5 resultados para Intrusions

em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Animal communication often occurs in communication networks in which multiple signalers and receivers are within signaling range of each other. In such networks, individuals can obtain information on the quality and motivation of territorial neighbors by eavesdropping on their signaling interactions. In songbirds, extracting information from interactions involving neighbors is thought to be an important factor in the evolution of strategies of territory defense. In a playback experiment with radio-tagged nightingales Luscinia megarhynchos we here demonstrate that territorial males use their familiar neighbors' performance in a vocal interaction with an unfamiliar intruder as a standard for their own response. Males were attracted by a vocal interaction between their neighbor and a simulated stranger and intruded into the neighbor's territory. The more intensely the neighbor had interacted with playback, the earlier the intrusions were made, indicating that males eavesdropped on the vocal contest involving a neighbor. However, males never intruded when we had simulated by a second playback that the intruder had retreated and sang outside the neighbor's territory. These results suggest that territorial males use their neighbors' singing behavior as an early warning system when territorial integrity is threatened. Simultaneous responses by neighboring males towards unfamiliar rivals are likely to be beneficial to the individuals in maintaining territorial integrity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is by mapping an area that the geographer comes to understand the contours and formations of a place. The “place” in this case is the prison world. This article serves to map moments in prison demonstrating how “old” female bodies are performed under the prison gaze. In this article I will illustrate how older women subvert, negotiate, or invoke discourse as a means of reinscribing the normalizing discourses that serve to confine and define older women's experiences in prison. Female elders in prison become defined and confined by regimes of femininity and ageism. They have to endure symbolic and actual intrusions of physical privacy, which serve to remind them of what they were, where they are, and what they have become. This article will critically explore the complexity and contradictions of time use in prison and how they impact on embodied identities. By incorporating the voices of elders, I hope to draw out the contradictions and dilemmas which they experience, thereby illustrating the relationship between time, their involvement in doing time, and the performance of time in a total institution (see Goffman, 1961), and the relationship between temporality and existence. The stories of the women show how their identities are caught within the movement and motion of time and space, both in terms of the time of “the real” on the outside and within prison time. This is the in-between space of carceral time within which women live and which they negotiate. It is by being caught in this network of carceral time that they are constantly being “remade” as their body/performance of identities alters within it. While only a small percentage of the female prison population in the United Kingdom are in later life, one has to question why criminological and gerontological literature fail to address the needs of a growing significant minority.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Three experiments examined developmental changes in serial recall of lists of 6 letters, with errors classified as movements, omissions, intrusions, or repetitions. In Experiments 1 and 2, developmental differences between groups of children aged from 7 to 11 years and adults were found in the pattern of serial recall errors. The errors of older participants were more likely to be movements than were those of younger participants, who made more intrusions and omissions. The number of repetition errors did not change with age, and this finding is interpreted in terms of a developmentally invariant postoutput response inhibition process. This interpretation was supported by the findings of Experiment 3, which measured levels of response inhibition in 7-, 9-, and 11-year-olds by comparing recall of lists with and without repeated items. Response inhibition remained developmentally invariant, although older children showed greater response facilitation (improved correct recall of adjacent repeated items). Group differences in the patterns of other errors are accounted for in terms of developmental changes in levels of output forgetting and changes in the efficiency of temporal encoding processes, (C) 2000 Academic Press.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The key attributes of a smarter power grid include: pervasive interconnection of smart devices; extensive data generation and collection; and rapid reaction to events across a widely dispersed physical infrastructure. Modern telecommunications technologies are being deployed across power systems to support these monitoring and control capabilities. To enable interoperability, several new communications protocols and standards have been developed over the past 10 to 20 years. These continue to be refined, even as new systems are rolled out.

This new hyper-connected communications infrastructure provides an environment rich in sub-systems and physical devices that are attractive to cyber-attackers. Indeed, as smarter grid operations become dependent on interconnectivity, the communications network itself becomes a target. Consequently, we examine cyber-attacks that specifically target communications, particularly state-of-the-art standards and protocols. We further explore approaches and technologies that aim to protect critical communications networks against intrusions, and to monitor for, and detect, intrusions that infiltrate Smart Grid systems.