-
2141
Florida Bromeliad Weevil (no official common name), Metamasius mosieri Barber (Insecta: Coleoptera: Curculionidae: Dryophthorinae)
Published 2003-10-01“…It should not be confused with the Mexican bromeliad weevil, Metamasius callizona, which is currently attacking five species of native bromeliads in 16 counties and will likely destroy populations of six additional species of already-threatened or endangered bromeliads if not brought under control. …”
Get full text
Article -
2142
Secure supply and demand relationship perception routing in intermittently connected wireless networks
Published 2015-11-01“…Because of low message delivery probability and nodes malicious attack behaviors in the quota-limit routing for intermittently connected wireless networks,a secure routing is proposed based on supply and demand relationship perception.According to activity degree,average residual buffer ratio of neighbors and encountered nodes reputation dynamically perceived by nodes,the encountered nodes in real time build the supply and demand model and determine the message quota allocation combined with the message survival ratio in common.When network status meets constraint situations,update message quota dynamically based on demand elasticity of message.Simulation results show that the proposed strategy effectively reduces influence of nodes malicious behaviors and improve network performance greatly.…”
Get full text
Article -
2143
Identity authentication scheme based on identity-based encryption
Published 2016-06-01“…In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encryption,which solved the problem of the digital certificate management in the PKI system by the identity-based encryption and the key escrow problem in identity based cryptograph by splitting the key as well,was designed.At the same time,the introduction of random factor,timestamp and hash algorithm in the authentication protocol prevented various network attacks.Finally,the security and efficiency of the encryption algorithm and the security of the authentication protocol were analyzed,which proved the security and reliability of the authentication scheme.…”
Get full text
Article -
2144
Lattice-based verifiable timed signature and application
Published 2024-10-01“…Aiming at the problem that current verifiable timed signature (VTS) schemes cannot effectively resist the threat of quantum computing attacks, a lattice-based verifiable timed signature (LVTS) scheme was proposed, founded on challenging problems over lattices. …”
Get full text
Article -
2145
Application of Fractional Wave Packet Transform for Robust Watermarking of Mammograms
Published 2015-01-01“…The proposed scheme is tested on mammograms images and is subjected to common attacks like Gaussian filtering, median filtering, compression, sharpening, and contrast adjustments. …”
Get full text
Article -
2146
Detection of phishing websites based on the improved TrustRank algorithm
Published 2018-03-01“…Anti-phishing methods just generally detect phishing sites based on comparing the similarity of pages features,which could be anti-detected when attackers are clear about the extraction process of features.Therefore,a method based on web pages relationship was proposed to detect phishing websites.According to this method,phishing websites were detected by an improved TrustRank algorithm which set up a collection of web pages and used the link relationship between phishing websites and other websites.Experiments show that the improved TrustRank algorithm can focus the trust values of phishing websites on some range with the lower false positive rate,the lower false negative rate and the higher speed compared to other methods.…”
Get full text
Article -
2147
Thrips in Florida Strawberry Crops
Published 2015-06-01“… Strawberries grown in Florida are attacked by several pests, including flower thrips. …”
Get full text
Article -
2148
A Three-Dimensional Cooperative Guidance Law of Multimissile System
Published 2015-01-01“…In order to conduct saturation attacks on a static target, the cooperative guidance problem of multimissile system is researched. …”
Get full text
Article -
2149
Annoying Hiccups following Intra-Articular Corticosteroid Injection of Betamethasone Acetate/Betamethasone Sodium Phosphate at the Knee Joint
Published 2013-01-01“…Usually, this phenomenon of hiccups responds to regular antihiccups treatment; however, it is recommended not to repeat an IACI in a patient who had this adverse effect before due to an expected severe recurrent attack of hiccups afterwards.…”
Get full text
Article -
2150
Silencing Mechanisms in Academia: Towards Collaborative Innovation to Support Critical Social Science
Published 2024-12-01“…We explain three dominant silencing mechanisms in academia that frame the backlash and attacks against CSS. Theorising collaborative innovation, we offer multilevel and inclusive design and solidarity as possible venues for resistance against the ongoing purge of CSS, which undermines autonomy, freedom of speech, and equality in academia.…”
Get full text
Article -
2151
Le canard a-t-il coulé la moule du Québec ? Construire un problème de prédation, dépolitiser un échec économique
Published 2023-12-01“…Several species of migratory birds, known as "sea ducks", are attacking sea-based cultivation lines, jeopardizing the province's mussel-growing industry. …”
Get full text
Article -
2152
Decision-level fusion model of multi-source intrusion detection alerts
Published 2011-01-01“…In order to lessen the dependence on training samples significantly and eliminate rigorous constraint conditions,an alert fusion model that supports online incremental training was presented.Firstly,primary alerts vector was mapped to voting pattern,so as to reduce statistical space.Then,the conditional probability distributions of various voting patterns in normal or attack traffic were inferred via training.Afterwards,according to the variation of statistical characteristics,the composition of the traffic being detected was inferred instantly.Finally,fusion decision was made via threshold constraint method and Bayesian inference.Besides extended applicative scope,the model proposed can track and adapt to the traffic being detected well,and improve detection performance significantly only via small scale training.…”
Get full text
Article -
2153
Tawny Crazy Ant
Published 2015-08-01“…This species infests buildings and greenhouses, attacks crops, domestic animals, honeybee hives, displaces native ant species, and disrupts electrical equipment. …”
Get full text
Article -
2154
FORCES AND DISPLACEMENTS DISTRIBUTION AFTER FEM ANALYSIS OF VIBRATORY WORKING TOOL
Published 2021-06-01“…According to prior studies, the angle of attack after the forces have been applied should not exceed 80 degrees. …”
Get full text
Article -
2155
Provable secure mutual RFID authentication protocol based on QC-MDPC code
Published 2014-11-01“…The security of radio frequency identification (RFID) has become an increasingly severe issue.In order to protect the security of information interaction in wireless channel of RFID system,a mutual RFID authentication secure protocol was proposed.It was like the Niederreiter type public cryptography which based on the quasi-cyclic medium density parity check code(QC-MDPC).The security proof for this novel protocol was given by using a reduction method ,and the hardness of attacking was reduced to the decoding problem of the linear codes.Besides the performance results also exhibit that compared with other RFID authentication protocols,this protocol is more suitable for RFID system in areas of interaction,computation and storage,which owns limited resource and needs high efficiency.…”
Get full text
Article -
2156
Treating COVID-19 using Micro RNA
Published 2023-06-01“…That resulted in an incredible increase in the rate of death, in particular for old people who are suffering from other diseases and have frailty in their immunity that permit viruses attacks. Various dense research is under working, as a way to uncover a cure or a vaccine on the long term. …”
Get full text
Article -
2157
Phytophthora Identification and Sampling in Citrus Nurseries
Published 2019-07-01“… Phytophthora species are important soilborne, fungus-like pathogens that attack the root systems, trunk, and fruit of citrus trees at any age. …”
Get full text
Article -
2158
Animal Bites in ENT
Published 2023-09-01“…Case reports: The first two case reports deal with tiger attack and the other two involve bites by the pet dogs. …”
Get full text
Article -
2159
Video Fingerprint Management System:Exploration and Practice on Video Content Security Protection
Published 2015-06-01“…Increasingly serious network security situation has made video website,broadcasting network and other video sending systems become more and more vulnerable to network attack. The video fingerprint management system which could protect video security on transmit line in real time was proposed. …”
Get full text
Article -
2160
Les papiers de Baya Hocine. Une source pour l’histoire des prisons algériennes pendant la guerre d’indépendance (1954-1962)
Published 2019-06-01“…In 1958, a search of the prison of Barbarossa in Algiers led to the confiscation of the Journal, notes and correspondence of Baya Hocine, a young female detainee of 17 years, sentenced to death for an attack. Written in the intimate style of a personal diary, Hocine’s papers are a valuable source for the historiography of prisons during the Algerian War of Independence (1954-1962). …”
Get full text
Article