-
2061
Yellow Garden Spider, Writing Spider Argiope aurantia (Lucas) (Arachnida: Araneae: Araneidae)
Published 2020-05-01“…Although their appearance may cause alarm, the species is relatively harmless and will generally leave its web to flee rather than attack when disturbed (Enders 1973). https://edis.ifas.ufl.edu/in1273 …”
Get full text
Article -
2062
Certificateless-based efficient aggregate signature scheme with universal designated verifier
Published 2015-02-01“…The security model of the certificateless aggregate signature scheme with universal designated verifier was studied,and then a certificateless aggregate signature scheme with universal designated verifier using bilinear pairings was proposed.In the random oracle mode,based on the hardness of the computational Diffie-Hellman problem,the new scheme was proved to be secure against three attacks of certificateless aggregate signature scheme with universal designated verifier.Meanwhile,the scheme satisfies properties of strong designated verify and non-transferability.Furthermore,the length of final aggregate signature is equivalent as the length of signal user’s signature,it is more efficient than others because the pairing computation is fixed among public verifies and designed verifies.…”
Get full text
Article -
2063
Proof of work algorithm based on credit model
Published 2018-08-01“…A consensus protocol based on the credit model was proposed.Firstly,the consensus agreement drew on the idea of personal credit risk assessment and a node credit model based on BP neural network was designed.Secondly,a piecewise rotation model was also constructed to segment the search space according to the node’s credit level to generate new blocks.At the same time,the possible attack of the protocol was analyzed and the vulnerability of this protocol was fixed.Finally,the simulation experiments show that the protocol not only effectively reduces the huge resource consumption in the process of new block generation,but also suppresses the generation of the large mine pool,making the whole blockchain system more secure and reliable.…”
Get full text
Article -
2064
Navigating the Jungle of Possibilities: How to Protect Citizens from Soaring Energy Prices
Published 2022-10-01“…Abstract Living costs in Germany have surged since Russia’s attack on Ukraine. In this article, we discuss pros and cons of different government policies to protect affected citizens. …”
Get full text
Article -
2065
Free Floating Thrombus in Carotid Artery in a Patient with Recurrent Strokes
Published 2017-01-01“…We present a case of 72-year-old male with reported past medical history of recurrent transient ischemic attacks (TIAs) presenting with myriad of neurological symptoms. …”
Get full text
Article -
2066
APPLYING THE AUTOENCODER MODEL FOR URL PHISHING DETECTION
Published 2024-12-01“…In the era of digital transformation, alongside the rapid development of the Internet and online applications, phishing attacks targeting users through malicious URLs have been increasingly prevalent. …”
Get full text
Article -
2067
Effect of ranolazine on the course of ischemic heart disease after percutaneous coronary intervention
Published 2020-12-01“…From the standpoint of current guidelines, the addition of second-line drugs, in particular ranolazine, to beta-blockers and/or calcium antagonists is considered during anginal attacks due to incomplete revascularization, to prevent myocardial damage during percutaneous coronary interventions, and in cases when revascularization is not possible. …”
Get full text
Article -
2068
Headache associated with sexual activity
Published 2021-06-01“…The impact of sexual activity on acute attacks of primary headache disorders and the comorbidity of primary headache and sexual dysfunction are also discussed. …”
Get full text
Article -
2069
Ciphertext-only fault analysis of the SIMON lightweight cipher
Published 2019-11-01“…The ciphertext-only fault analysis on the SIMON cipher was proposed by injecting a random nibble fault under the random nibble fault model.After injecting faults,every faulty ciphertext could be decrypted and the statistical distribution of all intermediate states were analyzed by the attackers.On the basis of the previous distinguishers of SEI,GF,MLE,MLE-SEI,GF-SEI and GF-MLE,four novel distinguishers of GF-MAP,HW-MLE,GF-HW and HW-MAP were proposed to reduce faults.The results show that the SIMON cipher cannot resist against the ciphertext-only fault analysis.It provides an important reference for security analysis of other ciphers.…”
Get full text
Article -
2070
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01“…A mutual authentication scheme based on the TPM cloud computing platform was proposed to solve the problem of mutual authentication between user and cloud computing server.Trusted computing technology and traditional smart card password method were used in cloud computing service platform.The scheme completed the authentication of both sides in cloud computing,generated the session key according consulting,at the same time,verified the credibility of cloud service platform.Experiment analysis shows that our scheme can resist various kinds of possible attacks,so it is therefore more secure than other schemes.And the computing time meet the requirements of cloud computing environment.…”
Get full text
Article -
2071
Research on Face Recognition Method by Autoassociative Memory Based on RNNs
Published 2018-01-01“…In order to avoid the risk of the biological database being attacked and tampered by hackers, an Autoassociative Memory (AAM) model is proposed in this paper. …”
Get full text
Article -
2072
Clustering algorithm preserving differential privacy in the framework of Spark
Published 2016-11-01“…Aimed at the problem that traditional methods fail to deal with malicious attacks with arbitrary background knowledge during the process of massive data clustering analysis,an improved clustering algorithm, especially designed for preserving differential privacy,under the framework of Spark was proposed.Furthermore,it’s theoretically proved to meet the standard of ε-differential privacy in the framework of Spark platform.Finally,experimental results show that guaranteeing the availability of proposed clustering algorithm,the improved algorithm has an advantage over privacy protection and satisfaction in the aspect of time as well as efficiency.Most importantly,the proposed algorithm shows a good application prospect in the analysis of data clustering preserving privacy protection and data security.…”
Get full text
Article -
2073
Idiopathic Pulmonary Hemosiderosis in a Child with Recurrent Macrophage Activation Syndrome Secondary to Systemic Juvenile Idiopathic Arthritis
Published 2017-01-01“…In this case report, we aimed to present gradually increased pulmonary manifestations due to pulmonary hemosiderosis with recurrent macrophage activation syndrome attacks in a child with systemic juvenile idiopathic arthritis.…”
Get full text
Article -
2074
Malicious PDF document detection based on mixed feature
Published 2019-02-01“…Aiming at the problem of poor robustness and easy to evade detection in the detection of malicious PDF document,a malicious PDF document detection method based on mixed features was proposed.It adopted dynamic and static analysis technology to extract the regular information,structure information and API calling information from the document,and then a feature extraction method based on K-means clustering algorithm was designed to filter and select the key mixed features that characterize the document security.Ultimately,it improved the robustness of features.On this basis,it used random forest algorithm to construct classifier and perform experiment to discuss the detection performance of the scheme and its ability to resist mimicry attacks.…”
Get full text
Article -
2075
A checklist of insects, mites and rodents affecting stored products in Iran
Published 1989-02-01“…It been compiled from personal observations and 1014 reports and published literatures concerning pests of stored products in Iran since 1943, particularly reports of Farah -bakhsh 1961 (89), Freeman 1958, 1977 (90,91) Gentry 1965 (93).More than 190 species have been grouped under 3 categories of Insects, Mites and Rodents, with reference to their scientific names, products attacked and local distributions in Iran. This summary included only the scientific names of pests of stored products in Iran with reference to their taxonomic orders and families as follows.…”
Get full text
Article -
2076
The Synthesis of π,n-Complexes of 1-Thio-1,3-dienes with Chromium Group Metals. The Inner-Sphere Hydrophosphorylation of α-Enethiones
Published 2015-06-01“…Hydrophosphorylation of the complexes begins from the attack of H-dialkylphosphonate towards the thiocarbonyl group; the generated organometallic α-mercaptophosphonates subsequently undergo the mercaptophosphonate-thiolphospate and thiolphosphate-thionphosphate rearrangements with organ-ophosphorus compounds remaining bound to the metal’s core.…”
Get full text
Article -
2077
Data security protection schema of telecom operators under the environment of big data
Published 2017-05-01“…With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.…”
Get full text
Article -
2078
Design and implementation of the controller scheduling-time in SDN
Published 2018-01-01“…Introducing multiple controllers to software defined network so that dynamically altering the mapping relationship between controller and the underlying network is an effective method to ease the security threats in control plane.However,little previous work has been done to investigate the economical time in dynamic-scheduling controllers.Firstly,the importance of scheduling-time in dynamic control plane based on security in SDN and dynamic control plane was introduced.Further,this problem was modeled as a renewal reward process and an optimal algorithm in deciding the right time to schedule was proposed.In our experiments,Simulations based on real network attack dataset are conducted and it demonstrate that proposed algorithm outperforms fixed-cycle algorithms and random algorithm.…”
Get full text
Article -
2079
A New Year, A New Issue and Fresh Expectations
Published 2016-03-01“…This issue is dedicated to the memory of all people who passed away their lives during terrorist attacks. With respect to their memoirs.…”
Get full text
Article -
2080
Facing Terrorism Alone
Published 2003-06-01“…We worry about the possibility of another terrorist attack. We feel stressed because we don’t know what to expect from day to day. …”
Get full text
Article