Results 91 to 100 of about 30,753 (229)

Changes of Potential Suitable Areas for Lynx Under Climate Change in Mohe Area, Daxing'anling Mountains, China

open access: yesWildlife Letters, EarlyView.
Climate change drives shifts in suitable habitats for Eurasian lynx and its prey (hare, roe deer) in Mohe, Daxing'anling Mountains. Under RCP scenarios, moderate warming (RCP4.5) promotes substantial habitat expansion, while high‐emission conditions (RCP8.5) lead to strong expansion in the 2050s but slower gains and partial contraction by the 2070s ...
Binglian Liu   +5 more
wiley   +1 more source

Should you use data integration for your distribution model?

open access: yesJournal of Animal Ecology, EarlyView.
This paper explores cases where data integration (the joint modelling of two or more observational datasets) is useful for species distribution models, and also highlights cases where it's actually not useful. This provides the first concrete guidance for deciding whether or not data integration is worth your time.
Benjamin R. Goldstein   +3 more
wiley   +1 more source

Resource Availability and Habitat Quality Drive Time‐Lag Effects in High‐Altitude Ungulate Distribution

open access: yesIntegrative Zoology, EarlyView.
Our analysis revealed that while climate strongly influenced species distributions, habitat change drove most observed delays in distribution responses. In terms of community ecology, dispersed communities exhibited shorter time lags than concentrated groups. Analyses of lag duration revealed a 5–6‐year distribution lag effect in high‐altitude ungulate
Lu Wang   +6 more
wiley   +1 more source

Representation of obligate groundwater‐dwelling copepod diversity in European protected areas

open access: yesConservation Biology, EarlyView.
Abstract Groundwaters sustain diverse surface ecosystems and are populated by metazoan species, mostly invertebrates, that provide fundamental ecological functions and are often of prominent conservation value due to narrow endemism and high phylogenetic rarity.
Francesco Cerasoli   +7 more
wiley   +1 more source

An iterated greedy‐based metaheuristic with local search for the rank pricing problem

open access: yesInternational Transactions in Operational Research, EarlyView.
Abstract The rank pricing problem involves determining optimal prices for a set of products while accounting for customers' budgets and preferences. This study develops an iterated greedy‐based metaheuristic to efficiently solve this problem. The core idea is to generate a sequence of solutions by iteratively applying destruction and reconstruction ...
Herminia I. Calvete   +3 more
wiley   +1 more source

Plating and double‐loop cerclage wiring improve the mechanical performance of the femoral stem after Zurich cementless total hip replacement in cats

open access: yesVeterinary Surgery, EarlyView.
Abstract Objective To compare the biomechanical performance of adjunctive locking plating and double‐loop cerclage wiring in feline femora implanted with Zurich cementless total hip replacement (THR) stems. Study design Cadaveric biomechanical study. Animals Paired femora (n = 32) from 16 feline cadavers.
Clair Park   +4 more
wiley   +1 more source

Spin Borromean surgeries

open access: yes, 2003
In 1986, Matveev defined the notion of Borromean surgery for closed oriented 3-manifolds and showed that the equivalence relation generated by this move is characterized by the pair (first betti number, linking form up to isomorphism).
Massuyeau, Gwenael
core   +1 more source

Degree theory for 4‐dimensional asymptotically conical gradient expanding solitons

open access: yesCommunications on Pure and Applied Mathematics, Volume 79, Issue 5, Page 1151-1298, May 2026.
Abstract We develop a new degree theory for 4‐dimensional, asymptotically conical gradient expanding solitons. Our theory implies the existence of gradient expanding solitons that are asymptotic to any given cone over S3$S^3$ with non‐negative scalar curvature. We also obtain a similar existence result for cones whose link is diffeomorphic to S3/Γ$S^3/\
Richard H. Bamler, Eric Chen
wiley   +1 more source

On Cryptographic Information Security in Cloud Infrastructures: PKI and IBE Methods

open access: yesБезопасность информационных технологий, 2014
The application of cryptographic security methods in cloud infrastructure information security is analyzed. The cryptographic problems in cloudy infrastructures are chosen; the appropriate protocols are investigated; the appropriate mathematical problems
Konstantin Grigorevich Kogos   +2 more
doaj  

Efficient Identity-Based Universal Designated Verifier Signature Proof Systems

open access: yesMathematics
The implementation of universal designated verifier signatures proofs (UDVSPs) enhances data privacy and security in various digital communication systems.
Yifan Yang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy