Showing 281 - 300 results of 408 for search '"The Intercept"', query time: 0.04s Refine Results
  1. 281

    2019–2020 Florida Citrus Production Guide: Canopy Management by Tripti Vashisth, Mongi Zekri, Fernando M. Alferez

    Published 2019-08-01
    “…Canopy management is an important aspect of citrus production in Florida to avoid problems associated with overcrowding and excessively tall trees, to improve light interception, and to improve pesticide distribution into the canopy as well as to facilitate equipment operation within the grove. …”
    Get full text
    Article
  2. 282

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  3. 283

    Two-stage authentication and key agreement protocol for commuting in Internet of vehicles by ZHANG Haibo, YU Yi, WANG Dongyu, HE Xiaofan

    Published 2024-05-01
    “…In the initial authentication phase, the three independent session keys, negotiated among the vehicle, the RSU, and the trusted authority (TA), were utilized to safeguard the privacy of transmitted data between two entities from interception by third-party entities. In the fast authentication phase, the vehicle and RSU utilized the vehicle's travel schedule to reach the high-efficiency mutual-authentication. …”
    Get full text
    Article
  4. 284

    Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology by Lei Liu, Xue Liu, Jiahua Wan

    Published 2022-01-01
    “…Experimental results show that the proposed algorithm improves the ability of resisting attacks and the amount of malicious data intercepted. The encryption complexity is lower, the time consumption is shorter, and the error of privacy large data encryption is smaller.…”
    Get full text
    Article
  5. 285

    South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Jr.

    Published 2004-07-01
    “…This species would seem to be potentially of economic importance in Florida and southern Texas should it ever be introduced there. It has been intercepted in the United States in pumpkin from Argentina and Brazil, and one adult was found in banana debris from Panama. …”
    Get full text
    Article
  6. 286

    Rhodamine B Adsorption- Kinetic, Mechanistic and Thermodynamic Studies by S. Ramuthai, V. Nandhakumar, M. Thiruchelvi, S. Arivoli, V. Vijayakumaran

    Published 2009-01-01
    “…The values of their corresponding constant were determined from the slope and intercepts of their respective plots. Thermodynamic parameters like ΔG0, ΔH0 and ΔS0 were calculated. …”
    Get full text
    Article
  7. 287

    IMPLEMENTATION OF MESSAGE EMBEDDING INTO VIDEO USING RSA AND LSB2BIT ALGORITHMS by Ibnu Faiz Abdillah, Abdul Halim Hasugian, Armansyah Armansyah

    Published 2024-12-01
    “…Steganography and cryptography are two commonly used methods for securing messages from illegal interception. Steganography involves two main components: a container and a secret message to conceal. …”
    Get full text
    Article
  8. 288

    Artificial noise aided secure beamforming for multi-antenna relay systems by Li-jian ZHANG, Liang JIN, Lu LIU, Wen-yu LUO

    Published 2014-11-01
    “…In the amplify-and-forward (AF) relay systems,the confidential information forwarded by the relay can be intercepted by the eavesdroppers.For guaranteeing the secure communications,an artificial noise aided secure beamforming method is proposed.The goal is to maximize the secrecy rate of the system by jointly designing the beamforming matrix and the artificial noise (AN) covariance matrix at the relay subject to the total power and the per-antenna power constraints.This non-convex secrecy rate maximization (SRM) problem can be recast as a two-level optimization problem.The outer part can be solved by performing a one-dimensional search,and the inner part can be handled by the semidefinite relaxation (SDR) technique and interior-point methods.It is shown that there always exists a rank-one optimal solution for the SDR problem,i.e.…”
    Get full text
    Article
  9. 289

    Fast Trajectory Generation Method for Midcourse Guidance Based on Convex Optimization by Jinlin Zhang, Jiong Li, Chijun Zhou, Humin Lei, Wanli Li

    Published 2022-01-01
    “…To generate the midcourse guidance trajectory for intercepting the high-speed and high maneuvering target, which is a strongly nonlinear and strongly constrained problem, a two-stage convex optimization method is proposed to solve the optimal trajectory quickly. …”
    Get full text
    Article
  10. 290

    Multi-user shortwave data link algorithm based on multi-domain orthogonal frequency selection by LI Lin, HUANG Xuexiao, PENG Xiaoyong

    Published 2025-02-01
    “…A multi-user shortwave data link algorithm based on multi-domain orthogonal frequency selection is proposed to address the difficulties in frequency selection, low timeliness, susceptibility to interception and interference during the fixed frequency construction of shortwave data link, as well as the problem of mutual interference during the multi-user simultaneously building the link. …”
    Get full text
    Article
  11. 291

    Adaptive Distributed Fixed-Time Cooperative Three-Dimensional Guidance Law for Multimissiles against Manoeuvring Target by Jiwei Gao, Xiaojing Li, Shaofei Zang, Jianwei Ma, Jinpeng Zhang

    Published 2023-01-01
    “…The problem of cooperative interception of the manoeuvring target is investigated in this paper. …”
    Get full text
    Article
  12. 292

    Data transmission algorithm for mobile wireless sensor network based on power loss equalization control mechanism by Lijun LI, Fuquan ZHANG, Hongfei LIU

    Published 2018-11-01
    “…In order to solve the problem of synchronization addressing and the inadequacy of power interaction among nodes in the current mobile wireless sensor network,a new data transmission algorithm for mobile wireless sensor network was proposed.Firstly,the broadcast mechanism was adopted to realize synchronous control packet transmission and reduce the pressure caused by the synchronization flow to the addressing process.Then regional node flow valve control mechanism was used,and data traffic between sink nodes and regional node links were recorded and got by interception,flow link equalization was further adopted to promote traffic equalization.in the further step.Finally,the limited bandwidth based on wheel number-sink link jitter screening mode could be identified,and the transmission failure due to limited bandwidth was reduced.Simulation results show that compared with the bandwidth of the root zone node and widely used in limiting transmission algorithm,node link stability encoding algorithm and hierarchical encoding algorithm,the data transmission bandwidth can be improved,the packet loss rate can be reduced,and the practical needs can be better met.…”
    Get full text
    Article
  13. 293

    Silence et langue. by Zlatka Timenova

    Published 2009-12-01
    “…Lors de l’échange verbal, cette spécificité inhérente à la langue provoque la perception d’un reste d’inexprimable qui pourrait intercepter la parole. Ainsi, le silence serait cette absence tendue au sein de l’activité langagière, promettant un nouvel équilibre entre le signe linguistique et l’objet. …”
    Get full text
    Article
  14. 294

    WSN key recovery attack based on symmetric matrix decomposition by Xiangmin JI, Bo ZHAO, Jinhui LIU, Jianwei JIA, Huanguo ZHANG, Shuang XIANG

    Published 2018-10-01
    “…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
    Get full text
    Article
  15. 295

    Japanese Orange Fly, Bactrocera tsuneonis (Miyake) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Jr., Thomas R. Fasulo

    Published 2004-11-01
    “…There have been no interceptions of the Japanese orange fly in the United States, probably due in a large part to the protection provided by a US embargo of long standing against citrus from the orient.This document is EENY-263 (originally published as DPI Entomology Circular 56), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  16. 296

    Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges by LU Xinjin, SHI Yuxin, LEI Jing, YANG Zhifei, YANG Xiaojun

    Published 2024-10-01
    “…The broadcast and openness of wireless systems make information transmission vulnerable to security threats such as interception, eavesdropping and interference. Wireless endogenous security utilizes the intrinsic characteristics of the wireless channel and communication-related technologies to complement existing security mechanisms and improve transmission security. …”
    Get full text
    Article
  17. 297

    Effects of Interplanting Medicinal Herbs on Runoff, Sediment and Nitrogen and Phosphorus Losses in Young Oil Tea Plantation on Red Soil Sloping Field by YAN Shijie, DUAN Jian, SHEN Faxing, XIE Dongjie, ZHENG Haijin

    Published 2024-12-01
    “…The nitrogen and phosphorus reduction effects ranged from 83.02% to 99.14% and 88.38% to 99.65%, respectively; whereas YA pattern only had a better nutrient interception effect under moderate and heavy rain, the soil and water conservation effect under heavy rain was not obvious. (3) Based on the TOPSIS model, the comprehensive benefits of the four patterns were evaluated and ranked as YY (0.48) > YC (0.29) > YA (0.23) > CK (0.02). …”
    Get full text
    Article
  18. 298

    Fixed-Time Convergent Guidance Law with Impact Angle Control by Zhongtao Cheng, Hao Wu, Bo Wang, Lei Liu, Yongji Wang

    Published 2020-01-01
    “…Unlike the existing guidance law in the literature, the fixed-time stability theory is utilized to ensure the impact angle error to converge to zero before the interception. Furthermore, the convergence rate is merely related to control parameters. …”
    Get full text
    Article
  19. 299

    Terminal Guidance Law for UAV Based on Receding Horizon Control Strategy by Zhenglong Wu, Zhenyu Guan, Chengwei Yang, Jie Li

    Published 2017-01-01
    “…Finally, guidance law performs repeated iteration until intercepting the target. The guidance law is of subprime optimal type, requiring less guidance information, and does not need to estimate the acceleration of target and time to go. …”
    Get full text
    Article
  20. 300

    Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control by Yang YANG, Bo-gang LIN, Mao-de MA

    Published 2013-08-01
    “…It deters a third-party storage provider from intercepting users' sensitive information when a search function is provided. …”
    Get full text
    Article