-
2021
Cornsilk Fly (suggested common name), Euxesta stigmatias Loew (Insecta: Diptera: Otitidae)
Published 2013-05-01“…Four species of ‘cornsilk flies’ are known to attack corn in Florida: Chaetopsis massyla (Walker), Euxesta annonae (Fabricius), Euxesta eluta Loew, and Euxesta stigmatias Loew. …”
Get full text
Article -
2022
Why is Your Cup of Coffee so Expensive? Because of a Tiny Bark Beetle!
Published 2013-11-01“… Sometimes an insect pest attacking crops in places as far away as Indonesia or Ethiopia can be very important to us here in Florida. …”
Get full text
Article -
2023
Beyond Equal Rights: The Persistence of Ethno-Racial Inequalities in America
Published 2014-11-01“…Worse, racial patterns of mass incarceration and efforts at disenfranchisement suggest that equal rights remain under attack in an indirect but still very troubling manner.…”
Get full text
Article -
2024
The Lexicon of Argumentation for Argument Mining: methodological considerations
Published 2020-12-01“…An argument being a relation between a controversial statement (claim) and a support or an attack, we deal with the marks specific to each class and those related to the expression of the relations which hold between them. …”
Get full text
Article -
2025
Design of network traffic monitoring and control system in SDN
Published 2015-12-01“…The core idea of SDN(software defined networking)is that the control plane and data plane are separated,which makes the network traffic can be flexible controlled.Since SDN has these characteristics,the traffic monitoring and control in SDN have significant differences with traditional IP networks.A network traffic monitoring and control system based on sFlow technology was presented.With the application of sFlow,the process of data collection was separated from the control plane of SDN.The experimental environment was constructed based on OpenDaylight controller and Mininet,and the abnormal traffic was simulated by DoS(denial of service)attacks.The experiments show that the proposed network traffic monitoring and control system can effectively intercept the abnormal traffic.…”
Get full text
Article -
2026
Anthracnose Fruit Rot of Strawberry
Published 2005-04-01“…Although fruit rot is the most important symptom caused by C. acutatum, the fungus can also attack other parts of the plant including the crown, leaves, petioles, and roots. …”
Get full text
Article -
2027
Anthracnose Fruit Rot of Strawberry
Published 2005-04-01“…Although fruit rot is the most important symptom caused by C. acutatum, the fungus can also attack other parts of the plant including the crown, leaves, petioles, and roots. …”
Get full text
Article -
2028
Facing Terrorism Alone
Published 2003-06-01“…We worry about the possibility of another terrorist attack. We feel stressed because we don’t know what to expect from day to day. …”
Get full text
Article -
2029
A Series on Diseases in the Florida Vegetable Garden: PEPPER
Published 2004-10-01“…The pathogenic microorganisms that attack garden vegetables, including pepper, can be classified into three major groups: fungi, bacteria, and viruses. …”
Get full text
Article -
2030
Acquired Traumatic Diaphragmatic Hernia with Delayed Presentation in a Child
Published 2019-03-01“…The author reports a case of acquired diaphragmatic hernia in a three-year-old boy with a prolonged history of recurrent attacks of vomiting and abdominal pain associated with cough. …”
Get full text
Article -
2031
Use of the Triptans
Published 2000-01-01“…This has been due in part to the realization that the migraine attack can be blocked by activating the serotonin receptor, namely the 5-hydroxytryptamine/1D receptor. …”
Get full text
Article -
2032
Insect Management for Cucurbits (Cucumber, Squash, Cantaloupe, and Watermelon)
Published 2005-12-01“…Pickleworm and melonworm rarely attack watermelon. This document is ENY-460, one of a series of the Entomology and Nematology Department, UF/IFAS Extension. …”
Get full text
Article -
2033
Tag's ownership transfer protocol based on quadratic residue
Published 2018-03-01“…A proprietary transfer protocol with higher security and lower cost was proposed.In order to ensure the communication entity authentication premise,two remainder theorems for information transmission encryption were used in the proposed protocol; in the process of mutual recognition of communication entities,the addition of random numbers could make the protocol effectively resist such attacks as replay and desynchronization.After the transfer of ownership occurs,new communication entities would be located.The authentication key needed to be dynamical,so as to reduce the storage space of communication entities.The performance comparison between the proposed protocol and other protocols for safety show that the proposed protocol has the security required for the transfer of ownership and low cost.…”
Get full text
Article -
2034
Trust based secure routing algorithm for wireless sensor networks
Published 2008-01-01“…Simulation experiments show that it can effectively resist the wormhole attack, which is lack of effective methods to re- sist at present.…”
Get full text
Article -
2035
Why is Your Cup of Coffee so Expensive? Because of a Tiny Bark Beetle!
Published 2013-11-01“… Sometimes an insect pest attacking crops in places as far away as Indonesia or Ethiopia can be very important to us here in Florida. …”
Get full text
Article -
2036
A Series on Diseases in the Florida Vegetable Garden: PEPPER
Published 2004-10-01“…The pathogenic microorganisms that attack garden vegetables, including pepper, can be classified into three major groups: fungi, bacteria, and viruses. …”
Get full text
Article -
2037
Cornsilk Fly (suggested common name), Euxesta stigmatias Loew (Insecta: Diptera: Otitidae)
Published 2013-05-01“…Four species of ‘cornsilk flies’ are known to attack corn in Florida: Chaetopsis massyla (Walker), Euxesta annonae (Fabricius), Euxesta eluta Loew, and Euxesta stigmatias Loew. …”
Get full text
Article -
2038
Cross‐ethnicity face anti‐spoofing recognition challenge: A review
Published 2021-01-01“…We organized the Chalearn Face Anti‐spoofing Attack Detection Challenge which consists of single‐modal (e.g. …”
Get full text
Article -
2039
Graph analysis based on SCN reveals novel neuroanatomical targets related to tinnitus distress
Published 2025-01-01“…In addition, the tinnitus network was found to be reduced in robustness to targeted attacks compared with HCs. Besides, a significant negative correlation between Tinnitus Handicap Inventory (THI) score and GMV in the left angular gyrus (r = −0.283, p = 0.040) as well as left superior temporal pole (r = −0.282, p = 0.041) were identified.ConclusionTinnitus patients showed reduced small-world properties, altered hub nodes, and reduced ability to respond to targeted attacks in brain network. …”
Get full text
Article -
2040
Influence of sediment additions on the mechanical behavior of fiber-reinforced concrete in aggressive environments
Published 2025-01-01“…Durability was assessed by exposing the concrete to chemical attacks from hydrochloric acid (HCl), sulfuric acid (H₂SO₄), and sodium sulfate (Na₂SO₄) solutions. …”
Get full text
Article