-
2161
Data processing based on the privacy-preserving vector for wireless sensor networks
Published 2015-09-01“…To solve the privacy disclosing problem during the data processing phase of wireless sensor networks,a dis-tributed mechanism was proposed.Privacy-preserving vector (vector for short) was constructed.Moreover,lightweight method for vector generation and novel method for using the vector were also presented.Thus,the methods were able to solve the privacy-preserving problem for various data processing funtions such as max/min and data compression effi-ciently.An algorithm based on data hiding and slice was given and then the vector was able to be generated securely and dynamically.Extensive analyses and experiments show that the mechanism is more robust to node compromise attack and thus can preserve privacy more efficiently.Moreover,the mechanism consumes less power.…”
Get full text
Article -
2162
Thrips in Florida Strawberry Crops
Published 2015-06-01“… Strawberries grown in Florida are attacked by several pests, including flower thrips. …”
Get full text
Article -
2163
Provably secure partially blind signature without trusted PKG
Published 2010-01-01“…Under the random oracle model, the proposed scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. The security of scheme relied on the hardness of the computational Diffie-Hellman problem (CDHP). …”
Get full text
Article -
2164
Photodegradation of Sulfadiazine in Aqueous Solution and the Affecting Factors
Published 2016-01-01“…This study suggested that sulfadiazine photodegradation under UV light is generally favored by the attack of hydroxyl radicals.…”
Get full text
Article -
2165
Prevalence of Stylopization of Sphex ichneumoneus (L.) (Hymenoptera: Sphecidae) by Paraxenos westwoodi (Templeton) (Strepsiptera: Xenidae)
Published 2009-01-01“…Our estimate is based on a sample size larger than those usually reported for strepsipterans attacking solitary aculeate wasps. We review the literature on strepsipteran prevalence in solitary aculeate wasps and provide an updated list of solitary wasps known to act of strepsipteran hosts in North America.…”
Get full text
Article -
2166
Study of BGP secure scheme based on divide and conquer strategy
Published 2012-05-01“…A new approach was studied for BGP security:SE-BGP.By analyzing the security of SE-BGP,was found it had some secure leaks which couldnt resist active attack.To solve these secure problems of SE-BGP,an AS-alliance-based secure BGP scheme :SA-BGP was proposed,which used the aggregate signatures algorithm based on RSA.The SA-BGP has strong ability of security that can effectively verify the propriety of IP prefix origination and verifies the validity of an AS to announce network layer reachability information (NLRI).SA-BGP can large-scale reduced the number of the used certificates.Performance evaluation results that SA-BGP can be implemented efficiently and the incurred overhead,in terms of time and space,ptable in practice.…”
Get full text
Article -
2167
Du détroit de Malacca jusqu’à sa périphérie
Published 2009-09-01“…In the surrounding areas of the Malacca Strait, there have already been attacks in 2008. Furthermore, the current economic crisis obliges parties concerned to stay vigilant. …”
Get full text
Article -
2168
Research on intrusion detection based on network events and deep protocol analysis
Published 2011-01-01“…The problems for restricting NIDS were investigated.Based on network events and deep protocol analysis,a new model MIDM analyzing and integrating network intrusion was proposed.After extending ABNF to describe network events,a new NIDS was built based on MIDM.Experimental results proved that,comparing to the current mainstream NIDS,the model MIDM can work effectively with less false positive rate and less redundancy of rule base.And if net-work stream and rule base were extended quickly,the CPU utilization of new model’s would remain low growth,which makes MIDM better adapt to high-speed network.And it’s also able to detect some unknown attacks and sustain rule gen-eralization.…”
Get full text
Article -
2169
A Series on Diseases in the Florida Vegetable Garden: TOMATO
Published 2004-10-01“…The pathogenic microorganisms that attack garden vegetables, including tomato, can be classified into three major groups: fungi, bacteria, and viruses. …”
Get full text
Article -
2170
Cooperative Guidance of Seeker-Less Missiles for Precise Hit
Published 2019-01-01“…A novel cooperative guidance scenario is proposed that implements fire-and-forget attacks for seeker-less missiles with a cheap finder for stationary targets and without requiring real-time communication among missiles or precise position information. …”
Get full text
Article -
2171
Robust video watermarking algorithm for H.264/AVC based on texture feature
Published 2012-03-01“…On the basis of analyzing some existing video watermarking al ithms and combining with the new features of the H.264/AVC video coding standard,a new robust video watermarking algorithm based on texture feature was proposed.The proposed algorithm firstly performs the 4×4 integer discrete cosine transform on the current frame in purpose of identifying whether it is the texture block.Then the watermarking is embedded by adopting the way of differential energy for selecting the appropriate coefficients adaptively.The experimental result shows that the proposed algorithm has little impact on the video quality and bit-rate,moreover,its robustness can effectively resist the common attacks such as the gauss noise,low pass filter and re-coded performed on the video watermarking.…”
Get full text
Article -
2172
NSAIDs and Triptans – a (not) New Treatment Option for Migraine
Published 2023-12-01“…Non-steroidal anti-inflammatory drugs and triptans are first line treatment of a migraine attack. Nevertheless, when used in combination, these medications deliver a synergistic action. …”
Get full text
Article -
2173
Treating COVID-19 using Micro RNA
Published 2023-06-01“…That resulted in an incredible increase in the rate of death, in particular for old people who are suffering from other diseases and have frailty in their immunity that permit viruses attacks. Various dense research is under working, as a way to uncover a cure or a vaccine on the long term. …”
Get full text
Article -
2174
Florida Bromeliad Weevil (no official common name), Metamasius mosieri Barber (Insecta: Coleoptera: Curculionidae: Dryophthorinae)
Published 2003-10-01“…It should not be confused with the Mexican bromeliad weevil, Metamasius callizona, which is currently attacking five species of native bromeliads in 16 counties and will likely destroy populations of six additional species of already-threatened or endangered bromeliads if not brought under control. …”
Get full text
Article -
2175
A compressive data gathering method based on El Gamal cryptography
Published 2019-12-01“…As a hot researching area,compressive sensing has advantages in signal process,image processing and data gathering and analysis.How to effectively and safely apply compressive sensing technology to collect data in wireless sensor networks is studied.Conventional compressive sensing technology based data collection method does not consider the security issue.Furthermore,every nod in the network must participate in the process of collecting measurements.The El Gamal cryptography and sparse matrices based compressive sensing technology were combined,and the El Gamal based sparse compressive data gathering (ESCDG) method was proposed.Theoretical analysis and numerical experiments show that ESCDG not only decreases the network resource consumption but also be able to defense the internal and external attacks.…”
Get full text
Article -
2176
Tawny Crazy Ant
Published 2015-08-01“…This species infests buildings and greenhouses, attacks crops, domestic animals, honeybee hives, displaces native ant species, and disrupts electrical equipment. …”
Get full text
Article -
2177
« The Fault is that she is my wife » : L’ambivalence des représentations d’Henriette-Marie (1625-1649)
Published 2021-10-01“…While her very presence reinforced the trope of Charles I as husband to the nation and father to his people, she also became a source of anxiety at a period when popery and the very institution of the monarchy came under violent attack from a part of the English people.…”
Get full text
Article -
2178
Juifs d'Istanbul, territorialités d'une communauté entre recompositions et dislocations
Published 2011-07-01“…Nowadays, behind an apparent optimism, the situation of the Jewish minority is more and more worrying because of internal and external reasons: attacks increase of anti-Semitism and political and geopolitical contexts damage the confidence; in the same time the community’s cohesion is breaking down due to urban sprawl. …”
Get full text
Article -
2179
Efficient ID-based certificateless signature scheme
Published 2008-01-01“…Under the random oracle model, the new scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. This scheme not only eliminated the inherent key escrow problem but also had a higher efficiency than the existing schemes did.…”
Get full text
Article -
2180
Binocular suppression based asymmetrical stereo image watermarking with self-recovery
Published 2013-06-01“…To authenticate the integrity of stereo image,an asymmetrical stereo image watermarking scheme based on binocular suppression was proposed.Firstly,according to the features of stereo vision,the computation of binocular sup-pression model was established.The concept of asymmetric stereo image watermarking was defined that two views of stereo image were embedded with different data payloads.Then,discrete wavelet transform was employed to generate different types of recovery watermark for each block,and their copies were embedded into two or three different mapping blocks to improve the quality of recovery.The experimental results demonstrate that the proposed method can detect and recover different kinds of tamper effectively,such as collage attack,and the recovered quality is better than those of other existing and extended mono-image watermarking methods.…”
Get full text
Article