Academic literature on the topic 'Anti-virus information protection system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anti-virus information protection system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Anti-virus information protection system"

1

Марценюк, В., І. Дідманідзе, I. Андрущак, Т. Крадінова, and К. Рудь. "Information security: anti-virus protection technologies." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 38 (March 13, 2020): 79–84. http://dx.doi.org/10.36910/6775-2524-0560-2020-38-07.

Full text
Abstract:
The article deals with the normative and methodological bases of classification of information security threats related to the use of malware against information systems. The threats to the impact on the information systems of certain types of malware are highlighted. In the process, antivirus experts desing and develop new methodologies to make them stronger, more and more every day. The purpose of this paper is to reviev these methodologies and outline their strengths and weaknesses to encourage those and interested in more investigation on these areas.
APA, Harvard, Vancouver, ISO, and other styles
2

Widarma, Adi, M. Dedi Irawan, Fajri Nurhidayahti, and Ranis Hsb. "Decision Support System Determining Computer Virus Protection Applications Using Simple Additive Weighting (SAW) Method." Journal of Computer Networks, Architecture, and High-Performance Computing 3, no. 1 (March 2, 2021): 86–79. http://dx.doi.org/10.47709/cnahpc.v3i1.936.

Full text
Abstract:
The use of information technology devices such as computers or laptops is currently increasing. The increased use is due to the fact that these devices are very supportive of our daily work activities. With the increasing use of these computers, data security on a computer or laptop device must be completely safe from virus attacks. To ward off viral attacks m aka requires the application of anti-virus to inhibit and prevent a variety of viruses that enter into the computer system so that the computer user's activity was not bothered by the many viruses are easily spread. Because there are too many antiviruses on the market, it is necessary to choose a good antivirus. One of the ways to choose antivirus is the existence of a decision support system . In this study, the Simple Additive Weighting (SAW) method was applied for the anti-virus application selection system. This data assessment analysis aims to produce the best anti - virus application options that computer users can use to secure their computer data. The criteria and weights used are K1 = application rating (5%) , K2 = completeness of features (30%) , K3 = price / official license (5%) , K4 = malware detection (45%) and K5 = blocking URL (15%). Of the 25 alternatives used, the results of the study, namely alternative A1 = Kaspersky anti-virus get the highest ranking result.
APA, Harvard, Vancouver, ISO, and other styles
3

Zaporotskov, Pavel. "Development of a Method for Conducting an Audit of the Information Security System." NBI Technologies, no. 4 (March 2021): 18–27. http://dx.doi.org/10.15688/nbit.jvolsu.2020.4.3.

Full text
Abstract:
Information processes, as well as information resources, manage information of varying degrees of importance for the enterprise. In this regard, the protection of such information is one of the most important procedures in the field of state security, the importance of which is growing every year. The problem of information security – the reliable provision of its safety and the established status of use – is one of the most important problems of our time. The paper considers the existing standards in the field of information security audit. The author has developed an innovative model of audit of the information security system based on the comparison of demand measures of order no. 21 of the FSTEC of Russia and ways of implementation in the subsystem of the information system of personal data protection, the recommendations for inspections of specific measures of protection and used technology audit technical means. The developed method is tested on the example of conducting an audit in “Lama” LLC company. The choice was made to establish the compliance of the organization’s personal data protection system with the requirements of order no. 21 of the FSTEC of Russia. Recommendations have been developed to eliminate the existing shortcomings and inconsistencies by re-equipping the anti-virus protection subsystem and the subsystem of inter-network shielding and protection of communication channels.
APA, Harvard, Vancouver, ISO, and other styles
4

Shevchenko, Svitlana, Pavlo Skladannyi, and Maksym Martseniuk. "ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE." Cybersecurity: Education Science Technique, no. 4 (2019): 62–71. http://dx.doi.org/10.28925/2663-4023.2019.4.6271.

Full text
Abstract:
The article is devoted to the problem of information security, namely the study of the characteristics of antivirus programs which are standardized in Ukraine. The study used statistical methods to analyze the characteristics of antivirus software and comparative methods of comparing the various types of such programs. Relying on researches in scientific literature, the main threats to information security in the field of information technology were analyzed. The emphasis is placed on the fact that antivirus software is the most effective protection against malicious software (malware). The basic methods of work of the antivirus – signature and heuristic – are described. The list of standardized in Ukraine antivirus programs is determined. The study was based on the quantitative and qualitative results which while testing had obtained by the independent testing laboratory AV-Comparatives (Austria), the independent Virus Bulletin (VB) laboratory for testing and certification in the field of security, the Center for antivirus protection information of the State Special Communication Service of Ukraine. The comparative analysis of the main characteristics of antivirus programs was carried out, namely: antivirus and anti-spyware; anti-phishing; anti-rootkit protection against exploits; Intrusion Prevention System; Real-time protection; parental control; host-based firewall; antispam; protection against network attacks; home network protection; anti-theft; password management.
APA, Harvard, Vancouver, ISO, and other styles
5

Tolіupa, Serhii, Oleksandr Pliushch, and Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.

Full text
Abstract:
Systems for detecting network intrusions and detecting signs of attacks on information systems have long been used as one of the necessary lines of defense of information systems. Today, intrusion and attack detection systems are usually software or hardware-software solutions that automate the process of monitoring events occurring in an information system or network, as well as independently analyze these events in search of signs of security problems. As the number of different types and ways of organizing unauthorized intrusions into foreign networks has increased significantly in recent years, attack detection systems (ATS) have become a necessary component of the security infrastructure of most organizations. The article proposes a software prototype of a network attack detection system based on selected methods of data mining and neural network structures. The conducted experimental researches confirm efficiency of the created model of detection for protection of an information network. Experiments with a software prototype showed high quality detection of network attacks based on neural network structures and methods of intelligent data distribution. The state of protection of information systems to counter cyber attacks is analyzed, which made it possible to draw conclusions that to ensure the security of cyberspace it is necessary to implement a set of systems and protection mechanisms, namely systems: delimitation of user access; firewall; cryptographic protection of information; virtual private networks; anti-virus protection of ITS elements; detection and prevention of intrusions; authentication, authorization and audit; data loss prevention; security and event management; security management.
APA, Harvard, Vancouver, ISO, and other styles
6

Grin, S. A., N. M. Pukhova, I. N. Matveyeva, A. Ya Samuylenko, and R. N. Melnik. "IMMUNOGENESIS IN THE DESTRUCTION OF CELLS OF THE NERVOUS SYSTEM UNDER THE INFLUENCE OF THE RABIES VIRUS." Medical academic journal 19, no. 1S (December 15, 2019): 139–41. http://dx.doi.org/10.17816/maj191s1139-141.

Full text
Abstract:
The nature of rabies immunity is not well understood, the zones of deployment of protective mechanisms are unknown, and the place where antibodies meet with the virus is unclear. The issue of the mechanism of protection of the central nervous system against rabies virus is relevant. It has been hypothesized that protection (immunity) of the central nervous system to the rabies virus is induced by the distant interaction of antibodies on the nerve сells and is mediated by the energy-information field of specific antibodies circulating in the blood vessels of the central nervous system. To confirm this hypothesis, the non-contact effect of rabies antibodies on the rabies virus (strain “Shchelkovo-51”) in the culture cell (BHK-21/13) and the decrease in antigen accumulation from 1.7 to 2.9 times were experimentally shown. The obtained data confirm the main point of the hypothesis on the protection of the central nervous system against the rabies virus using an energy-information biofield.
APA, Harvard, Vancouver, ISO, and other styles
7

Gao, Xiang, Yiqiang Zhao, and Haocheng Ma. "Fringing Electric Field Sensors for Anti-Attack at System-Level Protection." Sensors 18, no. 9 (September 11, 2018): 3034. http://dx.doi.org/10.3390/s18093034.

Full text
Abstract:
Information system security has been in the spotlight of individuals and governments in recent years. Integrated Circuits (ICs) function as the basic element of communication and information spreading, therefore they have become an important target for attackers. From this perspective, system-level protection to keep chips from being attacked is of vital importance. This paper proposes a novel method based on a fringing electric field (FEF) sensor to detect whether chips are dismantled from a printed circuit board (PCB) as system-level protection. The proposed method overcomes the shortcomings of existing techniques that can be only used in specific fields. After detecting a chip being dismantled from PCB, some protective measures like deleting key data can be implemented to be against attacking. Fringing electric field sensors are analyzed through simulation. By optimizing sensor’s patterns, areas and geometrical parameters, the methods that maximize sensitivity of fringing electric field sensors are put forward and illustrated. The simulation is also reproduced by an experiment to ensure that the method is feasible and reliable. The results of experiments are inspiring in that they prove that the sensor can work well for protection of chips and has the advantage of universal applicability, low cost and high reliability.
APA, Harvard, Vancouver, ISO, and other styles
8

Dong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.

Full text
Abstract:
With the increasingly advanced computer information network, a great convenience for people's daily work and life at the same time, the network security problem arises. Network security is not only related to the enterprises, institutions and social groups, network information security, is also related to the national security and social stability, Involves many disciplines of computer science, network technology, communication technology, security technology and techniques. Solve the problem of computer network security has become the most important research topics in the field of computer science. Starting from the characteristics of the computer information network security and network security factors, a network security system designed set includes virus protection, dynamic password authentication, firewall access control, information encryption, intrusion detection and other protective measures for our computer the improvement and development of the information Network Security provides a useful reference.
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Yan Wen, and Feng Dong. "Research on Multi-Core Network Equipment Virus Defense System." Applied Mechanics and Materials 738-739 (March 2015): 1197–200. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.1197.

Full text
Abstract:
With the arrival of the wave of information technology, the business activities of a variety of business systems via the network to complete. But the virus to exploit system vulnerabilities to sneak into the enterprise information network server, the enterprise network into a leak and suffered the double threat of external hackers. Leverage existing security infrastructure, enterprise networks, statistical analysis of all possible virus invasion point, combined with a good virus defense technology layers protection system vulnerabilities, the formation of a whole network antivirus, coordinated operations, a unified management modernization virus defense systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Jian, Xiaolin Qin, and Hongying Fang. "Virus-Information Coevolution Spreading Dynamics on Multiplex Networks." Complexity 2021 (March 5, 2021): 1–9. http://dx.doi.org/10.1155/2021/6624612.

Full text
Abstract:
Virus and information spreading dynamics widely exist in complex systems. However, systematic study still lacks for the interacting spreading dynamics between the two types of dynamics. This paper proposes a mathematical model on multiplex networks, which considers the heterogeneous susceptibility and infectivity in two subnetworks. By using a heterogeneous mean-field theory, we studied the dynamic process and outbreak threshold of the system. Through extensive numerical simulations on artificial networks, we find that the virus’s spreading dynamics can be suppressed by increasing the information spreading probability, decreasing the protection power, or decreasing the susceptibility and infectivity.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Anti-virus information protection system"

1

Semyonov, S. G., Svitlana Gavrylenko, and Viktor Chelak. "Processing information on the state of a computer system using probabilistic automata." Thesis, Institute of Electrical and Electronics Engineers, 2017. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40752.

Full text
Abstract:
The paper deals with the processing of information about the state of a computer system using a probabilistic automaton. A model of an intelligent system for detection and classification of malicious software is proposed, which compares a set of features that are characteristic for different classes of viruses with multiple states of the machine. The analysis process is reduced to modeling the operation of the automaton taking into account the probability of transition from state to state, which at each step is recalculated depending on the reaction of the environment. The received results of research allow to reach a conclusion about the possibility of using the offered system for detection of the harmful software.
APA, Harvard, Vancouver, ISO, and other styles
2

Островський, О. О. "Система захисту комп’ютерної інформації від вірусів-шифрувальників." Thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jonsson, Karl. "Machine learning and system administration : A structured literature review." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18975.

Full text
Abstract:
Denna literaturöversikt går igenom två olika system inom IT-säkerhet och hur de fungerar tillsammans med maskinlärningstekniker till en relativt ytlig nivå.Syftet med denna rapport är att kunna sammanfatta dessa system och se hur de kan hjälpa med en systemadministratörs uppgifter, hur det kan användas för automatisera och vad för positiva och negativa förändringar det kan ha på en infrastruktur.Maskinlärning kan vara ett kraftigt verktyg för systemadministratörer för att lätta på arbetsmängden som kan förekomma inom en organisation, vilket är också varför det är viktigt att diskutera när och var man ska utplacera en lösning. Den här studien ska diskutera användningen av maskinlärning och när och var det kan användas.
This literature review discusses two different systems within IT-security and how they work within machine learning to a relatively surface-level degree.The purpose of this paper is to be able to summarize these systems and see how they can help a system administrator’s assignments. how it can be used for automation and the positives and negatives.Machine learning can be a powerful tool for system administrators to alleviate the workload which can exist within an organization, which is why it is important to discuss when and where to deploy a solution.
APA, Harvard, Vancouver, ISO, and other styles
4

Tladi, Sebolawe Erna Mokowadi. "The regulation of unsolicited electronic communications (SPAM) in South Africa : a comparative study." Thesis, 2017. http://hdl.handle.net/10500/25265.

Full text
Abstract:
The practice of spamming (sending unsolicited electronic communications) has been dubbed “the scourge of the 21st century” affecting different stakeholders. This practice is also credited for not only disrupting electronic communications but also, it overloads electronic systems and creates unnecessary costs for those affected than the ones responsible for sending such communications. In trying to address this issue nations have implemented anti-spam laws to combat the scourge. South Africa not lagging behind, has put in place anti-spam provisions to deal with the scourge. The anti-spam provisions are scattered in pieces of legislation dealing with diverse issues including: consumer protection; direct marketing; credit laws; and electronic transactions and communications. In addition to these provisions, an Amendment Bill to one of these laws and two Bills covering cybercrimes and cyber-security issues have been published. In this thesis, a question is asked on whether the current fragmented anti-spam provisions are adequate in protecting consumers. Whether the overlaps between these pieces of legislation are competent to deal with the ever increasing threats on electronic communications at large. Finally, the question as to whether a multi-faceted approach, which includes a Model Law on spam would be a suitable starting point setting out requirements for the sending of unsolicited electronic communications can be sufficient in protecting consumers. And as spam is not only a national but also a global problem, South Africa needs to look at the option of entering into mutual agreements with other countries and organisations in order to combat spam at a global level.
Mercantile Law
LL. D.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Anti-virus information protection system"

1

Rhodes, Keith A. Information security: The Melissa computer virus demonstrates urgent need for stronger protection over systems and sensitive data : statement of Keith A. Rhodes, Technical Director for Computers and Telecommunications, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives. Washington, D.C: The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

A, Adey R., ed. Modelling of cathodic protection systems. Southampton: WIT, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adey, R. A. Modelling of Cathodic Protection Systems (Advances in Boundary Elements). WIT Press (UK), 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Anti-Spam Measures: Analysis and Design. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Marson, James, and Katy Ferris. Business Law Concentrate. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198840602.001.0001.

Full text
Abstract:
Each Concentrate revision guide is packed with essential information, key cases, revision tips, exam Q&As, and more. Concentrates show you what to expect in a law exam, what examiners are looking for, and how to achieve extra marks. Business Law Concentrate considers all the essential issues relating to business law in the English legal system, including EU law and the potential implications of Brexit. The first half of the book looks at contracts in terms of mistake, misrepresentation, duress, undue influence, contractual terms, consumer protection, and remedies for breach. The next few chapters examine employment and focus on issues including wrongful dismissal, unfair dismissal, redundancy, equal pay claims, and anti-discrimination. The last part considers company law, intellectual property law, and changes to data protection. This updated edition includes important cases in contract law and torts law, employment law, and intellectual property law, including cases from the Supreme Court, The Court of Justice of the European Union, and the Employment Appeal Tribunal. Recent legislation and its effects in these jurisdictions of law are also covered in detail.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Anti-virus information protection system"

1

Kurizki, G., A. G. Kofman, V. M. Akulin, E. Brion, and J. Clausen. "Zeno and Anti-Zeno Dynamics." In Decoherence, Entanglement and Information Protection in Complex Quantum Systems, 223–32. Dordrecht: Springer Netherlands, 2005. http://dx.doi.org/10.1007/1-4020-3283-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yoshikai, Noriaki, Kana Shimbo, John Stavrakakis, and Toshio Takahashi. "Study on Persuasion Effect of Computer Virus Measures Based on Collective Protection Motivation Theory." In Advances in Network-Based Information Systems, 518–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65521-5_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shimbo, Kana, Shun-ichi Kurino, and Noriaki Yoshikai. "Verification of Persuasion Effect to Cope with Virus Infection Based on Collective Protection Motivation Theory." In Advances in Network-Based Information Systems, 763–71. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98530-5_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Panda, Bijaya Kumar, Manoranjan Pradhan, and Sateesh Kumar Pradhan. "Intrusion Prevention System." In Securing the Internet of Things, 1285–98. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch058.

Full text
Abstract:
In the last decade, there is a rapid growth in the use of Internet by the organization for information sharing. As information is very vital to the organizations, it should be preserved and insulated from any unauthorized access or alternation. In last few years, attacks on the computer infrastructures have increased exponentially. Several information security techniques are available now a days like firewalls, anti-virus software and Intrusion prevention systems (IPSs), which are important tools for protecting an organization from intrusions. Now most attacks are impossible to defend with firewalls and anti-virus software alone. Without an IPS, such attacks are difficult to detect and prevent. This chapter presents different definitions of intrusion prevention system with meaningful explanation; compare network IPS with Host IPS, common and the advanced detection methods, common IPS components, coverage of attacks by IPS and criteria to select right IPS. Finally, this chapter concludes with an analysis of the challenges that still remain to be resolved.
APA, Harvard, Vancouver, ISO, and other styles
5

Panda, Bijaya Kumar, Manoranjan Pradhan, and Sateesh Kumar Pradhan. "Intrusion Prevention System." In Network Security Attacks and Countermeasures, 245–58. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8761-5.ch010.

Full text
Abstract:
In the last decade, there is a rapid growth in the use of Internet by the organization for information sharing. As information is very vital to the organizations, it should be preserved and insulated from any unauthorized access or alternation. In last few years, attacks on the computer infrastructures have increased exponentially. Several information security techniques are available now a days like firewalls, anti-virus software and Intrusion prevention systems (IPSs), which are important tools for protecting an organization from intrusions. Now most attacks are impossible to defend with firewalls and anti-virus software alone. Without an IPS, such attacks are difficult to detect and prevent. This chapter presents different definitions of intrusion prevention system with meaningful explanation; compare network IPS with Host IPS, common and the advanced detection methods, common IPS components, coverage of attacks by IPS and criteria to select right IPS. Finally, this chapter concludes with an analysis of the challenges that still remain to be resolved.
APA, Harvard, Vancouver, ISO, and other styles
6

K. Al Sarkhi, Awaad. "The Link between Electrical Properties of COVID-19 and Electromagnetic Radiation." In Biotechnology to Combat COVID-19 [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.96815.

Full text
Abstract:
The ability of a new vaccine design based on control the intracellular physiological consequences of both the electrical properties and the electromagnetic radiation interactions between a virus and a host cell, which is a method to strengthen immune system develop protection against COVID-19 and new strains. The capacity of COVID-19 to bind to angiotensin-converting enzyme 2 (ACE2) and immune evasion mechanisms are only one of the properties required to stimulate a preventative immune response. In this chapter, a multidimensional new strategy is used to exemplify the empowerment function intracellular and extracellular level information can play in the support of immunogen against COVID-19 pathogens. Besides during this chapter, the nature of electromagnetic radiation is described as a vibrating string based on a string-theory and unification of electromagnetic radiation and gravitational waves by supporting with multiple cites strong evidence. Overall, we demonstrate a new approach to understand the important role of the physiological consequences of the interplay between the immune system and COVID-19 and designing vaccine strategy immunogens that take advantage of that information against COVID-19 and new strains.
APA, Harvard, Vancouver, ISO, and other styles
7

Folarin, Sheriff, and Oluwatobi Njoaguani. "Global Health Governance, Human Rights, and the Control of Infectious Diseases." In Advances in Healthcare Information Systems and Administration, 1–21. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-6133-0.ch001.

Full text
Abstract:
The human right to the highest attainable standard of health has both a legal and normative basis. The legal foundations derive from a range of international agreements and declarations while the normative basis is rooted in humanitarianism. Alongside the rights-based declarations came the growing recognition of emerging and reemerging infectious diseases, as ill effects of globalization and potential risk to peace and development. The threats posed by infectious diseases like the Ebola virus disease (EVD) are now seen as universally relevant, as the speed and volume of international travel has made an outbreak or epidemic anywhere in the world a potential threat anywhere else. The question then arises as to where individual freedom is given up in the protection of the collective interest and national security of states. This chapter examines these right issues, with respect to the Ebola outbreak in West Africa, as they collide with state actions to combat infectious diseases.
APA, Harvard, Vancouver, ISO, and other styles
8

Mostipan, Oleksandr. "PERSPECTIVES OF MODERNIZATION OF THE COMMUNICATION STRATEGY OF THE VERKHOVNA RADA OF UKRAINE FOR 2017-2021 YEARS." In Integration of traditional and innovation processes of development of modern science. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-021-6-9.

Full text
Abstract:
The article examines the issue of improving the Communication Strategy of the Verkhovna Rada of Ukraine for 2017-2021 to increase the level of trust in Parliament, raise the political and legal culture of citizens, counteract information wars and operations against the Parliament, as well as the development of e-democracy. It is noted that the low level of public trust in Parliament causes the necessity of modernizing the parliamentary system of communications in the vector of approximation to EU standards and raising the political and legal culture of citizens. The thesis is grounded on the necessity of developing a communication system of protection against information wars and operations against the Parliament of Ukraine, forming its positive image and counteracting manipulative media. The main criterion for the effectiveness of the Strategy is proposed to be the increase of the level of trust in the Parliament and parliamentarians. It is suggested to pay more attention to the formation of the institutional basis for the implementation of the Communication Strategy: responsible entities, their job responsibilities and necessary resources. The implementation of joint projects of the Parliament of Ukraine with universities and research institutions, the establishment of a school of communications, conducting seminars, trainings and forums in cooperation with civil society will have a positive impact on the implementation of the Communication Strategy. This will develop the tradition of communication and understanding of the parliamentarian as a professional communicator. The implementation of the Communication Strategy envisages increasing the efficiency of the information space monitoring system, timely response to negative reports about the Parliament and prevention of their occurrence, which is the basis of anti-crisis communications. The tools that ensure the openness of the Parliament not only contribute to the realization of the idea of representation, but also immanently pose threats to democracy through manipulative media, trolling, cyberbullying. Digital communications are important, but by themselves will not completely solve the problem of low confidence in Parliament, and are seen as a modern tool that can be updated at any time. The implementation of the Communication Strategy of the Verkhovna Rada of Ukraine for 2017-2021 should be considered in the context of ensuring the national security of the state, branding of Ukraine in the world and responding to opportunities-threats from globalization.
APA, Harvard, Vancouver, ISO, and other styles
9

Mendel Nzogang, Patrice, and Martial Boris Donkeng. "Neuroprotection: The Way of Anti-Inflammatory Agents." In Neuroprotection - New Approaches and Prospects. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.90509.

Full text
Abstract:
Neurons are basic structural and functional units of the nervous system with major function being that of integration and interpretation of neuronal input or information. The lifespan of a nerve cell generally last throughout the individual lifetime. However, some physiologic or pathologic processes may affect the neuron causing premature death of this cell or tissue. This premature neurological death caused by pathologic circumstances is what we call neurotoxicity. The biochemical mechanisms put forward to explain neurotoxicity are not fully known. Nonetheless, whatever the mechanism involved, the outcome usually results in apoptosis, pyropoptosis, or necrosis. Examples of these mechanisms include excitotoxicity, oxidative stress, glial cell destruction, vascular interruptions, and inflammation. The idea about possibly protecting neurons against insults using pharmacologic means leads to the birth of the neuroprotection concept. This new concept has emerged based on ongoing research, suggesting it is possible through physical and pharmacological means to prevent or avoid neurotoxicity by the abovementioned mechanisms but with the exception of vascular interruption mechanisms. We will present in this chapter a synoptic view of the inflammatory mechanisms implicated in neurotoxicity and bring out the possible implications in neuroprotection.
APA, Harvard, Vancouver, ISO, and other styles
10

Jihong, Mo. "CORRECTLY AND PRUDENTLY SELECTING THE POLICY OF ANTI-VIRUS IN ORDER TO SEEK MORE EFFECTIVE FREEDOM." In Critical Dialogues: Human Rights, Democracy and Pandemic Perspectives, 369–78. Grupo de Pesquisa Cultura, Direito e Sociedade - GPCDES, 2021. http://dx.doi.org/10.55658/gpcds978-65-00-40218-6.chapter18.

Full text
Abstract:
pneumonia. During this period, countries all over the world have been severely affected by the new crown pneumonia epidemic, and two completely different worlds have been formed before and after the epidemic. The process of globalization has been disrupted, and in the foreseeable future, it is difficult to predict when human beings will truly and effectively get rid of the troubles and effects of the new crown pneumonia epidemic. Since the outbreak of the new crown pneumonia, there have been two main attitudes in terms of epidemic prevention policies. One is the “dynamic clearing” insisted by the Chinese government, and the other is “coexistence with the new crown” advocated by Western society. These two epidemic prevention policies are more effective, and a simple conclusion cannot be drawn at present. But at least one thing is certain, the “dynamic clearing” policy adopted by the Chinese government since the outbreak of the new crown pneumonia epidemic has avoided the death of a large number of people, the depletion of social medical resources and the disorder of the social management system. China is the first country to restore production and living order from the COVID-19 disaster. China’s adoption of an independent epidemic prevention policy has a very enlightening effect on all countries in the world. It has gained useful experience in correctly handling the interrelationship between epidemic prevention and production, public interest and human rights protection, lawful epidemic prevention and scientific epidemic prevention.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Anti-virus information protection system"

1

Yucheng, Liu, and Liu Yubin. "Design Strategy of Anti-Electromagnetic Interference for Microcomputer Relay Protection System." In 2010 International Forum on Information Technology and Applications (IFITA). IEEE, 2010. http://dx.doi.org/10.1109/ifita.2010.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Михнева, Анастасия Ильинична, and Илья Павлович Михнев. "INFORMATION TECHNOLOGY IN ANTI-TERRORISM." In Национальная безопасность России: актуальные аспекты: сборник избранных статей Всероссийской научно-практической конференции (Санкт-Петербург, Март 2021). Crossref, 2021. http://dx.doi.org/10.37539/nb190.2021.71.46.004.

Full text
Abstract:
В статье рассматриваются вопросы использования на территории Волгоградского региона современных информационных технологий для обеспечения безопасности и антитеррористической защищенности населения. Предложены варианты решения проблем системы миграционного учета и интернет-мониторинга. The article discusses the issues of using modern information technologies on the territory of the Volgograd region to ensure security and anti-terrorist protection of the population. The options for solving the problems of the migration registration system and Internet monitoring are proposed.
APA, Harvard, Vancouver, ISO, and other styles
3

Chun Wei Lin and Bing Shiun Hsieh. "An anti-clipping protection system for multilevel class-D amplifier." In 2011 8th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON 2011). IEEE, 2011. http://dx.doi.org/10.1109/ecticon.2011.5947788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jiravanstit, Nantipat, and Surachai Chaitusaney. "Protective device placement for reliability improvement by considering anti-islanding protection of PV generation system." In 2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON 2012). IEEE, 2012. http://dx.doi.org/10.1109/ecticon.2012.6254255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Fei, Chengcheng Zhang, and Zengqiang Mi. "Notice of Retraction: Anti-islanding Detection and Protection for Grid Connected PV System Using Instantaneous Power Theory." In 2009 International Conference on Industrial and Information Systems (IIS 2009). IEEE, 2009. http://dx.doi.org/10.1109/iis.2009.84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sharaf, A. M., M. I. Yacoub, and A. A. Elhefnawy. "Improving the Stability of a Bulletproofed Vehicle Using Modified Suspension System." In ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-97110.

Full text
Abstract:
Abstract Bulletproof or high-class protected VIP vehicles are widely produced based on particular types of OEM (Original Equipment Manufacturer) commercial vehicles. The arising implications of increasing the level of protection of such vehicles have reflected several negative consequences on the vehicle directional stability. This is obviously true, since adding extra armored plates will increase both gross vehicle weight and the height of its center of gravity. Additionally, such vehicles are normally driven at higher speeds during critical evasive maneuvers. The proper selection of suitable suspension system in terms of spring, shock absorber and anti-roll bar for front and rear axles will contribute to the overall vehicle stability. This paper presents both theoretical and experimental investigation to upgrade the suspension system of a particular bulletproof vehicle in order to improve its stability during high-speed cornering maneuvers. For this purpose, six kits of nominated suspension systems have been tested in order to measure their stiffness and damping characteristics. Furthermore, for each suspension kit, the considered bulletproofed vehicle is fully assessed in CarSim® simulation environment. In-order to check the gained simulation results, typical field tests of the fully instrumented vehicle along with the modified suspension kit. From both simulation and field tests, a suitable kit for front and rear suspension system as well as braking system has been recommended not only to carry the additional weight of the heavy armored body but also to maintain the vehicle stability within their allowable limits.
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Shinho, Jungwoon Lee, Wonrak Lee, Seohyun Lee, Suyoung Kim, and Eui Tak Kim. "Design of Integrated Messenger Anti-virus System using Chatbot Service." In 2020 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2020. http://dx.doi.org/10.1109/ictc49870.2020.9289514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gaston, John R., W. Brian Piercy, and C. Scott Harclerode. "Integrated Turbine-Compressor Controls Retrofit for an Olefins Unit." In ASME 1995 International Gas Turbine and Aeroengine Congress and Exposition. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/95-gt-349.

Full text
Abstract:
The Olefins Unit that is the subject of this case study has been operating for 25 years. Recently, the unit initiated a control system retrofit program to increase availability, save energy, and improve access to operating information. New control systems were installed on the ethylene, propylene and furnace gas compressor trains. The gas compression equipment consists of single and multi-case compressor trains driven by steam and gas turbines and electric motors. Significant control system improvements were made to the turbine/compressor speed/load regulation and temperature limiting. The systems also execute “safety system” logic for process and machinery protection. In addition to integrated turbine compressor control, the strategy that incorporates all control functions for the entire compresor train, a new anti-surge algorithm is included. To meet more stringent availability requirements imposed by integration, a triple modular redundant (TMR) system structure is employed. The surge algorithm described in this paper accurately predicts where surge occurs, regardless of changes in gas composition and conditions (e.g., molecular weight, temperature, etc.), and allows the integrated controls to compensate accordingly. A PC workstation-based operator display is provided for enhanced operator awareness of machinery conditions. This paper describes the requirements and implementation of this new approach to control.
APA, Harvard, Vancouver, ISO, and other styles
9

Goryachikh, Vadim, Fahad Alghamdi, and Abdulrahman Takrouni. "Compressor Computerized Performance Monitoring System CPMS." In SPE Middle East Oil & Gas Show and Conference. SPE, 2021. http://dx.doi.org/10.2118/204582-ms.

Full text
Abstract:
Abstract Background information Natural gas liquid (NGL) production facilities, typically, utilize turbo-expander-brake compressor (TE) to generate cold for C2+ separation from the natural gas by isentropic expansion of feed stream and use energy absorbed by expansion to compress residue gas. Experience shows that during operational phase TE can exposed to operation outside of design window that may lead to machine integrity loss and consequent impact on production. At the same time, there is a lack of performance indicators that help operator to monitor operating window of the machine and proactively identify performance deterioration. For instance, TE brake compressor side is always equipped with anti-surge protection system, including surge deviation alarms and trip. However, there is often gap in monitoring deviation from stonewall region. At the same time, in some of the designs (2×50% machines) likelihood of running brake compressor in stonewall is high during one machine trip or train start-up, turndown operating modes. Also, typical compressor performance monitoring systems does not have enough dynamic parameters that may indicate machine process process performance deterioration proactively (real-time calculation of actual polytrophic efficiency, absorbed power etc.) and help operator to take action before catastrophic failure occurs. In addition, typical compressor monitoring systems are based on assumed composition and fixed compressibility factor and do not reflect actual compositions variations that may affect machine performance monitoring. To overcome issues highlighted above, Hawiyah NGL (HNGL) team has developed computerized monitoring and advisory system to monitor the performance of turbo-expander-brake compressor, proactively, identify potentially unsafe conditions or performance deterioration and advice operators on taking necessary actions to avoid unscheduled deferment of production. Computerized performance monitoring system has been implemented in HNGL DCS (Yokogawa) and utilized by control room operators on day-to-day basis. Real-time calculation, analysis and outputs produced by performance monitoring system allow operator to understand how current operating condition are far from danger zone. Proactive deviation alarms and guide messages produce by the system in case of deviation help operators to control machine from entering unsafe region. Actual polytrophic efficiency, adsorbed power calculations provide machine condition status and allow identifying long-term performance deterioration trends.
APA, Harvard, Vancouver, ISO, and other styles
10

Arya, Jalaj, and Lalit Mohan Saini. "A reliable single stage single phase hybrid solar inverter with anti-islanding protection." In 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES). IEEE, 2015. http://dx.doi.org/10.1109/spices.2015.7091374.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Anti-virus information protection system"

1

Bar-Joseph, Moshe, William O. Dawson, and Munir Mawassi. Role of Defective RNAs in Citrus Tristeza Virus Diseases. United States Department of Agriculture, September 2000. http://dx.doi.org/10.32747/2000.7575279.bard.

Full text
Abstract:
This program focused on citrus tristeza virus (CTV), the largest and one of the most complex RNA-plant-viruses. The economic importance of this virus to the US and Israeli citrus industries, its uniqueness among RNA viruses and the possibility to tame the virus and eventually turn it into a useful tool for the protection and genetic improvement of citrus trees justify these continued efforts. Although the overall goal of this project was to study the role(s) of CTV associated defective (d)-RNAs in CTV-induced diseases, considerable research efforts had to be devoted to the engineering of the helper virus which provides the machinery to allow dRNA replication. Considerable progress was made through three main lines of complementary studies. For the first time, the generation of an engineered CTV genetic system that is capable of infecting citrus plants with in vitro modified virus was achieved. Considering that this RNA virus consists of a 20 kb genome, much larger than any other previously developed similar genetic system, completing this goal was an extremely difficult task that was accomplished by the effective collaboration and complementarity of both partners. Other full-length genomic CTV isolates were sequenced and populations examined, resulting in a new level of understanding of population complexities and dynamics in the US and Israel. In addition, this project has now considerably advanced our understanding and ability to manipulate dRNAs, a new class of genetic elements of closteroviruses, which were first found in the Israeli VT isolate and later shown to be omnipresent in CTV populations. We have characterized additional natural dRNAs and have shown that production of subgenomic mRNAs can be involved in the generation of dRNAs. We have molecularly cloned natural dRNAs and directly inoculated citrus plants with 35S-cDNA constructs and have shown that specific dRNAs are correlated with specific disease symptoms. Systems to examine dRNA replication in protoplasts were developed and the requirements for dRNA replication were defined. Several artificial dRNAs that replicate efficiently with a helper virus were created from infectious full-genomic cDNAs. Elements that allow the specific replication of dRNAs by heterologous helper viruses also were defined. The T36-derived dRNAs were replicated efficiently by a range of different wild CTV isolates and hybrid dRNAs with heterologous termini are efficiently replicated with T36 as helper. In addition we found: 1) All CTV genes except of the p6 gene product from the conserved signature block of the Closteroviridae are obligate for assembly, infectivity, and serial protoplast passage; 2) The p20 protein is a major component of the amorphous inclusion bodies of infected cells; and 3) Novel 5'-Co-terminal RNAs in CTV infected cells were characterized. These results have considerably advanced our basic understanding of the molecular biology of CTV and CTV-dRNAs and form the platform for the future manipulation of this complicated virus. As a result of these developments, the way is now open to turn constructs of this viral plant pathogen into new tools for protecting citrus against severe CTV terms and development of virus-based expression vectors for other citrus improvement needs. In conclusion, this research program has accomplished two main interconnected missions, the collection of basic information on the molecular and biological characteristics of the virus and its associated dRNAs toward development of management strategies against severe diseases caused by the virus and building of novel research tools to improve citrus varieties. Reaching these goals will allow us to advance this project to a new phase of turning the virus from a pathogen to an ally.
APA, Harvard, Vancouver, ISO, and other styles
2

Dawson, William O., and Moshe Bar-Joseph. Creating an Ally from an Adversary: Genetic Manipulation of Citrus Tristeza. United States Department of Agriculture, January 2004. http://dx.doi.org/10.32747/2004.7586540.bard.

Full text
Abstract:
Citrus is one of the major agricultural crops common to Israel and the United States, important in terms of nutrition, foreign exchange, and employment. The economy of both citrus industries have been chronically plagued by diseases caused by Citrus tristeza virus (CTV). The short term solution until virus-resistant plants can be used is the use of mild strain cross-protection. We are custom designing "ideal" protecting viruses to immunize trees against severe isolates of CTV by purposely inoculating existing endangered trees and new plantings to be propagated as infected (protected) citrus budwood. We crossed the substantial technological hurdles necessary to accomplish this task which included developing an infectious cDNA clone which allows in vitro manipulation of the virus and methods to then infect citrus plants. We created a series of hybrids between decline-inducing and mild CTV strains, tested them in protoplasts, and are amplifying them to inoculate citrus trees for evaluation and mapping of disease determinants. We also extended this developed technology to begin engineering transient expression vectors based on CTV as tools for genetic improvement of tree crops, in this case citrus. Because of the long periods between genetic transformation and the ultimate assay of mature tree characteristics, there is a great need for an effective system that allows the expression or suppression of target genes in fruiting plants. Virus-based vectors will greatly expedite progress in citrus genetic improvement. We characterized several components of the virus that provides necessary information for designing virus-based vectors. We characterized the requirements of the 3 ’-nontranslated replication promoter and two 3 ’-ORF subgenomic (sg) mRNA controller elements. We discovered a novel type of 5’-terminal sgRNAs and characterized the cis-acting control element that also functions as a strong promoter of a 3 ’-sgRNA. We showed that the p23 gene controls negative-stranded RNA synthesis and expression of 3 ’ genes. We identified which genes are required for infection of plants, which are host range determinants, and which are not needed for plant infection. We continued the characterization of native dRNA populations and showed the presence of five different classes including class III dRNAs that consists of infectious and self-replicating molecules and class V dRNAs that contain all of the 3 ’ ORFs, along with class IV dRNAs that retain non-contiguous internal sequences. We have constructed and tested in protoplasts a series of expression vectors that will be described in this proposal.
APA, Harvard, Vancouver, ISO, and other styles
3

Gurevitz, Michael, Michael E. Adams, and Boaz Shaanan. Structural Elements and Neuropharmacological Features Involved in the Insecticidal Properties of an Alpha Scorpion Neurotoxin: A Multidisciplinary Approach. United States Department of Agriculture, August 1995. http://dx.doi.org/10.32747/1995.7573061.bard.

Full text
Abstract:
Integrated pest management in modern crop protection requires the use of chemical or biological insecticides in many instances. Nontheless, the use non-selective chemical insecticides poses risks to the environment and livestock and consequently urgent need exists for safer alternatives, which target insects more specifically. Scorpions produce anti-insect selective polypeptide toxins that are biodegradable and not toxic to wam-blooded animals. Therefore, mobilization of these substances into insect pest targets is of major interest. Moreover, clarification of the molecular basis of this selectivity may provide valuable information pertinent to their receptor sites and to the future design of peptidomimetic anti-insect specific substances. These toxins may also be important for reducing the current overuse of chamical insecticides provided they have a synergistic effect with conventional pesticides. All of these objectives were addressed in this research. A direct approach for plant protection was the mobilization of toxins into target pests using baculoviral vectors. The other approach was to develop a suitable system enabling the elucidation of the toxin bioactive site, which would enable design of insecticidal peptidomimetics. In parallel, the mode of action and synergistic effects of scorpion insecticidal toxins, were studied at the sodium channel receptor site. All the above approaches show great promise and clearly indicate that scorpion insecticidal toxins may provide powerful means in insect pest control.
APA, Harvard, Vancouver, ISO, and other styles
4

Gurevitz, Michael, Michael E. Adams, Boaz Shaanan, Oren Froy, Dalia Gordon, Daewoo Lee, and Yong Zhao. Interacting Domains of Anti-Insect Scorpion Toxins and their Sodium Channel Binding Sites: Structure, Cooperative Interactions with Agrochemicals, and Application. United States Department of Agriculture, December 2001. http://dx.doi.org/10.32747/2001.7585190.bard.

Full text
Abstract:
Integrated pest management in modern crop protection may combine chemical and biological insecticides, particularly due to the risks to the environment and livestock arising from the massive use of non-selective chemicals. Thus, there is a need for safer alternatives, which target insects more specifically. Scorpions produce anti-insect selective polypeptide toxins that are biodegradable and non-toxic to warm-blooded animals. Therefore, integration of these substances into insect pest control strategies is of major importance. Moreover, clarification of the molecular basis of this selectivity may provide valuable information pertinent to their receptor sites and to the future design of peptidomimetic anti-insect specific substances. These toxins may also be important for reducing the current overuse of chemical insecticides if they produce a synergistic effect with conventional pesticides. Based on these considerations, our major objectives were: 1) To elucidate the three-dimensional structure and toxic-site of scorpion excitatory, "depressant, and anti-insect alpha toxins. 2) To obtain an initial view to the sodium channel recognition sites of the above toxins by generating peptide decoys through a phage display system. 3) To investigate the synergism between toxins and chemical insecticides. Our approach was to develop a suitable expression system for toxin production in a recombinant form and for elucidation of toxin bioactive sites via mutagenesis. In parallel, the mode of action and synergistic effects of scorpion insecticidal toxins with pyrethroids were studied at the sodium channel level using electrophysiological methods. Objective 1 was achieved for the alpha toxin, LqhaIT Zilberberg et al., 1996, 1997; Tugarinov et al., 1997; Froy et al., 2002), and the excitatory toxin, Bj-xtrIT (Oren et al., 1998; Froy et al., 1999; unpublished data). The bioactive surface of the depressant toxin, LqhIT2, has been clarified and a crystal of the toxin is now being analyzed (unpublished). Objective 2 was not successful thus far as no phages that recognize the toxins were obtained. We therefore initiated recently an alternative approach, which is introduction of mutations into recombinant channels and creation of channel chimeras. Objective 3 was undertaken at Riverside and the results demonstrated synergism between LqhaIT or AaIT and pyrethroids (Lee et al., 2002). Furthermore, negative cross-resistance between pyrethroids and scorpion toxins (LqhaIT and AaIT) was demonstrated at the molecular level. Although our study did not yield a product, it paves the way for future design of selective pesticides by capitalizing on the natural competence of scorpion toxins to distinguish between sodium channels of insects and vertebrates. We also show that future application of anti-insect toxins may enable to decrease the amounts of chemical pesticides due to their synergism.
APA, Harvard, Vancouver, ISO, and other styles
5

Meir, Shimon, Michael S. Reid, Cai-Zhong Jiang, Amnon Lers, and Sonia Philosoph-Hadas. Molecular Studies of Postharvest Leaf and Flower Senescence. United States Department of Agriculture, January 2011. http://dx.doi.org/10.32747/2011.7592657.bard.

Full text
Abstract:
Original objectives: To understand the regulation of abscission by exploring the nature of changes of auxin-related gene expression in tomato (Lycopersicon esculatumMill) abscission zones (AZs) following organ removal, and by analyzing the function of these genes. Our specific goals were: 1) To complete the microarray analyses in tomato flower and leaf AZs, for identifying genes whose expression changes early in response to auxin depletion; 2) To examine, using virus-induced gene silencing (VIGS), the effect of silencing target genes on ethylene sensitivity and abscission competence of the leaf and flower AZs; 3) To isolate and characterize promoters from AZ-specific genes to be used in functional analysis; 4) To generate stable transgenic tomato plants with selected genes silenced with RNAi, under the control of an AZ-specific promoter, for further characterization of their abscission phenotypes. Background: Abscission, the separation of organs from the parent plant, results in postharvest quality loss in many ornamentals and other fresh produce. The process is initiated by changes in the auxin gradient across the AZ, and is triggered by ethylene. Although changes in gene expression have been correlated with the ethylene-mediated execution of abscission, there is almost no information on the initiation of the abscission process, as the AZ becomes sensitized to ethylene. The present project was focused on elucidating these early molecular regulatory events, in order to gain a better control of the abscission process for agricultural manipulations. Major conclusions, solutions, achievements: Microarray analyses, using the Affymetrix Tomato GeneChip®, revealed changes in expression, occurring early in abscission, of many genes with possible regulatory functions. These included a range of auxin- and ethylene-related transcription factors (TFs), other TFs that are transiently induced just after flower removal, and a set of novel AZ-specific genes. We also identified four different defense-related genes, including: Cysteine-type endopeptidase, α- DOX1, WIN2, and SDF2, that are newly-associated with the late stage of the abscission process. This supports the activation of different defense responses and strategies at the late abscission stages, which may enable efficient protection of the exposed tissue toward different environmental stresses. To facilitate functional studies we implemented an efficient VIGS system in tomato, and isolated two abscission-specific promoters (pTAPG1 and pTAPG4) for gene silencing in stable transformation. Using the VIGS system we could demonstrate the importance of TAPGs in abscission of tomato leaf petioles, and evaluated the importance of more than 45 genes in abscission. Among them we identified few critical genes involved in leaf and flower abscission. These included: PTRP-F1, PRP, TKN4, KNOTTED-like homeobox TF, KD1, and KNOX-like homeodomain protein genes, the silencing of which caused a striking retardation of pedicel abscission, and ERF1, ERF4, Clavata-like3 protein, Sucrose transporter protein, and IAA10 genes, the silencing of which delayed petiole abscission. The importance of PRPand KD1 genes in abscission was confirmed also by antisense–silencing using pTAPG4. Experiments testing the effects of RNAi silencing of few other genes are still in progress, The analysis of the microarray results of flower and leaf AZs allowed us to establish a clear sequence of events occurring during acquisition of tissue sensitivity to ethylene, and to confirm our hypothesis that acquisition of ethylene sensitivity in the AZ is associated with altered expression of auxin-regulated genes in both AZs. Implication, both scientific and agricultural: Our studies had provided new insights into the regulation of the abscission process, and shaded light on the molecular mechanisms that drive the acquisition of abscission competence in the AZ. We pointed out some critical genes involved in regulation of abscission, and further expanded our knowledge of auxin-ethylene cross talk during the abscission process. This permits the development of novel techniques for manipulating abscission, and thereby improving the postharvest performance of ornamentals and other crops.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography