Results 21 to 30 of about 48,172 (181)
From Nobody to Somebody: Romantic Epistemology in Jane Austen’s Persuasion
The aim of this article is to substantiate the thesis that together with the development of the plot of Persuasion, the cognitive power of the principal heroine expands, and she becomes a highly sensitive reader of human minds.
Grażyna Bystydzieńska
doaj +1 more source
Quantum Key Distribution using Two Coherent States of Light and their Superposition [PDF]
Quantum mechanical complementarity ensures the security of the key-distribution scheme reported by Brassard and Bennet in 1984 (BB84), but does not prohibit use of multi-photons as a signal carrier.
Chiba-Kohno, Y. +3 more
core +3 more sources
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy ...
Guomei Zhang, Hao Sun
doaj +1 more source
Some bacteria can modulate their spoilage potential by responding to environmental signaling molecules via the quorum sensing (QS) system. However, the ability of Pseudomonas fluorescens, the specific spoilage organism (SSO) of turbot, to response to ...
Tingting Li +8 more
doaj +1 more source
Intercropping can reduce agricultural pest incidence and represents an important sustainable alternative to conventional pest control methods. Citrus intercropped with guava (Psidium guajava L.) has a lower incidence of Asian citrus psyllid (ACP ...
Siquan Ling +8 more
doaj +1 more source
On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks
The security and privacy of underwater acoustic sensor networks has received extensive attention recently due to the proliferation of underwater activities.
Qiu Wang +4 more
doaj +1 more source
The Evolution of Predator Resemblance in Avian Brood Parasites
Predators have profound effects on prey behavior and some adult brood parasites use predator resemblance to exploit the antipredator defenses of their hosts.
Jennifer E. York, Jennifer E. York
doaj +1 more source
A survey of acoustic eavesdropping attacks: Principle, methods, and progress
In today’s information age, eavesdropping has been one of the most serious privacy threats in information security, such as exodus spyware (Rudie et al., 2021) and pegasus spyware (Anatolyevich, 2020).
Yiwei Chen +3 more
doaj +1 more source
Performance Analysis of Interference and Eavesdropping Immunity in Narrow Beam mmWave Networks
Exploiting highly directional antenna arrays to compensate for severe propagation loss is one of the defining features in millimeter-wave (mmWave) communications. With efficient beamforming techniques, mmWave transceivers can form steerable narrow beams.
Qing Xue +3 more
doaj +1 more source
Incoherent and Coherent Eavesdropping in the 6-state Protocol of Quantum Cryptography
All incoherent as well as 2- and 3-qubit coherent eavesdropping strategies on the 6 state protocol of quantum cryptography are classified. For a disturbance of 1/6, the optimal incoherent eavesdropping strategy reduces to the universal quantum cloning ...
Bechmann-Pasquinucci, H., Gisin, N.
core +3 more sources

