Results 51 to 60 of about 48,172 (181)
An autonomous network of acoustic detectors to map tiger risk by eavesdropping on prey alarm calls
Tiger population recovery brings with it increased fatalities from human‐tiger conflict. We describe a network of autonomous intelligent passive acoustic sensors that monitor the forest for deer alarm calls as a proxy for tiger risk and provide a risk map to local communities in real‐time.
Arik Kershenbaum +9 more
wiley +1 more source
Multimodal Signaling in Myrmecophilous Butterflies
Ant nests and their surrounding territories represent a hoard of trophic resources, as well as of stable and protected environments for many arthropods involved in commensal, mutualistic, or parasitic associations.
Luca Pietro Casacci +4 more
doaj +1 more source
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
Predator-prey interactions take place in complex environments, and research on the sensory ecology of predator-detection relies on understanding when, where, and how prey experience and respond to predator cues.
Laurel B. Symes +6 more
doaj +1 more source
Performance Assessment and Mitigation of Timing Covert Channels over the IEEE 802.15.4
The fast development and adoption of IoT technologies has been enabling their application into increasingly sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount.
Ricardo Severino +3 more
doaj +1 more source
Efficient Wireless Security Through Jamming, Coding and Routing
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa +3 more
core +1 more source
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source
Investigating Indirect and Direct Reputation Formation in Asian Elephants (Elephas maximus)
Reputation is a key component in social interactions of group-living animals and appears to play a role in the establishment of cooperation. Animals can form a reputation of an individual by directly interacting with them or by observing them interact ...
Hoi-Lam Jim +6 more
doaj +1 more source
Brook no compromise: How to negotiate a united front
Abstract Negotiating factional conflict is crucial to successful coordination: Political parties, rebel alliances, and authoritarian elites must all overcome internal disagreements to survive and achieve collective aims. Actors in these situations sometimes employ hardball tactics to block outcomes they dislike, but at the risk of causing coordination ...
Elaine Yao
wiley +1 more source
Interspecific acoustic recognition in two European bat communities
Echolocating bats emit echolocation calls for spatial orientation and foraging. These calls are often species-specific and are emitted at high intensity and repetition rate.
Adriana Milena Dorado Correa +2 more
doaj +1 more source

