10,468 results on '"Défense"'
Search Results
2. Energy attack method for adaptive multi-exit neural networks
- Author
-
Du, Dongfang, Sha, Chaofeng, and Peng, Xin
- Published
- 2025
- Full Text
- View/download PDF
3. Antiviral activity of ribosome inactivating proteins for management of plant viral infection
- Author
-
Bhardwaj, Pooja, Raigond, Baswaraj, Raigond, Pinky, Verma, Ambika, Verma, Gaurav, Kochhar, Tarvinder, Patroti, Parashuram, Das, I.K., and Satyavathi, C Tara
- Published
- 2025
- Full Text
- View/download PDF
4. MYB proteins: Versatile regulators of plant development, stress responses, and secondary metabolite biosynthetic pathways
- Author
-
Bhatt, Preshita A., Gurav, Tanuja P., Kondhare, Kirtikumar R., and Giri, Ashok P.
- Published
- 2025
- Full Text
- View/download PDF
5. Selection for altruistic defense in structured populations
- Author
-
Jordan, Felix, Hutzenthaler, Martin, and Metzler, Dirk
- Published
- 2025
- Full Text
- View/download PDF
6. New rules, new game? The effects of the away goals rule removal and video assistant referee adoption on game dynamics in UEFA Champions League ties
- Author
-
Yildirim, Mustafa and Bilman, Mustafa Erhan
- Published
- 2024
- Full Text
- View/download PDF
7. DLShield: A Defense Approach Against Dirty Label Attacks in Heterogeneous Federated Learning
- Author
-
Sameera, K. M., Abhinav, M., Amal, P. P., Abhiram, T. Babu, Abishek, Raj K., Amal, Tomichen, Anaina, P., Vinod, P., Rafidha, Rehiman K. A., Mauro, Conti, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Knechtel, Johann, editor, Chatterjee, Urbi, editor, and Forte, Domenic, editor
- Published
- 2025
- Full Text
- View/download PDF
8. Byzantine-Robust Federated Learning Based on Blockchain
- Author
-
Song, Lihua, Cai, Chenying, Wei, Shuhua, Banerjee, Rochishnu, Feng, Xianglong, Jiang, Honglu, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Cai, Zhipeng, editor, Takabi, Daniel, editor, Guo, Shaoyong, editor, and Zou, Yifei, editor
- Published
- 2025
- Full Text
- View/download PDF
9. Improving Robustness to Model Inversion Attacks via Sparse Coding Architectures
- Author
-
Dibbo, Sayanton V., Breuer, Adam, Moore, Juston, Teti, Michael, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Leonardis, Aleš, editor, Ricci, Elisa, editor, Roth, Stefan, editor, Russakovsky, Olga, editor, Sattler, Torsten, editor, and Varol, Gül, editor
- Published
- 2025
- Full Text
- View/download PDF
10. A Lightweight Defense Scheme Against Usermode Helper Privilege Escalation Using Linux Capability
- Author
-
Meng, Jingzi, Wang, Yuewu, Lei, Lingguang, Kou, Chunjing, Wang, Peng, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Mouha, Nicky, editor, and Nikiforakis, Nick, editor
- Published
- 2025
- Full Text
- View/download PDF
11. A Millimetre-Wave LNA for Défense Covert Warfare Operations and Cybersecurity Applications
- Author
-
Mythry, Sarin Vijay, Harsha Vardhini, P., Dinesh Kumar, N., Mennaiah, B., Charan, Regonda, Shiva Rama Krishna, Kandikanti Bala, Rajesh, Penakanti, Vamshi, Bandari, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Sharma, Bikash, editor, Do, Dinh-Thuan, editor, Sur, Samarendra Nath, editor, and Liu, Chuan-Ming, editor
- Published
- 2025
- Full Text
- View/download PDF
12. Zero-Shot Learning in Cybersecurity: A Paradigm Shift in Attack and Defense Strategies
- Author
-
Srivastava, Aviral, Sanghavi, Priyansh, Parmar, Viral, Rani, Seema, Ghosh, Ashish, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Singh, Mayank, editor, Tyagi, Vipin, editor, Gupta, P. K., editor, Flusser, Jan, editor, Ören, Tuncer, editor, Cherif, Amar Ramdane, editor, and Tomar, Ravi, editor
- Published
- 2025
- Full Text
- View/download PDF
13. EdDSA Shield: Fortifying Machine Learning Against Data Poisoning Threats in Continual Learning
- Author
-
Nageswari, Akula, Sanjeevulu, Vasundra, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Kumar, Amit, editor, Gunjan, Vinit Kumar, editor, Senatore, Sabrina, editor, and Hu, Yu-Chen, editor
- Published
- 2025
- Full Text
- View/download PDF
14. A dTALE approach demonstrates that induction of common bean OVATE Family Protein 7 promotes resistance to common bacterial blight.
- Author
-
Gaudin, Charlotte, Preveaux, Anne, Aubineau, Nathan, Goff, Damien Le, Jacques, Marie-Agnès, and Chen, Nicolas W G
- Abstract
Common bacterial blight (CBB) is a devastating seed-transmitted disease of common bean (Phaseolus vulgaris L.), caused by Xanthomonas phaseoli pv. phaseoli and Xanthomonas citri pv. fuscans. The genes responsible for CBB resistance are largely unknown. Moreover, the lack of a reproducible and universal transformation protocol limits the study of genetic traits in common bean. We produced X. phaseoli pv. phaseoli strains expressing artificially designed transcription-activator like effectors (dTALEs) to target 14 candidate genes for resistance to CBB based on previous transcriptomic data. In planta assays in a susceptible common bean genotype showed that induction of PvOFP7 , PvAP2‐ERF71 , or PvExpansinA17 expression by dTALEs resulted in CBB symptom reduction. After PvOFP7 induction, in planta bacterial growth was reduced at early colonization stages, and RNA-seq analysis revealed up-regulation of cell wall formation and primary metabolism, together with major down-regulation of heat shock proteins. Our results demonstrated that PvOFP7 contributes to CBB resistance, and underlined the usefulness of dTALEs for functional validation of genes whose induction impacts Xanthomonas –plant interactions. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
15. Multipolarity, Alliances and Internal Balancing: Opportunities for Brazil.
- Author
-
Fornari Dall'Agnol, Gustavo and De Conti Pagliari, Graciela
- Subjects
- *
GREAT powers (International relations) , *MILITARY spending , *STRENGTH of materials , *NEGOTIATION - Abstract
The objective of this paper is to gain insight into Brazil's role in an unbalanced multipolar scenario. To achieve this objective, the principal concepts and assumptions of neorealism and offensive neorealism are set forth. It is argued that the optimal strategy for Brazil at this juncture is to pursue internal balancing to enhance its bargaining position among major powers and peer competitors. In this sense, the paper is normative, although its recommendations are derived from the system's imperatives, such as the vulnerabilities of alliances in a multipolar world. The United States is engaged in pivotal areas in Asia and Europe, which creates a margin of maneuverability in Latin America, historically a zone of influence for the United States. Moreover, Brazil must enhance its material strength, as it is a country of considerable richness and size, and thus of interest to great powers. To achieve a strong bargaining position, structural problems such as defense spending and investment must be addressed. We conclude that, regardless of whether Brazil "picks a side" or maintains a neutral position, internal balancing is necessary to achieve its objectives. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
16. القدس في الأدب الأفريقي العربي: رمز للهوية والمقاومة * تاريخ الاستلام: 5 سبتمبر/ أيلول تاريخ قبول النشر: 13 ديسمبر.
- Author
-
MAIGA, Mohamadou Aboubacar
- Subjects
- *
ARABIC literature , *COLLECTIVE consciousness , *AFRICAN literature , *JUSTICE , *CONSCIOUSNESS - Abstract
Al-Quds holds a significant position in the Islamic world, both historically and religiously, and is considered a central symbol of Islamic Arab identity. It is home to Masjid al-Aqsa, the first qibla and the third holiest site in Islam, which has granted it a special place in the hearts of Muslims throughout the ages. This study aims to explore how al-Quds is represented in African Arab literature and examine the connections between this representation and Islamic Arab identity while also focusing on the impact of al-Quds’ occupation on shaping this literature. The study draws upon an analysis of literary works by Arabized African writers from West African countries such as Mali, Senegal, Nigeria, Guinea, Niger, Mauritania, Ghana, and Togo. These works portray al-Quds as more than a geographical location; it symbolizes struggle and resistance against injustice and occupation, embodying values of justice and dignity within Islamic consciousness. Additionally, the study reveals that alQuds holds a significant dimension in the religious and political identity of Muslims in this region, where it is viewed as a source of inspiration for their struggles against political and social oppression. These writers believe that al-Quds represents a more profound symbol beyond geographic and political conflicts, embodying the unity of the Islamic and Arab Ummah in the face of global challenges. Therefore, it becomes evident that the issue of al-Quds is not merely a regional matter concerning Palestine alone but a global Islamic cause that resonates with the collective consciousness of the entire Ummah, playing a crucial role in shaping literary discourse in West Africa. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Why States Arm and Why, Sometimes, They Do So Together.
- Author
-
Anicetti, Jonata and Krotz, Ulrich
- Subjects
- *
INTERNATIONAL relations , *INTERNATIONAL security , *ECLECTICISM , *NUCLEAR weapons , *MILITARY readiness - Abstract
Why do states arm? And why do they, sometimes, do so together with other states? International relations and security studies scholars have long explored the causes that propel states to arm. However, the extant literature has yet to provide a coherent theoretical framework to explain arms production and collaboration. Drawing from work in eclectic theorizing, this article contributes a systematizing, integrative perspective. States arm, and sometimes arm together with other states, for a variety of reasons, often with very diverse theoretical roots and origins; frequently, causes mix, mingle, and intertwine. Two case studies serve as building blocks for our eclectic theory, illustrating and buttressing our framework. A study of Brazil's KC-390 military transport aircraft demonstrates the value of eclectic theorizing in explaining arms production. European (fragmented) collaboration to develop a sixth-generation fighter aircraft documents the benefits of applying an eclectic theory of arms collaboration augmented with a "domain of application" approach. That is, explanations rooted in particular theoretical traditions apply and play out strengths in specific domains, and may thus complement one another to generate comprehensive explanations. Among numerous other promising domain differentiations, we distinguish here between "high-end" and "low-end" arming. Our findings have important policy implications. If states' arming, alone or with others, is multicausal, then no single policy alone will suffice to channel, control, limit, or reduce the proliferation of weapons. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Balancing act: The dynamic relationship between nutrient availability and plant defence.
- Author
-
Dutta, Arka, Dracatos, Peter M., and Khan, Ghazanfar Abbas
- Subjects
- *
REACTIVE oxygen species , *COPPER , *PLANT nutrients , *IMMUNE response , *LEGAL evidence , *IRON , *NITROGEN - Abstract
SUMMARY: Plants depend heavily on soil nutrients for growth, development and defence. Nutrient availability is crucial not only for sustaining vital biochemical processes but also for mounting effective defences against a diverse array of pathogens. Macronutrients such as nitrogen, phosphorus and potassium significantly influence plant defence mechanisms by providing essential building blocks for the synthesis of defence compounds, immune signalling and physiological responses like stomatal regulation. Micronutrients like zinc, copper and iron are essential for balancing reactive oxygen species and other reactive compounds in plant immune responses. Although substantial circumstantial evidence links nutrient availability to plant defence, the molecular mechanisms underlying this process have only recently started to be understood. This review focuses on summarizing recent advances in understanding the molecular mechanisms by which nitrogen, phosphorus and iron interact with plant defence mechanisms and explores the potential for engineering nutritional immunity in crops to enhance their resilience against pathogens. Significance Statement: This review synthesizes recent advances in understanding how key nutrients—nitrogen, phosphorus and iron—interact with plant defence mechanisms. It explores the molecular pathways that link nutrient availability to immune responses and discusses the potential for engineering nutritional immunity to enhance crop resilience against pathogens. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Trade‐offs between defense and competitive traits in a planktonic predator–prey system.
- Author
-
Réveillon, Tom and Becks, Lutz
- Subjects
- *
CHLAMYDOMONAS reinhardtii , *BRACHIONUS , *ROTIFERA , *ALGAE , *PREDATION , *ANCESTORS - Abstract
Predator–prey interactions are crucial components of populations and communities. Their dynamics depend on the covariation of traits of the interacting organisms, and there is increasing evidence that intraspecific trade‐off relationships between defense and competitive traits are important drivers of trophic interactions. However, quantifying the relevant traits forming defense–competitiveness trade‐offs and how these traits determine prey and predator fitness remains a major challenge. Here, we conducted feeding and growth experiments to assess multiple traits related to defense and competitiveness in six different strains of the green alga Chlamydomonas reinhardtii exposed to predation by the rotifer Brachionus calyciflorus. We found large differences in defense and competitive traits among prey strains and negative relationships between these traits for multiple trait combinations. Because we compared trait differences among strains whose ancestors evolved previously in controlled environments where selection favored either defense or competitiveness, these negative correlations suggest the presence of a trade‐off between defense and competitiveness. These differences in traits and trade‐offs translated into differences in prey and predator fitness, demonstrating the importance of intraspecific trade‐offs in predicting the outcome of predator–prey interactions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Antagonistic Potential and Metabolomic Profiling of Clonostachys rosea against Alternaria spp. causing Early Blight in Tomato.
- Author
-
Arulsia, A., Kannan, R., Harish, S., Sendhilvel, V., Sivakumar, U., and Swarnakumari, N.
- Subjects
- *
TOMATOES , *ALTERNARIA alternata , *ALTERNARIA , *ANTAGONISTIC fungi , *METABOLOMICS , *TRICHODERMA , *MYCOSES , *TOMATO farming - Abstract
Tomato cultivation faces significant challenges from foliar fungal diseases such as early blight caused by Alternaria spp., resulting in substantial reduction in yield. In this study, we examined the suppressive effects of the antagonistic fungus Clonostachys rosea on early blight of tomato under controlled experimental conditions. The results of dual culture experiments revealed the inhibitory effects of five C. rosea isolates on Alternaria spp., with the TNAU CR04 isolate exhibiting the highest inhibition (77.22%). Scanning electron microscopy provided good insight into antagonistic effects of C. rosea against A. alternata, revealing hyphal interactions and structural alterations. Further investigations focused on the suppression of Alternaria alternata mycelial growth (86.78%) by culture filtrates of C. rosea. The results revealed that TNAU CR04 at a 50% concentration strongly inhibited mycelial growth. Through GC-MS analysis, we identified key compounds involved in the interaction between C. rosea TNAU CR04 and A. alternata, shedding light on metabolic pathways and defense mechanisms. Overall, this study showed that C. rosea and its metabolites strongly act against Alternaria spp., revealing its mode of action and mechanisms underlying disease suppression in tomato plants. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Central amygdala‐to‐pre‐Bötzinger complex neurotransmission is direct and inhibitory.
- Author
-
Gu, Jeffrey, Sugimura, Yae K., Kato, Fusao, and Del Negro, Christopher A.
- Subjects
- *
LIMBIC system , *EPILEPSY , *EMOTION regulation , *ANXIETY disorders , *NEURONS , *AMYGDALOID body - Abstract
Breathing behaviour is subject to emotional regulation, but the underlying mechanisms remain unclear. Here, we demonstrate a direct relationship between the central amygdala, a major output hub of the limbic system associated with emotional brain function, and the brainstem pre‐Bötzinger complex, which generates the fundamental rhythm and pattern for breathing. The connection between these two sites is monosynaptic and inhibitory, involving GABAergic central amygdala neurons whose axonal projections act predominantly via ionotropic GABAA receptors to produce inhibitory postsynaptic currents in pre‐Bötzinger neurons. This pathway may provide a mechanism to inhibit breathing in the context of freezing to assess threats and plan defensive action. The existence of this pathway may further explain how epileptic seizures invading the amygdala cause long‐lasting apnea, which can be fatal. Although their ultimate importance awaits further behavioural tests, these results elucidate a link between emotional brain function and breathing, which underlies survival‐related behaviour in mammals and pertains to human anxiety disorders. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. European union defense and security strategy for space and ground-based systems against hybrid threats.
- Author
-
Reis, João
- Subjects
- *
INFRASTRUCTURE (Economics) , *MILITARY policy , *GEOPOLITICS , *MANUSCRIPTS - Abstract
This article explores the Space Defense Strategy of the European Union (EU), building upon the recognition of Space as a crucial strategic domain within the EU's strategic Space compass. In the current geopolitical context, marked by increased power competition and intensified threats, the EU is proactively safeguarding its Space assets and strengthening its strategic autonomy. The central goal is to defend EU interests by deterring hostile Space activities. A pivotal aspect of this strategy is the development of methods and models to enhance the resilience of critical infrastructure to counter hybrid threats effectively. Considering the above, we adopted a Systematic Literature Review approach to identify relevant manuscripts and establish a robust conceptual framework for the EU Space Strategy in Security and Defense. The results revealed a conceptual framework encompassing three fundamental domains–hybrid threats, EU actions against threats, and an envisioned expansion of the Space strategy. The latter domain comes from the compelling need to fortify the EU's internal-external nexus emphasizing an approach that raises Space services to bolster Common Security and Defense Policy missions–this adaptive response addresses the nature of modern hybrid threats. From our perspective, the most effective solutions should cover all levels, addressing both domestic and international scopes. • Explores the space strategy of the EU in the fields of security and defense. • Addresses the contemporary hybrid character of space threats. • Provides a robust conceptual framework for securing space against hybrid threats. • Foresees EU satellite application to enhance CSDP missions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. PROBLEMS OF GENDER EQUALITY WITHIN THE CONDITIONS OF ARMED CONFLICTS.
- Author
-
PROTS, Anastasiia, PAURIENĖ, Giedrė, and CHEREP, Alla
- Abstract
This article is devoted to the study of the role of gender equality in the context of national security, taking into account modern world trends. We investigate how the implementation of equal opportunities for all gender groups can affect the stability and security of society. Analysis of the impact of gender equality on national security covers various spheres of life -- from politics and economics to peacekeeping and the fight against terrorism. Theoretical approaches to defining the essence of the concept of "national security", which is considered by scientists as a multi-level system of dependencies of various kinds, which are at different levels of perception, have been studied, and the author's definition of the essence of the concept has been provided. In addition, gender gaps in security and defense are addressed, highlighting the importance of gender-sensitive leadership in peacekeeping missions. It is emphasized that in order to achieve gender equality, it is necessary not only to increase the representation of women, but also to create conditions so that they can effectively perform their duties and overcome possible discrimination. The role of gender-sensitive leadership in peacekeeping missions has been established and it is stated that increasing the number of women in peace-management operations contributes to the fight against the patriarchal environment, which is hostile to the presence of women in such operations. It was established that insufficient consideration of gender aspects in the strategies, policies and procedures of the security and defense sector, gender imbalance at the level of decision-making, professional gender segregation, the infrastructure of the sector does not fully meet the needs of women, the procurement and provision of equipment and uniforms does not take into account gender aspects, Gender challenge shave been found, in particular the partial inconsistency of the administrative and economic working conditions of male service members and female service members, as well as recommendations for overcoming gender problems and gaps have been developed. The possibility of reducing conflicts through the involvement of women in decision-making processes, the role of women's peace initiatives in reducing violence have been analyzed. Proposals were made to improve the regulatory framework of the security and defense sector to ensure gender equality and eliminate differences in the status positions of women and men -- military personnel. The impact of stereotypes and inequality on radicalization and terrorism is also explored. Overall, the article highlights the importance of promoting gender equality as a key factor in achieving national security and stability in today's geopolitical context. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. LOS ALCANCES DEL EXAMEN DE ADMISIBILIDAD DE LA DEMANDA COLECTIVA Y EL DERECHO DE DEFENSA DE LAS PARTES.
- Author
-
Aguirrezabal-Grünstein, Maite
- Subjects
CLASS actions ,LEGAL judgments ,APPELLATE courts ,CONSTITUTIONAL courts ,CONSUMERS - Abstract
Copyright of Revista Chilena de Derecho Privado is the property of Fundacion Fernando Fueyo Laneri and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
25. Molecular interplay of symbiotic and defensive responses in the non-model legume Arachis hypogaea.
- Author
-
Rodriguez, Johan, Tonelli, María Laura, Fabra, Adriana, and Ibañez, Fernando
- Abstract
Plants and their microbiome are constantly influenced by a wide range of signaling molecules. However, molecular signaling between plants and associated microorganisms has been mainly studied in individual interactions with symbiotic or pathogenic microorganisms. The aim of this work was to study the molecular crosstalk between the signaling pathways activated after the individual and simultaneous perception of rhizobial Nod factors (symbiotic elicitor), chitosan (defense responses elicitor) and surfactin (Induced Systemic Resistance elicitor) in peanut plants. Transcriptome sequencing databases and bioinformatics were used to identify a set of marker genes for symbiotic and defense pathways. Afterwards, qRT-PCR analyses were used to study the expression of these selected genes in response to Nod factors, chitosan and surfactin inoculation and combined treatments. Simultaneous inoculation of Nod factors and chitosan indicated the prevalence of plant defense responses over the symbiotic pathway. On the other hand, transcriptional profiles of the marker genes were not significantly modified in plants previously treated with surfactin and inoculated with Nod factors and chitosan with respect to individual inoculation of the defense elicitor molecule. Taken together, the results reveal a complex scenario of symbiotic and defense pathways activated by the simultaneous detection of different elicitor molecules and contribute to the knowledge of the molecular crosstalk between the symbiotic and defense pathways in legumes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Thinning enhances whitebark pine (Pinus albicaulis) growth and resin duct defenses.
- Author
-
Kichas, Nickolas E., Shanahan, Erin K., and Hood, Sharon M.
- Subjects
TREE mortality ,FOREST canopies ,ENDANGERED species ,FOREST reserves ,PINE ,TREE growth - Abstract
Whitebark pine (Pinus albicaulis) is an important component of high‐elevation ecosystems throughout the northern Rocky Mountains; however, the species was recently listed as "threatened" under the Endangered Species Act due to widespread mortality throughout its native range. Land managers tasked with whitebark pine conservation and restoration require information on strategies that can positively influence whitebark pine establishment and promote growth and defense of preexisting trees on the landscape. Our study investigated the response of whitebark pine tree growth and resin duct defenses to thinning and removal of competing shade‐tolerant conifers in the Caribou‐Targhee National Forest, Idaho, USA. In the nine years following thinning treatments, we found that whitebark pine trees (>12.7 cm diameter at breast height [dbh]) responded favorably to thinning and experienced a 60% increase in basal area increment (52% increase in ring width index) while also producing 34% more resin ducts. Additionally, resin ducts were 23% larger with 49% increased area in the nine years post‐thinning compared with trees in the control. Small diameter (<5 cm dbh) whitebark pine in the treatment experienced a dramatic growth release with over 90% increase in basal area increment (74% increase in ring width index). Thinning also created conditions favorable for whitebark pine seedling and sapling establishment. In the treatment, 75% of seedlings and 93% of saplings were whitebark pine, compared with 32% seedlings and 14% saplings in the control. In addition, 93% of overstory trees in the treatment were whitebark pine, compared with 42% in the control. Whitebark pine tree mortality was similar across both the control (26%) and the treatment (25%), indicating that the thinning treatments did not have any adverse impacts on tree mortality. The positive effects of thinning on whitebark pine establishment and tree growth, coupled with the lack of elevated mortality in the treatment, provide strong evidence in support of thinning as a viable silvicultural technique in whitebark pine conservation efforts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. ОПЕРАТИВНО-РОЗШУКОВЕ ЗАБЕЗПЕЧЕННЯ ПРОТИДІЇ ЗЛОЧИННОСТІ В ОБОРОННО-ПРОМИСЛОВОМУ КОМПЛЕКСІ УКРАЇНИ.
- Author
-
Р. Ч., Сайипов
- Subjects
CRIMINAL procedure ,CRIME ,CRIMINAL codes ,OFFICIAL secrets ,ECONOMIC entity ,COOPERATION - Abstract
The defense-industrial complex is a component of the security and defense sector of Ukraine, the main task of which is the implementation of mechanisms of public-private partnership and militarytechnical cooperation with foreign countries for the production, supply of new and modernization of existing types of weapons, military and special equipment that meet the needs of the Armed Forces of Ukraine and other bodies of the security and defense sector, as well as to increase the export militaryindustrial potential of the country. Systematization of criminal offenses committed in the defense-industrial complex of Ukraine was carried out, divided into: self-interested encroachments on property (Articles 185, 191 of the Criminal Code of Ukraine) and abuse of office (Articles 364, 364-1, 365-2, 366, 367, 368, 369-2 of the Criminal Code of Ukraine); economic and criminal sabotage that undermines the economic security and defense capability of the country (Articles 330 and 333 of the Criminal Code of Ukraine) – uncontrolled movement across the state border of Ukraine of information and products of defense importance that are state secrets or subject to special export control; the defense-industrial complex, as an object of destructive influence by hostile foreign policy agents, can become the cause of crimes against the interests of the state and national security, such as disclosure of state secrets (Article 328 of the Criminal Code of Ukraine), espionage (Article 114 of the Criminal Code of Ukraine), treason (Article 111 of the Criminal Code of Ukraine) and sabotage (Article 113 of the Criminal Code of Ukraine). The conducted analysis of the criminal situation in the defense-industrial sphere proved the need for the implementation of a complex, systematic criminal-obstructive influence, including an operationalinvestigative one. Professional concealment of criminal actions by the participants through the use of a network of non-state economic entities and corruption connections is characteristic of such a militaryindustrial sector. Latency of tinted embezzlement schemes, carried out with the participation of illegally operating business entities, determines the priority of the work of operational units in identifying and documenting signs of criminal offenses in this area. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Pyrrolizidine alkaloids in tiger moths: trends and knowledge gaps.
- Author
-
Lopez-Cacacho, Isabel, de Bem Oliveira, Ivone, Markee, Amanda, Dowdy, Nicolas J., and Kawahara, Akito Y.
- Abstract
Insects and plants have been part of an evolutionary arms race that has led plants to produce toxins as defense and insects to sequester these chemical compounds. Pyrrolizidine alkaloids (PAs) are secondary plant chemical metabolites, and some herbivorous insects have evolved biochemical mechanisms to tolerate, sequester, and use PAs against predators and parasitoids. Several tiger moth species (Erebidae: Arctiinae) have gone one step further by transferring PAs acquired during mating to their eggs or using them as precursors of sexual pheromones, thereby making PAs an essential element in sexual selection. Although tiger moths are well known to use PAs for defense, a comprehensive qualitative and quantitative systematic review of PA research on tiger moths has yet to be conducted. To identify areas of past research focus and future research potential, we analyzed 108 studies retrieved from an exhaustive search on the Web of Science. Through a scientometric analysis, we synthesized available literature, examining authors, journals, countries and keywords with the aim of providing researchers tools to navigate the current literature more effectively. Using a systematic review approach, we evaluated the frequency of moth species studied and host plant diet, along with their research topic, allowing us to identify major knowledge gaps. We show that the number of publications decreased after 2015, and most research has focused on a few moth species and research topics. Our results provide valuable insights that can help direct research efforts to further the development of knowledge about PAs in Arctiinae. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Function and Evolution of the Plant MES Family of Methylesterases.
- Author
-
Chaffin, Timothy A., Wang, Weijiao, Chen, Jin-Gui, and Chen, Feng
- Subjects
METHYL formate ,ROOT development ,CHROMOSOME duplication ,ESTERS ,CARBOXYLIC acids - Abstract
Land plant evolution has been marked by numerous genetic innovations, including novel catalytic reactions. Plants produce various carboxyl methyl esters using carboxylic acids as substrates, both of which are involved in diverse biological processes. The biosynthesis of methyl esters is catalyzed by SABATH methyltransferases, and understanding of this family has broadened in recent years. Meanwhile, the enzymes catalyzing demethylation—known as methylesterases (MESs)—have received less attention. Here, we present a comprehensive review of the plant MES family, focusing on known biochemical and biological functions, and evolution in the plant kingdom. Thirty-two MES genes have been biochemically characterized, with substrates including methyl esters of plant hormones and several other specialized metabolites. One characterized member demonstrates non-esterase activity, indicating functional diversity in this family. MES genes regulate biological processes, including biotic and abiotic defense, as well as germination and root development. While MES genes are absent in green algae, they are ubiquitous among the land plants analyzed. Extant MES genes belong to three groups of deep origin, implying ancient gene duplication and functional divergence. Two of these groups have yet to have any characterized members. Much remains to be uncovered about the enzymatic functions, biological roles, and evolution of the MES family. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. An insect pheromone primes tolerance of herbivory in goldenrod plants.
- Author
-
Yip, Eric C., Mescher, Mark C., De Moraes, Consuelo M., and Tooker, John F.
- Subjects
- *
INSECT pheromones , *EXPOSURE dose , *PHEROMONES , *PLANT growth , *RESOURCE allocation , *PLANT defenses - Abstract
Environmental cues that predict increased risk of herbivory can prime plant defenses; however, few studies have explored how such cues elicit broader plant responses, including potential effects on plant growth and other resource allocations that may affect tolerance to herbivore damage. We exposed goldenrod plants (Solidago altissima) to varying concentrations of the putative sex pheromone of a gall‐inducing herbivore, which has previously been implicated in defense priming. In experiments with two plant genotypes and three herbivore populations, any level of exposure to the pheromone enhanced tolerance of galling, rescuing flower production to levels observed for ungalled plants. Exposure to low doses of the pheromone elicited greater resistance to galling than exposure to high doses, with unexposed plants exhibiting intermediate resistance, suggesting a nonlinear relationship between exposure and defense priming. These findings suggest plant responses to environmental cues associated with biotic stressors are broader and more complex than previously appreciated. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Freud's 1926 conjecture is confirmed: evidence from the dorsal periaqueductal gray in mice that human psychological defense against internal instinctual threat evolved from animal motor defense against external predatory threat.
- Author
-
Schwartz, Paul J.
- Subjects
PSYCHOANALYTIC interpretation ,ANIMAL defenses ,POST-traumatic stress disorder ,COMPUTATIONAL neuroscience ,PSYCHOANALYTIC theory - Abstract
In 1926, Freud famously conjectured that the human ego defense of repression against an internal instinctual threat evolved from the animal motor defense of flight from an external predatory threat. Studies over the past 50 years mainly in rodents have investigated the neurobiology of the fight-or-flight reflex to external threats, which activates the emergency alarm system in the dorsal periaqueductal gray (dPAG), the malfunction of which appears likely in panic and post-traumatic stress disorders, but perhaps also in some "non-emergent" conditions like social anxiety and "hysterical" conversion disorder. Computational neuroscience studies in mice by Reis and colleagues have revealed unprecedented insights into the dPAG-related neural mechanisms underlying these evolutionarily honed emergency vertebrate defensive functions (e.g., explore, risk assessment, escape, freeze). A psychoanalytic interpretation of the Reis studies demonstrates that Freud's 1926 conjecture is confirmed, and that internal instinctual threats alone can also set off the dPAG emergency alarm system, which is regulated by 5-HT
1A and CRF-1 receptors. Consistent with current psychoanalytic and neurobiologic theories of panic, several other of the primitive components of the dPAG alarm system may also have relevance for understanding of the unconscious determinants of impaired object relationships (e.g., avoidance distance). These dPAG findings reveal (1) a process of "evolution in situ ," whereby a more sophisticated dPAG ego defense is seen evolving out of a more primitive dPAG motor defense, (2) a dPAG location for the phylogenetically ancient kernel of Freud's Ego and Id, and (3) a Conscious Id theory that has been conclusively invalidated. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
32. Modern ransomware: Evolution, methodology, attack model, prevention and mitigation using multi‐tiered approach.
- Author
-
Raj, Arpit, Narayan, Vedant, Muskan, Vivek, Sani, Abhilash, Sharma, Pankaj, and Sarma, S. S.
- Subjects
- *
MALWARE prevention , *DIGITAL technology , *CYBERTERRORISM , *RANSOMWARE , *BUDGET - Abstract
Ransomware is a menace to the vibrant digital ecosystem. The exponential growth in ransomware attacks, its detrimental impacts, and the ever‐changing methods adopted by threat actor groups demands a focused understanding of the evolution of ransomware. This would help the organizations devise novel defensive frameworks and security controls against the modern ransomware. In this work, the impacts and evolution of ransomware through different phases up to its current form are detailed. Further, based on the study and analysis of the most prevalent modern ransomware variants, their most used tactics, techniques and procedures (TTPs) are identified as per the MITRE ATT&CK model. This acts as a platform to propose a generic attack model for "modern ransomware." Building on the existing MITRE mitigation, D3FEND‐based approaches and considering the resource and budget constraints of organizations, a simplified three‐tier defensive model that is cost‐effective and implementable is put forward. Thus, this work aims to open avenues for understanding the TTPs, and attack methodology of "modern ransomware," thereby developing feasible and implementable defensive security controls. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Design of distributed network intrusion prevention system based on Spark and P2DR models.
- Author
-
An, Lei, Qiu, Jiankai, Zhang, Hanzhi, and Liu, Chen
- Subjects
- *
RANDOM forest algorithms , *INFORMATION technology security , *COMPUTER network traffic , *COMPUTER network security , *FALSE alarms , *INTRUSION detection systems (Computer security) - Abstract
The commonly used method for network intrusion is based on pattern matching systems, but these systems do not have high detection accuracy when facing large-scale high-speed network traffic environments. In addition, when facing a wide variety of network attacks, relying solely on a certain network security technology is difficult to ensure network security. Therefore, a distributed network intrusion prevention system based on the Spark framework and dynamic information security theory model was innovatively proposed to improve the detection efficiency of network intrusion and solve these issues. The architecture and functional structure of the network intrusion prevention system were constructed by improving the random forest algorithm and Spark. In addition, the dynamic network intrusion prevention system was designed on the basis of the Policy Protection Detection Response (P2DR) model and the Protection Detection Reaction Recovery (PDRR) model to cope with the diverse network attacks and make up for the lack of dynamic defense based on improved forest algorithm and Spark. The test results showed that the network intrusion prevention system based on the improved random forest algorithm and Spark had a maximum detection time of 13,593 ms, a minimum detection time of 13,318 ms, and an average detection time of 13,468 ms when the data were 6000 pieces. The average success rate of the dynamic network intrusion prevention system based on the dynamic information security theory model was 87.72%, the average detection rate was 71.68%, and the average false alarm rate was 17.23%. The F1 values corresponding to the improved random forest algorithm under 7 different attack types of data were 0.985, 0.983, 0.876, 0.843, 0.797, 0.983, and 0.890, respectively, which were significantly better than the comparison algorithm. It can be seen that the dynamic network intrusion prevention system based on the improved random forest algorithm, Spark, and the dynamic information security theoretical model, has good performance and can effectively detect network intrusions, providing technical support for solving network intrusion problems in reality. The contribution of the research is reflected in the improvement of the detection performance of network intrusion detection systems and the reduction of detection time and false alarm rates. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Systemic acquired resistance inducing chemicals mitigate black scurf disease in potato by activating defense-related enzymes.
- Author
-
Buswal, Manoj Kumar, Punia, Rakesh, Kumar, Mukesh, Tiwari, Rahul Kumar, Lal, Milan Kumar, and Kumar, Ravinder
- Subjects
SALICYLIC acid ,POLYPHENOL oxidase ,JASMONIC acid ,TUBERS ,CHEMICAL resistance - Abstract
The potato, being an underground vegetable crop, faces consistent threats from soil- and tuber-borne fungal and bacterial pathogens. Black scurf and stem canker disease caused by the fungal pathogen Rhizoctonia solani Kuhn is a critical global concern in the potato cultivation system. In this study, we evaluated the disease mitigation potential of five systemic acquired resistance-inducing chemicals viz., salicylic acid, jasmonic acid, β-aminobutyric acid, γ-aminobutyric acid and hydrogen peroxide (H
2 O2 ). Two common methods, tuber dipping and foliar spray, were utilized in this experiment to evaluate pathogen inhibition on inoculated tubers. The results revealed that all the systemic acquired resistance inducing chemicals were effective in disease suppression in a concentration-dependent manner compared to an inoculated control. Significant differences (P < 0.005) were evident among the various treatment combinations, with salicylic acid being the most effective in alleviating black scurf disease. Maximum reduction in disease incidence compared to the control was observed with salicylic acid (57.89% and 73.68%), followed by jasmonic acid (52.63% and 65.78%) and H2 O2 (49.99% and 60.52%) under the tuber dipping treatment combinations. Whereas, in the foliar application, the maximum reduction in disease incidence compared to the control was observed with salicylic acid (44.73 and 63.15%), followed by jasmonic acid (42.10 and 60.52%) and H2 O2 (39.46 and 52.63%). The tuber dipping treatments were significantly more efficacious (P < 0.005) compared to foliar spray for all treatment combinations. The biochemical analysis of defense-related enzymes and metabolites demonstrated the induced resistance activation under these treatments. The activity of peroxidase, polyphenol oxidase, and phenyl ammonia-lyase was significantly higher in treated tubers as compared to inoculated and uninoculated control. The total phenol content was also elevated in treated tubers as compared to the respective control. Altogether, these resistance-inducing chemicals can be successfully included in integrated disease management programs. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
35. Kimyasal Savaş Ajanları: Özellikleri, Etkileri ve Dekontaminasyon Stratejileri.
- Author
-
BİLGİSEVEN, İrem Mukaddes and KARAKURT, Serdar
- Subjects
CHEMICAL warfare agents ,NERVE gases ,CHEMICAL weapons ,HUMAN ecology ,OXIDATIVE stress - Abstract
Copyright of Journal of Defense Sciences / Savunma Bilmleri Dergisi is the property of Turkish Military Academy Defense Sciences Institute and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
36. The defense function of the state: Traditional and modern understanding
- Author
-
Vračar Milinko S. and Barišić Igor I.
- Subjects
defense ,human ,state ,defense mechanism ,defense function ,Political science - Abstract
To understand a phenomenon means to grasp its essence, that is, all the characteristics that define it and distinguish it from other phenomena. Since the defense function of the state is a complex phenomenon encompassing biological, anthropological, philosophical, sociological, psychological, political, security, military, strategic, and other aspects, understanding its essence is no easy task. It requires a multidisciplinary approach and the application of concepts such as man, society, state, values, interests, power, politics, and strategy. The starting point in understanding its essence is undoubtedly the individual, given that instinctual needs for survival and security drive human nature. Since the origin and functioning of a political community are rooted in these human needs, the defense function of the state can be further clarified through an analogy with the same function in individuals. By applying this analogy, it can be concluded that defense belongs to the state's protective functions category. It differs from other functions of this type in that it is aimed at safeguarding the survival and vital values of the state from violent threats, and its protective action is also inherently violent. For this reason, until recently, the defense function of the state was equated with the military function. In recent decades, however, there has been a shift from the traditional militarycentric understanding of the state's defense function due to the growing significance of non-military threats to its survival and vital values. This has led to changes in the state's defense operations and, consequently, to a transformation in the essence of its defense function. While the object of the state's defense remains the same, its survival and vital values, the changes in the essence of its defense function emerge from the dialectical relationship between defense and attack. Therefore, the modern defense function of the state can be understood as a protective function by which the state, through the use of military and non-military instruments of national power in both peace and war, protects its survival and vital values from various military and non-military threats.
- Published
- 2025
- Full Text
- View/download PDF
37. Securing E.U. Democracy and Citizenship at what Costs? Reflections on Defence Spendings Between North-South and West-East Divergens
- Author
-
Laurențiu PETRILA, Felix Angel POPESCU, and Ana-Maria COATU
- Subjects
defense ,budgets ,acquisitions ,security ,culture ,e.u. ,nato. ,International relations ,JZ2-6530 - Abstract
The events produced at the international level today demonstrate and track the recent evolution of the security environment of each member state of the European Union and beyond. The direct and indirect threats to regional and global security and stability require the taking, by the bodies empowered in this regard, of some precautionary measures and the improvement of the already existing military equipment at the level of each structure representing the military force of the states. In order to increase the sustainability and production capacity of the European Union, it is essential not only to increase, but also to optimize national and international investments in this field. This approach is necessary to achieve a significant change in strategy and to strengthen the joint capability to respond to critical needs.
- Published
- 2024
- Full Text
- View/download PDF
38. miR472 Deficiency Enhances Arabidopsis thaliana Defense Without Reducing Seed Production
- Author
-
Francois Vasseur, Patricia Baldrich, Tamara Jiménez-Góngora, Luis Villar-Martin, Detlef Weigel, and Ignacio Rubio-Somoza
- Subjects
defense ,development ,evolution ,microRNA ,nucleotide-binding leucine-rich repeat protein ,pathogen sensor ,Microbiology ,QR1-502 ,Botany ,QK1-989 - Abstract
After having co-existed in plant genomes for at least 200 million years, the products of microRNA (miRNA) and nucleotide-binding leucine-rich repeat protein (NLR) genes formed a regulatory relationship in the common ancestor of modern gymnosperms and angiosperms. From then on, DNA polymorphisms occurring at miRNA target sequences within NLR transcripts must have been compensated by mutations in the corresponding mature miRNA sequence. The potential evolutionary advantage of such regulation remains largely unknown and might be related to two nonexclusive scenarios: (i) miRNA-dependent regulation of NLR levels might prevent defense mis-activation with negative effects on plant growth and reproduction or (ii) reduction of active miRNA levels in response to pathogen-derived molecules (pathogen-associated molecular patterns [PAMPs] and silencing suppressors) might rapidly release otherwise silent NLR transcripts for rapid translation and thereby enhance defense. Here, we used Arabidopsis thaliana plants deficient for miR472 function to study the impact of releasing its NLR targets on plant growth and reproduction and on defense against the fungal pathogen Plectosphaerella cucumerina. We show that miR472 regulation has a dual role, participating both in the tight regulation of plant defense and growth. MIM472 lines, with reduced active miR472, are more resistant to pathogens and, correlatively, have reduced relative growth compared with wild-type plants, although the end of their reproductive phase is delayed, exhibiting higher adult biomass and similar seed yield as the wild-type. Our study highlights how negative consequences of defense activation might be compensated by changes in phenology and that miR472 reduction is an integral part of plant defense responses. [Figure: see text] Copyright © 2024 The Author(s). This is an open access article distributed under the CC BY-NC-ND 4.0 International license.
- Published
- 2024
- Full Text
- View/download PDF
39. Defense supply chain collaboration: an exploratory study and empirical framework
- Author
-
Loska, David, Genchev, Stefan, Rich, Nicholas, and Malik, Tegwen
- Published
- 2024
- Full Text
- View/download PDF
40. Small RNA sequencing analysis provides novel insights into microRNA-mediated regulation of defense responses in chickpea against Fusarium wilt infection.
- Author
-
Priyadarshini, Parichita, Kalwan, Gopal, Kohli, Deshika, Kumar, Deepesh, Bharadwaj, C., Gaikwad, Kishor, and Jain, Pradeep Kumar
- Subjects
GENE expression ,NON-coding RNA ,RNA sequencing ,FUSARIOSIS ,LIFE sciences - Abstract
Main conclusion: Small RNA sequencing analysis in two chickpea genotypes, JG 62 (Fusarium wilt-susceptible) and WR 315 (Fusarium wilt-resistant), under Fusarium wilt stress led to identification of 544 miRNAs which included 406 known and 138 novel miRNAs. A total of 115 miRNAs showed differential expression in both the genotypes across different combinations. A miRNA, Car-miR398 targeted copper chaperone for superoxide dismutase (CCS) that, in turn, regulated superoxide dismutase (SOD) activity during chickpea–Foc interaction. Fusarium wilt (FW) of chickpea (Cicer arietinum L.) caused by Fusarium oxysporum f. sp. ciceris (Foc) is a destructive soil-borne disease that severely reduces the chickpea yield and quality globally. In the present study, we have investigated microRNAs and the microRNA/target gene crosstalk involved in chickpea resistance to FW. The control and stress samples from two genotypes, JG 62 (FW-susceptible) and WR 315 (FW-resistant), collected at 10 days post-inoculation (dpi), were selected for small RNA sequencing. A total of 12 libraries were constructed and sequenced using Illumina HiSeq 2500 platform. The sequencing and in silico analyses revealed the identification of 544 miRNAs which included 406 known and 138 novel miRNAs. A total of 50 miRNAs were physically co-localized with Foc-resistance QTLs present on chromosome 2 (also known as Foc hotspot). A total of 115 miRNAs showed differential expression in both the genotypes across different combinations. Prediction and functional annotation of miRNA targets revealed their role in transcription regulation, disease resistance, defense response, metabolism, etc. Ten miRNAs and their targets were validated using poly(A)-based qRT-PCR in two genotypes grown under lab and field conditions. Many miRNAs and their targets showed genotype-specific expression. The expression profiling also highlighted, both, similar and different expression patterns for the same sets of miRNA and mRNA at different stages of Foc infection. A high correlation in expression patterns of the miRNAs and their targets in lab- and field-grown plant samples was observed. Interestingly, Car-miR398 targeted copper chaperone for superoxide dismutase (CCS) that, in turn, regulated superoxide dismutase (SOD) activity during chickpea–Foc interaction. The cleavage site in targets was mapped for three miRNAs by analyzing publicly available degradome data for chickpea. The study, for the first time, provides novel insights into microRNA-mediated regulation of resistance and susceptibility mechanisms in chickpea against FW and opens up avenues for the development of the wilt-resistant cultivars in chickpea. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
41. Dual transcriptional characterization of spinach and Peronospora effusa during resistant and susceptible race-cultivar interactions
- Author
-
Kelley J. Clark, Chunda Feng, Amy G. Anchieta, Allen Van Deynze, James C. Correll, and Steven J. Klosterman
- Subjects
Race-specific ,Downy mildew ,Spinach ,Transcriptomics ,Defense ,Resistance ,Biotechnology ,TP248.13-248.65 ,Genetics ,QH426-470 - Abstract
Abstract Background Spinach downy mildew, caused by the obligate oomycete pathogen, Peronospora effusa remains a major concern for spinach production. Disease control is predominantly based on development of resistant spinach cultivars. However, new races and novel isolates of the pathogen continue to emerge and overcome cultivar resistance. Currently there are 20 known races of P. effusa. Here we characterized the transcriptomes of spinach, Spinacia oleracea, and P. effusa during disease progression using the spinach cultivar Viroflay, the near isogenic lines NIL1 and NIL3, and P. effusa races, R13 and R19, at 24 h post inoculation and 6 days post inoculation. A total of 54 samples were collected and subjected to sequencing and transcriptomic analysis. Results Differentially expressed gene (DEG) analysis in resistant spinach interactions of R13-NIL1 and R19-NIL3 revealed spinach DEGs from protein kinase-like and P-loop containing families, which have roles in plant defense. The homologous plant defense genes included but were not limited to, receptor-like protein kinases (Spiol0281C06495, Spiol06Chr21559 and Spiol06Chr24027), a BAK1 homolog (Spiol0223C05961), genes with leucine rich repeat motifs (Spiol04Chr08771, Spiol04Chr01972, Spiol05Chr26812, Spiol04Chr11049, Spiol0084S08137, Spiol03Chr20299) and ABC-transporters (Spiol02Chr28975, Spiol06Chr22112, Spiol06Chr03998 and Spiol04Chr09723). Additionally, analysis of the expression of eight homologous to previously reported downy mildew resistance genes revealed that some are differentially expressed during resistant reactions but not during susceptible reactions. Examination of P. effusa gene expression during infection of susceptible cultivars identified expressed genes present in R19 or R13 including predicted RxLR and Crinkler effector genes that may be responsible for race-specific virulence on NIL1 or NIL3 spinach hosts, respectively. Conclusions These findings deliver foundational insight to gene expression in both spinach and P. effusa during susceptible and resistant interactions and provide a library of candidate genes for further exploration and functional analysis. Such resources will be beneficial to spinach breeding efforts for disease resistance in addition to better understanding the virulence mechanisms of this obligate pathogen.
- Published
- 2024
- Full Text
- View/download PDF
42. Arabidopsis MORC1 and MED9 Interact to Regulate Defense Gene Expression and Plant Fitness
- Author
-
Ji Chul Nam, Padam Shekhar Bhatt, April Bonnard, Dinesh Pujara, and Hong-Gu Kang
- Subjects
arabidopsis ,defense ,growth ,mediator ,morc1 ,Plant culture ,SB1-1110 - Abstract
Arabidopsis MORC1 (Microrchidia) is required for multiple levels of immunity. We identified 14 MORC1-interacting proteins (MIPs) via yeast two-hybrid screening, eight of which have confirmed or putative nuclear-associated functions. While a few MIP mutants displayed altered bacterial resistance, MIP13 was unusual. The MIP13 mutant was susceptible to Pseudomonas syringae, but when combined with morc1/2, it regained wild-type resistance; notably, morc1/2 is susceptible to the same pathogen. MIP13 encodes MED9, a mediator complex component that interfaces with RNA polymerase II and transcription factors. Expression analysis of defense genes PR1, PR2, and PR5 in response to avirulent P. syringae revealed that morc1/2 med9 expressed these genes in a slow but sustained manner, unlike its lower-order mutants. This expression pattern may explain the restored resistance and suggests that the interplay of MORC1/2 and MED9 might be important in curbing defense responses to maintain fitness. Indeed, repeated challenges with avirulent P. syringae triggered significant growth inhibition in morc1/2 med9, indicating that MED9 and MORC1 may play an important role in balancing defense and growth. Furthermore, the in planta interaction of MED9 and MORC1 occurred 24 h, not 6 h, post-infection, suggesting that the interaction functions late in the defense signaling. Our study reveals a complex interplay between MORC1 and MED9 in maintaining an optimal balance between defense and growth in Arabidopsis.
- Published
- 2024
- Full Text
- View/download PDF
43. Piriformospora indica incumbers the incidence and growth of Colletotrichum capsici in colonized chilli plants by direct antagonism and activation of phenylpropanoid pathway
- Author
-
Elizabeth T. Jojy, P. Amrutha, Joy Michal Johnson, A. Sajeena, M. Rafeekher, N. V. Radhakrishnan, and Ambily Paul
- Subjects
piriformospora indica ,chilli ,colletotrichum capsici, dual culture ,anthracnose ,defense ,Plant culture ,SB1-1110 - Abstract
Chilli anthracnose, incited by Colletotrichum capsici, is a major disease affecting the quality and quantity of chilli production. Farmers greatly depend on synthetic fungicides for the management of the disease. However, the extensive and non-judicious use of chemical fungicides resulted in the development of fungicide resistance in the pathogen and associated human and animal health risks. Piriformospora indica, a beneficial fungal root endophyte, has been employed as an efficient and safe biocontrol agent for managing bacterial, fungal and viral diseases and enhancing growth and yield. Hence, the present study was carried out to establish the protective role of P. indica against the chilli anthracnose incitant, C. capsici. The enzymes of phenylpropanoid pathway involved in this tripartite interaction were also studied. The study demonstrates that P. indica restricted C. capsici growth in dual culture with 57.22% mycelial inhibition on the 15th day after inoculation. P. indica ‒ colonized chilli plants showed a delay in disease development, and significantly reduced the incidence and severity of chilli anthracnose disease compared to the control plants. Higher activities of defence-related enzymes viz. peroxidase, phenylalanine ammonia-lyase, polyphenol oxidase, 4-coumaryl CoA ligase, cinnamyl alcohol dehydrogenase and total phenol in the P. indica ‒ colonised plants revealed that the endophyte early resistance of plants against further pathogen invasions. The present study revealed P. indica to be an efficient biocontrol agent against chilli anthracnose. The results showed that P. indica reduced the infection of C. capsici by direct antagonism, activation of enzymes involved in plant defence and enhanced growth in chilli plants.
- Published
- 2024
- Full Text
- View/download PDF
44. Defense supply chain collaboration: an exploratory study and empirical framework
- Author
-
David Loska, Stefan Genchev, Nicholas Rich, and Tegwen Malik
- Subjects
Supply chain ,Defense ,Military ,Case study ,Collaboration ,Military Science - Abstract
Purpose – Considering the size and intricate nature of defense supply chains (DSC), there exists a need for a conceptual understanding regarding the precise dynamics of collaboration among the various participants engaged in these chains. This paper seeks to address the gap by investigating the practices that enable or inhibit collaborations and the development of new competencies to effectively employ a flexible response to temporary or more sustained surges in demand. Ultimately, the study aims to develop a theoretical framework relevant to the practical implementation and scholarly examination of contemporary military supply chains. Design/methodology/approach – Semi-structured interviews were conducted with 51 DSC professionals in 7 embedded cases within an enterprise framework. The resulting transcripts were analyzed using constructs and concepts from a supply chain logistics (SC/L) literature analysis and synthesis relevant to our research purpose. Finally, the results were validated by an industry focus group with 12 participants representing the government, military, industry, and academia. Findings – This research produced empirical generalizations that provide in-depth and systematic exploratory insights into collaboration’s meaning and characteristics within the DSC context. This study culminates by introducing a conceptual model and definition of defense supply chain collaboration (DSCC) and concludes by proposing future research directions. Originality/value – This study makes a novel and empirical contribution to the SC/L body of knowledge by investigating embedded cases through unique access to informants within an enterprise framework that focuses on the antecedent influencing factors of collaboration within the contextual domain of the DSC and positions a future research agenda.
- Published
- 2024
- Full Text
- View/download PDF
45. Enrichment of novel entomopathogenic Pseudomonas species enhances willow resistance to leaf beetles
- Author
-
Haitao Wang, Fengjuan Zhang, Yali Zhang, Mengnan Wang, Yiqiu Zhang, and Jiang Zhang
- Subjects
Willow ,Plagiodera versicolora ,Pseudomonas ,Colonization ,Defense ,Microbial ecology ,QR100-130 - Abstract
Abstract Background Plants have evolved various defense mechanisms against insect herbivores, including the formation of physical barriers, the synthesis of toxic metabolites, and the activation of phytohormone responses. Although plant-associated microbiota influence plant growth and health, whether they play a role in plant defense against insect pests in natural ecosystems is unknown. Results Here, we show that leaves of beetle-damaged weeping willow (Salix babylonica) trees are more resistant to the leaf beetle Plagiodera versicolora (Coleoptera) than those of undamaged leaves. Bacterial community transplantation experiments demonstrated that plant-associated microbiota from the beetle-damaged willow contribute to the resistance of the beetle-damaged willow to P. versicolora. Analysis of the composition and abundance of the microbiome revealed that Pseudomonas spp. is significantly enriched in the phyllosphere, roots, and rhizosphere soil of beetle-damaged willows relative to undamaged willows. From a total of 49 Pseudomonas strains isolated from willows and rhizosphere soil, we identified seven novel Pseudomonas strains that are toxic to P. versicolora. Moreover, re-inoculation of a synthetic microbial community (SynCom) with these Pseudomonas strains enhances willow resistance to P. versicolora. Conclusions Collectively, our data reveal that willows can exploit specific entomopathogenic bacteria to enhance defense against P. versicolora, suggesting that there is a complex interplay among plants, insects, and plant-associated microbiota in natural ecosystems. Graphical Abstract Video Abstract
- Published
- 2024
- Full Text
- View/download PDF
46. Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
- Author
-
Khaleel Yahya Layth, Habeeb Mustafa Abdulfattah, Albahri A. S., Al-Quraishi Tahsien, Albahri O. S., and Alamoodi A. H.
- Subjects
adversarial attack ,defense ,network ,cybersecurity ,methods ,artificial intelligence ,Science ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
This study aims to perform a thorough systematic review investigating and synthesizing existing research on defense strategies and methodologies in adversarial attacks using machine learning (ML) and deep learning methods. A methodology was conducted to guarantee a thorough literature analysis of the studies using sources such as ScienceDirect, Scopus, IEEE Xplore, and Web of Science. A question was shaped to retrieve articles published from 2019 to April 2024, which ultimately produced a total of 704 papers. A rigorous screening, deduplication, and matching of the inclusion and exclusion criteria were followed, and hence 42 studies were included in the quantitative synthesis. The considered papers were categorized into a coherent and systematic classification including three categories: security enhancement techniques, adversarial attack strategies and defense mechanisms, and innovative security mechanisms and solutions. In this article, we have presented a systematic and comprehensive analysis of earlier studies and opened the door to potential future studies by discussing in depth four challenges and motivations of adversarial attacks, while three recommendations have been discussed. A systematic science mapping analysis was also performed to reorganize and summarize the results of studies to address the issues of trustworthiness. Moreover, this research covers a large variety of network and cybersecurity applications of defense in adversarial attack subjects, including intrusion detection systems, anomaly detection, ML-based defenses, and cryptographic techniques. The relevant conclusions well demonstrate what have achieved in defense mechanisms against adversarial attacks. In addition, the analysis revealed a few emerging tendencies and deficiencies in the area to be remedied through better and more dependable mitigation methods against advanced persistent threats. The findings of this review have crucial implications for the community of researchers, practitioners, and policy makers in network and cybersecurity using artificial intelligence applications.
- Published
- 2024
- Full Text
- View/download PDF
47. Enhancing tomato plant immune responses to Fusarium wilt disease by red seaweed Jania sp.
- Author
-
Amer M. Abdelaziz, Ahmed A. Elrefaey, Mohamed H. Sharaf, Rahmah N. Al-Qthanin, and Mohamed S. Attia
- Subjects
Jania ,Antioxidant ,Defense ,Isozyme ,Tomato ,Fusarium ,Medicine ,Science - Abstract
Abstract The novelty of this study lies in demonstrating a new approach to control wilt diseases using Jania ethyl acetate extract. In the current investigation, the potential impacts of Jania sp. ethyl acetate extract (JE) on Tomato Fusarium oxysporum wilt (FOW) have been studied. The in vitro antifungal potential of JE against F. oxysporum (FO) was examined. GC–MS investigation of the JE revealed that, the compounds possessing fungicidal action were Phenol,2-methoxy-4-(2-propenyl)-,acetate, Eugenol, Caryophyllene oxide, Isoespintanol, Cadinene, Caryophylla-4(12),8(13)-dien-5à-ol and Copaen. Jania sp. ethyl acetate extract exhibited strong antifungal potential against FO, achieving a 20 mmzone of inhibition. In the experiment, two different methods were applied: soil irrigation (SI) and foliar application (FS) of JE. The results showed that both treatments reduced disease index present DIP by 20.83% and 33.33% respectively. The findings indicated that during FOW, proline, phenolics, and the antioxidant enzymes activity increased, while growth and photosynthetic pigments decreased. The morphological features, photosynthetic pigments, total phenol content, and antioxidant enzyme activity of infected plants improved when JE was applied through soil or foliar methods. It is interesting to note that the application of JE had a substantially less negative effect on the isozymes peroxidase and polyphenol oxidase in tomato plants, compared to FOW. These reactions differed depending on whether JE was applied foliarly or via the soil. Finally, the use of Jania sp. could be utilized commercially as an ecologically acceptable method to protect tomato plants against FOW.
- Published
- 2024
- Full Text
- View/download PDF
48. Analysis of the Development and Key Technologies of Hypersonic Defense Capability in Foreign Countries
- Author
-
Wang Enliang, Yuan Cheng, Zhao Yujie, Gao Shuliang
- Subjects
hypersonic ,defense ,anti near space ,interception ,detection ,Motor vehicles. Aeronautics. Astronautics ,TL1-4050 - Abstract
With the rapid development and application in practical battlefields of hypersonic weapons, the demand for hypersonic defense technologies has become increasingly urgent in various countries. Due to the different target characteristics of hypersonic weapons from traditional missiles, existing missile defense systems are difficult to achieve good interception effects, and related equipment and technologies need to be redeveloped. In order to sort out the future demand directions of hypersonic defense technologies, this paper summarized the current status of hypersonic defense capabilities in countries such as the United States, Russia, and Japan from the aspects of early warning detection, interception and strike and so on, and analyzed relevant key technologies. It is proposed that future hypersonic defense should focus on increasing interception distance, reducing combat costs, and dealing with system attack.
- Published
- 2024
- Full Text
- View/download PDF
49. Differential predation pressure on island pit vipers shape their niches and defensive behavior.
- Author
-
Banci, Karina R.S., Siqueira, Lucas H.C., Torello-Viera, Natália F., and Marques, Otavio A.V.
- Subjects
- *
DEFENSIVENESS (Psychology) , *BOTHROPS , *NATURAL selection , *SNAKES , *PREDATORY animals - Abstract
Animals are naturally exposed to several predators, and, given that a single encounter with a predator may cause prey's death, natural selection will strongly act upon its defensiveness. Therefore, defensive behavior is strongly shaped by predation pressure. Predation rate in islands tends to be relaxed due to lower abundance of predators. The aim of this study was to test the hypothesis that predation rates upon the two island pit vipers Bothrops alcatraz and B. insularis would be lower than correlated mainland B. jararaca. Additionally, we evaluated the defensive behavior of these island snakes in the field to compare with the mainland B. jararaca. Predation pressure upon the insular species was assessed utilizing plasticine replicas, and we evaluated their defensive behavior to approach. These data were compared to those previously reported for B. jararaca. We found a lower predation pressure on B. insularis (from the smaller area) than on B. alcatraz and B. jararaca from the urban mainland forest fragment (areas with intermediate size), and all of them showed lower predation pressure than B. jararaca from the continuous mainland forested area. In the field, island snakes show narrower defensive repertoire than B. jararaca , since most B. insularis fled, and B. alcatraz either fled or remained immobile on approach. Apparently, the predation pressure to which these island pit vipers are exposed shapes their defensive behavior, as well as the niches exploited by them. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. 저항과 서사적 진실: 양분화 문제와 상호보완의 가능성.
- Author
-
이창훈
- Subjects
- *
EGO (Psychology) , *PSYCHOANALYSTS , *PSYCHOANALYSIS , *NARRATIVES - Abstract
Contemporary psychoanalysis, while diversified into various theories, fundamentally bifurcates into resistance analysis (analysis of ego) and the creation of narrative truth (analysis of drives/Id) in terms of methodology. Ego analysis, the core goal and method of ego psychology, focuses on defense and resistance analysis, aiming for maturation and development of ego functions by collaborating with a patient’s ego. On the other hand, the creation of narrative truth as a methodology primarily relies on drive analysis, which bypasses patients’ ego and focuses on aspects of drives. All psychoanalysts, including Freud, tend to oscillate ambiguously between these two methodologies, moving from drive analysis to ego analysis and returning to drive analysis again. When psychoanalysts do not clearly distinguish between these opposing approaches and fail to recognize our stances, the psychoanalytic process can become confusing, leading to a lack of effective therapeutic changes for patients. Therefore, the author suggests that we should acknowledge our position of bifurcation between analysis of resistance and defense, create narrative truth, and integrate usefulness and limitations of both approaches in a complementary manner so that a higher level of therapeutic effectiveness in psychoanalysis could be achieved. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.