Showing 181 - 200 results of 408 for search '"interception"', query time: 0.04s Refine Results
  1. 181

    Mealybug Vryburgia trionymoides (DeLotto) (Pseudococcidae) by Ian Stocks

    Published 2013-05-01
    “…A traceback revealed that the succulents originated in California, where this mealybug is known as an occasional greenhouse pest. Specimens intercepted or found in retail stores often were well-hidden in the axillary region near the stem, making detection more challenging. …”
    Get full text
    Article
  2. 182

    Mealybug Vryburgia trionymoides (DeLotto) (Pseudococcidae) by Ian Stocks

    Published 2013-05-01
    “…A traceback revealed that the succulents originated in California, where this mealybug is known as an occasional greenhouse pest. Specimens intercepted or found in retail stores often were well-hidden in the axillary region near the stem, making detection more challenging. …”
    Get full text
    Article
  3. 183

    Fig Wax Scale, Ceroplastes rusci (L.) (Insecta: Hemiptera: Coccoidea: Coccidae) by Avas B. Hamon, Gregor J. Mason

    Published 2004-03-01
    “…Prior to these discoveries, the California Department of Food and Agriculture had intercepted specimens from Florida. This document is EENY-187 (originally published as DPI Entomology Circular 380), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  4. 184

    Design of network traffic monitoring and control system in SDN by Chuan LIU, Zheng LOU, Hui HUANG, Hui DENG

    Published 2015-12-01
    “…The core idea of SDN(software defined networking)is that the control plane and data plane are separated,which makes the network traffic can be flexible controlled.Since SDN has these characteristics,the traffic monitoring and control in SDN have significant differences with traditional IP networks.A network traffic monitoring and control system based on sFlow technology was presented.With the application of sFlow,the process of data collection was separated from the control plane of SDN.The experimental environment was constructed based on OpenDaylight controller and Mininet,and the abnormal traffic was simulated by DoS(denial of service)attacks.The experiments show that the proposed network traffic monitoring and control system can effectively intercept the abnormal traffic.…”
    Get full text
    Article
  5. 185

    Fig Wax Scale, Ceroplastes rusci (L.) (Insecta: Hemiptera: Coccoidea: Coccidae) by Avas B. Hamon, Gregor J. Mason

    Published 2004-03-01
    “…Prior to these discoveries, the California Department of Food and Agriculture had intercepted specimens from Florida. This document is EENY-187 (originally published as DPI Entomology Circular 380), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  6. 186

    Differences in pronotum shape in Phlaeothripinae thrips (Thysanoptera) of quarantine importance by Allan H. Smith-Pardo

    Published 2024-08-01
    “…To do that, a multitude of digital images and illustrations of different genera of phytophagous phlaeothripine thrips were examined to compare their pronotum shape for genera that contain more than 20 species, which are known to feed on plants, as well as those that have been intercepted at U.S. ports of entry coming from other countries. …”
    Get full text
    Article
  7. 187

    Sapote Fruit Fly, Serpentine Fruit Fly, Anastrepha serpentina (Wiedemann) (Insecta: Dipera: Tephritidae) by Howard V. Weems, Jr.

    Published 2004-07-01
    “… The sapote fruit fly, Anastrepha serpentina (Wiedemann), sometimes called the serpentine fruit fly, is intercepted frequently in United States ports of entry in various hosts from several countries. …”
    Get full text
    Article
  8. 188

    South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae) by Howard V. Weems

    Published 2012-03-01
    “…This species is potentially of economic importance in Florida and southern Texas should it ever be introduced there. It has been intercepted in the United States in pumpkin from Argentina and Brazil, and in banana debris from Panama. …”
    Get full text
    Article
  9. 189

    Causal relationship between ulcerative colitis and male infertility: A two-sample Mendelian randomization study. by Xia Wang, Tongyi Li, Qiu Chen

    Published 2024-01-01
    “…The results of MR analysis combined with BWMR analysis also showed positive genetic causal relationship between UC and male infertility.MR-Egger regression showed an intercept of -2.21×10-3 with a standard error of 0.006 and P = 0.751, there was no horizontal pleiotropy for the IVs of exposure factors. …”
    Get full text
    Article
  10. 190

    Don’t move a mussel: The role of key environmental drivers and management scale in assessing spatial variation in dreissenid spread risk in the Missouri River basin by Joseph Raymond, Lucas S. Bair, Timothy D. Counihan, Wesley M. Daniel, Sofie Duntugan, Matthew E. Neilson, Michael Springborn

    Published 2025-01-01
    “…Management efforts such as watercraft inspection and detection programs that attempt to intercept infected watercraft can help limit this type of spread, but optimizing the effectiveness of these programs under limited resources is complicated. …”
    Get full text
    Article
  11. 191

    South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae) by Howard V. Weems

    Published 2012-03-01
    “…This species is potentially of economic importance in Florida and southern Texas should it ever be introduced there. It has been intercepted in the United States in pumpkin from Argentina and Brazil, and in banana debris from Panama. …”
    Get full text
    Article
  12. 192

    Spectrophotometric Methods for the Assay of Fluvoxamine Using Chromogenic Reagents by V. Annapurna, G. Jyothi, V. Nagalakshmi, B. B. V. Sailaja

    Published 2010-01-01
    “…Regression analysis using the method of least squares was made to evaluate the slope(b), intercept(a) and correlation coefficient (r) and standard error of estimation (Se) for each system. …”
    Get full text
    Article
  13. 193

    Selfish mining detection scheme based on the characters of transactions by Heli WANG, Qiao YAN

    Published 2023-04-01
    “…Selfish mining is an attack strategy in Proof-of-Work based blockchains, where attackers withhold their mined blocks to intercept the awards of other honest miners, resulting in higher profitability.This attack undermines the incentive compatibility of Proof-of-Work.Although there are various studies from researchers in recent years, there is no effective detection scheme as the vulnerability of blockchain in propagation delay makes it challenging to distinguish the attackers from honest miners.A scheme for selfish mining detection was introduced.In this scheme, a state value was assigned to the new block based on transaction amount and the transaction fee of the block.By analyzing the relationship between state value and transaction characteristics, we can determine if the block was mined by a selfish miner.The scheme is verified by an experiment with an accuracy of 86.02%.…”
    Get full text
    Article
  14. 194

    Japanese Orange Fly, Bactrocera tsuneonis (Miyake) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Thomas R. Fasulo

    Published 2012-03-01
    “…There have been no interceptions of the Japanese orange fly in the United States, probably due in a large part to the protection provided by a U.S. embargo of long standing against citrus from the orient. …”
    Get full text
    Article
  15. 195

    Japanese Orange Fly, Bactrocera tsuneonis (Miyake) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Thomas R. Fasulo

    Published 2012-03-01
    “…There have been no interceptions of the Japanese orange fly in the United States, probably due in a large part to the protection provided by a U.S. embargo of long standing against citrus from the orient. …”
    Get full text
    Article
  16. 196

    A False Powder-post Beetle, Xylopsocus capucinus (Fabridius) (Insecta: Coleoptera: Bostrichidae) by Robert E. Woodruff, E. J. Gerberg, T. J. Spilman

    Published 2004-03-01
    “… Xylopsocus capucinus (Fabricius) has previously been intercepted at ports of entry into the U.S. on many occasions in a wide variety of plant materials. …”
    Get full text
    Article
  17. 197

    Blind recognition of RSC based on logarithmic conformity by Zhaogen ZHONG, Zhaojun WU, Limin ZHANG, Zhiqing WANG

    Published 2018-10-01
    “…A new algorithm based on logarithmic conformity was proposed.Firstly,based on the probability of total RSC coding equation,the concept of logarithmic coincidence degree,which could measure the establishment of coding equation,was introduced.Then because of constraint length of RSC,the polynomial database could be generated,and then logarithmic conformity of every polynomial could be calculated when traversing the database.As the results,the RSC could be recognized,because the correct polynomial could make the conformity maximum.The algorithm has small amount of calculation because of finite traversal,which was only related to amount of intercepted data,besides,this algorithm has good error tolerance by soft decisions.The simulation results show that the correct ratio of recognition can reach 90% at SNR of 0 dB and its performances are obviously superior to those of existing algorithms.…”
    Get full text
    Article
  18. 198

    Mango Fruit Fly, Ceratitis cosyra (Walker) (Insecta: Diptera: Tephritidae) by Gary J. Steck

    Published 2012-03-01
    “…It is one of the most commonly intercepted fruit flies in Europe. This 3-page fact sheet was written by G. …”
    Get full text
    Article
  19. 199

    Mango Fruit Fly, Ceratitis cosyra (Walker) (Insecta: Diptera: Tephritidae) by Gary J. Steck

    Published 2012-03-01
    “…It is one of the most commonly intercepted fruit flies in Europe. This 3-page fact sheet was written by G. …”
    Get full text
    Article
  20. 200

    Security test of 101 protocol of FTU by Yong WANG, Xiang WANG, Wenting HE, Yuhao ZHOU, Yufan CAI

    Published 2018-10-01
    “…The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication security,there is a common security risk among the intermediate personnel.In order to verify the communication problems of the 101 protocol,the communication system between the FTU and the main station of the feeder terminal was constructed,which collected the telemetry signal of the FTU mobile IoT card on the cloud server,and used the man-in-the-middle attack mode to use the ARP to intercept the communication data packet.To analyze the telemetry information in the data packet,try data tampering and successfully make the monitoring data not updated in time.Finally,an enhancement mechanism against external attacks was proposed.…”
    Get full text
    Article