Search Results - defensive back

Refine Results
  1. 1
  2. 2

    Protecting DNS from reflection amplification attacks using distributed defense scheme by Ahmed, Dana Hasan

    Published 2017
    “…Normally, DNS receives requests from its source and sends back the substantially larger responses without inspecting the source address. …”
    Get full text
    Get full text
  3. 3

    Implicit evaluations and physiological threat responses in people with persistent low back pain and fear of bending by Caneiro, J., O'Sullivan, Peter, Smith, Anne, Moseley, G., Lipp, Ottmar

    Published 2017
    “…Both assessed implicit associations between (i) images of people bending/lifting with a flexed lumbar spine posture ('round-back' posture) or bending/lifting with a straight lumbar spine posture ('straight-back' posture), and (ii) perceived threat (safe vs. dangerous). …”
    Get full text
  4. 4

    Mathematics in theosophical perspective by Azram, Mohammad, Daoud, Jamal Ibrahim

    Published 2015
    “…ABSTRACT— The present doldrums position and state of decadence, internal differences, external aggression (geographicaland ideological), lack of self-confidence and dependence, illiteracy, political instability, economic disaster, lack of knowledge and wisdom, back benchers in science and technology, education, medicine, trade and business, banking system and defensive incapability of Muslim World prompted me to look at our principal sources of inspiration, which are, the Qur’an, Sunnah of the Prophet (SAW), and examples of the “enlightened Caliphs” and see what is Islam’s view about seeking knowledge, technology and inventions in general and mathematics’ education in particular. …”
    Get full text
    Get full text
  5. 5

    Exclusion zones in the law of armed conflict at sea: evolution in law and practice by Sivakumaran, Sandesh

    Published 2016
    “…The article then turns to the third phase of exclusion zone, which can be traced back to the San Remo Manual on International Law Applicable to Armed Conflicts at Sea (1994). …”
    Get full text
  6. 6

    Islamic mathematics by Azram, Mohammad, Daoud, Jamal Ibrahim

    Published 2013
    “…The present doldrums position and state of decadence, internal differences, external aggression (geographical and ideological), lack of self-confidence and dependence, illiteracy, political instability, economic disaster, lack of knowledge and wisdom, back benchers in science and technology, education, medicine, trade and business, banking system and defensive incapability of Muslim World prompted me to look at our principal sources of inspiration, which are, the Qur’an, Sunnah of the Prophet (SAW), and examples of the “enlightened Caliphs” and see what is Islam’s view about seeking knowledge, technology and inventions in general and mathematics’ education in particular. …”
    Get full text
    Get full text
    Get full text
  7. 7

    Rasuah dalam karya sastera Melayu klasik: Satu analisis semantik kognitif by Nor Hashimah Jalaluddin, Rozaimah Rashidin

    Published 2008
    “…Syed Hussein Alatas has given seven typologies of corruption namely, nepotism, investive, defensive, transactive, autogenic, blackmail and supportive. …”
    Get full text
    Get full text
  8. 8

    Rectification and revival of muslim world by Azram, Mohammad

    Published 2011
    “…The present doldrums position and state of decadence, internal differences, external aggression (geographical and ideological), lack of self-confidence and dependence, illiteracy, political instability, economic disaster, lack of knowledge and wisdom, back benchers in science and technology, education, medicine, trade and business, banking system and defensive incapability of Muslim Ummah prompted me to write this article. …”
    Get full text
    Get full text
  9. 9

    Counter-Insurgency against ‘kith and kin’?: the British Army in Northern Ireland, 1970–76 by Burke, Edward

    Published 2015
    “…However, the insistence by William Whitelaw, secretary of state for Northern Ireland (1972–73), on ‘throttling back'—the release of internees and the imposition of unprecedented restrictions on the use of violence by the army—put a serious strain on civil-military relations in Northern Ireland. …”
    Get full text
  10. 10
  11. 11

    Investigating the role of metapleural glands in social immunity and the role of co-founding in pathogen resistance in Messor barbarus by Simpson, M.C.

    Published 2025
    “…Colony-founding queens do not have access to the colony-wide defensive system, and new colonies suffer high rates of mortality. …”
    Get full text
  12. 12

    Effects of 8-week medicine ball training on physical and skill performance among basketball players by Thanuraj, Suntharalingam

    Published 2023
    “…The experimental group (EG) that received medicine ball training showed improvements in physical performance, which was expressed in the form of percentage in the following variables: Overhead Medicine Ball Throw (OHMBT) (5.11%), Standing Long Jump (SLJ) (4.52%), Sprinting 20 m (SPRINT) (1.34%), Agility T-Test (AGILITY) (3.49%), Vertical Jump (VJ) (6.45%), and Back and Leg Dynamometer (BLD) (16.40%). Moreover, this study found that the experimental group that received medicine ball training showed improvement in basketball skill performance as well, which was expressed in the form of percentage in the following measures: Control Dribble (CD) (2.14%), Defensive Movement (DM) (3.22%), Passing (PASS) (6.83%), and Speed Spot Shooting (SSS) (13.29%). …”
    Get full text
    Get full text
  13. 13

    Managing the ethical issues of genomic research using pathology specimens by Zeps, Nikolajs, Bledsoe, M.

    Published 2015
    “…We also provide points to consider in the development of an ethically defensible plan for giving back individual research results.…”
    Get full text
  14. 14

    Safeguarding privacy from criminal process by Purshouse, Joe

    Published 2017
    “…The first broad task for the thesis is to develop a normatively defensible model which can identify where privacy interests are set back as part of a criminal process, and articulate why it is important for those tasked with regulating such a process to recognise and appropriately protect these interests. …”
    Get full text
  15. 15

    Islamic International Law and the right of self-defence of states by Hamid, Abdul Ghafur@Khin Maung Sein

    Published 2009
    “…This paper appeals for the reconsideration of the classical doctrine, which was adopted at a time when there was a state of war between Islamic and non-Islamic states. Going back to the roots and referring to the Qur’an and the Sunnah: the two primary sources of Islamic law, the paper argues that Islam prohibits aggressive war and that the essence of ‘jihad’ is‘self-defense.’ …”
    Get full text
    Get full text
  16. 16

    The use of intrusion prevention system to increase computer security / Najib Limun by Limun, Najib

    Published 2005
    “…Network intrusion prevention systems provide an important proactive defense capability against security threats by detecting and blocking network attacks. …”
    Get full text
  17. 17

    Towards immunity of oil palm against Ganoderma fungus infection by Sahebi, Mahbod, Hanafi, Mohamed M., Wong, Mui Yun, Idris, A. S., Azizi, Parisa, Jahromi, Mohammad Faseleh, Shokryaz, Parisa, Abiri, Rambod, Mohidin, Hasmah

    Published 2015
    “…The first record of Ganoderma can be traced back to the Pharmacopoeia written by Chinese scientists in first century B.C. …”
    Get full text
    Get full text
  18. 18

    Towards immunity of oil palm against Ganoderma fungus infection by Sahebi, Mahbod, Musa, Mohamed Hanafi, Wong, Mui Yun, Abu Seman, Idris, Azizi, Parisa, Jahromi, Mohammad Faseleh, Shokryazdan, Parisa, Abiri, Rambod, Mohidin, Hasmah

    Published 2015
    “…The first record of Ganoderma can be traced back to the Pharmacopoeia written by Chinese scientists in first century B.C. …”
    Get full text
    Get full text
  19. 19

    General pathways of pain sensation and the major neurotransmitters involved in pain regulation by Yam, Mun Fei, Loh, Yean Chun, Tan, Chu Shan, Adam, Siti Khadijah, Abd Manan, Nizar, Basir, Rusliza

    Published 2018
    “…Pain has been considered as a concept of sensation that we feel as a reaction to the stimulus of our surrounding, putting us in harm’s way and acting as a form of defense mechanism that our body has permanently installed into its system. …”
    Get full text
    Get full text
  20. 20

    Modelling of intelligent intrusion detection system: making a case for snort by Olanrewaju, Rashidah Funke, Ku zahir, Ku Nor Afiza, Asnawi, Ani Liza, Sanni, Mistura Laide, Ahmed, Abdulkadir Adekunle

    Published 2018
    “…Intrusion Detection System (IDS) is a dynamic network security defense technology that can help to provide realtime detection of internal and external attacks on a computer network and alerting the administration for necessary action. …”
    Get full text
    Get full text
    Get full text