2 resultados para Game and game-birds

em Digital Commons at Florida International University


Relevância:

90.00% 90.00%

Publicador:

Resumo:

During the 1960s, water management practices resulted in the conversion of the wetlands that fringe northeastern Florida Bay (USA) from freshwater/oligohaline herbaceous marshes to dwarf red mangrove forests. Coincident with this conversion were several ecological changes to Florida Bay’s fauna, including reductions in the abundances of top trophic-level consumers: piscivorous fishes, alligators, crocodiles, and wading birds. Because these taxa rely on a common forage base of small demersal fishes, food stress has been implicated as playing a role in their respective declines. In the present study, we monitored the demersal fishes seasonally at six sites over an 8-year time period. During monitoring, extremely high rainfall conditions occurred over a 3.5-year period leading to salinity regimes that can be viewed as “windows” to the area’s natural past and future restored states. In this paper, we: (1) examine the changes in fish communities over the 8-year study period and relate them to measured changes in salinity; (2) make comparisons among marine, brackish and freshwater demersal fish communities in terms of species composition, density, and biomass; and (3) discuss several implications of our findings in light of the intended and unintended water management changes that are planned or underway as part of Everglades restoration. Results suggest the reduction in freshwater flow to Florida Bay over the last several decades has reduced demersal fish populations, and thus prey availability for apex consumers in the coastal wetlands compared to the pre-drainage inferred standard. Furthermore, greater discharge of freshwater toward Florida Bay may result in the re-establishment of pre-1960s fauna, including a more robust demersal-fish community that should prompt increases in populations of several important predatory species.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This research involves the design, development, and theoretical demonstration of models resulting in integrated misbehavior resolution protocols for ad hoc networked devices. Game theory was used to analyze strategic interaction among independent devices with conflicting interests. Packet forwarding at the routing layer of autonomous ad hoc networks was investigated. Unlike existing reputation based or payment schemes, this model is based on repeated interactions. To enforce cooperation, a community enforcement mechanism was used, whereby selfish nodes that drop packets were punished not only by the victim, but also by all nodes in the network. Then, a stochastic packet forwarding game strategy was introduced. Our solution relaxed the uniform traffic demand that was pervasive in other works. To address the concerns of imperfect private monitoring in resource aware ad hoc networks, a belief-free equilibrium scheme was developed that reduces the impact of noise in cooperation. This scheme also eliminated the need to infer the private history of other nodes. Moreover, it simplified the computation of an optimal strategy. The belief-free approach reduced the node overhead and was easily tractable. Hence it made the system operation feasible. Motivated by the versatile nature of evolutionary game theory, the assumption of a rational node is relaxed, leading to the development of a framework for mitigating routing selfishness and misbehavior in Multi hop networks. This is accomplished by setting nodes to play a fixed strategy rather than independently choosing a rational strategy. A range of simulations was carried out that showed improved cooperation between selfish nodes when compared to older results. Cooperation among ad hoc nodes can also protect a network from malicious attacks. In the absence of a central trusted entity, many security mechanisms and privacy protections require cooperation among ad hoc nodes to protect a network from malicious attacks. Therefore, using game theory and evolutionary game theory, a mathematical framework has been developed that explores trust mechanisms to achieve security in the network. This framework is one of the first steps towards the synthesis of an integrated solution that demonstrates that security solely depends on the initial trust level that nodes have for each other.^