4 resultados para Political marketing, perception of security, democratic security, Alvaro Uribe Velez.

em Indian Institute of Science - Bangalore - Índia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The perception of ultraviolet (UV) light by spiders has so far been only demonstrated in salticids. Crab spiders (Thomisidae) hunt mostly on flowers and need to find appropriate hunting sites. Previous studies have shown that some crab spiders that reflect UV light use UV contrast to enhance prey capture. The high UV contrast can be obtained either by modulation of body colouration or active selection of appropriate backgrounds for foraging. We show that crab spiders (Thomisus sp.)hunting on Spathiphyllum plants use chromatic contrast, especially UV contrast, to make themselves attractive to hymenopteran prey. Apart from that, they are able to achieve high UV contrast by active selection of non-UV reflecting surfaces when given a choice of UV-reflecting and non-UV reflecting surfaces in the absence of odour cues. Honeybees (Apis cerana) approached Spathiphyllum plants bearing crab spiders on which the spiders were high UV-contrast targets with greater frequency than those plants on which the UV-contrast of the spiders was low. Thus, crab spiders can perceive UV and may use it to choose appropriate backgrounds to enhance prey capture, by exploiting the attraction of prey such as honeybees to UV.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we propose a linear time-varying model for diphthong synthesis based on linear interpolation of formant frequencies. We, thence, determine the timbre just-noticeable difference (JND) for diphthong /a I/ (as in ‘buy’) with a constant pitch excitation through perception experiment involving four listeners and explore the phonetic JND of the diphthong. Their JND responses are determined using 1-up-3-down procedure. Using the experimental data, we map the timbre JND and phonetic JND onto a 2-D region of percentage change of formant glides. The timbre and phonetic JND contours for constant pitch show that the phonetic JND region encloses timbre JND region and also varies across listeners. The JND is observed to be more sensitive to ending vowel /I/ than starting vowel /a/ in some listeners and dependent on the direction of perturbation of starting and ending vowels.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.