A Defense Mechanism Against Timing Attacks on User Privacy in ICN

Author(s):  
Vignesh Sivaraman ◽  
Biplab Sikdar
Author(s):  
Olya Khaleelee

This paper describes the use of the Defense Mechanism Test as an aid in helping to assess senior executives in four areas: for selection, development, career strategy, and crisis intervention. The origins of this test, developed to measure the defense mechanisms used to protect the individual from stress, are described. The paper shows how it was used to predict the capacity of trainee fighter pilots to withstand stress and its later application to other stressful occupations. Finally, some ideal types of the test are shown followed by four real test profiles, two of them with their associated histories.


Diabetes mellitus can be defined as chronic metabolic disease which results from either relative or complete absence of insulin by the pancreatic beta islet cells. This in-turn may lead to hyperglycemia due to disturbances in the metabolism of glucose. In the human body, iron is con- sidered to be an effective pro-oxidant and participates in the generation of reactive oxygen species (ROS) such as hydroxyl radical. Because of the poor antioxidant defense mechanism of beta cells (low production of antioxidant enzymes such as catalase, glutathione peroxidase and dismutase), so they are highly prone to iron-induced oxidative stress and iron deposition in it and this will lead to apoptosis, and subsequently insulin deficiency. This iron deposition in beta cells will also lead to insulin resistance by reducing insulin extracting ability of the liver and inhibiting glucose uptake in muscle tissues and fats, this in turn will result in high production of hepatic glucose. Ferritin which is an acute phase reactant protein, that responds to acute stress like trauma, infections, tissue necrosis and surgery, it can produce diabetes mellitus either through inflammation or by increasing iron stores.


Author(s):  
Hossein Aliakbari Harehdasht ◽  
Zahra Ekbatäni

In The Sense of an Ending, Julian Barnes portrays the mysterious workings of the human mind as it distorts facts towards the end of a self-image that one can live with. The protagonist in the novel deploys certain psychological defense mechanisms in order to protect himself from feelings of anxiety, only to experience even more profound anxiety due to his excessive use of them. The significance of the present paper lies in its novel view of the book. So far, the critique on the novel has mainly been focused on the workings of time on memory; however, the present paper investigates how psychological defense mechanisms blur the protagonist’s perception of reality and distort his memories. This paper also attempts to attract scholarly interest in the study of psychological defense mechanisms in the study of The Sense of an Ending which has so far been to the best of our knowledge overlooked


2020 ◽  
Vol 2 (1) ◽  
pp. 70-78
Author(s):  
Elvira Yanova ◽  
◽  
Gulshod Mardiyeva

As is well known,bone,and arterial, abnormalityora combination of both, may cause adecrease in cerebral blood flow, which in turn leads to early morbidity and loss of efficiency. Many scientists are wondering if the Kimmer leanomalya rises with age, is it ananomalya tall, or is it a kind of defense mechanism


2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


2010 ◽  
Vol 33 (7) ◽  
pp. 1153-1164
Author(s):  
Xin-Jie ZHAO ◽  
Tao WANG ◽  
Yuan-Yuan ZHENG
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document