A new Phytophagous Chalcid attacking Bamboo

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introduction of sulfonated bamboo (bamboo-SO3H) as a new catalyst for the facile synthesis of bis(indolyl)methanes

Bamboo is one of the important biopolymers which is used in chemistry. In this work, for the first time, a solid acid catalyst from bamboo was prepared from the reaction of sawdust bamboo and chlorosulfonic acid. Relevant properties of catalyst were investigated by FT-IR, XRD, SEM and TGA. The sulfonated bamboo (bamboo-SO3H) with several acid functional groups was utilized as highly ...

متن کامل

A New Discovery of Ancient Chinese Bamboo Slips

I For the past 30 years, there has arisen a new trend of worldwide studies on Ancient Chinese culture and thought. This new trend is indeed about excavated materials. In ancient China, they had a custom such that, when people died, they were buried with the articles they had used in order to commemorate the dead. And these articles included such literary material as bamboo slips, wood slips, si...

متن کامل

Attacking a Feedback Controller

We consider the problem of generating sensor spoofing attacks on feedback controllers. The attacker has the option of remaining in a stealth mode – wherein it spoofs some sensor but only by an amount that is indistinguishable from noise. Later, the attacker can launch a full attack and try to force the system to get into an unsafe region. Using bounded model checking on an example adaptive crui...

متن کامل

Attacking a Trusted Computing Platform

We describe a flaw which we individuated in the Object-Independent Authorization Protocol (OIAP), an authorization protocol which represents one of the building blocks of the Trusted Platform Module (TPM), the core of the Trusted Computing Platform (TP) as devised by the Trusted Computing Group (TCG) standards. In particular we show that the protocol fails to protect messages exchanges against ...

متن کامل

Phish and Chips (Traditional and New Recipes for Attacking EMV)

This paper surveys existing and new security issues affecting the EMV electronic payments protocol. We first introduce a new price/effort point for the cost of deploying eavesdropping and relay attacks – a microcontroller-based interceptor costing less than $100. We look next at EMV protocol failures in the back-end security API, where we describe two new attacks based on chosen-plaintext CBC w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bulletin of Entomological Research

سال: 1922

ISSN: 0007-4853,1475-2670

DOI: 10.1017/s0007485300045405