Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Decoy Strategy“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Decoy Strategy" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Decoy Strategy"
Seo, Sang, und Dohoon Kim. „OSINT-Based LPC-MTD and HS-Decoy for Organizational Defensive Deception“. Applied Sciences 11, Nr. 8 (10.04.2021): 3402. http://dx.doi.org/10.3390/app11083402.
Der volle Inhalt der QuelleLinsky, Thomas W., Renan Vergara, Nuria Codina, Jorgen W. Nelson, Matthew J. Walker, Wen Su, Christopher O. Barnes et al. „De novo design of potent and resilient hACE2 decoys to neutralize SARS-CoV-2“. Science 370, Nr. 6521 (05.11.2020): 1208–14. http://dx.doi.org/10.1126/science.abe0075.
Der volle Inhalt der QuelleHuang, Hesong, Zhongxiang Tong, Taorui Li, Lintong Jia und Shenbo Li. „Defense Strategy of Aircraft Confronted with IR Guided Missile“. Mathematical Problems in Engineering 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/9070412.
Der volle Inhalt der QuelleAckerman, Joshua T., John M. Eadie und Thomas G. Moore. „Does Life History Predict Risk-Taking Behavior of Wintering Dabbling Ducks?“ Condor 108, Nr. 3 (01.08.2006): 530–46. http://dx.doi.org/10.1093/condor/108.3.530.
Der volle Inhalt der QuelleKato, K., K. Akeda, S. Miyazaki, J. Yamada, C. Muehleman, K. Miyamoto, YA Asanuma et al. „NF-kB decoy oligodeoxynucleotide preserves disc height in a rabbit anular-puncture model and reduces pain induction in a rat xenograft-radiculopathy model“. European Cells and Materials 42 (20.07.2021): 90–109. http://dx.doi.org/10.22203/ecm.v042a07.
Der volle Inhalt der QuelleBern, Marshall W., und Yong J. Kil. „Two-Dimensional Target Decoy Strategy for Shotgun Proteomics“. Journal of Proteome Research 10, Nr. 12 (02.12.2011): 5296–301. http://dx.doi.org/10.1021/pr200780j.
Der volle Inhalt der QuelleBurri Naresh, Et al. „Integrating Enhanced Decoy Technology and User Behavior Profiling for Strengthening Cloud Server Security“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 8 (20.09.2023): 401–8. http://dx.doi.org/10.17762/ijritcc.v11i8.9082.
Der volle Inhalt der QuelleRamasamy, Thiruganesh, Xucai Chen, Bin Qin, Daniel E. Johnson, Jennifer R. Grandis und Flordeliza S. Villanueva. „STAT3 decoy oligonucleotide-carrying microbubbles with pulsed ultrasound for enhanced therapeutic effect in head and neck tumors“. PLOS ONE 15, Nr. 11 (18.11.2020): e0242264. http://dx.doi.org/10.1371/journal.pone.0242264.
Der volle Inhalt der QuelleTomita, Naruya, Toshio Ogihara und Ryuichi Morishita. „Therapeutic potential of decoy oligonucleotides strategy in cardiovascular diseases“. Expert Review of Cardiovascular Therapy 1, Nr. 3 (Oktober 2003): 463–70. http://dx.doi.org/10.1586/14779072.1.3.463.
Der volle Inhalt der QuelleJia, Dong. „Decoy oligonucleotide technology in fibrosis: Application and delivery strategy“. World Chinese Journal of Digestology 23, Nr. 31 (2015): 4931. http://dx.doi.org/10.11569/wcjd.v23.i31.4931.
Der volle Inhalt der QuelleDissertationen zum Thema "Decoy Strategy"
Arandel, Ludovic. „Développement d'une thérapie génique pour la Dystrophie Myotonique de type 1“. Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS229.
Der volle Inhalt der QuelleMyotonie dystrophy types 1(DM1) and 2 (DM2) are autosomal dominant multisystem diseases with a strong neuromuscular component. They are characterized by progressive myotonia, muscle weakness, cognitive impairment, and cardiac conduction defects. These diseases are caused by abnormal amplification of C(C)TG repeat sequences located in the 3'UTR region of the DMPK gene and in the intron of the CNBP gene, respectively. These expansion-containing sequences are transcribed and retained in the nucleus as riboprotein aggregates. The presence of these toxic C(C)UG RNAs induces sequestration of the MBNL family of RNA-binding proteins, leading to their loss of function and deregulation of alternative splicing events, many ofv/hich are associated with clinical symptoms in patients. There is currently no1reatment for DM. In this thesis, I have developed a gene therapy tool based on a modification of the MBNL1 protein. This C- terminal truncated MBNL derivative (MBNLΔ) acts as a decoy to release endogenous MBNL proteins sequestered by mutant RNAs. Our approach was validated in muscle cells from DM1 patients and in a mouse model of the disease after AAV virus injection. Treatment with MBNLΔ allows the delocalisation of endogenous MBNL proteins from the foci, modifies the foci dynamics, corrects the transcriptome and myotonia, which is maintained 1 year after injection
Got, Elisa, und Fabrice Sanz. „Merger & Acquisition : Avoiding the path of decay“. Thesis, Linköping University, Department of Management and Economics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1023.
Der volle Inhalt der QuelleBackground : Globalisation has led company to think globally and act locally. Such a change in the business world have made emerge the need to find partner around the world, and even to merge with complementary companies in order to sustain the corporate strategic advantage and to create value.
Purpose : The objective of this paper is to integrate major Merger & Acquisitions theories in order to establish a warning model pointing out the main pitfalls changing promising motivations into failed implementation in the process of Merger & Acquisition. Such a model will aim at preventing managers engaged in a transnational horizontal merger from the potential hazards leading to value destruction.
Delimitations : We choose to focus on the transnational merger because it should play with different national management and with the consequent variance in cultural distance ; the human and social context appears more clearly as fundamentally variable when a merger involves different sensibilities.
Results : After having integrated the main theoretical finding into a holistic framework which enabled us to shape a warning model we tested successfully in case of Pharmacia-Upjohn merger, which aims at analysing the general risks of one strategic merger or/and the following implementation process.
Moreira-Munoz, Simon. „Timber supply and economic impact of mountain pine beetle salvage strategies“. Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/697.
Der volle Inhalt der QuelleNkokoto, Mokela. „Analysis of the implementation of Johannesburg inner city renewal strategies“. Thesis, 2007. http://hdl.handle.net/10539/2169.
Der volle Inhalt der QuelleThis paper is a report on the research undertaken to evaluate the implementation of the Urban Renewal strategies that the City of Johannesburg adopted for the CBD renewal through the Blue IQ. The study was restricted to the views expressed by the general community, business community, Johannesburg Development Agency (JDA). Johannesburg Housing Company (JHC), Blue IQ, Gauteng Development Agency and Gauteng Economic Development Agency (GEDA), which are the main role players in the CBD renewal effort. There was administered questioner to the members of the Business and general communities that were randomly picked using the fish bowl method. Interviews were conducted with the senior executive staff of JDA. Blue IQ, JHC. Statistics derived from the above company s websites was used as well. The results of the study show that the renewal strategy has been largely successful in so far as a number of factors, which have contributed to the CBD decay such as poor infrastructure and slumps. There have also been considerable efforts to address acute shortage of parking space by private partners such as financial institutions. Although crime has decreased it is still posing a serious challenge as most people still consider the CBD high risk. However there is still a room for improvement, which includes: the enhancement of safety and security, the infrastructure maintenance policy and the enforcement of the municipality by laws and town planning scheme. Overall the strategies have also improved the economic performance of the city significantly though unemployment still remain high with the ever increasing number of people coming to seek opportunities.
Bücher zum Thema "Decoy Strategy"
Carmoy, Hervé de. Global banking strategy: Financial markets and industrial decay. Cambridge, Mass., USA: B. Blackwell, 1990.
Den vollen Inhalt der Quelle findenFields of deception: Britain's bombing decoys of World War II. London: Methuen, 2000.
Den vollen Inhalt der Quelle findenHadda, Lamia, Saverio Mecca, Giovanni Pancani, Massimo Carta, Fabio Fratini, Stefano Galassi und Daniela Pittaluga, Hrsg. Villages et quartiers à risque d’abandon. Florence: Firenze University Press, 2022. http://dx.doi.org/10.36253/978-88-5518-537-0.
Der volle Inhalt der QuelleMagnaghi, Alberto, Hrsg. Il territorio bene comune. Firenze: Firenze University Press, 2012. http://dx.doi.org/10.36253/978-88-6655-134-8.
Der volle Inhalt der QuelleGarofalo, Giuseppe, Hrsg. Capitalismo distrettuale, localismi d'impresa, globalizzazione. Florence: Firenze University Press, 2008. http://dx.doi.org/10.36253/978-88-8453-605-1.
Der volle Inhalt der QuelleCarmoy, Herve De. Global Banking Strategy: Financial Markets and Industrial Decay. Blackwell Pub, 1991.
Den vollen Inhalt der Quelle findenJohnston, Nessa. Sounding Decay in the Digital Age. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190469894.003.0012.
Der volle Inhalt der QuelleDobinson, Colin. Fields of Deception: Britain's Bombing Decoys of World War II. Methuen Publishing, Ltd., 2001.
Den vollen Inhalt der Quelle findenMarovich, Beatrice. Reverence, Revision and Creaturely Life: Whitehead’s Political Theology of Enjoyment. Edinburgh University Press, 2018. http://dx.doi.org/10.3366/edinburgh/9781474429566.003.0006.
Der volle Inhalt der QuelleBuchteile zum Thema "Decoy Strategy"
Elias, Joshua E., und Steven P. Gygi. „Target-Decoy Search Strategy for Mass Spectrometry-Based Proteomics“. In Methods in Molecular Biology, 55–71. Totowa, NJ: Humana Press, 2009. http://dx.doi.org/10.1007/978-1-60761-444-9_5.
Der volle Inhalt der QuelleRieger, Marcel. „Analysis Strategy“. In Search for tt̄H Production in the H → bb̅ Decay Channel, 73–84. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65380-4_4.
Der volle Inhalt der QuelleHuntley, Brian John. „Strategic Opportunism: A Pragmatic Approach to Conservation in Africa“. In SpringerBriefs in Environmental Science, 3–5. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-24880-1_1.
Der volle Inhalt der QuelleZhen, Wenxi, Weicheng Shen, Xiping Ma und Kaisong Dong. „Optimal Scheduling Strategy of Integrated Energy System Considering Energy Storage Lifetime Decay“. In Lecture Notes in Electrical Engineering, 907–17. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1532-1_97.
Der volle Inhalt der QuelleCaldeira, Ana Teresa. „Green Mitigation Strategy for Cultural Heritage Using Bacterial Biocides“. In Microorganisms in the Deterioration and Preservation of Cultural Heritage, 137–54. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69411-1_6.
Der volle Inhalt der Quellevan der Westhuizen, Thea. „Internal Domains Entrepreneurial Heartset, Mindset, and Handset“. In Practical Tools for Youth Entrepreneurs, 31–55. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-44362-6_2.
Der volle Inhalt der QuelleBalbina, F. T. C. S., F. J. H. Moraes, E. Munin und L. P. Alves. „Strategy to Computationally Model and Resolve Radioactive Decay Chain in Engineering Education by Using the Runge-Kutta Numerical Method“. In XXVII Brazilian Congress on Biomedical Engineering, 2311–17. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-70601-2_339.
Der volle Inhalt der QuelleScolaro, Antonello Monsù, Stefania De Medici, Salvatore Giuffrida, Maria Rosa Trovato, Cheren Cappello, Ludovica Nasca und Fuat Emre Kaya. „New Perspectives for the Building Heritage in Depopulated Areas: A Methodological Approach for Evaluating Sustainable Reuse and Upcycling Strategies“. In The Urban Book Series, 757–67. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29515-7_68.
Der volle Inhalt der QuelleCaro-González, A., A. Serra, X. Albala, C. E. Borges, D. Casado-Mansilla, J. Colobrans, E. Iñigo, J. Millard, A. Mugarra-Elorriaga und Renata Petrevska Nechkoska. „The Three MuskEUteers“. In Contributions to Management Science, 3–28. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-11065-8_1.
Der volle Inhalt der QuelleWight, Martin. „The Balance of Power“. In Foreign Policy and Security Strategy, 26–51. Oxford University PressOxford, 2023. http://dx.doi.org/10.1093/oso/9780192867889.003.0002.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Decoy Strategy"
Yan, Peijie, Feihuang Chu und Luliang Jia. „A novel collaborative jamming method based on decoy strategy“. In 2021 International Conference on Wireless Communications and Smart Grid (ICWCSG). IEEE, 2021. http://dx.doi.org/10.1109/icwcsg53609.2021.00044.
Der volle Inhalt der QuelleSun, W., und M. J. Yao. „Research on jamming strategy of surface-type infrared decoy against by infrared-guided simulation“. In 2020 20th International Conference on Control, Automation and Systems (ICCAS). IEEE, 2020. http://dx.doi.org/10.23919/iccas50221.2020.9268227.
Der volle Inhalt der QuelleBasilico, Cristina, Chiara Modica, Federica Maione, Elisa Vigna und Paolo M. Comoglio. „Abstract 828: Targeting theMEToncogene by concomitant inhibition of receptor and ligand by an antibody-‘decoy' strategy“. In Proceedings: AACR Annual Meeting 2018; April 14-18, 2018; Chicago, IL. American Association for Cancer Research, 2018. http://dx.doi.org/10.1158/1538-7445.am2018-828.
Der volle Inhalt der QuelleFeng, Xiaodong, Jie Ma, Cheng Chang, Kunxian Shu und Yunping Zhu. „An Improved Target-decoy Strategy for Evaluation of Database Search Engines and Quality Control Methods in Shotgun Proteomics“. In International Conference on Biomedical and Biological Engineering. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/bbe-16.2016.56.
Der volle Inhalt der QuelleTan, Zhi-Fang, Yingzi Kang, Wenbin Shangguan, Weiwei Wang und Kaihong Jiang. „Research on Thermal Recession Compensation Method of Disc Brakes“. In WCX SAE World Congress Experience. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2023. http://dx.doi.org/10.4271/2023-01-0668.
Der volle Inhalt der QuelleHe, Xiaowei, Guohua Geng und Jingjing Yu. „Quantitative bioluminescence tomography from single view measurement with decay correction strategy“. In 2012 5th International Conference on Biomedical Engineering and Informatics (BMEI). IEEE, 2012. http://dx.doi.org/10.1109/bmei.2012.6513200.
Der volle Inhalt der QuelleMulder, Eben, Dawid Serfontein und Eberhard Teuchert. „Deep Burn Strategy for Pure Reactor-Grade Plutonium in Pebble Bed High Temperature Gas-Cooled Reactors“. In Fourth International Topical Meeting on High Temperature Reactor Technology. ASMEDC, 2008. http://dx.doi.org/10.1115/htr2008-58082.
Der volle Inhalt der QuelleChen, Ying Chun, und Ying Hua Guo. „Optimal Combination Strategy for Two Swim-Out Acoustic Decoys to Countermeasure Acoustic Homing Torpedo“. In 2017 4th International Conference on Information Science and Control Engineering (ICISCE). IEEE, 2017. http://dx.doi.org/10.1109/icisce.2017.222.
Der volle Inhalt der QuelleGrinstein, Fernando F. „Implicit Large-Eddy Simulation of Transition and Turbulence Decay“. In ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/ajkfluids2019-5451.
Der volle Inhalt der QuelleWang, Jun, Xin Wang, Wei Du, Yuan Li, Chenghong Tang und Gang Liu. „Proximal Policy Optimization Algorithm for Integrated Energy System Operation with Adaptive Learning Rate Decay Strategy“. In 2023 4th International Conference on Smart Grid and Energy Engineering (SGEE). IEEE, 2023. http://dx.doi.org/10.1109/sgee60678.2023.10481730.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Decoy Strategy"
Breiman, Adina, Jan Dvorak, Abraham Korol und Eduard Akhunov. Population Genomics and Association Mapping of Disease Resistance Genes in Israeli Populations of Wild Relatives of Wheat, Triticum dicoccoides and Aegilops speltoides. United States Department of Agriculture, Dezember 2011. http://dx.doi.org/10.32747/2011.7697121.bard.
Der volle Inhalt der Quelle