-
981
-
982
Position of the Anaphylaxis, Insect Venom Allergy and Mastocytosis Section of the Polish Society of Allergology regarding the principles of diagnosing hypersensitivity to Hymenopte...
Published 2024-09-01“…With the aim of optimizing and improving the quality of allergy care for all these patient groups, the Anaphylaxis, Insect Venom Allergy, and Mastocytosis Section of the Polish Allergy Society has developed a scheme for the diagnostic and treatment process of patients with sensitization and allergy to bee, wasp, hornet, and bumblebee venom. The recommendations presented in this article are based on the guidelines of the European Academy of Allergy and Clinical Immunology (EAACI), as well as on the results of research, meta-analyses, and recommendations of scientific societies from the last 5 years, and the opinions of physicians dealing with the treatment of allergies to hymenoptera venom. …”
Get full text
Article -
983
-
984
-
985
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Published 2024-01-01“…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
Get full text
Article -
986
Use of Relay Method for Enhancing Comb Construction by <i>Apis cerana cerana</i> Utilizing <i>Apis mellifera ligustica</i>
Published 2025-01-01“…Italian honey bees (IHBs, <i>Apis mellifera ligustica</i>) exhibit superior comb-building abilities compared with Chinese honey bees (CHBs, <i>Apis cerana cerana</i>), which often fail to fully utilize wax foundations, resulting in incomplete comb structures. …”
Get full text
Article -
987
-
988
-
989
Une trompe romaine (tuba) à Brie-Comte-Robert (Seine-et-Marne) ?
Published 2013-01-01Get full text
Article -
990
Témoignages de la Guerre des Gaules dans le bassin clermontois, nouveaux apports
Published 2015-04-01Get full text
Article -
991
-
992
-
993
Protocol for 3D photogrammetry and morphological digitization of complex skulls
Published 2025-03-01Get full text
Article -
994
Seaside Goldenrod, Solidago sempervirens
Published 2018-10-01“…It attracts many pollinators, including birds, native bees, honey bees, butterflies (especially Monarch butterflies), and beneficial insects. …”
Get full text
Article -
995
Pest Management Perceptions and Practices for Equine Farms in North and Central Florida
Published 2013-05-01Get full text
Article -
996
Design and performance analysis of a SDN-based intelligent and collaborative Honeynet for mobile networks environment
Published 2018-11-01“…In the mobile network environment,the mobile honeypot resources are limited and the attack injection means are flexible,so it is necessary to dynamically deploy the honeynet to collaboratively detect the attack behavior characteristics.However,existing honey nets are susceptible to feature recognition attacks,malicious traffic within the network,and can’t be migrated across honeypots.Based on software defined networking (SDN) technology,an intelligent collaborative honeynet system (ic-Honeynet) was designed.It consisted of a reverse connection proxy module and a honeynet controller.Finally,an ic-Honeynet experimental environment was built and the effectiveness of the system was verified.The experimental results show that the throughput of the system is nearly linear,up to 8.23 Gbit/s; the additional increase in response delay is small,only in the range of 0.5 to 1.2 ms; the connection processing capability is also very strong,up to 1 473 connections/s.…”
Get full text
Article -
997
Nest Relocation and Colony Founding in the Australian Desert Ant, Melophorus bagoti Lubbock (Hymenoptera: Formicidae)
Published 2010-01-01“…Even after years of research on navigation in the Red Honey Ant, Melophorus bagoti, much of its life history remains elusive. …”
Get full text
Article -
998
-
999
-
1000
The evaluation of biofilm production by streptococcus equi zooepidemicus isolates
Published 2020-12-01Get full text
Article