-
1921
Secure Pesticide Storage: Security Against Terrorist Threats
Published 2005-06-01“… Many farmers and managers of pesticide storage facilities had concerns about biosecurity and agroterrorism even before the Oklahoma City bombing and the September 11, 2001 terrorist attacks on our nation. Businesses that manufacture, reformulate, sell, distribute, transport, store, or apply pesticides have long known the mitigation steps for safety of their workers, customers and communities. …”
Get full text
Article -
1922
Design of Ice Tolerance Flight Envelope Protection Control System for UAV Based on LSTM Neural Network for Detecting Icing Severity
Published 2025-01-01“…At present, most flight control methods for icing-affected aircraft adopt a conservative control strategy, in which small control inputs are used to keep the aircraft’s angle of attack and other state variables within a limited range. …”
Get full text
Article -
1923
Towards Reliable Participation in UAV-Enabled Federated Edge Learning on Non-IID Data
Published 2024-01-01“…Through experiments, we assess the effectiveness of our scheme in resisting different attack scenarios, in terms of convergence and achieved model accuracy. …”
Get full text
Article -
1924
Karhunen–Loeve orthogonal decomposition method for problems of EEG assessment of patients with migraine
Published 2025-01-01“…For the frontal lobe of the brain, significant differences in the distribution of the first mode were demonstrated, assessed for groups of patients with rare and frequent migraine attacks.…”
Get full text
Article -
1925
A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application
Published 2022-01-01“…S-boxes with low value of differential uniformity and high value of nonlinearity are considered more secure against cryptanalysis attacks. For the construction of <inline-formula> <tex-math notation="LaTeX">$8\times 8$ </tex-math></inline-formula> S-boxes, an efficient and novel scheme is presented in this paper. …”
Get full text
Article -
1926
Phytophthora Identification and Sampling in Citrus Nurseries
Published 2015-09-01“… Phytophthora species are important soil-borne, fungus-like pathogens that attack the root systems, trunk, and fruit of citrus trees at any age. …”
Get full text
Article -
1927
Image Encryption Algorithm Based on a Novel Improper Fractional-Order Attractor and a Wavelet Function Map
Published 2017-01-01“…The obtained simulation results and extensive security analyses demonstrate the high level of security of the algorithm and show its robustness against various types of attacks.…”
Get full text
Article -
1928
Nonislet Cell Tumor Hypoglycemia in a Patient with Adrenal Cortical Carcinoma
Published 2016-01-01“…The serum level of the IGF-II/IGF-I ratio was normalized after removal of the tumor, and the hypoglycemic attacks no longer occurred after the operation.…”
Get full text
Article -
1929
Some Graph-Based Encryption Schemes
Published 2021-01-01“…The need of new nonstandard encryption algorithms has been raised to prevent the communication from traditional attacks. This paper proposes some new encryption algorithms for secure transmission of messages using some special corona graphs and bipartite graph along with some algebraic properties. …”
Get full text
Article -
1930
Reducing Your Risk for Heart Disease: The Power of Food
Published 2021-01-01“…Heart disease is an umbrella term for the following heart conditions: • Angina • Irregular heartbeats • Heart attacks • Heart failure • Stroke This new 8-page publication of the UF/IFAS Food Science and Human Nutrition Department describes the modifiable risk factors for heart disease and tips to reduce one’s risk for heart disease. …”
Get full text
Article -
1931
Application research of optical communication network based on artificial intelligence technique
Published 2020-01-01“…The applications of artificial intelligence (AI) technique in optical communication networks were explored.Some representative AI applications and potential risks due to the failure of the AI technique were discussed.To address these risks,methods including systematic AI modeling through unitizing and miniaturizing sub-systems and cooperation with traditional network modeling and planning methods were proposed,which were expected to help improve the effectiveness and practicality of the application of the AI technique.Finally,to recover a system from the failure of its employed AI technique or attacks,some protection strategies were proposed.…”
Get full text
Article -
1932
Real time database system data security collection scheme
Published 2016-10-01“…With application status of the China Petroleum Refining and Chemicals run system MES(manufacturing execution system)in subordinate enterprises as well as the data acquisition interface program in real-time database module, the security risks such as virus, attacks and illegal invasions in production unit automatic control system (DCS, PLC)because of the “two-network integration”were analyzed. …”
Get full text
Article -
1933
Black thread scale, Ischnaspis longirostris (Signoret) (Insecta: Hemiptera: Diaspididae)
Published 2009-07-01“…It describes this one of the most serious armored scale pests worldwide, attacking over 50 families of host plants — its distribution, field characteristics, life cycle, hosts, plant damage and economic importance, and management. …”
Get full text
Article -
1934
South American Fruit Fly, Anastrepha fraterculus (Wiedemann) (Insecta: Diptera: Tephritidae)
Published 2004-11-01“…This species is of great economic importance because of the wide variety of plants which it attacks and its extensive distribution. In most of South America it probably is the most important species of Anastrepha. …”
Get full text
Article -
1935
Phytophthora Identification and Sampling in Citrus Nurseries
Published 2015-09-01“… Phytophthora species are important soil-borne, fungus-like pathogens that attack the root systems, trunk, and fruit of citrus trees at any age. …”
Get full text
Article -
1936
Encryption based on reversible cellular automata
Published 2008-01-01“…Compared with the general irreversible toggle cellular automata cryptosystem,the proposed method greatly improves the speed of encryption and has large keys space,it can resist bruce attack and differ-ential cryptanalysis.…”
Get full text
Article -
1937
Detection of Paroxysmal Atrial Fibrillation in Stroke/Tia Patients
Published 2013-01-01“…One-third of stroke and transient ischemic attack (TIA) are cryptogenic, and paroxysmal atrial fibrillation (PAF) has been suggested as a possible cause for these cryptogenic strokes. …”
Get full text
Article -
1938
Broadcasting Bidirectional Access Network Intrusion Detection System Facing Tri-Networks Integration
Published 2015-06-01“…The system can detect network attacks passing through the border in real time with four notable features,non-aided deployment,high reliable operation,not able to be detected to ensure its own safety and fu11 data collection,and hopefully it can give a simple and easy-to-accomplish solution to protect the border safety.…”
Get full text
Article -
1939
A Forward-Secure Digital Signature Based on Elliptic Curve
Published 2015-10-01“…The forward-secure digital signature is an important digital signature scheme.It requires that even if the attackers have already been given a signature key by invading a system in t time,it still can’t forge signatures before time t.In other words,the forward-secure digital signature provides an assurance that any signatures in the previous periods are still valid before the key compromises.Based on the elliptic curve discrete logarithm problem and the factoring problem,a forward-secure digital signature scheme was put forward,and the safety and efficiency of the program was analyzed and proved systematically.…”
Get full text
Article -
1940
Black thread scale, Ischnaspis longirostris (Signoret) (Insecta: Hemiptera: Diaspididae)
Published 2009-07-01“…It describes this one of the most serious armored scale pests worldwide, attacking over 50 families of host plants — its distribution, field characteristics, life cycle, hosts, plant damage and economic importance, and management. …”
Get full text
Article