Showing 201 - 220 results of 408 for search '"interception"', query time: 0.03s Refine Results
  1. 201

    A False Powder-post Beetle, Xylopsocus capucinus (Fabridius) (Insecta: Coleoptera: Bostrichidae) by Robert E. Woodruff, E. J. Gerberg, T. J. Spilman

    Published 2004-03-01
    “… Xylopsocus capucinus (Fabricius) has previously been intercepted at ports of entry into the U.S. on many occasions in a wide variety of plant materials. …”
    Get full text
    Article
  2. 202

    Sapote Fruit Fly, Serpentine Fruit Fly, Anastrepha serpentina (Wiedemann) (Insecta: Dipera: Tephritidae) by Howard V. Weems, Jr.

    Published 2004-07-01
    “… The sapote fruit fly, Anastrepha serpentina (Wiedemann), sometimes called the serpentine fruit fly, is intercepted frequently in United States ports of entry in various hosts from several countries. …”
    Get full text
    Article
  3. 203

    South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Jr.

    Published 2004-07-01
    “…This species would seem to be potentially of economic importance in Florida and southern Texas should it ever be introduced there. It has been intercepted in the United States in pumpkin from Argentina and Brazil, and one adult was found in banana debris from Panama. …”
    Get full text
    Article
  4. 204

    Distance-Based Formation Control for Quadrotors with Collision Avoidance via Lyapunov Barrier Functions by Jawhar Ghommam, Luis F. Luque-Vega, Maarouf Saad

    Published 2020-01-01
    “…In this scheme, the leader is assigned the task of intercepting a target whose velocity is unknown, while the follower quadrotors are arranged to set up a predefined rigid formation pattern, ensuring simultaneously interagent collision avoidance and relative localization. …”
    Get full text
    Article
  5. 205

    Low-maintenance subtropical green roofs. Spontaneous vegetation and substrate deph by Brenda Chaves Coelho Leite, Lucas Gobatti, Isabela Gamba Huttenlocher

    Published 2022-06-01
    “…The paper aims to systematically identify the effects exerted by substrate depth during the first months of vegetation growth using the Point-Intercept method in low-maintenance extensive green roofs. …”
    Get full text
    Article
  6. 206

    Statistical Characteristics and Security Analysis over Multi-Cascade κ-μ Shadowed Channels by Xiaohong Wang, Ming Ren, Yiwei Fang, Xinji Tian, Yanyang Zeng

    Published 2022-01-01
    “…Moreover, we further utilize the two performance evaluation metrics including outage probability and intercept probability to investigate the impacts of cascade number and channel parameters on reliability and security. …”
    Get full text
    Article
  7. 207

    A Heuristic Algorithm for Resource Allocation/Reallocation Problem by S. Raja Balachandar, K. Kannan

    Published 2011-01-01
    “…This paper presents a 1-opt heuristic approach to solve resource allocation/reallocation problem which is known as 0/1 multichoice multidimensional knapsack problem (MMKP). The intercept matrix of the constraints is employed to find optimal or near-optimal solution of the MMKP. …”
    Get full text
    Article
  8. 208

    Adsorption of Malachite Green Dye by Acid Activated Carbon - Kinetic, Thermodynamic and Equilibrium Studies by P. K. Baskaran, B. R. Venkatraman, S. Arivoli

    Published 2011-01-01
    “…Thermodynamic parameters such as ΔH°,ΔS° and ΔG°, were calculated from the slope and intercept of the linear plots. Analysis of adsorption results obtained at 303, 313, 323 and 333 K showed that the adsorption pattern on zea mays dust carbon seems to follow the Langmuir and Freundlich. …”
    Get full text
    Article
  9. 209

    Radar Selection Method Based on an Improved Information Filter in the LPI Radar Network by Zhenkai Zhang, Bing Zhang, Zhibin Xie, Yi Yang

    Published 2018-01-01
    “…In order to save the radar resources and obtain the better low probability intercept ability in the network, a novel radar selection method for target tracking based on improved interacting multiple model information filtering (IMM-IF) is presented. …”
    Get full text
    Article
  10. 210

    Simple, Rapid and Sensitive UV-Visible Spectrophotometric Method for Determination of Antidepressant Amitriptyline in Pharmaceutical Dosage Forms by Pankaj Soni, Deepak Sinha, Rajmani Patel

    Published 2013-01-01
    “…The detection limit of the method was 0.3 μg·mL−1. The slope, intercept, and correlation coefficients for the present method were found to be 0.008, 0.002, and +0.998, respectively. …”
    Get full text
    Article
  11. 211

    Efficient DDoS attack detection and prevention scheme based on SDN in cloud environment by Heng HE, Yan HU, Lianghan ZHENG, Zhengyuan XUE

    Published 2018-04-01
    “…For addressing the problem of two typical types of distributed denial of service (DDoS) attacks in cloud environment,a DDoS attack detection and prevention scheme called SDCC based on software defined network (SDN) architecture was proposed.SDCC used a combination of bandwidth detection and data flow detection,utilized confidence-based filtering (CBF) method to calculate the CBF score of packets,judged the packet of CBF score below the threshold as an attacking packet,added its attribute information to the attack flow feature library,and sent the flow table to intercept it through SDN controller.Simulation results show that SDCC can detect and prevent different types of DDoS attacks effectively,and it has high detection efficiency,reduces the controller’s computation overhead,and achieves a low false positive rate.…”
    Get full text
    Article
  12. 212

    Japanese Orange Fly, Bactrocera tsuneonis (Miyake) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Jr., Thomas R. Fasulo

    Published 2004-11-01
    “…There have been no interceptions of the Japanese orange fly in the United States, probably due in a large part to the protection provided by a US embargo of long standing against citrus from the orient.This document is EENY-263 (originally published as DPI Entomology Circular 56), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  13. 213

    A bidirectional authentication protocol for RFID based on Syn by Shanhua ZHAN, Shaorong HUANG

    Published 2018-12-01
    “…The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.…”
    Get full text
    Article
  14. 214

    Android application privacy protection mechanism based on virtual machine bytecode injection by Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU

    Published 2021-06-01
    “…To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was generated according to the user’s security requirement and usage scenario, and injected into the coding unit of Android application that involves dangerous permission request and sensitive data access, to realize dynamic application behavior control.Tests on applications crawled from four mainstream domestic App stores show that the method can effectively intercept sensitive API calls and dangerous permission requests of legitimate App programs and implement control according to pre-specified security policies.Also, after injecting virtual machine bytecode, most of the App program operation is not affected by the injected code, and the robustness is guaranteed.The proposed method has a good universality.…”
    Get full text
    Article
  15. 215

    Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud by Jianhua LIU, Minglu LI, Dazhi LI, Luqun LI

    Published 2017-06-01
    “…Industrial wireless sensor networks and production equipments are deployed in unattended and distributed intelligent manufacturing system (IMS).Sensor-cloud as a potential technology can effectively integrate distributed equipments as a service and provide it to mobile robots.However,when the mobile robots access the remote devices via sensor-cloud platform,because potential attackers easily intercept keys and eavesdrop equipment operation contents through wireless channels,which makes the key management and the control of equipment operation permission become crucial to the safe and reliable operation of IMS.Therefore,the utility function of game players were formalized,the adaptive trust update process was analyzed,and an adaptive trust management mechanism based on evolutionary game was proposed.Simulation results show that the proposed method can effectively improve the security of sensor-cloud network systems and equipments.…”
    Get full text
    Article
  16. 216

    LANGUAGE LEARNING STRATEGIES OF ESL LEARNERS AT MURRAY STATE UNIVERSITY IN IMPROVING THEIR ENGLISH LANGUAGE SKILLS by Rusnadi Rusnadi

    Published 2017-05-01
    “…The collected data were analyzed by using multiple regression analysis which includes Coefficients of Discrimination (r squared), Intercept Coefficients (the constant), and Variable Coefficients (slope), and then concluded inductively. …”
    Get full text
    Article
  17. 217

    Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology by Lei Liu, Xue Liu, Jiahua Wan

    Published 2022-01-01
    “…Experimental results show that the proposed algorithm improves the ability of resisting attacks and the amount of malicious data intercepted. The encryption complexity is lower, the time consumption is shorter, and the error of privacy large data encryption is smaller.…”
    Get full text
    Article
  18. 218

    South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Jr.

    Published 2004-07-01
    “…This species would seem to be potentially of economic importance in Florida and southern Texas should it ever be introduced there. It has been intercepted in the United States in pumpkin from Argentina and Brazil, and one adult was found in banana debris from Panama. …”
    Get full text
    Article
  19. 219

    Spectrophotometric Method for the Determination of Nebivolol Hydrochloride in Bulk and Pharmaceutical Formulations by A. Lakshmana Rao, K. R. Rajeswari, G. G. Sankar

    Published 2010-01-01
    “…Beer’s law was obeyed in the concentration range of 4-60 μg/mL. The slope, intercept and correlation coefficient were also calculated. …”
    Get full text
    Article
  20. 220

    Rhodamine B Adsorption- Kinetic, Mechanistic and Thermodynamic Studies by S. Ramuthai, V. Nandhakumar, M. Thiruchelvi, S. Arivoli, V. Vijayakumaran

    Published 2009-01-01
    “…The values of their corresponding constant were determined from the slope and intercepts of their respective plots. Thermodynamic parameters like ΔG0, ΔH0 and ΔS0 were calculated. …”
    Get full text
    Article