Results 41 to 50 of about 201,296 (311)

Signal fingerprint feature extraction and recognition method for communication satellite

open access: yesConnection Science, 2022
Due to the complex maritime environment, communication satellite signals are inevitably subjected to various unpredictable situations which results in the noisy signal.
Zhen Guo, Kai Huang, Jun Ye
doaj   +1 more source

From Golden to Unimodular Cryptography

open access: yes, 2019
We introduce a natural generalization of the golden cryptography, which uses general unimodular matrices in place of the traditional Q-matrices, and prove that it preserves the original error correction properties of the encryption.
Koshkin, Sergiy, Styers, Taylor
core   +1 more source

The unpredictably eruptive dynamics of spruce budworm populations in eastern Canada

open access: yesPopulation Ecology, EarlyView.
We examine historical population data for spruce budworm from several locations through the period 1930–1997, and use density‐dependent recruitment curves to test whether the pattern of population growth over time is more consistent with Royama's (1984; Ecological Monographs 54:429–462) linear R(t) model of harmonic oscillation at Green River New ...
Barry J. Cooke, Jacques Régnière
wiley   +1 more source

Characterisations of Ideal Threshold Schemes [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results on ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +1 more source

A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment

open access: yesMathematics, 2023
In Internet of Things (IoT)-based healthcare, sensor nodes are deployed to detect the patient’s physiological data in a wireless sensor network. In order to prevent unwarranted users from accessing the sensor network to obtain patients’ data, designing ...
Qingyun Xie, Zixuan Ding, Qi Xie
doaj   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

occumb: An R package for site occupancy modeling of eDNA metabarcoding data

open access: yesPopulation Ecology, EarlyView.
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley   +1 more source

Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher. Our main contributions are new differential-linear distinguishers that we were able to build thanks to the following improvements: a) we considered a ...
Emanuele Bellini   +4 more
doaj   +1 more source

Making tau amyloid models in vitro: a crucial and underestimated challenge

open access: yesFEBS Letters, EarlyView.
This review highlights the challenges of producing in vitro amyloid assemblies of the tau protein. We review how accurately the existing protocols mimic tau deposits found in the brain of patients affected with tauopathies. We discuss the important properties that should be considered when forming amyloids and the benchmarks that should be used to ...
Julien Broc, Clara Piersson, Yann Fichou
wiley   +1 more source

Social context prevents heat hormetic effects against mutagens during fish development

open access: yesFEBS Letters, EarlyView.
This study shows that sublethal heat stress protects fish embryos against ultraviolet radiation, a concept known as ‘hormesis’. However, chemical stress transmission between fish embryos negates this protective effect. By providing evidence for the mechanistic molecular basis of heat stress hormesis and interindividual stress communication, this study ...
Lauric Feugere   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy