Abstracts - faqs.org

Abstracts

Science and technology

Search abstracts:
Abstracts » Science and technology

Frog communication

Article Abstract:

Frogs have developed a wide array of strategies for communicating with each other, mainly in response to the limitations and opportunities offered by their habitats. Some strategies allow them to identify and send messages amidst noise, while others involve making use of available media in the environment, such as leaves and muddy ground.

Author: Narins, Peter M.
Publisher: Scientific American, Inc.
Publication Name: Scientific American
Subject: Science and technology
ISSN: 0036-8733
Year: 1995
Analysis, Telecommunications systems, Frogs, Animal communication, Sound production by animals, Animal vocalizations

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


New satellites for personal communication

Article Abstract:

New types of communications satellites will be launched in the future to handle more cellular telephone traffic and Internet services. Larger groups of satellites at lower orbits will provide less delayed in responses than existing geosynchronous systems.

Author: Evans, John V.
Publisher: Scientific American, Inc.
Publication Name: Scientific American
Subject: Science and technology
ISSN: 0036-8733
Year: 1998
Innovations, Telecommunications services industry, Telecommunications industry, Television broadcasting, Equipment and supplies, Communications satellites

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Confidential communication on the Internet

Article Abstract:

Cryptography inspires people to transact business via computers without fear of having their privacy invaded. By relying on a technique called modular exponentiation, cryptography ensures confidential communication on computer networks.

Author: Beth, Thomas
Publisher: Scientific American, Inc.
Publication Name: Scientific American
Subject: Science and technology
ISSN: 0036-8733
Year: 1995
Methods, Usage, Confidential communications, Cryptography

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA

Similar abstracts:
  • Abstracts: Granting immunity. Immunity and the invertebrates. Sharks and the origins of vertebrate immunity
  • Abstracts: Kin recognition. Carbohydrates in cell recognition
  • Abstracts: Priority concerns. Integration of coal utilization and environmental control in integrated gasification combined cycle systems
  • Abstracts: Badgers and bovine TB: conflicts between conservation and health. Uncertainty, resource exploitation, and conservation: lessons from history
  • Abstracts: Computing with DNA. Configurable computing. Computing bouts for the prisoner's dilemma
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.