Showing 20 articles starting at article 461

< Previous 20 articles        Next 20 articles >

Categories: Computer Science: Encryption, Ecology: Research

Return to the site home page

Ecology: General Ecology: Research
Published

Climate 'presses' and 'pulses' impact Magellanic penguins -- a marine predator -- with guidance for conservationists      (via sciencedaily.com) 

Climate change will reshape ecosystems through two types of events: short-term, extreme events -- or 'pulses' -- and long-term changes, or 'presses.' Understanding the effects of presses and pulses is essential as conservationists and policymakers try to preserve ecosystems and safeguard biodiversity. Researchers have discovered how different presses and pulses impacted Magellanic penguins -- a migratory marine predator -- over nearly four decades and found that, though individual presses and pulses impacted penguins in a variety of ways, both were equally important for the future survival of the penguin population. They also found that these types of climate changes, taken together, are leading to an overall population decline at their historically largest breeding site.

Ecology: General Ecology: Invasive Species Ecology: Research
Published

Warming oceans have decimated marine parasites -- but that's not a good thing      (via sciencedaily.com) 

Save the ... parasites? Analyzing 140 years of parasite abundance in fish shows dramatic declines, especially in parasites that rely on three or more host species. The decline is linked to warming ocean temperatures. Parasitic species might be in real danger, researchers warn -- and that means not just fewer worms, but losses for the entire ecosystem.

Ecology: General Ecology: Research
Published

Marine plankton tell the long story of ocean health, and maybe human too      (via sciencedaily.com) 

Researchers suggest that rising levels of humanmade chemicals, accumulating in marine plankton, might be used to monitor the impact of human activity on ecosystem health and perhaps study links between ocean pollution and land-based rates of childhood and adult chronic illnesses.

Ecology: General Ecology: Research Environmental: Ecosystems
Published

Study details impact of prairie dog plague die-off on other species      (via sciencedaily.com) 

This study, conducted from 2015-19 in the Thunder Basin National Grassland, may be the first to specifically examine the multispecies impacts of a wide-scale plague outbreak, which reduced the area covered by prairie dog colonies from nearly 25,000 acres to only about 125 acres in the study area. The 2017 outbreak was followed by abnormally high precipitation in 2018, which caused vegetation to grow quickly and taller without the presence of prairie dogs. The researchers found that the mountain plover, birds that thrive when vegetation is kept shorter by prairie dogs, almost disappeared from the study area, while migrant songbirds such as the lark bunting, which prefer taller vegetation, increased in number. Meanwhile, species including ferruginous hawks, badgers and swift foxes declined dramatically as their prey base crashed.

Ecology: General Ecology: Invasive Species Ecology: Research Environmental: Ecosystems
Published

Invasive rats transform reef fish behavior      (via sciencedaily.com) 

Scientists have discovered for the first time that invasive rats on tropical islands are affecting the territorial behavior of fish on surrounding coral reefs. The new study shows that the presence of invasive black rats on tropical islands is causing changes in the territorial behavior of the jewel damselfish -- a herbivorous species of tropical reef fish that 'farm' algae in the branches of corals.

Ecology: General Ecology: Research
Published

Effects of highly pathogenic avian influenza on canids investigated      (via sciencedaily.com) 

Researchers have revealed the effects of high pathogenicity avian influenza virus infection on an Ezo red fox and a Japanese raccoon dog, linking their infection to a recorded die-off of crows.

Ecology: Endangered Species Ecology: General Ecology: Research
Published

Current Antarctic conservation efforts are insufficient to avoid biodiversity declines, study shows      (via sciencedaily.com) 

Existing conservation efforts are insufficient to protect Antarctic ecosystems, and population declines are likely for 65% of the continent's plants and wildlife by the year 2100, according to a new study.

Ecology: General Ecology: Research Environmental: Ecosystems
Published

Palau's Rock Islands harbor heat-resistant corals      (via sciencedaily.com)     Original source 

Ocean warming is driving an increase in the frequency and severity of marine heatwaves, causing untold damage to coral reefs. Tropical corals, which live in symbiosis with tiny single celled algae, are sensitive to high temperatures, and exhibit a stress response called bleaching when the ocean gets too hot. In the last 4 decades, marine heatwaves have caused widespread bleaching, and killed millions of corals. Because of this, a global search is underway for reefs that can withstand the heat stress, survive future warming, and act as sources of heat-tolerant coral larvae to replenish affected areas both naturally and through restoration.

Computer Science: Encryption
Published

Researchers propose methods for automatic detection of doxing      (via sciencedaily.com) 

A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or knowledge -- may help social media platforms better protect their users, according to researchers.

Computer Science: Encryption Computer Science: Quantum Computers Mathematics: Puzzles
Published

Microlaser chip adds new dimensions to quantum communication      (via sciencedaily.com) 

With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's hyperdimensional microlaser generates 'qudits,' photons with four simultaneous levels of information. The increase in dimension makes for robust quantum communication technology better suited for real-world applications.

Computer Science: Encryption
Published

New AI model can help prevent damaging and costly data breaches      (via sciencedaily.com) 

Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks.

Computer Science: Encryption
Published

New method to systematically find optimal quantum operation sequences for quantum computers developed      (via sciencedaily.com) 

Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from among all conceivable quantum operation sequences. This method is expected to become a useful tool for medium-scale quantum computers and is expected to contribute to improving the performance of quantum computers and reducing environmental impact in the near future.

Computer Science: Encryption
Published

From bits to p-bits: One step closer to probabilistic computing      (via sciencedaily.com) 

Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can quantify uncertainty while interpreting complex data.

Computer Science: Encryption
Published

Thinking like a cyber-attacker to protect user data      (via sciencedaily.com) 

Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key.

Computer Science: Encryption Mathematics: Puzzles
Published

A key role for quantum entanglement      (via sciencedaily.com) 

A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is based on high-quality quantum entanglement -- offering much broader security guarantees than previous schemes.

Computer Science: Encryption
Published

Quantum cryptography: Hacking is futile      (via sciencedaily.com) 

An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts.

Computer Science: Encryption Mathematics: Puzzles
Published

'Pulling back the curtain' to reveal a molecular key to The Wizard of Oz      (via sciencedaily.com) 

Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption key from sequence-defined polymers that are built and deconstructed in a sequential way. They hid their molecular key in the ink of a letter, which was mailed and then used to decrypt a file with text from a classic story.

Computer Science: Encryption Engineering: Biometric
Published

Radio waves for the detection of hardware tampering      (via sciencedaily.com) 

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.

Computer Science: Encryption
Published

Secure communication with light particles      (via sciencedaily.com) 

While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution, researchers have developed a new, tap-proof communication network.

Computer Science: Encryption
Published

Emulating impossible 'unipolar' laser pulses paves the way for processing quantum information      (via sciencedaily.com) 

A laser pulse that sidesteps the inherent symmetry of light waves could manipulate quantum information, potentially bringing us closer to room temperature quantum computing.