Showing 981 - 1,000 results of 1,265 for search 'Hornsey~', query time: 2.76s Refine Results
  1. 981
  2. 982

    Position of the Anaphylaxis, Insect Venom Allergy and Mastocytosis Section of the Polish Society of Allergology regarding the principles of diagnosing hypersensitivity to Hymenopte... by Marita Nittner-Marszalska, Marek Niedoszytko, Ewa Cichocka-Jarosz, Andrzej Bożek, Iwona Poziomkowska-Gęsicka, Radoslaw Gawlik, Marta Chełmińska

    Published 2024-09-01
    “…With the aim of optimizing and improving the quality of allergy care for all these patient groups, the Anaphylaxis, Insect Venom Allergy, and Mastocytosis Section of the Polish Allergy Society has developed a scheme for the diagnostic and treatment process of patients with sensitization and allergy to bee, wasp, hornet, and bumblebee venom. The recommendations presented in this article are based on the guidelines of the European Academy of Allergy and Clinical Immunology (EAACI), as well as on the results of research, meta-analyses, and recommendations of scientific societies from the last 5 years, and the opinions of physicians dealing with the treatment of allergies to hymenoptera venom. …”
    Get full text
    Article
  3. 983
  4. 984
  5. 985

    Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid by Jianwei CHEN, Shuyu WANG, Meiping ZHANG, Zhenping ZHANG

    Published 2024-01-01
    “…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
    Get full text
    Article
  6. 986

    Use of Relay Method for Enhancing Comb Construction by <i>Apis cerana cerana</i> Utilizing <i>Apis mellifera ligustica</i> by Shunhua Yang, Shanglun Ge, Yiqiu Liu, Danyin Zhou, Xueyang Gong, Kun Dong

    Published 2025-01-01
    “…Italian honey bees (IHBs, <i>Apis mellifera ligustica</i>) exhibit superior comb-building abilities compared with Chinese honey bees (CHBs, <i>Apis cerana cerana</i>), which often fail to fully utilize wax foundations, resulting in incomplete comb structures. …”
    Get full text
    Article
  7. 987
  8. 988
  9. 989
  10. 990
  11. 991
  12. 992
  13. 993
  14. 994

    Seaside Goldenrod, Solidago sempervirens by Debbie Miller, Mack Thetford, Chris Verlinde, Gabriel Campbell, Ashlynn Smith

    Published 2018-10-01
    “…It attracts many pollinators, including birds, native bees, honey bees, butterflies (especially Monarch butterflies), and beneficial insects. …”
    Get full text
    Article
  15. 995
  16. 996

    Design and performance analysis of a SDN-based intelligent and collaborative Honeynet for mobile networks environment by Liyue CHEN, Yangdan NI, Xiaoyun KONG, Sheng ZHOU, Hui HUANG, Xing ZHENG

    Published 2018-11-01
    “…In the mobile network environment,the mobile honeypot resources are limited and the attack injection means are flexible,so it is necessary to dynamically deploy the honeynet to collaboratively detect the attack behavior characteristics.However,existing honey nets are susceptible to feature recognition attacks,malicious traffic within the network,and can’t be migrated across honeypots.Based on software defined networking (SDN) technology,an intelligent collaborative honeynet system (ic-Honeynet) was designed.It consisted of a reverse connection proxy module and a honeynet controller.Finally,an ic-Honeynet experimental environment was built and the effectiveness of the system was verified.The experimental results show that the throughput of the system is nearly linear,up to 8.23 Gbit/s; the additional increase in response delay is small,only in the range of 0.5 to 1.2 ms; the connection processing capability is also very strong,up to 1 473 connections/s.…”
    Get full text
    Article
  17. 997

    Nest Relocation and Colony Founding in the Australian Desert Ant, Melophorus bagoti Lubbock (Hymenoptera: Formicidae) by Patrick Schultheiss, Sebastian Schwarz, Antoine Wystrach

    Published 2010-01-01
    “…Even after years of research on navigation in the Red Honey Ant, Melophorus bagoti, much of its life history remains elusive. …”
    Get full text
    Article
  18. 998
  19. 999
  20. 1000