Results 41 to 50 of about 7,526,383 (337)

Predicting endotracheal tube size from length: Evaluation of the Broselow tape in Indian children

open access: yesJournal of Anaesthesiology Clinical Pharmacology, 2018
Background and Aims: Several formulae are available to estimate endotracheal tube (ETT) size in children. This study was designed to compare the ETT estimated by the Broselow tape (BT) with age-based estimation of ETT size and to identify the most ...
Shalini Subramanian   +3 more
doaj   +1 more source

Error Free Perfect Secrecy Systems

open access: yes, 2012
Shannon's fundamental bound for perfect secrecy says that the entropy of the secret message cannot be larger than the entropy of the secret key initially shared by the sender and the legitimate receiver. Massey gave an information theoretic proof of this
Chan, Terence H.   +3 more
core   +1 more source

Moving in the Dark: Enlightening the Spatial Population Ecology of European Cave Salamanders

open access: yesPopulation Ecology, EarlyView.
We assessed individual interactions, movement ecology and activity patterns of a subterranean population of Speleomantes strinatii, applying spatial capture–recapture modeling to a photographic dataset of 104 individuals. ABSTRACT Space use and movement are fundamental aspects of organisms' ecology, mirroring individual fitness, behavior, and life ...
Giacomo Rosa   +2 more
wiley   +1 more source

Practical challenges in quantum key distribution

open access: yes, 2016
Quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key ...
Diamanti, Eleni   +3 more
core   +1 more source

Security proof of differential phase shift quantum key distribution in the noiseless case [PDF]

open access: yes, 2008
Differential phase shift quantum key distribution systems have a high potential for achieving high speed key generation. However, its unconditional security proof is still missing, even though it has been proposed for many years.
Fung, Chi-Hang Fred   +3 more
core   +2 more sources

Infection Models for Pine Wilt Disease on the Basis of Vector Behaviors

open access: yesPopulation Ecology, EarlyView.
Infection models for pine wilt disease without vector density were built to estimate the transmission coefficient of the pathogenic nematode. The models successfully simulated the annual change in the density of infected trees for four pine stands. ABSTRACT Pine wilt disease is caused by the pinewood nematode (Bursaphelenchus xylophilus Steiner et ...
Katsumi Togashi
wiley   +1 more source

Speciation Through the Lens of Population Dynamics: A Theoretical Primer on How Small and Large Populations Diverge

open access: yesPopulation Ecology, EarlyView.
Population size and dynamics fundamentally shape speciation by influencing genetic drift, founder events, and adaptive potential. Small populations may speciate rapidly due to stronger drift, whereas large populations harbor more genetic diversity, which can alter divergence trajectories. We highlight theoretical models that incorporate population size
Ryo Yamaguchi   +3 more
wiley   +1 more source

Secure and {\sl Practical} Identity-Based Encryption [PDF]

open access: yes, 2005
In this paper, we present a variant of Waters' Identity-Based Encryption scheme with a much smaller public-key size (only a few kilobytes). We show that this variant is semantically secure against passive adversaries in the standard model.\smallskip In
Naccache, David
core   +1 more source

Security of continuous-variable quantum key distribution against general attacks

open access: yes, 2012
We prove the security of Gaussian continuous-variable quantum key distribution against arbitrary attacks in the finite-size regime. The novelty of our proof is to consider symmetries of quantum key distribution in phase space in order to show that, to ...
Anthony Leverrier   +5 more
core   +3 more sources

Evolutionary interplay between viruses and R‐loops

open access: yesFEBS Letters, EarlyView.
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy