Results 81 to 90 of about 48,172 (181)

Using acoustic indices to detect interspecific bird interactions and behaviour

open access: yesIbis, Volume 168, Issue 2, Page 541-553, April 2026.
Communication networks and acoustic interactions play a crucial role in shaping animal communities by mediating information exchange between individuals. These interactions contribute to the biophonic component of the soundscape—the acoustic environment of a place—which is increasingly analysed to understand ecosystem structure and functioning. However,
Federica Rossetto   +2 more
wiley   +1 more source

Improving Secrecy Capacity in the Face of Eavesdropping in SWIPT CIoT Networks With Actor-Critic DRL

open access: yesIEEE Open Journal of the Communications Society
One of the key enablers of 6th-generation (6G) wireless networks is cognitive radio, offering optimized spectrum utilization, enhanced device intelligence, and improved security. This article investigates secure communication in an energy-harvesting (EH)
Nada Abdel Khalek, Walaa Hamouda
doaj   +1 more source

Cowbirds use conspecific social information to detect host nests in the wild

open access: yesIbis, Volume 168, Issue 2, Page 799-804, April 2026.
Recent work shows that hosts of avian brood parasites use social information to increase egg rejection rates, but fewer studies explore how parasites themselves use such information to detect host nests in the wild. To determine whether wild Brown‐headed Cowbirds Molothrus ater use social information to detect host nests, we measured how individual ...
Omar J. Morosse   +2 more
wiley   +1 more source

Two New Bio-Inspired Particle Swarm Optimisation Algorithms for Single-Objective Continuous Variable Problems Based on Eavesdropping and Altruistic Animal Behaviours

open access: yesBiomimetics
This paper presents two novel bio-inspired particle swarm optimisation (PSO) variants, namely biased eavesdropping PSO (BEPSO) and altruistic heterogeneous PSO (AHPSO).
Fevzi Tugrul Varna, Phil Husbands
doaj   +1 more source

Molecular Communication Is the Internet of Brain Missing Key: A Comprehensive Overview of Background Technologies and the Generic Framework

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
A novel three‐layer architecture is proposed for cell‐to‐cell communication, integrating molecular, nano‐electronic, and digital components. It enables bio‐integrated applications such as remote emotional touching, consensual telepathy, and autonomous drug delivery. Molecular Communication (MC) is utilized with advanced implants, modulation techniques,
Saeed Banaeian Far   +2 more
wiley   +1 more source

Performance Analysis of Wireless Information Surveillance in Machine-Type Communication at Finite Blocklength Regime

open access: yesSensors, 2019
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via the massive deployment of machine-type communication devices in order to greatly improve daily life. However, machine-type communications can be illegally used (e.g.,
Ruonan Dong, Baogang Li, Binyang Yan
doaj   +1 more source

The Secrecy Capacity Optimization Artificial Noise: A New Type of Artificial Noise for Secure Communication in MIMO System

open access: yesIEEE Access, 2019
In multiple-input multiple-output wireless communication system, artificial noise (AN) is designed to be aligned into the null space of the legitimate channel so that it has no effect on the legitimate channel.
Yebo Gu   +3 more
doaj   +1 more source

On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas

open access: yesInternational Journal of Distributed Sensor Networks, 2013
The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks.
Hong-Ning Dai   +3 more
doaj   +1 more source

Less eavesdropping losses induce more eavesdropping information gain

open access: yes, 2004
The eavesdropping scheme proposed by W jcik [Phys. Rev. Lett. {\bf 90},157901(2003)] on the quantum communication protocol of Bostr m and Felbinger [Phys. Rev. Lett. {\bf 89}, 187902(2002)] is improved by constituting a new set of attack operations. The improved scheme only induces half of the eavesdropping losses in W jcik's scheme, therefore, in a
Zhang, Zhanjun, Man, Zhongxiao, Li, Yong
openaire   +2 more sources

Fiber Eavesdropping Detection and Location in Optical Communication System

open access: yesPhotonics
Fiber eavesdropping severely endangers the confidentiality of data transmitted in optical networks. Therefore, it is necessary to explore how to detect and locate fiber eavesdropping in an effective approach.
Yuang Li   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy