37 resultados para faking


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Female fireflies of the genus Photuris, the so-called firefly “femmes fatales,” prey on male fireflies of the genus Photinus. The females are able to entrap the males by faking the flash signal characteristics of the Photinus female. We found that by feeding on Photinus males, Photuris females gain more than nutrients. They also acquire defensive steroidal pyrones called lucibufagins, which are contained in Photinus but which Photuris fireflies are unable to produce on their own. Photuris females that eat Photinus males or lucibufagin are rejected by Phidippus jumping spiders. Lucibufagin itself proved to be a deterrent to such spiders. Field-collected Photuris females contain lucibufagin in varying amounts. The more lucibufagin they contain the more unacceptable they are to Phidippus.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Jellyfishes have functionally replaced several overexploited commercial stocks of planktivorous fishes. This is paradoxical, because they use a primitive prey capture mechanism requiring direct contact with the prey, whereas fishes use more efficient visual detection. We have compiled published data to show that, in spite of their primitive life-style, jellyfishes exhibit similar instantaneous prey clearance and respiration rates as their fish competitors and similar potential for growth and reproduction. To achieve this production, they have evolved large, water-laden bodies that increase prey contact rates. Although larger bodies are less efficient for swimming, optimization analysis reveals that large collectors are advantageous if they move through the water sufficiently slowly.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper is about three working class women academics in their 40s, who are at different phases in their career. I take a reflexive, feminist, (Reay 2000, 2004, Ribbens and Edwards 1998) life story approach (Plummer, 2001) in order to understand their particular narratives about identity, complicity, relationships and discomfort within the academy, and then how they inhabit care-less spaces. However unique their narratives, I am able to explore an aspect of higher education – women and their working relationships – through a lens of care-less spaces, and argue that care-less-ness in the academy, can create and reproduce animosity and collusion. Notably, this is damaging for intellectual pursuits, knowledge production and markedly, the identity of woman academics. In introducing this work, I first contextualise women in the academy and define the term care-less spaces, then move onto discuss feminist methods. I then explore and critique in some detail, the substantive findings under the headings of ‘complicity and ‘faking’ it’ and ‘publishing and collaboration’. The final section concludes the paper by drawing on Herring’s (2013) legal premise, in the context of care ethics, as a way to interrogate particular care-less spaces within higher education.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research investigated faking across test administration modes in an employment testing scenario. For the first time, phone administration was included. Participants (N = 91) were randomly allocated to testing mode (telephone, Internet, or pen-and-paper). Participants completed a personality measure under standard instructions and then under instructions to fake as an ideal police applicant. No significant difference in any faked personality domains as a function of administration mode was found. Effect sizes indicated that the influence of administration mode was small. Limitations and future directions are considered. Overall, results indicate that if an individual intends to fake on a self-report test in a vocational assessment scenario, the electronic administration mode in which the test is delivered may be unimportant.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Opportunistic Networks aim to set a reliable networks where the nodes has no end-To-end connection and the communication links often suffer from frequent disruption and long delays. The design of the OppNets routing protocols is facing a serious challenges such as the protection of the data confidentiality and integrity. OppNets exploit the characteristics of the human social, such as similarities, daily routines, mobility patterns and interests to perform the message routing and data sharing. Packet dropping attack is one of the hardest attacks in Opportunistic Networks as both the source nodes and the destination nodes have no knowledge of where or when the packet will be dropped. In this paper, we present a new malicious nodes detection technique against packet faking attack where the malicious node drops one or more packets and instead of them injects new fake packets. We have called this novel attack in our previous works a packet faking attack. Each node in Opportunistic Networks can detect and then traceback the malicious nodes based on a solid and powerful idea that is, hash chain techniques. In our hash chain based defense techniques we have two phases. The first phases is to detect the attack, and the second phases is to find the malicious nodes. We have compared our approach with the acknowledgement based mechanisms and the networks coding based mechanism which are well known approaches in the literature. In our simulation, we have achieved a very high node detection accuracy and low false negative rate.