-
1301
Cherry Fruit Fly, Rhagoletis cingulata (Loew) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“… The cherry fruit fly (adult) or cherry maggot (larva) attacks cherry and causes wormy fruits. In Florida, it attacks wild cherries and is of little economic importance. …”
Get full text
Article -
1302
Study on shared key management scheme for WSN based on LEACH protocol
Published 2016-08-01“…In order to achieve transmission safety,nodes longer life and higher operation efficiency for the hierar-chical wireless sensor network,a shared secret key management scheme for WSN based on LEACH protocol was proposed.The scheme has good integrity and timeliness,dynamic key safety,node security independence and key survival,and also has the ability to resist the man-in-the-middle attack,DDoS attacks and so on.Furthermore,en-ergy consumption is lower to distribute shared key,and efficiency is higher to operate network.…”
Get full text
Article -
1303
Multipurpose zero watermarking algorithm for medical image based on SVD and SAE
Published 2017-11-01“…A multipurpose zero watermarking algorithm was proposed according to the copyright protection and tamper location of medical image.The two information matrices were executed the XOR operation with the original robust watermarking image and the original semi-fragile watermarking image separately to generate zero robust watermarking image and zero semi-fragile watermarking image.The experimental results show that effects of extracted zero watermarking image are terrific,and the algorithm can resist the common attacks,particularly its resistance is effect ive for strong attacks.…”
Get full text
Article -
1304
Hierarchical location-diversity-based low-delay anonymous communication framework
Published 2009-01-01“…The theoretic analysis and simulation experiment indicate that the HLLACF based on the mechanism can prevent AS-level passive attack and other familiar attacks well while decreasing commnunicaton delay, and HLLACF also scales well.…”
Get full text
Article -
1305
Dummy location selection algorithm based on location semantics and query probability
Published 2020-03-01“…Aiming at the problem of privacy leakage caused by attackers possessing background knowledge in traditional location privacy protection schemes,a dummy location selection algorithm based on location semantics and query probability was proposed.Under the conditions that the locations in the dummy location set satisfied semantic difference,similar query probability,and geographically dispersed,it avoided attackers who filter dummy locations by combining background knowledge,and the accuracy of query results was guaranteed.Simulation experiments verify that the proposed algorithm can effectively protect the user’s location privacy.…”
Get full text
Article -
1306
Life Threatening Idiopathic Recurrent Angioedema Responding to Cannabis
Published 2015-01-01“…In the last few months before prescribing cannabis, the frequency and severity of the attacks worsened and included several presyncope events, associated with scrotal and neck swelling. …”
Get full text
Article -
1307
Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network
Published 2020-06-01“…More specifically, our formal security proofs analysis indicates that the proposed scheme can guarantee security even if partial information of the secret key is continually leaked due to side-channel attacks or fault injection attacks. Above all, compared to the existing identity-based online/offline encryption schemes, an identity-based online/offline encryption scheme with continual leakage resilient meets wireless sensor networks with strong security.…”
Get full text
Article -
1308
A Resilience-Based Security Assessment Approach for CBTC Systems
Published 2021-01-01“…Two typical attacking scenarios are analyzed, and the simulation results illustrate the effectiveness of the proposed assessment approach.…”
Get full text
Article -
1309
STATISTICS AS INSTRUMENT OF COUNTERACTION TO INDIVIDUAL TERRORISM
Published 2017-09-01“…Authors come to a conclusion that in this case not only the number of individually conducted terrorist attacks in a year will be taken into consideration (or for any other period of time), but also that damage which was caused (a death toll and the wounded and cumulative damages of material property as a result of individual terrorist attacks). …”
Get full text
Article -
1310
Constitute the passive infrastructure in network
Published 2003-01-01“…It proves that the active technology is very helpful to forecast attack activities and promote network security with passive technology.…”
Get full text
Article -
1311
Type 1 Kounis Syndrome in Patient with Idiopathic Anaphylaxis
Published 2017-01-01“…We present a case of male who experienced attacks of dyspnoea, hypoxemia, hypotension, purple-red skin, and chest pain over several years. …”
Get full text
Article -
1312
Correlation probability indistinguishable location privacy protection algorithm
Published 2017-08-01“…The attack of corre1ation probabi1ity used by the adversary in snapshot query and continuous query services were measured.Then,on account of these attacks,a privacy protection framework based on the differentia1 privacy and a 1ocation-shift scheme to achieve the indistinguishab1e of corre1ation probabi1ities was provided,and the protection effectiveness of this method was proved.At 1ast,security ana1ysis and the experiment resu1ts further verify the protection effectiveness and guarantee the execution efficiency of the proposed scheme.…”
Get full text
Article -
1313
Research on color QR code watermarking technology based on chaos theory
Published 2018-07-01“…In order to carry on copyright protection and security verification of color QR code,the digital image chaos encryption technology and digital watermarking technology were respectively researched.Firstly,an improved image chaos encryption algorithm was proposed as a preprocessing step of digital watermarking algorithm.Then a color QR code digital watermarking algorithm was designed based on discrete wavelet transform and matrix singular value decomposition.Finally,the feasibility of the algorithm was verified by experiments.The results show that the proposed method has good resistance to JPEG compression,noise attack and cropping attack.…”
Get full text
Article -
1314
Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…Active attack testing using a known-plaintext attack (KPA) is declared to have failed in obtaining the plaintext value. …”
Get full text
Article -
1315
A Risk Management Approach to Global Pandemics of Infectious Disease and Anti-Microbial Resistance
Published 2024-11-01“…We discuss the growing trend of attacks on healthcare and differentiate between types: community-driven attacks targeting vaccinators in regions like Pakistan, and state-sponsored attacks by governments such as those of Syria and Russia that weaponize healthcare to deliberately harm whole populations. …”
Get full text
Article -
1316
CFD-Modeling of the Airfoil of the Blades of a Wind Power Plant with a Vertical Axis in the Ansys Fluent System
Published 2024-04-01“…Based on the results of a study of the dependence of the ratio of the drag and lift coefficients on changes in the angle of attack, carried out using the SST k – omega (k – ω) and k – epsilon (k – ε) turbulence models, it has been found that the maximum value of the ratio of the drag and lift coefficients is 21 at the optimal angle attack inclination equal to 5°.…”
Get full text
Article -
1317
The Environmentally IPM Package for Controlling Fall Armyworm (Spodoptera frugiperda) in Maize Field
Published 2023-07-01“…The variables observed were the population of S. frugiperda (individual/plant), attack rate (%), attack intensity (%), cob weight (g/cob), and farming cost (IDR). …”
Get full text
Article -
1318
A cost-effective adaptive repair strategy to mitigate DDoS-capable IoT botnets.
Published 2024-01-01“…Since large-scale botnets based on the Internet of Things (IoT) have been hotbeds for launching DDoS attacks, it is crucial to defend against DDoS-capable IoT botnets effectively. …”
Get full text
Article -
1319
Effectiveness of Wood Vinegar from Tobacco Stalk on Termite Resistance in Bamboo (Dendrocalamus asper Backer)
Published 2024-10-01“…Consequently, treatment E is recommended for bamboo used in curing barns to enhance resistance against subterranean termite attacks.…”
Get full text
Article -
1320
Basmacı İsyanı ve Sovyet-Afgan Sınır Anlaşmazlığı (1925-1926)
Published 2022-06-01“…During this revolt, the Basmachi’s attacked the Soviet targets in Turkestan and returned to Afghanistan after these attacks. …”
Get full text
Article