Enhancement of off-key pecking by on-key punishment1

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Technical Report Key Distribution versus Key Enhancement in Quantum Cryptography

It has been said that quantum cryptography in general o ers a secure solution to the problem of key enhancement This means that two parties who already share a small secret key can use quantum protocols to establish a new large secret key This large secret key can be arbitrarily long and is unbreakable Thus to date the main contribution of quantum cryptography has been believed to be quan tum k...

متن کامل

Key Distribution versus Key Enhancement in Quantum Cryptography

It has been said that quantum cryptography in general o ers a secure solution to the problem of key enhancement. This means that two parties who already share a small secret key, can use quantum protocols to establish a new large secret key. This large secret key can be arbitrarily long and is unbreakable. Thus, to date, the main contribution of quantum cryptography has been believed to be quan...

متن کامل

Economic and biological influences on key pecking and treadle pressing in pigeons.

Pigeons were studied on a two-component multiple schedule in which the required operant was, in different conditions, biologically relevant (i.e., key pecking) or nonbiologically relevant (i.e., treadle pressing). Responding was reinforced on a variable-interval (VI) 2-min schedule in both components. In separate phases, additional food was delivered on a variable-time (VT) 15-s schedule (respo...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

An Enhancement of Security on Image Applying Asymmetric Key Algorithm

Every characters of textual message are encrypted through the encryption key of RSA algorithm and then to an array of data bits. After that the data bits are embedded to some suitable nonlinear pixel and bit positions about the entire image through system modulus of RSA algorithm. As a result, we get a watermarked image. After that we have formed three different image shares using any two compo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Experimental Analysis of Behavior

سال: 1969

ISSN: 0022-5002

DOI: 10.1901/jeab.1969.12-789