Results 41 to 50 of about 87,772 (336)

Moving in the Dark: Enlightening the Spatial Population Ecology of European Cave Salamanders

open access: yesPopulation Ecology, EarlyView.
We assessed individual interactions, movement ecology and activity patterns of a subterranean population of Speleomantes strinatii, applying spatial capture–recapture modeling to a photographic dataset of 104 individuals. ABSTRACT Space use and movement are fundamental aspects of organisms' ecology, mirroring individual fitness, behavior, and life ...
Giacomo Rosa   +2 more
wiley   +1 more source

Ivan\u27s Letter (Part 1) [PDF]

open access: yes, 1982
The following cipher puzzle appeared in the May 1930 issue of The Enigma, the official publication of the National Puzzlers League. Erik Bodin offered a $10 to the first person to discover the secret message in Ivan\u27s letter, hinting only that the ...
Bodin, Erik
core   +2 more sources

Jacobile Ciphers [PDF]

open access: yesThe English Historical Review, 1903
n ...
openaire   +1 more source

Infection Models for Pine Wilt Disease on the Basis of Vector Behaviors

open access: yesPopulation Ecology, EarlyView.
Infection models for pine wilt disease without vector density were built to estimate the transmission coefficient of the pathogenic nematode. The models successfully simulated the annual change in the density of infected trees for four pine stands. ABSTRACT Pine wilt disease is caused by the pinewood nematode (Bursaphelenchus xylophilus Steiner et ...
Katsumi Togashi
wiley   +1 more source

Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices

open access: yesIEEE Access
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua   +2 more
doaj   +1 more source

A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices

open access: yesSensors, 2018
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context.
Evangelina Lara   +3 more
doaj   +1 more source

Making tau amyloid models in vitro: a crucial and underestimated challenge

open access: yesFEBS Letters, EarlyView.
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley   +1 more source

Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network

open access: yesJournal of Communications Software and Systems
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein   +2 more
doaj   +1 more source

A de novo variant of BICRA results in Coffin–Siris syndrome 12

open access: yesMolecular Genetics & Genomic Medicine, 2023
Background BICRA, a transcript regulator, was identified as the genetic factor of Coffin–Siris syndrome 12 (CSS12) recently, which was characterized by diverse neurodevelopmental delays.
Youquan Tu   +5 more
doaj   +1 more source

Modern and Lightweight Component-based Symmetric Cipher Algorithms

open access: yesARO-The Scientific Journal of Koya University, 2022
Information security, being one of the corner stones of network and communication technology, has been evolving tremendously to cope with the parallel evolution of network security threats.
Samar A. Qassir   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy