-
181
Mealybug Vryburgia trionymoides (DeLotto) (Pseudococcidae)
Published 2013-05-01“…A traceback revealed that the succulents originated in California, where this mealybug is known as an occasional greenhouse pest. Specimens intercepted or found in retail stores often were well-hidden in the axillary region near the stem, making detection more challenging. …”
Get full text
Article -
182
Mealybug Vryburgia trionymoides (DeLotto) (Pseudococcidae)
Published 2013-05-01“…A traceback revealed that the succulents originated in California, where this mealybug is known as an occasional greenhouse pest. Specimens intercepted or found in retail stores often were well-hidden in the axillary region near the stem, making detection more challenging. …”
Get full text
Article -
183
Fig Wax Scale, Ceroplastes rusci (L.) (Insecta: Hemiptera: Coccoidea: Coccidae)
Published 2004-03-01“…Prior to these discoveries, the California Department of Food and Agriculture had intercepted specimens from Florida. This document is EENY-187 (originally published as DPI Entomology Circular 380), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
184
Design of network traffic monitoring and control system in SDN
Published 2015-12-01“…The core idea of SDN(software defined networking)is that the control plane and data plane are separated,which makes the network traffic can be flexible controlled.Since SDN has these characteristics,the traffic monitoring and control in SDN have significant differences with traditional IP networks.A network traffic monitoring and control system based on sFlow technology was presented.With the application of sFlow,the process of data collection was separated from the control plane of SDN.The experimental environment was constructed based on OpenDaylight controller and Mininet,and the abnormal traffic was simulated by DoS(denial of service)attacks.The experiments show that the proposed network traffic monitoring and control system can effectively intercept the abnormal traffic.…”
Get full text
Article -
185
Fig Wax Scale, Ceroplastes rusci (L.) (Insecta: Hemiptera: Coccoidea: Coccidae)
Published 2004-03-01“…Prior to these discoveries, the California Department of Food and Agriculture had intercepted specimens from Florida. This document is EENY-187 (originally published as DPI Entomology Circular 380), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
186
Differences in pronotum shape in Phlaeothripinae thrips (Thysanoptera) of quarantine importance
Published 2024-08-01“…To do that, a multitude of digital images and illustrations of different genera of phytophagous phlaeothripine thrips were examined to compare their pronotum shape for genera that contain more than 20 species, which are known to feed on plants, as well as those that have been intercepted at U.S. ports of entry coming from other countries. …”
Get full text
Article -
187
Sapote Fruit Fly, Serpentine Fruit Fly, Anastrepha serpentina (Wiedemann) (Insecta: Dipera: Tephritidae)
Published 2004-07-01“… The sapote fruit fly, Anastrepha serpentina (Wiedemann), sometimes called the serpentine fruit fly, is intercepted frequently in United States ports of entry in various hosts from several countries. …”
Get full text
Article -
188
South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“…This species is potentially of economic importance in Florida and southern Texas should it ever be introduced there. It has been intercepted in the United States in pumpkin from Argentina and Brazil, and in banana debris from Panama. …”
Get full text
Article -
189
Causal relationship between ulcerative colitis and male infertility: A two-sample Mendelian randomization study.
Published 2024-01-01“…The results of MR analysis combined with BWMR analysis also showed positive genetic causal relationship between UC and male infertility.MR-Egger regression showed an intercept of -2.21×10-3 with a standard error of 0.006 and P = 0.751, there was no horizontal pleiotropy for the IVs of exposure factors. …”
Get full text
Article -
190
Don’t move a mussel: The role of key environmental drivers and management scale in assessing spatial variation in dreissenid spread risk in the Missouri River basin
Published 2025-01-01“…Management efforts such as watercraft inspection and detection programs that attempt to intercept infected watercraft can help limit this type of spread, but optimizing the effectiveness of these programs under limited resources is complicated. …”
Get full text
Article -
191
South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“…This species is potentially of economic importance in Florida and southern Texas should it ever be introduced there. It has been intercepted in the United States in pumpkin from Argentina and Brazil, and in banana debris from Panama. …”
Get full text
Article -
192
Spectrophotometric Methods for the Assay of Fluvoxamine Using Chromogenic Reagents
Published 2010-01-01“…Regression analysis using the method of least squares was made to evaluate the slope(b), intercept(a) and correlation coefficient (r) and standard error of estimation (Se) for each system. …”
Get full text
Article -
193
Selfish mining detection scheme based on the characters of transactions
Published 2023-04-01“…Selfish mining is an attack strategy in Proof-of-Work based blockchains, where attackers withhold their mined blocks to intercept the awards of other honest miners, resulting in higher profitability.This attack undermines the incentive compatibility of Proof-of-Work.Although there are various studies from researchers in recent years, there is no effective detection scheme as the vulnerability of blockchain in propagation delay makes it challenging to distinguish the attackers from honest miners.A scheme for selfish mining detection was introduced.In this scheme, a state value was assigned to the new block based on transaction amount and the transaction fee of the block.By analyzing the relationship between state value and transaction characteristics, we can determine if the block was mined by a selfish miner.The scheme is verified by an experiment with an accuracy of 86.02%.…”
Get full text
Article -
194
Japanese Orange Fly, Bactrocera tsuneonis (Miyake) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“…There have been no interceptions of the Japanese orange fly in the United States, probably due in a large part to the protection provided by a U.S. embargo of long standing against citrus from the orient. …”
Get full text
Article -
195
Japanese Orange Fly, Bactrocera tsuneonis (Miyake) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“…There have been no interceptions of the Japanese orange fly in the United States, probably due in a large part to the protection provided by a U.S. embargo of long standing against citrus from the orient. …”
Get full text
Article -
196
A False Powder-post Beetle, Xylopsocus capucinus (Fabridius) (Insecta: Coleoptera: Bostrichidae)
Published 2004-03-01“… Xylopsocus capucinus (Fabricius) has previously been intercepted at ports of entry into the U.S. on many occasions in a wide variety of plant materials. …”
Get full text
Article -
197
Blind recognition of RSC based on logarithmic conformity
Published 2018-10-01“…A new algorithm based on logarithmic conformity was proposed.Firstly,based on the probability of total RSC coding equation,the concept of logarithmic coincidence degree,which could measure the establishment of coding equation,was introduced.Then because of constraint length of RSC,the polynomial database could be generated,and then logarithmic conformity of every polynomial could be calculated when traversing the database.As the results,the RSC could be recognized,because the correct polynomial could make the conformity maximum.The algorithm has small amount of calculation because of finite traversal,which was only related to amount of intercepted data,besides,this algorithm has good error tolerance by soft decisions.The simulation results show that the correct ratio of recognition can reach 90% at SNR of 0 dB and its performances are obviously superior to those of existing algorithms.…”
Get full text
Article -
198
Mango Fruit Fly, Ceratitis cosyra (Walker) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“…It is one of the most commonly intercepted fruit flies in Europe. This 3-page fact sheet was written by G. …”
Get full text
Article -
199
Mango Fruit Fly, Ceratitis cosyra (Walker) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“…It is one of the most commonly intercepted fruit flies in Europe. This 3-page fact sheet was written by G. …”
Get full text
Article -
200
Security test of 101 protocol of FTU
Published 2018-10-01“…The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication security,there is a common security risk among the intermediate personnel.In order to verify the communication problems of the 101 protocol,the communication system between the FTU and the main station of the feeder terminal was constructed,which collected the telemetry signal of the FTU mobile IoT card on the cloud server,and used the man-in-the-middle attack mode to use the ARP to intercept the communication data packet.To analyze the telemetry information in the data packet,try data tampering and successfully make the monitoring data not updated in time.Finally,an enhancement mechanism against external attacks was proposed.…”
Get full text
Article