Suggested Topics within your search.
Suggested Topics within your search.
-
7061
A Psyllid, Boreioglycaspis melaleucae Moore (Insecta: Hemiptera: Psyllidae)
Published 2004-03-01“…This document is EENY-300 (originally published as DPI Entomology Circular 410- updated for this publication), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
7062
A Psyllid, Boreioglycaspis melaleucae Moore (Insecta: Hemiptera: Psyllidae)
Published 2004-03-01“…This document is EENY-300 (originally published as DPI Entomology Circular 410- updated for this publication), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
7063
Analysis of software defined security model and architecture
Published 2017-06-01“…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
Get full text
Article -
7064
Travestis, transsexuels et homosexuels dans le cinéma espagnol de la Transition démocratique (1975-1982): une interrogation à la nation
Published 2012-11-01“…Almodóvar’s cinema is a case apart, but many other feature-length films looked at what was coming to be known as the gay scene from a variety of angles, commercial or militant. …”
Get full text
Article -
7065
POSSIBILITIES OF APPLICATION OF THE MATHEMATICAL THEORY OF SOLITONS FOR STORAGE AND INFORMATION TRANSFER
Published 2022-09-01“…Characteristic feature of modern physical theories is significantly nonlinear nature of interactions. …”
Get full text
Article -
7066
Darkwinged Fungus Gnats, Bradysia spp. (Insecta: Diptera: Sciaridae)
Published 2004-10-01“…Sciarids are a problem in Florida greenhouses, mostly concerning injury to plants, but also large numbers of flying gnats being an occasional nuisance to workers. …”
Get full text
Article -
7067
Retracted: Content-Based E-Commerce Image Classification Research
Published 2020-01-01“…In order to effectively manage goods and improve the accuracy and efficiency of product image retrieval, this paper uses content-based methods to classify e-commerce images. Aiming at the problems of insufficient classification accuracy and long classification training time in e-commerce image classification, an adaptive momentum learning rate based LBP-DBN training algorithm–AML-LBP-DBN and commodity image classification method based on image local feature multi-level clustering and image-class nearest neighbor classifier are proposed. …”
Get full text
Article -
7068
Darkwinged Fungus Gnats, Bradysia spp. (Insecta: Diptera: Sciaridae)
Published 2004-10-01“…Sciarids are a problem in Florida greenhouses, mostly concerning injury to plants, but also large numbers of flying gnats being an occasional nuisance to workers. …”
Get full text
Article -
7069
Proposed methods of image recognition depend on the PCA
Published 2010-03-01“…This paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). …”
Get full text
Article -
7070
CHARACTERISTIC OF AREA-BASED PLACEMENT OF SUBJECTS OF SMALL ENTITIES IN THE AGRO-INDUSTRIAL COMPLEX OF THE VOLGOGRAD REGION
Published 2016-08-01“…As a result of the carried-out monitoring of rural municipal areas features of specialization, concentration of agricultural production and a problem of subjects of small entities in agrarian sector of economy of the Volgograd region were revealed.…”
Get full text
Article -
7071
A TECHNIQUE FOR INTRODUCTION OF THE PROJECT APPROACH IN TO THE CURRENT CRISIS MANAGEMENT SYSTEM OF THE INDUSTRIAL ENTERPRISE
Published 2014-12-01“…The features of the implementation of the project approach to crisis management are covered. …”
Get full text
Article -
7072
Fast Decomposition Algorithm Based on Two-Dimensional Wavelet Transform for Image Processing of Graphic Design
Published 2021-01-01“…In this paper, we propose a fast decomposition algorithm image processing method based on a new transform of the wavelet transform, which mainly addresses the problems of large computation of feature points and long-time consumption of traditional image processing algorithms. …”
Get full text
Article -
7073
Pathological changes in organs in rheumatoid arthritis with secondary amyloidosis of the heart and kidneys on the background of COVID-19
Published 2022-10-01“…The relevance of this problem in immunoinflammatory rheumatic diseases is due to the increased risk of infection with SARS-CoV-2 and its severe course. …”
Get full text
Article -
7074
Voice Identification Using MFCC and Vector Quantization
Published 2020-09-01“…The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. …”
Get full text
Article -
7075
Attribute-based multi-keyword searchable encryption scheme based on counting Bloom filters
Published 2023-11-01“…To address the problems of low retrieval efficiency of searchable encryption scheme under traditional public key cryptosystem, high storage overhead of keyword index, and index does not support dynamic update, based on the good space and time efficiency of counting Bloom filter to determine whether an element belongs to a certain set, the feature into searchable encryption was applied to establish keyword index, thus, the keyword set was mapped into a binary vector, thereby reducing the keyword storage cost.Simultaneously, the feature of counting Bloom filter can be deleted was used to realize the dynamic update of keyword index.In addition, to prevent adversaries from inferring keyword plaintext information from binary vectors through statistical analysis, the binary vector was blinded by permutation, and then the permutation was encrypted by attribute-based encryption for secret sharing.After legitimate users generated keyword traps correctly, the service provider helped users complete keyword matching queries based on the user’s keyword trapdoor.Finally, the security and efficiency of the scheme were proved through security analysis and simulation experiments.…”
Get full text
Article -
7076
Long-term prediction for VBR video traffic based on wavelet packet decomposition
Published 2008-01-01“…Long-term prediction is one of the most difficult problems in the area of VBR video traffic prediction.As to the time variation,non-linearity and long range dependence in VBR video traffic trace,a novel method of feature based on multi-scale decomposition was proposed.On the analysis of the time-frequency distribution characteristics of the video trace,the wavelet packets which have the trait of arbitrary distinction and decomposition are selected.After space partition of wavelet packets,the best wavelet packet basis for feature extraction is picked out.Based on the best basis,it can do fast arbitrary multi-scale WPT(wavelet packet transform),and obtain each higher dimension wavelet coefficients matrix.And then wavelet coefficients prediction is proposed based on LS-SVM and LMS algorithms.The long-term pre-diction of VBR video traffic is obtained through reverse wavelet transforms on the predicted wavelet coefficients.Nu-merical and simulation results are provided to validate the claims.…”
Get full text
Article -
7077
ORMATION OF FINANCIAL SUPERMARKETS AS COMPETITIVENESS OF BANKS ON THE FINANCIAL MARKET
Published 2022-03-01“…In this article, the financial supermarket is considered as a fight against the problem of reducing the proitability of speciic business areas. …”
Get full text
Article -
7078
A Comparative Study of Methods for Separating Audio Signals
Published 2020-12-01“…In this paper, a review of sound source separation problem has been presented, as well as the methods used to extract features from the audio signal, also, we define the Blind source separation problem and comparing between some of the methods used to solve the problem of source separation.…”
Get full text
Article -
7079
Cloud computing based smartphone social authentication system
Published 2012-09-01“…Cloud computation provided the capabilities to store and compute infinitely,which can filled the gap of resource constrain.So a cloud-computation based social authentication system for smartphones aimed at the problem that the present authentication methods require a long period of validity of the authentication tokens and make the terminals consume large resources was proposed.The system took three types of social networking features into considered,which were different certification authority between the friends,behavior differences between individual and trust level carried by each interactive event.The results of experiments show that the system can effectively solve the problem that system performance will sharply decline when the expiry date of authentication tokens is short.…”
Get full text
Article -
7080
Cloud computing based smartphone social authentication system
Published 2012-09-01“…Cloud computation provided the capabilities to store and compute infinitely,which can filled the gap of resource constrain.So a cloud-computation based social authentication system for smartphones aimed at the problem that the present authentication methods require a long period of validity of the authentication tokens and make the terminals consume large resources was proposed.The system took three types of social networking features into considered,which were different certification authority between the friends,behavior differences between individual and trust level carried by each interactive event.The results of experiments show that the system can effectively solve the problem that system performance will sharply decline when the expiry date of authentication tokens is short.…”
Get full text
Article