Results 41 to 50 of about 87,772 (336)
Moving in the Dark: Enlightening the Spatial Population Ecology of European Cave Salamanders
We assessed individual interactions, movement ecology and activity patterns of a subterranean population of Speleomantes strinatii, applying spatial capture–recapture modeling to a photographic dataset of 104 individuals. ABSTRACT Space use and movement are fundamental aspects of organisms' ecology, mirroring individual fitness, behavior, and life ...
Giacomo Rosa+2 more
wiley +1 more source
Ivan\u27s Letter (Part 1) [PDF]
The following cipher puzzle appeared in the May 1930 issue of The Enigma, the official publication of the National Puzzlers League. Erik Bodin offered a $10 to the first person to discover the secret message in Ivan\u27s letter, hinting only that the ...
Bodin, Erik
core +2 more sources
Infection Models for Pine Wilt Disease on the Basis of Vector Behaviors
Infection models for pine wilt disease without vector density were built to estimate the transmission coefficient of the pathogenic nematode. The models successfully simulated the annual change in the density of infected trees for four pine stands. ABSTRACT Pine wilt disease is caused by the pinewood nematode (Bursaphelenchus xylophilus Steiner et ...
Katsumi Togashi
wiley +1 more source
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua+2 more
doaj +1 more source
A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context.
Evangelina Lara+3 more
doaj +1 more source
Making tau amyloid models in vitro: a crucial and underestimated challenge
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley +1 more source
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein+2 more
doaj +1 more source
A de novo variant of BICRA results in Coffin–Siris syndrome 12
Background BICRA, a transcript regulator, was identified as the genetic factor of Coffin–Siris syndrome 12 (CSS12) recently, which was characterized by diverse neurodevelopmental delays.
Youquan Tu+5 more
doaj +1 more source
Modern and Lightweight Component-based Symmetric Cipher Algorithms
Information security, being one of the corner stones of network and communication technology, has been evolving tremendously to cope with the parallel evolution of network security threats.
Samar A. Qassir+2 more
doaj +1 more source