Results 51 to 60 of about 48,172 (181)

An autonomous network of acoustic detectors to map tiger risk by eavesdropping on prey alarm calls

open access: yesRemote Sensing in Ecology and Conservation, EarlyView.
Tiger population recovery brings with it increased fatalities from human‐tiger conflict. We describe a network of autonomous intelligent passive acoustic sensors that monitor the forest for deer alarm calls as a proxy for tiger risk and provide a risk map to local communities in real‐time.
Arik Kershenbaum   +9 more
wiley   +1 more source

Multimodal Signaling in Myrmecophilous Butterflies

open access: yesFrontiers in Ecology and Evolution, 2019
Ant nests and their surrounding territories represent a hoard of trophic resources, as well as of stable and protected environments for many arthropods involved in commensal, mutualistic, or parasitic associations.
Luca Pietro Casacci   +4 more
doaj   +1 more source

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

From Understory to Canopy: In situ Behavior of Neotropical Forest Katydids in Response to Bat Echolocation Calls

open access: yesFrontiers in Ecology and Evolution, 2018
Predator-prey interactions take place in complex environments, and research on the sensory ecology of predator-detection relies on understanding when, where, and how prey experience and respond to predator cues.
Laurel B. Symes   +6 more
doaj   +1 more source

Performance Assessment and Mitigation of Timing Covert Channels over the IEEE 802.15.4

open access: yesJournal of Sensor and Actuator Networks, 2023
The fast development and adoption of IoT technologies has been enabling their application into increasingly sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount.
Ricardo Severino   +3 more
doaj   +1 more source

Efficient Wireless Security Through Jamming, Coding and Routing

open access: yes, 2013
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming.
Dehghan, Mostafa   +3 more
core   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Investigating Indirect and Direct Reputation Formation in Asian Elephants (Elephas maximus)

open access: yesFrontiers in Psychology, 2021
Reputation is a key component in social interactions of group-living animals and appears to play a role in the establishment of cooperation. Animals can form a reputation of an individual by directly interacting with them or by observing them interact ...
Hoi-Lam Jim   +6 more
doaj   +1 more source

Brook no compromise: How to negotiate a united front

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Negotiating factional conflict is crucial to successful coordination: Political parties, rebel alliances, and authoritarian elites must all overcome internal disagreements to survive and achieve collective aims. Actors in these situations sometimes employ hardball tactics to block outcomes they dislike, but at the risk of causing coordination ...
Elaine Yao
wiley   +1 more source

Interspecific acoustic recognition in two European bat communities

open access: yesFrontiers in Physiology, 2013
Echolocating bats emit echolocation calls for spatial orientation and foraging. These calls are often species-specific and are emitted at high intensity and repetition rate.
Adriana Milena Dorado Correa   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy