-
281
2019–2020 Florida Citrus Production Guide: Canopy Management
Published 2019-08-01“…Canopy management is an important aspect of citrus production in Florida to avoid problems associated with overcrowding and excessively tall trees, to improve light interception, and to improve pesticide distribution into the canopy as well as to facilitate equipment operation within the grove. …”
Get full text
Article -
282
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
283
Two-stage authentication and key agreement protocol for commuting in Internet of vehicles
Published 2024-05-01“…In the initial authentication phase, the three independent session keys, negotiated among the vehicle, the RSU, and the trusted authority (TA), were utilized to safeguard the privacy of transmitted data between two entities from interception by third-party entities. In the fast authentication phase, the vehicle and RSU utilized the vehicle's travel schedule to reach the high-efficiency mutual-authentication. …”
Get full text
Article -
284
Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology
Published 2022-01-01“…Experimental results show that the proposed algorithm improves the ability of resisting attacks and the amount of malicious data intercepted. The encryption complexity is lower, the time consumption is shorter, and the error of privacy large data encryption is smaller.…”
Get full text
Article -
285
South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae)
Published 2004-07-01“…This species would seem to be potentially of economic importance in Florida and southern Texas should it ever be introduced there. It has been intercepted in the United States in pumpkin from Argentina and Brazil, and one adult was found in banana debris from Panama. …”
Get full text
Article -
286
Rhodamine B Adsorption- Kinetic, Mechanistic and Thermodynamic Studies
Published 2009-01-01“…The values of their corresponding constant were determined from the slope and intercepts of their respective plots. Thermodynamic parameters like ΔG0, ΔH0 and ΔS0 were calculated. …”
Get full text
Article -
287
IMPLEMENTATION OF MESSAGE EMBEDDING INTO VIDEO USING RSA AND LSB2BIT ALGORITHMS
Published 2024-12-01“…Steganography and cryptography are two commonly used methods for securing messages from illegal interception. Steganography involves two main components: a container and a secret message to conceal. …”
Get full text
Article -
288
Artificial noise aided secure beamforming for multi-antenna relay systems
Published 2014-11-01“…In the amplify-and-forward (AF) relay systems,the confidential information forwarded by the relay can be intercepted by the eavesdroppers.For guaranteeing the secure communications,an artificial noise aided secure beamforming method is proposed.The goal is to maximize the secrecy rate of the system by jointly designing the beamforming matrix and the artificial noise (AN) covariance matrix at the relay subject to the total power and the per-antenna power constraints.This non-convex secrecy rate maximization (SRM) problem can be recast as a two-level optimization problem.The outer part can be solved by performing a one-dimensional search,and the inner part can be handled by the semidefinite relaxation (SDR) technique and interior-point methods.It is shown that there always exists a rank-one optimal solution for the SDR problem,i.e.…”
Get full text
Article -
289
Fast Trajectory Generation Method for Midcourse Guidance Based on Convex Optimization
Published 2022-01-01“…To generate the midcourse guidance trajectory for intercepting the high-speed and high maneuvering target, which is a strongly nonlinear and strongly constrained problem, a two-stage convex optimization method is proposed to solve the optimal trajectory quickly. …”
Get full text
Article -
290
Multi-user shortwave data link algorithm based on multi-domain orthogonal frequency selection
Published 2025-02-01“…A multi-user shortwave data link algorithm based on multi-domain orthogonal frequency selection is proposed to address the difficulties in frequency selection, low timeliness, susceptibility to interception and interference during the fixed frequency construction of shortwave data link, as well as the problem of mutual interference during the multi-user simultaneously building the link. …”
Get full text
Article -
291
Adaptive Distributed Fixed-Time Cooperative Three-Dimensional Guidance Law for Multimissiles against Manoeuvring Target
Published 2023-01-01“…The problem of cooperative interception of the manoeuvring target is investigated in this paper. …”
Get full text
Article -
292
Data transmission algorithm for mobile wireless sensor network based on power loss equalization control mechanism
Published 2018-11-01“…In order to solve the problem of synchronization addressing and the inadequacy of power interaction among nodes in the current mobile wireless sensor network,a new data transmission algorithm for mobile wireless sensor network was proposed.Firstly,the broadcast mechanism was adopted to realize synchronous control packet transmission and reduce the pressure caused by the synchronization flow to the addressing process.Then regional node flow valve control mechanism was used,and data traffic between sink nodes and regional node links were recorded and got by interception,flow link equalization was further adopted to promote traffic equalization.in the further step.Finally,the limited bandwidth based on wheel number-sink link jitter screening mode could be identified,and the transmission failure due to limited bandwidth was reduced.Simulation results show that compared with the bandwidth of the root zone node and widely used in limiting transmission algorithm,node link stability encoding algorithm and hierarchical encoding algorithm,the data transmission bandwidth can be improved,the packet loss rate can be reduced,and the practical needs can be better met.…”
Get full text
Article -
293
Silence et langue.
Published 2009-12-01“…Lors de l’échange verbal, cette spécificité inhérente à la langue provoque la perception d’un reste d’inexprimable qui pourrait intercepter la parole. Ainsi, le silence serait cette absence tendue au sein de l’activité langagière, promettant un nouvel équilibre entre le signe linguistique et l’objet. …”
Get full text
Article -
294
WSN key recovery attack based on symmetric matrix decomposition
Published 2018-10-01“…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
Get full text
Article -
295
Japanese Orange Fly, Bactrocera tsuneonis (Miyake) (Insecta: Diptera: Tephritidae)
Published 2004-11-01“…There have been no interceptions of the Japanese orange fly in the United States, probably due in a large part to the protection provided by a US embargo of long standing against citrus from the orient.This document is EENY-263 (originally published as DPI Entomology Circular 56), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
296
Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges
Published 2024-10-01“…The broadcast and openness of wireless systems make information transmission vulnerable to security threats such as interception, eavesdropping and interference. Wireless endogenous security utilizes the intrinsic characteristics of the wireless channel and communication-related technologies to complement existing security mechanisms and improve transmission security. …”
Get full text
Article -
297
Effects of Interplanting Medicinal Herbs on Runoff, Sediment and Nitrogen and Phosphorus Losses in Young Oil Tea Plantation on Red Soil Sloping Field
Published 2024-12-01“…The nitrogen and phosphorus reduction effects ranged from 83.02% to 99.14% and 88.38% to 99.65%, respectively; whereas YA pattern only had a better nutrient interception effect under moderate and heavy rain, the soil and water conservation effect under heavy rain was not obvious. (3) Based on the TOPSIS model, the comprehensive benefits of the four patterns were evaluated and ranked as YY (0.48) > YC (0.29) > YA (0.23) > CK (0.02). …”
Get full text
Article -
298
Fixed-Time Convergent Guidance Law with Impact Angle Control
Published 2020-01-01“…Unlike the existing guidance law in the literature, the fixed-time stability theory is utilized to ensure the impact angle error to converge to zero before the interception. Furthermore, the convergence rate is merely related to control parameters. …”
Get full text
Article -
299
Terminal Guidance Law for UAV Based on Receding Horizon Control Strategy
Published 2017-01-01“…Finally, guidance law performs repeated iteration until intercepting the target. The guidance law is of subprime optimal type, requiring less guidance information, and does not need to estimate the acceleration of target and time to go. …”
Get full text
Article -
300
Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control
Published 2013-08-01“…It deters a third-party storage provider from intercepting users' sensitive information when a search function is provided. …”
Get full text
Article