To see the other types of publications on this topic, follow the link: Perimeter defense.

Journal articles on the topic 'Perimeter defense'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Perimeter defense.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wallace, Tom. "Optimize Perimeter Defense for Utility Security." Opflow 43, no. 5 (May 2017): 26–28. http://dx.doi.org/10.5991/opf.2017.43.0031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Andriychuk, V. M. "REGULARITIES OF CHANGES OF PERIMETER PARAMETERS OF MALE CADETS IN CONDITIONS OF TEACHING-EDUCATIONAL PROCESS." Health and Ecology Issues, no. 1 (March 28, 2017): 70–73. http://dx.doi.org/10.51523/2708-6011.2017-14-1-15.

Full text
Abstract:
Objective : to determine the features of the changes of perimeter body sizes of male cadets in the conditions of the pedagogical process at a higher educational institution of I level of accreditation. Material and methods . We have conducted longitudinal (I, II, III years of study) determination of perimeter body sizes of 87 male cadets and analyzed the features of the changes in these parameters in the conditions of the pedagogical process during a three-year period. The analysis of the indicators was conducted using «Statistica», 6.1 (StatSoft) by parametric methods of assessment. Results. Based on the obtained data we have defined the characteristic features of the annual changes of the perimeter body parameters during the three-year period of study in conditions of the pedagogical process of a civil defense college. We have determined the increase dynamics of most of the average indicators throughout the period of study at the civil defense college, except for the perimeters of the neck, pelvis and abdomen, where the decrease of the sizes has been found. Conclusions. We have revealed reliable differences when comparing the annual changes of the perimeters of the pelvis, abdomen, thorax (during a breathing pause, inhale, exhale), the shoulder, forearm, hand, thigh, upper third of the leg, the instep of the foot. The annual changes of perimeter sizes of the neck, pelvis and abdomen in the male cadets during the second year of training were bigger than during the first one. The perimeter increase parameters of the chest (during a breathing pause, inhale, exhale), shoulder, forearm, wrist, hand, hip, upper and lower third of the leg, foot, the instep of foot in the male cadets dominated when they were in the first year of study.
APA, Harvard, Vancouver, ISO, and other styles
3

Crawford, J. M., C. Portmann, X. Zhang, M. B. J. Roeffaers, and J. Clardy. "Small molecule perimeter defense in entomopathogenic bacteria." Proceedings of the National Academy of Sciences 109, no. 27 (June 18, 2012): 10821–26. http://dx.doi.org/10.1073/pnas.1201160109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Daly-Grafstein, Daniel, and Luke Bornn. "Using in-game shot trajectories to better understand defensive impact in the NBA." Journal of Sports Analytics 6, no. 4 (January 7, 2021): 235–42. http://dx.doi.org/10.3233/jsa-200400.

Full text
Abstract:
As 3-point shooting in the NBA continues to increase, the importance of perimeter defense has never been greater. Perimeter defenders are often evaluated by their ability to tightly contest shots, but how exactly does contesting a jump shot cause a decrease in expected shooting percentage, and can we use this insight to better assess perimeter defender ability? In this paper we analyze over 50,000 shot trajectories from the NBA to explain why, in terms of impact on shot trajectories, shooters tend to miss more when tightly contested. We present a variety of results derived from this shot trajectory data. Additionally, pairing trajectory data with features such as defender height, distance, and contest angle, we are able to evaluate not just perimeter defenders, but also shooters’ resilience to defensive pressure. Utilizing shot trajectories and corresponding modeled shot-make probabilities, we are able to create perimeter defensive metrics that are more accurate and less variable than traditional metrics like opponent field goal percentage.
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Kwon-il, Yeon-seung Ryu, and Jee-won Kim. "Defense Industrial Community Cloud Using Software Defined Perimeter." Korean Journal of Industry Security 11, no. 1 (April 30, 2021): 459–76. http://dx.doi.org/10.33388/kais.2021.11.1.459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, S., and Q. Song. "Perimeter-based defense against high bandwidth DDoS attacks." IEEE Transactions on Parallel and Distributed Systems 16, no. 6 (June 2005): 526–37. http://dx.doi.org/10.1109/tpds.2005.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shishika, Daigo, James Paulos, and Vijay Kumar. "Cooperative Team Strategies for Multi-Player Perimeter-Defense Games." IEEE Robotics and Automation Letters 5, no. 2 (April 2020): 2738–45. http://dx.doi.org/10.1109/lra.2020.2972818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Edwards, Paul M., and Uzal W. Ent. "Fighting on the Brink: Defense of the Pusan Perimeter." Journal of Military History 62, no. 4 (October 1998): 960. http://dx.doi.org/10.2307/120234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Qassim, Mohammed A., and Emad H. Al-Hemiary. "Network Perimeter Defenses Using Open-Source Software." Iraqi Journal of Information & Communications Technology 1, no. 2 (July 27, 2018): 41–51. http://dx.doi.org/10.31987/ijict.1.2.22.

Full text
Abstract:
network security role grew exponentially in the late several years, especially with the notable amount of attacks that target all types of organizations and services. Thus, the need for more research on efficient and open source perimeter defense system and packet analysis and are rising. Intrusion detection system can afford significate role in protecting networks by detecting and reporting malicious behaviors. In this paper, an open source-based model was introduced that can provide security monitoring and logging, intrusion detection and prevention, firewall services and packet inspection and analysis. The proposed design provide high visibility and add a security layer to networks and data centers with many use cases such as: network forensics, security analysis, and production deployment. All the components and software were deployed with virtualization and container-based technology to get the benefits of these technologies like cost effective, cloud applicable, and flexible deployment across many hardware requirements. The results show that the proposed design presents detection capability of the attacks and visualization of the network traffic with security controls. This work also aims to accomplishes the OWASP A10:2017 which focus on insufficient logging and monitoring.
APA, Harvard, Vancouver, ISO, and other styles
10

Steingartner, William, Darko Galinec, and Andrija Kozina. "Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model." Symmetry 13, no. 4 (April 3, 2021): 597. http://dx.doi.org/10.3390/sym13040597.

Full text
Abstract:
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods. Security programs primarily focus on prevention-based strategies aimed at stopping attackers from getting into the network. These programs attempt to use hardened perimeters and endpoint defenses by recognizing and blocking malicious activities to detect and stop attackers before they can get in. Most organizations implement such a strategy by fortifying their networks with defense-in-depth through layered prevention controls. Detection controls are usually placed to augment prevention at the perimeter, and not as consistently deployed for in-network threat detection. This architecture leaves detection gaps that are difficult to fill with existing security controls not specifically designed for that role. Rather than using prevention alone, a strategy that attackers have consistently succeeded against, defenders are adopting a more balanced strategy that includes detection and response. Most organizations deploy an intrusion detection system (IDS) or next-generation firewall that picks up known attacks or attempts to pattern match for identification. Other detection tools use monitoring, traffic, or behavioral analysis. These reactive defenses are designed to detect once they are attacked yet often fail. They also have some limitations because they are not designed to catch credential harvesting or attacks based on what appears as authorized access. They are also often seen as complex and prone to false positives, adding to analyst alert fatigue. The security industry has focused recent innovation on finding more accurate ways to recognize malicious activity with technologies such as user and entity behavioral analytics (UEBA), big data, artificial intelligence (AI), and deception.
APA, Harvard, Vancouver, ISO, and other styles
11

NOPONEN, HELZI, ANN MARKUSEN, KARL DRIESSEN, and YANG SHAO. "Is There a Trade and Defense Perimeter? The Regional Impacts of Trade and Defense Spending in the United States, 1978-1986." Growth and Change 27, no. 4 (October 1996): 405–33. http://dx.doi.org/10.1111/j.1468-2257.1996.tb00975.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Yungblud, Valerii T., and Denis A. Sadakov. "Inclusion of the Republic of Korea in the US Defense Perimeter after the Korean War." Vestnik of Saint Petersburg University. History 66, no. 1 (2021): 226–44. http://dx.doi.org/10.21638/11701/spbu02.2021.114.

Full text
Abstract:
The article describes the formation of a military and political alliance of the United States and the Republic of Korea in 1954. The article aims at defining the motives and priorities of the parties in the American-Korean negotiations held from June to November 1954 and at determining which factors influenced the negotiation outcome. On the whole, the significance of conflict elements in the US-South Korea relations increased in 1953–1954. While the Americans’ goal was to stabilize the situation on the peninsula and create a strong security system in northeast Asia, the priority of the Koreans and their leader Syngman Rhee, the President of the South Korea, was to restore the country’s unity. These priorities were not in line after the failure of the Korean talks at the 1954 Geneva Conference. Being totally dependent on the Americans in the military and economic spheres, Rhee was forced to comply with the armistice and cooperate in the implementation of the US initiatives regarding reunification of the country, which had very little chance of success. In exchange, he expected the US-Korea Mutual Defense Treaty to come into force and demanded the implementation of economic and military aid programs. Although the USA made concessions regarding all the points, they managed to create sufficient counterbalance to restrain Syngman Rhee: they established control over the South Korean military forces; assigned broad authority to the Coordinator of aid programs; had considerable armed forces on the territory of Korea. The Republic of Korea was included in the US regional security system on the terms of the Americans.
APA, Harvard, Vancouver, ISO, and other styles
13

Tang, Zhi Jie, Ping Long Liu, Qian Luo, and Zhi Feng Ye. "Main Control System Design for Balanced Tension-Type Electronic Fence." Applied Mechanics and Materials 687-691 (November 2014): 349–52. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.349.

Full text
Abstract:
Since the 1990s, with the defense, deterrence, alarm in one of the electronic fence system is gradually being widely developed in the field of public safety. The composition and control system design of a balanced tension electronic fence alarm system is described in this paper. This system has a balanced without fatigue characteristics, adapting to a variety of complex terrain environment and leaving no guard dead. It can be widely applicable to all establishments that have the perimeter guard need.
APA, Harvard, Vancouver, ISO, and other styles
14

Mohamed, Osama, and Rania Khattab. "Assessment of Progressive Collapse Resistance of Steel Structures with Moment Resisting Frames." Buildings 9, no. 1 (January 9, 2019): 19. http://dx.doi.org/10.3390/buildings9010019.

Full text
Abstract:
This paper evaluates the practice of using moment connections in the perimeter of the structural system and shear connections within the interior connections of the three-dimensional structural system from the perspective of resistance to progressive collapse. The enhanced resistance to progressive collapse associated with using moment resisting connections at the perimeter as well as internal to the three-dimensional system is assessed. Progressive collapse occurrence and system resistance are determined using the alternate path method which presumes a primary load carrying-member is notionally removed. The paper compares the structural response determined using linear elastic, non-linear elastic and non-linear dynamic analyses. Linear and non-linear static analyses are found to be incapable of capturing the response pursuant to the loss of the primary load carrying member. The analysis procedures used in this study followed (for the most part) the United States Department of Defense Guide for Progressive Collapse Resistant Design of Structures.
APA, Harvard, Vancouver, ISO, and other styles
15

Li, Xianfeng, Sen Xu, and Xiaopeng Hua. "Pattern Recognition of Grating Perimeter Intrusion Behavior in Deep Learning Method." Symmetry 13, no. 1 (January 6, 2021): 87. http://dx.doi.org/10.3390/sym13010087.

Full text
Abstract:
An intrusion behavior recognition method based on deep learning is proposed in this paper in order to improve the recognition accuracy of raster perimeter intrusion behavior. The Mach–Zehnder fiber optic interferometer was used to collect the external vibration signal sensing unit, capture the external vibration signal, use the cross-correlation characteristic method to obtain the minimum frame length of the fiber vibration signal, and preprocess the intrusion signal according to the signal strength. The intrusion signals were superimposed and several sections of signals were intercepted by fixed window length; the spectrum information is obtained by Fourier transform of the intercepted stationary signals. The convolution neural network was introduced into the pattern recognition of the intrusion signals in the optical fiber perimeter defense zone, and the different characteristics of the intrusion signals were extracted, so as to realize the accurate identification of different intrusion signals. Experimental results showed that this method was highly sensitive to intrusion events, could effectively reduce the false alarm rate of intrusion signals, and could improve the accuracy and efficiency of intrusion signal recognition.
APA, Harvard, Vancouver, ISO, and other styles
16

Mol, Arjan, Ton Van der Plas, Robert McCall, and Merel Kroeders. "PREDICTING THE RESHAPING OF TEMPORARILY EXPOSED BUNDS WITH XBEACH-G." Coastal Engineering Proceedings, no. 36 (December 30, 2018): 31. http://dx.doi.org/10.9753/icce.v36.sediment.31.

Full text
Abstract:
During coastal construction works, damages often occur to temporary constructions consisting of fine and often wide graded rock material due to exposure to waves. Examples of vulnerable structures are the bunds that are constructed to serve as the core for a breakwater before placement of the filter and armour layers, or as temporary defense during reclamation works. Such structures – mostly built in bulk – are temporarily exposed to wave conditions, and will reshape depending on the duration of exposure and the prevailing hydraulic conditions. For the exposed breakwater core, it is important to have an idea on how much of the placed material will be moved outside the perimeter, and thus how much material needs to be rehandled before the cover layers can be constructed. For temporary defense works, it is important to know how much material needs to be placed initially in order to offer sufficient protection for a certain period. For both cases, an accurate prediction of the reshaping of such structures is necessary.
APA, Harvard, Vancouver, ISO, and other styles
17

Golovan, V., S. Tarasenko, O. Budur, K. Dekhtyarenko, and R. Bubenshchikov. "SUBSTANTIATION OF PRINCIPLES OF STRUCTURE AND EVALUATION OF EFFICIENCY OF PERIMETER SYSTEMS OF PROTECTION OF ARSENALS, BASES AND WAREHOUSES." Collection of scientific works of Odesa Military Academy 1, no. 14 (January 25, 2021): 112–22. http://dx.doi.org/10.37129/2313-7509.2020.14.1.112-122.

Full text
Abstract:
The current state of organization of protection of missile and ammunition storage facilities shows the imperfection of the installed perimeter alarm systems and, as a result, an ineffective response mechanism in case of emergencies. Events of recent years, namely explosions at arsenals in Balakleya, Kharkiv region and Kalynivka, Vinnytsia region, field depots near Svatove, Luhansk region, Maloyanisol, Donetsk region, and Ichnia, Chernihiv region, point to an imperfect system of protection and defense of storage sites. There are systemic omissions in the organization of systems for detecting the penetration of sabotage groups into the territory of arsenals, bases and warehouses, which showed training with the involvement of Special Forces in August, September 2018. These factors are directly related to the lack of funding for programs to ensure the safe storage of missiles and ammunition in storage, and, as a result, lead to emergencies. In all cases, versions of the emergencies that caused the explosions were considered. The main versions include arson, negligence and sabotage, with the main version being sabotage. It should be noted that the development of various protection systems is based on the principle of creating closed, consistent boundaries that begin outside the controlled area and are concentrically tightened to particularly important premises. At each border, threats of security breaches must be identified in a minimum amount of time. The perimeter is the first and most responsible line of protection. The main task of protecting the perimeter of the territory is to detect the violator during the approach and to overcome the perimeter line. The principle of prevention is the most important criterion of the security system of the critical infrastructure, which makes it possible to obtain information about the incident before the intruder, thus gaining additional time to respond and prevent the threat. Sometimes video surveillance systems (security television) are used to protect the border №1 – as the most common solution among technical means of protection. But it is worth remembering – video surveillance often does not protect against illegal actions. Incidents recorded by video cameras are investigated much later after they are committed. Of course, if the video surveillance system is operational, the incident is serviced and the incident is recorded in the archives of the video surveillance system. But, according to statistics, this is not always the case. In this case, regardless of the budget of the solution and the technology used, it is often the «human factor» eliminates all the benefits and reduces the effectiveness of the security system. Perimeter security systems have a number of qualitative features that distinguish them from other security systems. Thus, perimeter security systems differ in the principles of operation, design and configuration options. At the same time, most perimeter systems are used to protect open areas in the face of continuous exposure to adverse natural factors. With a variety of technologies, methods of implementation, features of design, installation and maintenance of perimeter security systems, the rationale for the choice should be based on the criteria for selecting optimal solutions. As Yu. Tarasov notes in his work, «the choice of the optimal option for building a perimeter security system is based on a comparative analysis of their main characteristics, primarily such as efficiency and cost». Keywords: alarm system, security system, arsenal, base, warehouse, perimeter.
APA, Harvard, Vancouver, ISO, and other styles
18

Dulanovic, Nenad, Dane Hinic, and Dejan Simic. "An intrusion prevention system as a proactive security mechanism in network infrastructure." Yugoslav Journal of Operations Research 18, no. 1 (2008): 109–22. http://dx.doi.org/10.2298/yjor0801109d.

Full text
Abstract:
A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS), proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS) are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.
APA, Harvard, Vancouver, ISO, and other styles
19

Dyda, Iryna. "UKRAINIAN URBAN TRADITIONS: RELEVANCE IN THE CONDITIONS OF MODERN CHALLENGES." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Arhìtektura 4, no. 2 (December 22, 2022): 79–86. http://dx.doi.org/10.23939/sa2022.02.079.

Full text
Abstract:
The article considers the importance of preserving the architectural environment's national identity in terms of its defense’s effectiveness in modern military operations. A brief overview of the traditional urban characteristics of Ukrainian cities, which in the past ensured their effective defense, was made: the way the buildings are located in the landscape, the planning structure, the height of the buildings, and the density of their location on the territory. The local landscape was actively involved in the architectural organization of the environment, which ultimately determined the unique plan structure for each city and the individual routing of the street network. If necessary, elements of the local landscape were supplemented with artificial systems and used for defense. A significant perimeter of cities with a predominance of traditional manor buildings created difficulties for the organization of the enemy encirclement. Internal fortifications around individual structural elements of the city contributed to long-term defense. To protect large areas, a system of tree-earth ramparts was artificially created. In the past, these measures helped to defend Ukrainian cities effectively. The events of the Russian-Ukrainian war, among other things, revealed that modern weapons, with all their capabilities, could not always overcome landscape obstacles, in particular, ancient defensive walls and swampy areas north of Kyiv; cities that preserved the traditional character of the architectural environment defended more effectively; flat regions of cities, compared to those located on rugged terrain, found themselves in a more threatening situation, etc. All these facts will obviously be subject to detailed analysis in the future. Still, it is already possible to conclude that the preservation of traditional identity in the conditions of a modern architectural environment is essential not only for the self-identification of residents or for the formation of the attractiveness of urban space but also for practical reasons of organizing the effective defense. After all, in the process of long-term formation of the architectural space’s traditional features, the defensive potential of the local landscape many times passed a practical test of its effectiveness by military operations in different historical periods.
APA, Harvard, Vancouver, ISO, and other styles
20

Bhattacharya, Deepak. "Spiritualism Seeks Sword for Self Defense Konark, World Heritage Site: Hieroglyphics – Katha." Historical Journal 14, no. 1 (March 7, 2023): 21–37. http://dx.doi.org/10.3126/hj.v14i1.52956.

Full text
Abstract:
Hindu adhyatmais ‘consciousness about the soul, its perimeter (time & space), purpose, practices & prognosis’. It is not an ism (dogma). It is a way of life. The Hindu scholar is termed a ‘Brahmana’. Pan globally and historically, scholars are known as incapable of physical combat & self-defense; require extra mural physical protection. Post the fall of Constantinople (c. 1453 A.D.) to the Jihadists, Islam (peaceful) went murderously viral (The Thesis), and became Muslim (sequestering).The Hindus (riparian beings) in sub-continent India were slaughtered; homesteads, women & livelihoods were taken away; worship & ritual places were done to dust or converted. Faced with barbarians, an existential crisis had arisen out of such historical processes. The docile\timid (kafir) spiritual Brahmans (scholar) had then opted for the mace, muscle, sword, and shield (Anti-Thesis). The ecclesiastical system was maintained side-by-side (Synthesis). The UNESCO world heritage site of Konarak (c.13th A.D., Odisa, India,) has artifacts informing the beholder via hieroglyphics that the then state had played such role quite tellingly, took pride in the might of arms, pomp, in proclaiming defense at of the invader; protection of the erudite; and the gamp seeker. Sanatan survived. Data & discussions about any such military counter have remained due. First time. Nascent attempt. Theoretical history about such complex process paths. Non-revisionist.
APA, Harvard, Vancouver, ISO, and other styles
21

Huang, Yun, Ya Jie Zhu, and Heng Hui Lian. "Research and Realization of Apron Protection System Based on Internet of Things." Advanced Materials Research 912-914 (April 2014): 1339–44. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1339.

Full text
Abstract:
The airport perimeter intrusion prevention system is the first defending line of airport security system, and its position is very important. Based on the correlation of air defense, anti-technology and anti-intrinsic, paper compares the advantage and the disadvantage of domestic airport in the selection of the electronic fence pattern. Through technical analysis of the use of acceleration transducer in networking technology for the prevention of airport apron, combined with the actual situation of the Hangzhou Xiaoshan International Airport in airport apron prevention, the ability of electronic fence used in tracking protection and discrimination for location has been improved through system optimization, expanding the application of the electronic fence at the airport apron prevention system. The paper also prospects the application future for internet of things used in the apron protection system
APA, Harvard, Vancouver, ISO, and other styles
22

Lu, Hainan, Ningning Wang, Nian Fang, and Lutang Wang. "Signal recognition method based on Mel frequency cepstral coefficients and fast dynamic time warping for optical fiber perimeter defense systems." Applied Optics 61, no. 7 (March 1, 2022): 1758. http://dx.doi.org/10.1364/ao.448754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Shvaiba, D. N. "System for Ensuring Social and Economic Security of Industrial Sector." Science & Technique 18, no. 1 (February 12, 2019): 70–74. http://dx.doi.org/10.21122/2227-1031-2019-18-1-70-74.

Full text
Abstract:
Methodological basis for formation of system to ensure social and economic security make provisions for specific features of industrial sector. It is proposed to reflect specificity of its protection with the help of methodological and operational fundamentals. Methodological fundamentals have been formulated on the basis of functional specificity for ensuring social and economic security of the industrial sector which was determined with the help of research process. They create a perimeter for ensuring social and economic security which is formed by expectations of the society from defense system of the country’s industrial sector. Operational fundamentals complement functional specificity of the system for ensuring social and economic security through formation of a specific institutional framework. The framework includes the following components: modeling presupposing multivariance in escalation of adverse events in the industrial sector and methods for its evaluation; instrumental assistance which takes into account necessity for instrumental diversity in order to implement defense functions in changing criteria (environment of industrial sector functioning, its structure and state of inter-element relations); functional consistency as a requirement to balance targets for ensuring social and economic security of the industrial sector with objectives and values pertaining to formation of the country’s industrial sector which are fixed in program documents of the state.
APA, Harvard, Vancouver, ISO, and other styles
24

Deidda, M., C. Musa, and G. Vacca. "A GIS OF SARDINIA'S COASTAL DEFENSE SYSTEM (XVI – XVIII CENTURY)." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-4/W7 (June 30, 2015): 17–22. http://dx.doi.org/10.5194/isprsarchives-xl-4-w7-17-2015.

Full text
Abstract:
The use of GIS as a tool for archival, analysis and representation of geographic information has become significantly popular in many scientific fields that are directly concerned with the "territory" as their object of study. The field of application of GIS, however, has expanded also in other areas, such as those related to humanities and architecture, in which the territory is studied in an "indirect" mode because it constitutes a kind of substrate on which to develop a specific spatial analysis for particular purposes. Among these areas are to be included certainly archeology and restoration, fields in which the GIS has become a useful tool for historical studies. In this work we present a GIS developed for the study of the historical and territorial coastal defense system of Sardinia (16<sup>th</sup> – 18<sup>th</sup> century), in order to respond to the need to store, analyze and efficiently manage the information regarding cultural heritage and landscape heritage such as that consisting of the coastal defensive towers of Sardinia. This defensive system, in fact, was composed by over 100 towers positioned around the entire coastal perimeter of Sardinia, of which more than 90 still exist today. Their position was planned on the basis of the following criteria:<br> - Warning the neighboring towers about the sighting of enemy ships<br> - Protecting coasts located near the towns<br> - Monitoring the water sources near the coast<br> - Allowing for the full visibility of the coasts of any morphology<br> With this study we also verified, through the use of high resolution and high accuracy DTM (LiDAR) and the topographic databases, whether the positioning criteria specified in the design of the system were respected and effective.
APA, Harvard, Vancouver, ISO, and other styles
25

Soroushian, Siavash, Esmaeel Rahmanishamsi, Ki P. Ryu, Manos Maragakis, and Andrei M. Reinhorn. "Experimental Fragility Analysis of Suspension Ceiling Systems." Earthquake Spectra 32, no. 2 (May 2016): 881–908. http://dx.doi.org/10.1193/071514eqs109m.

Full text
Abstract:
The seismic response of suspended ceiling systems that were shaken at the University at Buffalo; University of Nevada, Reno; and E-Defense facilities is critically assessed in this paper. After presenting a brief description of each experiment, the most repetitive damage observations in all experiments are discussed. Fragility curves are developed for ceiling perimeter connectors, supporting elements, and overall performance of ceiling systems by using 346 combinations of ceiling configurations and shake intensities. The key findings of these curves are the insufficient support of the 7/8-in. wall angles, unconservative code design capacity of connections for supporting elements, and early damage of ceiling systems because of ceiling-piping interaction. Acceleration amplification factors of ceiling systems with respect to suspending floor are computed. The amplification factors prescribed by the code were found to be unconservative due to the pounding of panels to the ceiling grids and deck vibration in a vertical direction.
APA, Harvard, Vancouver, ISO, and other styles
26

Rodriguez, Annette R., Jieh-Juen Yu, Christopher Navara, James P. Chambers, M. Neal Guentzel, and Bernard P. Arulanandam. "Contribution of FcɛRI-associated vesicles to mast cell–macrophage communication following Francisella tularensis infection." Innate Immunity 22, no. 7 (August 22, 2016): 567–74. http://dx.doi.org/10.1177/1753425916663639.

Full text
Abstract:
Understanding innate immune intercellular communication following microbial infection remains a key biological issue. Using live cell imaging, we demonstrate that mast cells actively extend cellular projections to sample the macrophage periphery during Francisella tularensis LVS infection. Mast cell MHCIIhi expression was elevated from less than 1% to 13% during LVS infection. Direct contact during co-culture with macrophages further increased mast cell MHCIIhi expression to approximately 87%. Confocal analyses of the cellular perimeter revealed mast cell caspase-1 was localized in close proximity with FcɛRI in uninfected mast cells, and repositioned to clustered regions upon LVS infection. Importantly, mast cell FcɛRI-encompassed vesicles are transferred to macrophages by trogocytosis, and macrophage caspase-1 expression is further up-regulated upon direct contact with mast cells. Our study reveals direct cellular interactions between innate cells that may impact the function of caspase-1, a known sensor of microbial danger and requirement for innate defense against many pathogenic microbes including F. tularensis.
APA, Harvard, Vancouver, ISO, and other styles
27

Madni, Azad, and Carla Madni. "Architectural Framework for Exploring Adaptive Human-Machine Teaming Options in Simulated Dynamic Environments." Systems 6, no. 4 (December 13, 2018): 44. http://dx.doi.org/10.3390/systems6040044.

Full text
Abstract:
With the growing complexity of environments in which systems are expected to operate, adaptive human-machine teaming (HMT) has emerged as a key area of research. While human teams have been extensively studied in the psychological and training literature, and agent teams have been investigated in the artificial intelligence research community, the commitment to research in HMT is relatively new and fueled by several technological advances such as electrophysiological sensors, cognitive modeling, machine learning, and adaptive/adaptable human-machine systems. This paper presents an architectural framework for investigating HMT options in various simulated operational contexts including responding to systemic failures and external disruptions. The paper specifically discusses new and novel roles for machines made possible by new technology and offers key insights into adaptive human-machine teams. Landed aircraft perimeter security is used as an illustrative example of an adaptive cyber-physical-human system (CPHS). This example is used to illuminate the use of the HMT framework in identifying the different human and machine roles involved in this scenario. The framework is domain-independent and can be applied to both defense and civilian adaptive HMT. The paper concludes with recommendations for advancing the state-of-the-art in HMT.
APA, Harvard, Vancouver, ISO, and other styles
28

Sharma, Vishal, Kyungroul Lee, Soonhyun Kwon, Jiyoon Kim, Hyungjoon Park, Kangbin Yim, and Sun-Young Lee. "A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT." Security and Communication Networks 2017 (2017): 1–24. http://dx.doi.org/10.1155/2017/4749085.

Full text
Abstract:
“Internet of Things” (IoT) bridges the communication barrier between the computing entities by forming a network between them. With a common solution for control and management of IoT devices, these networks are prone to all types of computing threats. Such networks may experience threats which are launched by exploitation of vulnerabilities that are left unhandled during the testing phases. These are often termed as “zero-day” vulnerabilities, and their conversion into a network attack is named as “zero-day” attack. These attacks can affect the IoT devices by exploiting the defense perimeter of the network. The existing solutions are capable of detecting such attacks but do not facilitate communication, which affects the performance of the network. In this paper, a consensus framework is proposed for mitigation of zero-day attacks in IoT networks. The proposed approach uses context behavior of IoT devices as a detection mechanism followed by alert message protocol and critical data sharing protocol for reliable communication during attack mitigation. The numerical analysis suggests that the proposed approach can serve the purpose of detection and elimination of zero-day attacks in IoT network without compromising its performance.
APA, Harvard, Vancouver, ISO, and other styles
29

Ahn, Ezekiel, Jacob Botkin, Vishnutej Ellur, Yoonjung Lee, Kabita Poudel, Louis K. Prom, and Clint Magill. "Genome-Wide Association Study of Seed Morphology Traits in Senegalese Sorghum Cultivars." Plants 12, no. 12 (June 16, 2023): 2344. http://dx.doi.org/10.3390/plants12122344.

Full text
Abstract:
Sorghum is considered the fifth most important crop in the world. Despite the potential value of Senegalese germplasm for various traits, such as resistance to fungal diseases, there is limited information on the study of sorghum seed morphology. In this study, 162 Senegalese germplasms were evaluated for seed area size, length, width, length-to-width ratio, perimeter, circularity, the distance between the intersection of length & width (IS) and center of gravity (CG), and seed darkness and brightness by scanning and analyzing morphology-related traits with SmartGrain software at the USDA-ARS Plant Science Research Unit. Correlations between seed morphology-related traits and traits associated with anthracnose and head smut resistance were analyzed. Lastly, genome-wide association studies were performed on phenotypic data collected from over 16,000 seeds and 193,727 publicly available single nucleotide polymorphisms (SNPs). Several significant SNPs were found and mapped to the reference sorghum genome to uncover multiple candidate genes potentially associated with seed morphology. The results indicate clear correlations among seed morphology-related traits and potential associations between seed morphology and the defense response of sorghum. GWAS analysis listed candidate genes associated with seed morphologies that can be used for sorghum breeding in the future.
APA, Harvard, Vancouver, ISO, and other styles
30

Carpenter, John E., Amy C. Clayton, Kevin C. Halling, Daniel J. Bonthius, Erin M. Buckingham, Wallen Jackson, Steven M. Dotzler, J. Patrick Card, Lynn W. Enquist, and Charles Grose. "Defensive Perimeter in the Central Nervous System: Predominance of Astrocytes and Astrogliosis during Recovery from Varicella-Zoster Virus Encephalitis." Journal of Virology 90, no. 1 (October 21, 2015): 379–91. http://dx.doi.org/10.1128/jvi.02389-15.

Full text
Abstract:
ABSTRACTVaricella-zoster virus (VZV) is a highly neurotropic virus that can cause infections in both the peripheral nervous system and the central nervous system. Several studies of VZV reactivation in the peripheral nervous system (herpes zoster) have been published, while exceedingly few investigations have been carried out in a human brain. Notably, there is no animal model for VZV infection of the central nervous system. In this report, we characterized the cellular environment in the temporal lobe of a human subject who recovered from focal VZV encephalitis. The approach included not only VZV DNA/RNA analyses but also a delineation of infected cell types (neurons, microglia, oligodendrocytes, and astrocytes). The average VZV genome copy number per cell was 5. Several VZV regulatory and structural gene transcripts and products were detected. When colocalization studies were performed to determine which cell types harbored the viral proteins, the majority of infected cells were astrocytes, including aggregates of astrocytes. Evidence of syncytium formation within the aggregates included the continuity of cytoplasm positive for the VZV glycoprotein H (gH) fusion-complex protein within a cellular profile with as many as 80 distinct nuclei. As with other causes of brain injury, these results suggested that astrocytes likely formed a defensive perimeter around foci of VZV infection (astrogliosis). Because of the rarity of brain samples from living humans with VZV encephalitis, we compared our VZV results with those found in a rat encephalitis model following infection with the closely related pseudorabies virus and observed similar perimeters of gliosis.IMPORTANCEInvestigations of VZV-infected human brain from living immunocompetent human subjects are exceedingly rare. Therefore, much of our knowledge of VZV neuropathogenesis is gained from studies of VZV-infected brains obtained at autopsy from immunocompromised patients. These are not optimal samples with which to investigate a response by a human host to VZV infection. In this report, we examined both flash-frozen and paraffin-embedded formalin-fixed brain tissue of an otherwise healthy young male with focal VZV encephalitis, most likely acquired from VZV reactivation in the trigeminal ganglion. Of note, the cellular response to VZV infection mimicked the response to other causes of trauma to the brain, namely, an ingress of astrocytes and astrogliosis around an infectious focus. Many of the astrocytes themselves were infected; astrocytes aggregated in clusters. We postulate that astrogliosis represents a successful defense mechanism by an immunocompetent human host to eliminate VZV reactivation within neurons.
APA, Harvard, Vancouver, ISO, and other styles
31

Tan, Choon Seng, Douglas L. Van Bossuyt, and Britta Hale. "System Analysis of Counter-Unmanned Aerial Systems Kill Chain in an Operational Environment." Systems 9, no. 4 (November 3, 2021): 79. http://dx.doi.org/10.3390/systems9040079.

Full text
Abstract:
The proliferation of Unmanned Aerial System (UAS) capabilities in the commercial sector is posing potentially significant threats to the traditional perimeter defense of civilian and military facilities. Commercial Off-The-Shelf (COTS) UAS are small, cheap, and come with multiple types of functions which have growing interest among hobbyists. This has prompted the need for facility commanders to have a methodology to conduct quick evaluation and analysis of the facility and the existing Counter-Unmanned Aerial System (CUAS)’s effectiveness. This research proposes a methodology that follows a systems engineering perspective to provide a step-by-step process in conducting evaluation and analysis by employing Model-Based Systems Engineering (MBSE) tools to understand the CUAS’s effectiveness and limitations. The methodology analyzes the CUAS’s operating environment and effects of the dominant factors and impacts that CUAS may pose to other stakeholders (e.g., adjacent allied forces, civilians, etc.) within the area of operation. We then identify configuration candidates for optimizing the CUAS’s performance to meet the requirements of the stakeholders. A case study of a hypothetical airport with existing CUAS is presented to demonstrate the usability of the methodology, explore the candidates, and justify the implementation of a candidate that fits the facility and the stakeholders’ requirements.
APA, Harvard, Vancouver, ISO, and other styles
32

Alconini, Sonia. "The Southeastern Inka Frontier against the Chiriguanos: Structure and Dynamics of the Inka Imperial Borderlands." Latin American Antiquity 15, no. 4 (December 2004): 389–418. http://dx.doi.org/10.2307/4141585.

Full text
Abstract:
Abstract Recent research on the Inka has documented the strategies and effects of imperial administration at a provincial and household level. Less is known, however, about the structure and dynamics of the Inka frontier and its impact on local and economic processes. The southeastern Inka frontier—according to ethnohistoric record—was the setting for conflict between the Inkas and the Guaraní-speaking Chiriguano groups from the Chaco piedmonts and Amazonian lowlands. In the context of two competing frontier models, one military (a hardened perimeter or in-depth defense) and one cultural (with wide socioeconomic processes), this article evaluates the nature of the southeastern Inka frontier and its effects on local socioeconomic dynamics. Archaeological and ethnohistorical research at Oroncota and Cuzcotuyo, two Inka centers of this frontier, suggest an alternative in the form of a “soft military frontier” formed by outposts and imperial centers disembedded from local socioeconomic processes. While architecture reveals high levels of investment, settlement data, storage capability, and the distribution of Inka imperial materials all suggest a minimal involvement in local socioeconomic processes. The results are relevant to understanding Inka frontier strategies and provide a case study of frontier interaction between a highly organized prehistoric state and tribal populations.
APA, Harvard, Vancouver, ISO, and other styles
33

Ozhiganova, Marina, and Emil Kurtametov. "Using Neural Networks to Protect Web Applications." NBI Technologies, no. 2 (December 2020): 16–20. http://dx.doi.org/10.15688/nbit.jvolsu.2020.2.3.

Full text
Abstract:
Security of network systems has become a necessity, as more and more important information is stored and used online. The spread of web applications opens up new attack vectors. Traditional security mechanisms, such as firewalls, are not designed to protect web applications and therefore do not provide adequate protection. Current attacks cannot be prevented only by blocking ports 80 (HTTP) and 443 (HTTPS). Preventative measures (such as web application firewall rules) are not always possible. Signature methods for detection are always behind the actual event. Protocol-enforced network firewalls usually provide the first line of defense, delaying most major attacks on the network perimeter. They mainly work on the network, session, and transport layers of the reference network model (OSI). Developers have significantly expanded the capabilities of network firewalls to control the integrity of a wide range of top-level protocols, such as DNS, FTP, HTTP, SMTP, and TFTP. Standard firewalls can help restrict or allow access to network ports. Although application proxy firewalls exist, they cannot understand the specific content of all web applications run by an enterprise. The purpose of this article is to study the features of using machine learning in web application protection. Methods of web application security and learning neural networks were studied. The result of this work is a theoretical overview of the neural network security of a web application.
APA, Harvard, Vancouver, ISO, and other styles
34

Kriytchenko, A. A. "THE VARIANT OF SYSTEMATIZATION OF THE HILL-FORTS OF SCYTHIAN AGE OF DNIEPER-DON FOREST-STEPPE INTERFLUVE." Archaeology and Early History of Ukraine 31, no. 2 (March 25, 2019): 76–82. http://dx.doi.org/10.37445/adiu.2019.02.05.

Full text
Abstract:
The article is devoted to the development of a typology of fortified settlements of the Dnieper-Don forest-steppe interfluves of the Scythian period. The formation and development of the fortification in that region was influenced by the economic opportunities of the local population, relations with neighboring tribes and among themselves, under special natural-geographical conditions. The presented systematization of the hillforts proceeds from the understanding of the principles of the construction of their defense. Based on which, we noticed the following possible pattern of systematization of fortified settlements. Type I is fortified settlements with a single-row system without additional protective pre-walls, regardless of whether the fortification is traced along the entire perimeter or only on the front side. Type II — single-row settlements with additional reinforcement on the front side. Type ІІІ — settlements with a single-row system of fortifications, having additional protection from a combination of non-residential frontiers, complicating the approaches to the entrance to the village site and creating the possibility of leading flanked fire on the attack. Type IV — monuments protected (often on the front side) by a multi-row system of fortifications. Type V — settlements with a pronounced main courtyard and a large economic frontier. By the VI type, we attributed the Belsk hillfort due to its features.
APA, Harvard, Vancouver, ISO, and other styles
35

Karki, Sonali, and Dr Kiran V. "Performance Comparison of SSH Libraries." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 18, 2021): 868–73. http://dx.doi.org/10.51201/jusst/21/05357.

Full text
Abstract:
The business industry is evolving. Enterprises have begun a digital transformation path, adopting innovative technologies that enable them to move quickly and change how they cooperate, lowering costs and improving productivity. However, as a result of these technologies, the conventional perimeter has evaporated, and identification has become the new line of defense. New security concerns necessitate modern security measures. Passwords are no longer appropriate for authenticating privileged access to mission-critical assets. Passwords are notorious for being insecure, causing weariness, and giving the user a false sense of security. Enterprises must use password-less solutions, which is where SSH key-based authentication comes in. The Python language’s numerous applications are the consequence of a mixture of traits that offer this language advantage over others. Some of the advantages of programming with Python are as follows: To enable easy communication between Python and other systems, Python Package Index (PyPI) is used. The package consists of a variety of modules developed by third-party developers. It also has the benefit of being an Open Source and Community Development language, as well as having substantial Support Libraries. There are multiple SSH libraries in python and this paper focuses on each of their pros and cons as well as the time it has taken for each of them to perform.
APA, Harvard, Vancouver, ISO, and other styles
36

Vlasov, N. V. "The Contemporary Chinese Policy in Southeast Asia." MGIMO Review of International Relations, no. 3(42) (June 28, 2015): 60–67. http://dx.doi.org/10.24833/2071-8160-2015-3-42-60-67.

Full text
Abstract:
Although the PRC has been gradually turning into a genuinely global power recently, her regional interests particularly in SEA are not shrinking. Developing relations with ASEAN in general and its member states in particular is still among the key priorities of the Chinese foreign policy. This is motivated by the interest to ensure safe and controlled buffer along China's border perimeter - "belt of peace, stability and common prosperity". At present, Chinese standing in SEA is firm. Sino-ASEAN relations are based upon mutual pragmatism. The reason for that to a great extent is a tangible trade and economic and investment cooperation. Bilateral relations in political and security as well as defense spheres have been also steadily expanding. Humanitarian ties are closely interwoven, which may help make future ASEAN elites more pro-Chinese. Nevertheless, it has been all the more evident that Southeast Asian nations are seeking to lower their current overdependence on China. Their concern are rising due to China's growing political and military and economic muscles as well as because of increasing Chinese nationalism. Unresolved territorial disputes in the South China Sea also impede promotion of China's influence there. In this context China turns out to be sandwiched between the necessity to uphold her national interests, on the one hand, and the goal to keep a comfort regional atmosphere for facilitating her relationship with ASEAN, on the other. Moreover, lately there has been another sound factor jeopardizing China's leadership in SEA - Washington's Asia Pacific pivot.
APA, Harvard, Vancouver, ISO, and other styles
37

Schwenk, J. Tyler, Steven D. Sloan, Julian Ivanov, and Richard D. Miller. "Surface-wave methods for anomaly detection." GEOPHYSICS 81, no. 4 (July 2016): EN29—EN42. http://dx.doi.org/10.1190/geo2015-0356.1.

Full text
Abstract:
Perimeter-defense operations, geohazard assessment, and engineering characterization require the detection and localization of subsurface anomalies. Seismic waves incident upon these discontinuities generate a scattered wavefield. We have developed various surface-wave techniques, currently being fielded, that have consistently delivered accurate and precise results across a wide range of survey parameters and geographical locations. We use the multichannel analysis of surface waves approach to study the multimode Rayleigh wave, the backscatter analysis of surface waves (BASW) method to detect anomalies, 3D visualization for efficient seismic interpretation, BASW correlation for attribute analysis, and instantaneous-amplitude integration in the complex BASW method. Discrete linear moveout functions and [Formula: see text]-[Formula: see text] filter designs are optimized for BASW considering the fundamental and higher mode dispersion trends of the Rayleigh wave. Synthetic and field data were used to demonstrate multimode BASW and mode separation, which accentuated individual scatter events, and ultimately increased confidence in points of interest. Simple correlation algorithms between fundamental and higher-mode BASW data offer attribute analysis that limits the subjective interpretation of BASW images. Domain sorting and Hilbert transforms allow for 3D visualization and rapid interpretation of an anomaly’s wavefield phenomena within an amplitude cube. Furthermore, instantaneous-amplitude analysis can be incorporated into a more robust complex BASW method that forgives velocity-estimation inaccuracies, while requiring less rigorous preprocessing. Our investigations have suggested that a multifaceted surface-wave analysis provides a valuable tool for today’s geophysicists to fulfill anomaly-detection survey requirements.
APA, Harvard, Vancouver, ISO, and other styles
38

Rybchynskyi, Nestor-Mykolai. "GRAPHIC RECONSTRUCTION OF DEFENSE BULWARK OF THE THIRD FORTIFIED SETTLEMENT OF IX - X CENTURIES. IN THE KOROSTEN CITY (ON BASIS OF ARCHAEOLOGICAL DATA)." Current Issues in Research, Conservation and Restoration of Historic Fortifications 14, no. 2021 (2021): 132–42. http://dx.doi.org/10.23939/fortifications2020.14.132.

Full text
Abstract:
From ancient times, mankind has tried to protect their settlement from predators and enemies. This promoted to creation of comfortable living conditions. This contributed to the emergence of fortified settlements. On the territory that archaeologists associate with the Slavs tribe Drevlyany, settlements began to appear in the IX century. when the Great Migration of the Slavs was finally completed. Bohdan Zvizdetsky, researcher of drevlyan՚s antiquity, provided information about 20 fortified settlements between the Horyn and Teteriv rivers. Such settlements are called in Ukrainian «horodyshche». Unfortunately, researchers rarely turned to archaeological research of the fortifications of drevlyan՚s fortified settlements. They primarily paid attention to the filling of cultural layer and archaeological excavation of ancient cemeteries. Therefore, few fortifications have been studied: Rayky, Secont fortified settlement in Korosten, Malyn and Third fortified settlement in Korosten. In general, it is worth mentioning the researchers who studied and analyzed the fortifications of the settlements of Kyiveian Rus՚ in the IX - XIII centuries. P. Rappaport was one of the first to pay attention to the construction of defensive bulwarks in his opinion, main types of wooden structures were palisade and the pillar structure, when horizontal logs are clamped between two verticals, or in the grooves of one vertical. Another archaeologist who paid attention to the study of fortifications was M. Kuchera. In his opinion, the most used was a framework structure. As a basis of a design, he put three-, or four-walled framework. They could be separate segments of the defense wall, or be structurally combined into a single line. Another option for fortifications, the researcher considered the walls of the pillar structure. Archaeologist Yuri Morgunov is also tried to study of fortifications of Kyievian Rus՚. He singled out separate elements: Escarpments; ditches; wooden-earthen defense constructions. In the middle of XX century. military engineer B. Sperk considered various types of defensive walls of fortified settlements of Ancient Rus՚. He wrote that, the main types of walls were three- or four-walled framework. They could be separate segments of the defense wall, or be structurally combined into a single line. Also, architect Vadym Lukyanchenko was engaged in architectural analysis. He turned his attention to the construction of wooden and earth defense construction. According to him, the earliest type of fortifications was a palisade, and later there were several types of fortifications: three, or four-walled frameworks. Based on the work of other researchers, as well as on analogies from the monuments of Poland (Motych; Naszacowice; Zawada Lanckorońska), Czech Republic (Uherské Hradiště- Rybárny; Breclav-Pohansko; Vlastislav) , Slovakia (Spišske Tomášovce; Pobedim), Germany (Behren-Lübchin; Lenzen; Oldenburg; Berlin-Spandau) and Austria (Gars-Thunau), was created a graphic reconstruction of the south-eastern section of the defensive wall of fortified settlement №3 in Korosten. The main structure was a 4-walled framework. We assume that the diameter of the deck could be 250 mm. In addition, frameworks, as the main structure of the defensive wall, were also found on the early medieval fortified settlement near Olevsk, which is also considered as drevlyan՚s fortress. Hypothetical size of each framework could reach 2x2 m in plan and up to 3 m in height. On the top of framework could be a palisade. It was protection for the defenders of the fortress. It was system of fences. The diameter of the deck of a single pile could be 200 mm and a height of 1.8 m. The difference in the height of individual piles formed loopholes. The piles were located on the inside, near the outer wall of the framework. A similar construction can be traced on the already mentioned settlement of Motych and Gars-Thunau. For construction of wooden and earthen construction was required a wide range of tools. It was partially represented by archaeological finds: wooden shovels with metal shells, axes of various types, saws, etc. Despite the fact that other segments of the defensive line of third fortified settlement in Korosten have not been studied. Based on the plan published by I. Samoilovsky, it is possible to draw a conclusion that such a construction of the defensive wall was not found along the entire defensive perimeter. So, the section on the eastern side adjacent to the steep cliffs on the Uzh river does not have clear protective fortifications. Therefore, Therefore, it was possible that this area was fortified only with a palisade. Also, according to I. Samoilovsky's plan, the western and northern parts of the defensive perimeter are surrounded by a powerful bulwark, which most likely had a more complex structure with larger parameters of fortifications. Unfortunately, the worst studied element of the lines of defense of the settlements of the IX - X centuries is the entrance remains. Therefore, were used analogies from well-researched monuments in Poland, Germany, the Czech Republic and Slovakia. In all cases, it had pillar structure withn the gate tower. It has an exclusively observation function, because they do not have loopholes. That is why in visualization gate structures is also only as observation and guard points. The outer wall of such a gatehouse could be made of boards. The volume of the watchtower could be covered with a gabled roof. This design required the installation of a roof ridge and the placement of wooden brackets for the stability of the structure. A wooden bridge over the defensive moat could be located in front of the entrance, which would facilitate access to the settlement in peacetime.
APA, Harvard, Vancouver, ISO, and other styles
39

Ryabchenko, A. G., and E. V. Orel. "Military threat in Krasnodar. 1942-1943." Scientific bulletin of the Southern Institute of Management, no. 4 (December 25, 2018): 112–17. http://dx.doi.org/10.31775/2305-3100-2018-4-112-117.

Full text
Abstract:
The Article is devoted to the significant date, the 75th anniversary of the liberation ofKrasnodarfrom the German-fascist invaders. Immediately after the outbreak of war with fascist invaders inKrasnodarstarted to prepare for it. Since the early days, in particular, was organized by the city destroyer battalion. In parallel, the organization of the assault battalions in four inner-city areas,Krasnodar. Was created regiment of militia. Built a defensive perimeter around the city.Krasnodarcity Committee of the CPSU (b), from 07. 07. 1942 informed that the date of completion of the defensive line of the city defense Committee of the city appointed on 10 August 1942 the measures Taken have led to the fact that as a result, on July 20 the construction of the defensive alignment (of the turn) and setting her weapon emplacements, there are 8 thousand people. The route passes through the settlements adjacent to the city. Each local district was assigned areas battery manned by gunners and cadets of theKrasnodarmortar school. Since the beginning of August 1942 for the construction of theKrasnodardefensive bypass (internal and external) daily had uvlekalas to 30 thousand civilians. But unfortunately, despite the measures taken, the city fell. Six months of the occupation had been the most terrible ordeal for the residents of the city, maybe in its history. In the historical memory of our people deposited the traces of the brutal cruelty by the Nazi occupiers. Moreover, the historical memory of the population passed, and the events leading up to the occupation associated with severe logistical difficulty.
APA, Harvard, Vancouver, ISO, and other styles
40

Skorospelov, Petr P. "“A Special Form of Making Foreign Policy by the Threat of War to Imperialists”. A Case Study of Military-Political Activity of Central Committee Presidium under N.S. Khrushchev, 1954–1964. Part 1." Vostok. Afro-aziatskie obshchestva: istoriia i sovremennost, no. 2 (2022): 9. http://dx.doi.org/10.31857/s086919080019661-4.

Full text
Abstract:
Khrushchev’s foreign policy (1953–1964) that characterized by the strategy of “balancing on the edge” is usually recognized as erroneous. Immediately after Stalin’s death, his successors initially feared a nuclear attack from the United States, which their own Air Force and Air Defense were unable to repel or to retaliate. Therefore, in 1954–1955, the Soviet leader attempted to create a buffer zone of neutral states along the perimeter of the USSR’s borders: he stopped the Korean War, proposed the mutual withdrawal of troops from Europe, etc. After the 1955 Geneva Conference, Khrushchev began to act more courageously, because he saw that the U.S. were afraid of the USSR too and didn’t want to attack it first. Trying to use the opportunities of the European colonial empires’ disintegration, the USSR provided to the newly independent states in Asia and Africa a large-scale economic, military, technical, and political support, and first of all, to Egypt and Indonesia, which controlled the Suez Canal and the Strait of Malacca – key areas on the sea route from Europe to the Far East. The negotiations between Mao Tse Tung and Khrushchev in 1957–1958 reveals their intention to shake up the military blocs created by the Americans near the borders of the socialist camp (NATO, SEATO, the Baghdad Pact). The Soviet leader initiated a series of political crises as interconnected stages of geopolitical offensive against the US position: the Suez (1956), the Syrian (1957), the Middle East (1958), the 2nd Berlin (1958), the Caribbean (1962), etc., which brought the USSR to the brink of war.
APA, Harvard, Vancouver, ISO, and other styles
41

Khokhon, Mykhailo. "BASILIAN ORDER MONASTERY IN SCHEPLOTY. HISTORY, ARCHITECTURE AND PROBLEMS OF PRESERVATION." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Arhìtektura 4, no. 2 (December 22, 2022): 198–204. http://dx.doi.org/10.23939/sa2022.02.198.

Full text
Abstract:
Monasteries in the XVII–XVIII centuries to a greater or lesser extent were the cultural centers of the country, centers of theological thought, spiritual and intellectual activity. It is worth noting that the sacred buildings of that time are a sign of the presence of a certain people in the territory. The monastery in Shcheploty was a small Ukrainian monastery that played its own role in this process. This Monastery is little known, and the surviving relics are not included in the register of monuments and are not protected by the law, which threatens the preservation of part of the history of sacred architecture of Ukraine. The monastery in Shcheploty is poorly studied. There are work of Slobodyan (Slobodyan V., 1998.) in the context of wooden sacred architecture with exploration of the main historical aspects of the monastery and the first attempt of the author to conduct architectural research in 2017 (Khokhon M., 2017). On the basis of measurements, the analysis of historical data the graphic reconstruction of the lost monastery is carried out. It is worth noting that the fortifications could have different shapes and combinations. Including for the fence there are two options: 1) the fence was arranged on the crown of the shaft; 2) the fence was arranged on the outer perimeter of the defensive moat (Bogdanowski, J., 1996). Both scenarios were possible, the reconstruction was carried out for the first option and is designed to open a discussion in the scientific community and stimulate further research of the monastery. As a result of the research It is determined that the monastery consisted of two wooden churches of different times, a bell tower with a fence of the sacred territory and monastic cells with an economic part and fortifications. Archaeological excavations should determine the presence of burials near the former churches. The territory of the monastery occupied about 0.7 hectares. The overall dimensions of the fortifications in the widest part were 115x80 m. The defensive perimeter consisted of an earthen rampart, a moat, bastions on the corners, a fence and a gate. The configuration had an irregular layout close to an irregular trapezoid. It has been determined that the historic territory is privately owned and has an inappropriate purpose, which creates certain legal complications in the museification of shafts at the initiative of local authorities. The defensive relics of the monastery in Shcheploty are an important element of the history of Ukrainian defensive sacred architecture. Despite the relatively small size of the monastery, the defense system was designed in the spirit of the European fortification schools. The remains of fortifications and monasteries need to be included in the register of monuments of Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
42

Levine, Ari Daniel. "Walls and Gates, Windows and Mirrors: Urban Defences, Cultural Memory, and Security Theatre in Song Kaifeng." East Asian Science, Technology, and Medicine 39, no. 1 (June 25, 2014): 55–118. http://dx.doi.org/10.1163/26669323-03901003.

Full text
Abstract:
Kaifeng, the capital of the Northern Song (960-1127) dynasty, boasted sophisticated siege defence installations, which were ultimately breached by the Jurchen invasion of 1126-1127. According to both the archaeological and textual evidence, its concentric city walls and militarized gates with barbicans and bastions represented a crucial stage in the militarization of urban form in early-modern China, as well as a more open approach to planning. While Kaifeng’s urban defences evoked imperial majesty and personal security for Northern Song residents who described them, diasporic literati of the Southern Song (1127-1279) invoked the violation of this defensive perimeter as a metonym for the invasion of their lost homeland. The concept of security theatre explains how Northern Song Kaifeng’s city walls and gates could simultaneously function as efficacious siege defence installations and be perceived as symbolic defences.
APA, Harvard, Vancouver, ISO, and other styles
43

Pryshchepa, B. A. "THE CASTLE OF CZARTORYSKI PRINCES IN KLEVAN: STAGES OF DEVELOPMENT, PLANNING AND BUILDINGS." Archaeology and Early History of Ukraine 43, no. 2 (June 30, 2022): 111–20. http://dx.doi.org/10.37445/adiu.2022.02.08.

Full text
Abstract:
Based on a comprehensive analysis of written, archaeological and architectural sources the article considers the main stages of Klevan castle development, and considers its planning and buildings. According to archeological sources, the site of the settlement of the Kyiv Rus period was used to build the castle. According to the written sources, there were three stages of the erection of the castle. In the first stage (the first quarter of the 16th century), Prince Fedir Mykhailovych Czartoryski began the construction of a castle on the old settlement site, where, perhaps, there had already been a farmstead. In the second stage (the second quarter of the 16th century), due to the conflict with Radziwills, the construction was stopped but the castle functioned and the settlement was developed. In the third stage (the 60s of the 16th century), Prince Ivan Fedorovych Czartoryski completed the construction of the castle. The Klevan castle consisted of two parts — a citadel and the adjacent settlement. The information on the castle planning is contained in the inventories of 1700 and 1709. The earliest description of 1609 describes the defense, housing, religious and economic facilities in the territory of the citadel. It was surrounded by a wall, had two brick towers and a wooden one. Most of the buildings were located on the perimeter of the fortifications; the central part housed the princes’ palace and a church. According to the inventories of 1700 and 1709, the settlement was located to the north and east of the citadel and occupied the territory on the hill where now the Church of the Nativity of Christ is located and, probably, the area occupied by estates on Horodyshche street. The citadel was surrounded by a rampart and oak fence; there was a chapel and a garden around it, outbuildings, the Greek-Catholic Church of the Nativity, and the entrance gate. The analysis of the planning, fortifications and buildings of the Klevan castle allows to conclude that in the last third of the 16th — early 17th century, it was one of the most powerful private castles in Volhynia.
APA, Harvard, Vancouver, ISO, and other styles
44

Amineh, Mehdi Parvizi, and Henk Houweling. "Global Energy Security and Its Geopolitical Impediments—The Case of the Caspian Region." Perspectives on Global Development and Technology 6, no. 1-3 (2007): 365–88. http://dx.doi.org/10.1163/156914907x207793.

Full text
Abstract:
AbstractThis article discusses the global geopolitics of energy security in the post-Cold War environment. Energy companies headquartered in western countries have long history of accessing energy resources beyond borders through invasion of the host by their home state, followed by domination and the creation of property rights to explore and sell oil. Conquest and domination, respectively voluntary exchange are the survival strategies of human groups in the global system. The article differentiates between demand-induced scarcity, supply-induced scarcity, structural scarcity, and the creation and transfer of property rights. Together, the behaviors referred to by these concepts create a field of social forces that cross state borders and involve state and non-state actors. Monopolizing control over energy resources by the Anglo-Saxon maritime powers was one of the causes of both world wars. Since the collapse of the Soviet Union, the US has been creating a land-based extension of its post-World War II defense perimeter. It runs from Romania, via Central Eurasia, to Israel, Afghanistan, and Pakistan. Overland transport increasingly connects economies and energy supplies on the Central European and Pacific sides of the Eurasian continent. The US, therefore, has decided to bring under its military umbrella the energy-carrying region between industrializing China and India, recovering Russia and unifying Europe. China's policy to secure its energy supply by direct contracting with the home state and legal owner of the stock, brings it into confrontation with the US. The latter consumes one-quarter of the energy assumed to be present in the Greater Middle East. In recent decades, the Chinese economy has been growing at a rate substantially above the worldwide growth rate, which implies that China's share in the world economy is increasing over time. Accordingly, China is becoming more dependent on imports, especially energy. The US domestic oil production peaked in 1970-71. Thus, the US has no spare capacity to provide its allies in Europe and East Asia in case of an interruption of supply. The conquest of Iraq by the US and its allies, and the transfer of the management of the oil sector from the state to a US tax-paying private company opens a new era of violent interstate competition for access to and control of fossil energy sources.
APA, Harvard, Vancouver, ISO, and other styles
45

Akunna, Gabryel G., LC Saalu, A. Irozuoke, and E. Joshua. "Rats kidney morphological particularities and functions post-treatment with vernonia amygdalina extract and low-dose lead acetate." European Journal of Anatomy 27 (January 2023): 91–102. http://dx.doi.org/10.52083/ztzk6810.

Full text
Abstract:
This study was conducted to evaluate the effect of Vernonia amygdalina extract on Pb-induced kidney toxicity in Wistar rats. This investigation was carried out using 25 Wistar rat of both sexes, and the animals were divided into five groups: 5 rats per group. Group A served as the negative control group and was orally gavaged with 5mg/ kg body weight of normal saline daily. Group B served as the positive control and was treated with daily intraperitoneal (IP) injection of 8 mg/kg body weight of Pb acetate (Pb). Group C was treated with daily intraperitoneal (IP) injection of 8 mg/kg body weight of Pb along with 20 mg/kg body weight of Vernonia amygdalina extract orally. Group D was treated with daily intraperitoneal (IP) injection of 8 mg/kg body weight of Pb along with 40 mg/kg body weight of Vernonia amygdalina extract orally. Group 5 was treated with daily intraperitoneal (IP) injection of 8 mg/kg body weight of Pb along with 60 mg/kg body weight of Vernonia amygdalina extract orally. All treatments were done for a period of 28 days. The animals were sacrificed on the 29th day by cervical dislocation, then blood was collected by cardiac puncture, and kidneys were collected for histological profile. Lipid peroxidation (MDA), creatinine and urea level were all determined. There was marked elevation in MDA level with a concomitant depletion in urea and creatinine content in the group treated with only Pb when compared with the negative control group. There was a significant increase in proximal tubular area, distal tubular area, glomerular membrane thickness, area, perimeter and feret’s diameter and a significant decrease in proximal tubule, distal tubule ratio and cellularity in this group of rats when compared to the negative control. Oxidation and histological changes in the kidneys were successfully prevented by the pre- administration of Vernonia amygdalina as evidenced by creatinine and urea and MDA level. These were made evident as the morphological scores across all experimental groups were significantly different from those of the positive control (group 2). Based on the current findings, it can be concluded that Vernonia amygdalina successfully minimizes the deleterious effects in kidney function and histological coherence associated with nephrotoxicity by strengthening the antioxidant defense system, suppressing oxidative stress, and mitigating apoptosis.
APA, Harvard, Vancouver, ISO, and other styles
46

Mohanty, Sudeshna, Subhrasmita Mahapatra, Sanat Ku Panda, Plavan Ku Rath, Manoj Ku Sarangi, and Olga I. Bylya. "Development and Optimization of Perimeter Traversing Robot." Applied Mechanics and Materials 186 (June 2012): 280–88. http://dx.doi.org/10.4028/www.scientific.net/amm.186.280.

Full text
Abstract:
This paper presents the development and optimization of control parameters of an autonomous robot capable of traversing a planar surface without going beyond the surface boundary. Based on standard Lego® design, the proposed robot travels on surfaces with different geometrical shapes and collects data on the basis of which the perimeter can be redrawn using MATLAB. The remote detection capabilities of this robot can find its application in construction, defence surveillance operations, geological and space research and industry as an automated process of measurement, especially when the surface being measured is beyond human reach. The robot detects the edge using a color sensor which differentiates the color of the surface from its boundary. After detecting an edge point, the robot retracts and turns to detect an edge point in another direction. The length of the paths traversed by the robot from one edge point to another serves as the input data to the MATLAB program which computes this data and transforms it to a plot of the perimeter. Experiments conducted demonstrate the optimal values of parameters for control of motion of the robot to give satisfactory results with minimal power and time expenditure.
APA, Harvard, Vancouver, ISO, and other styles
47

Rogobete, M. "An Unmanned Underwater Vehicle Defence System." Scientific Bulletin of Naval Academy XXV, no. 1 (August 15, 2022): 16–22. http://dx.doi.org/10.21279/1454-864x-22-i1-002.

Full text
Abstract:
Nowadays, military threats are very close to us and cover terrestrial, aerial, and maritime attacks. This research defines a submarine defence system capable of monitoring and controlling a certain perimeter, based on submersible drones known as Unmanned Underwater Vehicles (UUV) and a grid of stations fixed to the seabed, which provides positioning acoustic signals as well as full-duplex digital communication using underwater acoustic modems. The novelty is the proposed 3D grid system with each Positioning Grid Element (PGE) being an Ultra-Short Baseline (USBL) low or medium operating range device and the processing
APA, Harvard, Vancouver, ISO, and other styles
48

Lin, Kung-Sung, Kung-Hua Yeh, Yan-Ju Chiang, and Likarn Wang. "Fiber-Optic Perimeter Intrusion Detection by Employing a Fiber Laser Cavity in Each Defensed Zone." IEEE Sensors Journal 18, no. 20 (October 15, 2018): 8352–60. http://dx.doi.org/10.1109/jsen.2018.2866223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Portela i Valls, S., M. J. Viñals, and G. Muñoz Cosme. "ACTIONS FOR THE ENHANCEMENT OF HERITAGE. THE CASE OF THE TOWN WALLS OF MORELLA (CASTELLÓN, SPAIN)." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIV-M-1-2020 (July 24, 2020): 877–84. http://dx.doi.org/10.5194/isprs-archives-xliv-m-1-2020-877-2020.

Full text
Abstract:
Abstract. Morella is an archetypical medieval town that is home to many heritage buildings, protected by fortified walls and crowned by an imposing castle. Located in a mountainous area, this town is one of only four examples in the Valencian Region (Spain) that retain the entire defence perimeter. This defence heritage has been decisive not only in shaping the urban layout of the town, but also in the local lifestyle and traditions of the place: living inside the walls means being protected from the weather, but also inhabiting a limited environment and having social and cultural connotations. The process of enhancing the value of heritage buildings involves studying, analysing and understanding the elements they are made up of with the aim of proposing new uses based on their significance, their characteristics, the environment and social needs. To address this objective, the present work has carried out an architectural analysis of each of the towers and gates of the town walls, which has made it possible to study their characteristics and detect the potential for the interpretation of the heritage buildings in each section. The result is the ‘Walls Walking Tour’, a proposal for a public visit that divides the walled perimeter of Morella into five thematic areas that each offers different types of routes, activities and relationships with the environment. In short, this initiative contributes to the enhancement and cultural diffusion of Morella's defence heritage, and brings buildings and their history closer both to the local population and to visitors.
APA, Harvard, Vancouver, ISO, and other styles
50

Salzer, Thomas E. "A Low-Impedance Projection Welding Device for Large Package Hermetic Sealing." International Symposium on Microelectronics 2015, no. 1 (October 1, 2015): 000810–16. http://dx.doi.org/10.4071/isom-2015-thp32.

Full text
Abstract:
Electronic packages for medical, communications, defense, and other applications are often hermetically sealed into metal containers using projection welding. However, current projection welding machines may not reliably seal packages with weld perimeters exceeding 7.6 cm (3.0 in), and also may expel metallic particles into the package. This paper describes a novel low-impedance projection welding device that can reliably weld large packages with up to 25.4 cm (10.0 in) weld perimeters with zero weld expulsion and zero weld defects, using half the energy required by traditional machines. The device does not rely on conventional power supplies and transformers, and delivers ≫120kA of weld current while operating from standard electrical outlet (110V, 15A circuits), and requires no external bus bars or cooling system. The system architecture can be easily scaled upward to significantly increase the delivered weld current and hermetically seal packages with weld perimeters greater than 25.4 cm (10.0 in). A commercial version of this device has welded more than 1 million medical, communications, and military electronic packages with zero customer returns. Data is presented showing the weld parameters for a variety of commercial and military hermetic electronic packages.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography