Research on Multi-Core Network Equipment Virus Defense System

2015 ◽  
Vol 738-739 ◽  
pp. 1197-1200
Author(s):  
Yan Wen Xu ◽  
Feng Dong

With the arrival of the wave of information technology, the business activities of a variety of business systems via the network to complete. But the virus to exploit system vulnerabilities to sneak into the enterprise information network server, the enterprise network into a leak and suffered the double threat of external hackers. Leverage existing security infrastructure, enterprise networks, statistical analysis of all possible virus invasion point, combined with a good virus defense technology layers protection system vulnerabilities, the formation of a whole network antivirus, coordinated operations, a unified management modernization virus defense systems.

1979 ◽  
Vol 87 (5) ◽  
pp. 685-700 ◽  
Author(s):  
Marcos V. Goycoolea ◽  
Michael M. Paparella ◽  
Anna Mary Carpenter ◽  
S. K. Juhn

A longitudinal sequential study of otitis media in an experimental animal (cat) using eustachian tube obstruction was done. Fifty animals were used. The continuum of mucoperiosteal changes from one day to six months after obstruction revealed gradual changes that were similar for each animal. Stages were defined, and by using different staining techniques, including immunocytochemistry, an overall middle ear defense system was postulated and documented. Nonspecific as well as specific defense systems, including localized immunity, were described. Effusions were studied in a continuum, and their pathogenesis was discussed.


Author(s):  
Darko Galinec ◽  
Slavko Vidovic

For integration of two business functions or two business systems it is necessary to connect their business processes with application support and data exchange. Processes appertaining to one application system create data which will be used by another application system. First, and the key reason for the integration of business systems’ applications, are user business needs for business processes and information flow, and changes in business processes occurring during business transactions. The next integration reason is related to the technological differences by means of which applications are constructed. Integration should be carried out to connect technologically different applications. Because of process complexity which includes breakdown of the existing business processes and applications, business processes change on the basis of business needs and user requirements, modeling of such processes, and new applications and their connection, it is necessary to shape methodological framework. The use of this framework should result in the successful completion of EAI projects.


2002 ◽  
Vol 6 (2) ◽  
pp. 121-129
Author(s):  
P R Bhatt

NOKIA is one of the ‘e-generation’ companies, which relies on the web to conduct their everyday business, demanding richer and more personalized experience. Its objective is ‘to transform the Digital Age to a truly Mobile Age’, giving everyone access to information. Nokia is the undisputed global king of mobile communication. Its strategy is to become a global player in telecommunications through ‘collaboration and innovations'. It has made spectacular innovations in mobile communications. It brought technologies such as General Packet Radio Services (GPRS), Wideband Code Division Multiple Access (CDMA) as the mobile moves third generation (3G). Nokia has established their cutting edge technology and trend settling lifestyle offerings while unveiling their mobile handset products. In 3G services, Nokia will give e-mail, weather information maps, rout planning, traffic information, bank account data, views, travel information, etc. Nokia adopted a strategy of mergers, acquisitions, alliance and collaboration to gain superiority in technology and competitive advantage. While Nokia is the market leader in handset manufacturing with 35.3% share, Ericsson is the king of wireless network equipment with 33% market share. Nokia's performance was impressive during 1996–2000. Nokia's future growth areas include market leadership in security infrastructure for corporates, supplying solutions to help corporations block viruses and intruders at their network gateways.


Author(s):  
P. Openko ◽  
O. Doska ◽  
A. Dudush ◽  
A. Kozyr

The operational use of armament and military equipment (AME) and the resulting operational failures and combat damage lead to a decrease or loss of combat capability of groupings of troops. That is why the timely and high– quality implementation of a set of measures to keep the AME in operational conditions is connected with the need of solving the problem of logistical support for the timely elimination of failures and combat damage. At the same time, the effectiveness of the air defense systems recovery, taking into account the type of operation being conducted and the existing resource constraints requires a more detailed study. The aim of the article is to form a methodical approach to evaluate the effectiveness of repairing combat damage and restoring the combat effectiveness of air defense systems in a counteroffensive operation in modern conditions. Means of destruction that can be employed to inflict air defense systems in counteroffensive operation are considered. Modeling of the enemy’s use of different types of means of destruction was carried out, the obtained results substantiated the damage to the air defense systems’ means of combat, which can be sustained in a counteroffensive operation. In addition, the labor costs for recovery were calculated. Using the method of assessing the possibilities of combat damage eliminating and restoring the effectiveness of AME specimen, calculations of the recovery effectiveness of air defense system’s means of combat were performed. As indicators that characterize the capabilities of repair and restoration units to eliminate combat damage and restore the operational performance of AME, the average duration of AME specimen restoration and the probability of timely repairs, taking into account resource constraints are used. An analysis of the calculations results of the probability of timely recovery of air defense system was performed. The maximum values of labor costs for restoration and characteristics of repair and restoration units are given. The method of calculating the effectiveness of combat damage eliminating and restoring the combat effectiveness of air defense system in a counteroffensive operation under resource constraints was further developed.


mBio ◽  
2019 ◽  
Vol 10 (2) ◽  
Author(s):  
Matthew T. Montgomery ◽  
Carlos A. Guerrero Bustamante ◽  
Rebekah M. Dedrick ◽  
Deborah Jacobs-Sera ◽  
Graham F. Hatfull

ABSTRACT Temperate phages play important roles in the physiology of their bacterial hosts and establish a lysogenic relationship with the host through which prophage-expressed genes confer new phenotypes. A key phenotype is prophage-mediated defense against heterotypic viral attack, in which temperate phages collude with their bacterial host to prevent other phages from attacking, sometimes with exquisite specificity. Such defense systems have been described in Pseudomonas and Mycobacterium phages but are likely widespread throughout the microbial community. Here, we describe a novel prophage-mediated defense system encoded by Gordonia phage CarolAnn, which defends against infection by unrelated phages grouped in cluster CZ. CarolAnn genes 43 and 44 are coexpressed with the repressor and are necessary and sufficient to confer defense against phage Kita and its close relatives. Kita and these relatives are targeted through Kita gene 53, a gene that is of unknown function but which is the location of defense escape mutations that overcome CarolAnn defense. Expression of Kita gene 53 is toxic to Gordonia terrae in the presence of CarolAnn genes 43 and 44, suggesting that defense may be mediated by an abortive infection type of mechanism. CarolAnn genes 43 and 44 are distant relatives of mycobacteriophage Sbash genes 31 and 30, respectively, which also confer viral defense but use a different targeting system. IMPORTANCE Prophage-mediated viral defense systems play a key role in microbial dynamics, as lysogeny is established relatively efficiently, and prophage-expressed genes can strongly inhibit lytic infection of other, unrelated phages. Demonstrating such defense systems in Gordonia terrae suggests that these systems are widespread and that there are a multitude of different systems with different specificities for the attacking phages.


Author(s):  
Mohamed Khedir Noraldain Alamin

In recent years, the use of Flying drones and modern Unmanned aerial vehicles (UAVs) with the latest techniques and capabilities for both civilian and military applications growing sustainably on a large scope, Drones could autonomously fly in several environments and locations and could perform various missions, providing a system for UAV detection and tracking represent crucial importance. This paper discusses Designing Detection and Tracking method as a part of Aero-vehicle Defense System (ADS) for UAVs using Deep learning algorithms. The small Radar cross-section (RCS) foot-print makes a problem for Traditional methods and Aero-vehicle Defense systems to distinguish between birds, stealth fighters, and UAVs incomparable of size and RCS characteristics, the detection is a challenge in low RCS targets because the chance of detection is incredibly less moreover, in the existence of interference and clutter which reduce the performance of detection process rapidly. 


2021 ◽  
Vol 26 (4) ◽  
pp. 274-281
Author(s):  
Ionuț Alin Cîrdei ◽  
Laviniu Bojor

Abstract Each state seeks to protect its territory from external threats using a wide range of forces and means, which combine the strike power with increased possibilities of detection given by the use of modern technologies. In this regard, we can see that some states have developed complex active and passive defense systems with the purpose of banning access and controlling certain key areas and aimed at both discouraging potential aggressors and protecting vital interests. For states with regional or global ambitions, the successful conduct of access operations in the area of operations, in a permissive, semi-permissive or hostile environment must be a priority. Access operations in a semi-permissive or hostile environment involve the use of tailored capabilities to deal with the opponent’s defense system and to overcome A2AD’s abilities.


2019 ◽  
Vol 2 (1) ◽  
pp. 1
Author(s):  
Chih-Wei Chen ◽  
C. W. Chen ◽  
C. Y. J. Chen

<p><em>Taiwan and Japan are both maritime countries. The natural resources in the territory are quite limited. Due to this inherent limitation, both Taiwan and Japan rely on trade to safeguard their own economic interests. Therefore, defending the maritime traffic lines and ensuring maritime interests are important missions of the Taiwan and Japan defense systems. The recent increasingly harsh international situation in the Asia-Pacific region has seriously affected the security and stability of the surrounding areas. Invisible also poses many challenges to Taiwan’s maritime rights and interests, so it is a reflection on Taiwan’s future development by understanding the Japanese defense system.</em></p>


Sign in / Sign up

Export Citation Format

Share Document