-
2081
Pripojenie Javoriny a Lesnice k Poľsku 1938–1939
Published 2015-01-01“…On 1st September1939, after the German attack on Poland, which the Slovak Army was involved in too, Javorina and Lesnica became a part of Slovakia again. …”
Get full text
Article -
2082
BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks
Published 2013-03-01“…In this paper, we propose a BRS-based robust secure localization (BRSL) algorithm in order to reduce the impact of the malicious attackers in WSNs. The BRSL method includes two phases. …”
Get full text
Article -
2083
Hospodářský bojkot jako odpověď na antisemitismus. Příklad druhé Československé republiky
Published 2017-10-01“…In spite of the government’s effort to preserve the tradition of religious and racial tolerance, anti-Jewish attacks, mostly verbal, but gradually even real, took place at different levels, resulting in attempts to declare a boycott of Czech-Slovak goods exported to democratic states, especially the USA. …”
Get full text
Article -
2084
Insect Management for Cucurbits (Cucumber, Squash, Cantaloupe, and Watermelon)
Published 2005-12-01“…Pickleworm and melonworm rarely attack watermelon. This document is ENY-460, one of a series of the Entomology and Nematology Department, UF/IFAS Extension. …”
Get full text
Article -
2085
Female Midwifery in the Czech Lands 1850–1950: A Career on the Decline
Published 2020-11-01“… Although midwives were incorporated into the administrative system governing the conditions of birth delivery, female midwifery became the target of verbal attacks from the leading authorities of scientific medicine. …”
Get full text
Article -
2086
Network architecture with intrinsic security
Published 2019-09-01“…IP network brings big benefits for human’s life by connecting most devices all over the world,but its security and privacy issues make people frustrating when using end to end communication.Without intrinsic security design of the network,it is difficult for patch-like solutions to cure stubborn security issues (IP spoofing,privacy leakage,MITM attack,DDoS,etc.).On the basis of surveying different kinds of security threats and related security techniques,an overview of the security weakness analysis was given,and network architecture with intrinsic security (NAIS) was presented,including dynamic ID/IP with intrinsic security,security verification and audit protocols,and cross-domain cooperation defense mechanism,which could provide security and trustworthiness for end to end communication.…”
Get full text
Article -
2087
Multi-layered based network security defense system
Published 2007-01-01“…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
Get full text
Article -
2088
Pine Sawflies, Neodiprion spp. (Insecta: Hymenoptera: Diprionidae)
Published 2005-04-01“…Sawfly infestations can cause growth loss and mortality, especially when followed by secondary attack by bark and wood-boring beetles (Coleoptera: Buprestidae, Cerambycidae, Scolytidae,). …”
Get full text
Article -
2089
Arpenter et sillonner les archives du Web
Published 2023-07-01“…It looks back at research projects, from the Web90 project running between 2014 and 2018, dedicated to the digital cultures of the 1990s, to the current Hivi project (A History of Online Virality), through research about events (terrorist attacks of 2015-2016; COVID-19 crisis). This path is related to the evolution of the state of the art and of archival and academic practices, in the face of the large amounts of data generated, particularly those of the social networks, and of transnational or transversal research in progress.…”
Get full text
Article -
2090
Distributed robust RLS estimation algorithm over sensor networks
Published 2019-01-01“…The characteristic of interference or attack on a node is usually sporadic (ie, sparse) for a period of time was utilized, ℓ<sub>1</sub>norm was introduced to cost function. …”
Get full text
Article -
2091
South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“… This rather large, yellow-brown, fruit fly with yellow and dark-brown markings exists in several South American countries, and attacks watermelon and other fruits of the family Cucurbitaceae. …”
Get full text
Article -
2092
Review of information hiding on Chinese text
Published 2019-09-01“…Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing algorithms were divided into three categories,algorithms based on text images,algorithms based on text format and algorithms based on text content.The implementation process of each type of algorithm was elaborated and the advantages and disadvantages of the algorithm were analyzed.At the same time,their principles,embedded capacity and anti-attack capability was compared and analyzed.In addition,the problems existing in Chinese text information hiding technology was summarized,and the research trends were discussed in the future.It is expected to provide reference for research in this field.…”
Get full text
Article -
2093
Chaotic image encryption algorithm based on single image local scrambling and dynamic feedback diffusion
Published 2016-11-01“…A novel chaotic image encryption algorithm based on single image local scrambling and dynamic feedback diffusion was presented.Firstly,a single image local scrambling algorithm was proposed.Secondly,a novel dynamic feedback diffusion strategy was proposed to change the pixel values of the scrambled image in the phase of diffusion,by which improved the results of image encryption.Finally,the simulation results and performance analysis show that the number pixels change rate(NPCR)values and unified average changing intensity(UACI)values of the proposed algorithm can be close to 99.6% and 33.4%,showing that the proposed algorithm has better resistance to differential attacks and saves time compared with the other three classic algorithms.…”
Get full text
Article -
2094
Common Sharks of Florida
Published 2002-07-01“…Among the species that grow to this size and have been known to attack humans are bull sharks, tiger sharks and great white sharks. …”
Get full text
Article -
2095
Pine Sawflies, Neodiprion spp. (Insecta: Hymenoptera: Diprionidae)
Published 2005-04-01“…Sawfly infestations can cause growth loss and mortality, especially when followed by secondary attack by bark and wood-boring beetles (Coleoptera: Buprestidae, Cerambycidae, Scolytidae,). …”
Get full text
Article -
2096
Asymmetric watermarking based on Contourlet transform and subspace projection
Published 2009-01-01“…For the copyright protection of the digital image,a new asymmetric watermarking method of feature subspace projection based on Contourlet transform was presented.Embedding matrix(private key) and detecting matrix(public key) were constructed differently,where embedding matrix was kept secretly while detecting matrix was public.At the same time,the embedding matrix was independent on the host images.Robust subspace was obtained by Contourlet transformation.Using the embedding matrix,the arbitrary watermarking was embedded in the robust subspace.The de-tection function was constructed to detect whether an image had watermarking or not.The proposed method has good security,high detection probability and low false alarm probability.The stimulation shows that the proposed method is robust to many attacks.…”
Get full text
Article -
2097
Zmiany w polskim systemie ochrony lotnictwa cywilnego
Published 2023-04-01“…Air transport, as a component of critical infrastructure, is an attractive target for terrorist attack, which makes it necessary to maintain an adequate level of aviation security. …”
Get full text
Article -
2098
DNA algorithm of primeness test based on finite automaton
Published 2006-01-01“…Finite automaton,a computational model of extremely limited computing ability,was proved to have the capa-bility of solving primeness test by construction.Then,a DNA algorithm of the primeness test based on finite automaton was proposed.Furthermore,the method of constructing the finite automaton was presented in detail.The state of the fi-nite automaton was encoded by single-stranded DNA.The input was encoded by double-stranded DNA.The transition rule was represented by a double strand with a ring.The state of transition was realized by enzyme-mediated chemical reactions.The innovation of the algorithm is that it can be applied not only in primeness test but also in prime factoriza-tion and further in attack of RSA cipher.The advantage of this method is that it can be easily implemented.The time re-quired is polynomial in the size of the problem instead of exponential in the size of the problem.…”
Get full text
Article -
2099
A Series on Diseases in the Florida Vegetable Garden: TOMATO
Published 2004-10-01“…The pathogenic microorganisms that attack garden vegetables, including tomato, can be classified into three major groups: fungi, bacteria, and viruses. …”
Get full text
Article -
2100
Common Sharks of Florida
Published 2002-07-01“…Among the species that grow to this size and have been known to attack humans are bull sharks, tiger sharks and great white sharks. …”
Get full text
Article