often original interpretation of the text. …”
Get full text
Article -
50
Salida, tránsito, destierro : una aproximación al imaginario transnacional de los jóvenes
Published 2015-10-01“…But it also soaks the imagery of those who remain in Aragon, who vandalize their aesthetic and discourses through mimicry.…”
Get full text
Article -
51
Malicious PDF document detection based on mixed feature
Published 2019-02-01“…Aiming at the problem of poor robustness and easy to evade detection in the detection of malicious PDF document,a malicious PDF document detection method based on mixed features was proposed.It adopted dynamic and static analysis technology to extract the regular information,structure information and API calling information from the document,and then a feature extraction method based on K-means clustering algorithm was designed to filter and select the key mixed features that characterize the document security.Ultimately,it improved the robustness of features.On this basis,it used random forest algorithm to construct classifier and perform experiment to discuss the detection performance of the scheme and its ability to resist mimicry attacks.…”
Get full text
Article -
52
TRANSHUMANISM IN RUSSIA: SOCIAL ACTIVIVITIES
Published 2016-12-01“…Transhumanist can also be viewed as self PR and a phenomenon of social mimicry.…”
Get full text
Article -
53
On the Life Cycle and Natural History of Hymenitis Nero (Lepidoptera: Ithomiinae) in Costa Rica
Published 1972-01-01“…This is surprising in light of the considerable interest in these butterflies as members of mimicry complexes. In this spirit, this paper summarizes life cycle and natural history data on a clear wing ithoreiine Hymenitis nero (Hewitson) (Nymphalidae: Ithomiinae) in Costa Rica. …”
Get full text
Article -
54
Punishment, integration, forgetting: Post-war fate of Muslims from Stara Raška members of the German forces in WWII
Published 2024-01-01“…Emphasis is placed on their post-war destinies, i.e. their (non)punishment for collaboration and (non)integration into Yugoslav society, that is, a kind of mimicry in which the majority enter while waiting for a more favorable historical moment. …”
Get full text
Article -
55
(Re)producing orientalism
Published 2024-12-01“…By taking a theoretical and technological understanding of reskins, I argue that reskinned games, as a form of industrial mimicry, while an important aspect of standardized game production, can also serve as means of subversion against seemingly totalizing control of the US-dominated app economy. …”
Get full text
Article -
56
The Role and Therapeutic Potential of Endothelial Progenitor Cells in Tumor Neovascularization
Published 2010-01-01“…Numerous studies over the past decades demonstrated that neovascularization associated with tumor growth occurs via angiogenic and vasculogenic mechanisms that involve sprouting angiogenesis, intussusceptive angiogenesis, vessel co-option, vasculogenic mimicry, lymphangiogenesis, and the recruitment of endothelial progenitor cells (EPCs). …”
Get full text
Article -
57
Kesurupan Massal di Sekolah Menengah: Kerasukan Roh Jahat atau Emotional Contagion?
Published 2022-01-01“…The findings show that there are seven categories of factors on mass trance: emotional stimulus, mystical experiences, suggestability, supernatural interpretation, anomalous experience, unconditioned emotional response, and mimicry. Core category analysis shows that mass trance on middle school students indicates emotional contagion with supernatural beliefs nuance.…”
Get full text
Article -
58
Variations to the Nanotube Surface for Bone Regeneration
Published 2013-01-01“…A particularly fascinating area of research involves the study of nanostructured surfaces, which are believed to enhance osteogenic behavior, possibly due to the mimicry of components of the extracellular matrix of bone. …”
Get full text
Article -
59
Memory’s Seams: Scarcity and Preciousness in Earth Pigments
Published 2024-12-01“…During the Second World War, the material was mined for its coal-like properties to conceal tanks and ships, while its intense color and oily texture coated eyelashes in Max Factor’s first commercial mascara until it was replaced by blacker polymers—an ambivalent form of synthetic mimicry and that displaces mining by way of plastics. …”
Get full text
Article -
60
Extradigestive Manifestation of Helicobacter Pylori Infection in Children and Adolescents
Published 2005-01-01“…Moderate evidence supports H pylori gastric infection as a cause of some cases of immune thrombocytopenic purpura due to molecular mimicry. Guidelines should be adjusted in accordance with advancing knowledge in the field.…”
Get full text
Article