4 resultados para marine protected networks

em Digital Commons at Florida International University


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Predators exert strong direct and indirect effects on ecological communities by intimidating their prey. Non-consumptive effects (NCEs) of predators are important features of many ecosystems and have changed the way we understand predator-prey interactions, but are not well understood in some systems. For my dissertation research I combined a variety of approaches to examine the effect of predation risk on herbivore foraging and reproductive behaviors in a coral reef ecosystem. In the first part of my dissertation, I investigated how diet and territoriality of herbivorous fish varied across multiple reefs with different levels of predator biomass in the Florida Keys National Marine Sanctuary. I show that both predator and damselfish abundance impacted diet diversity within populations for two herbivores in different ways. Additionally, reef protection and the associated recovery of large predators appeared to shape the trade-off reef herbivores made between territory size and quality. In the second part of my dissertation, I investigated context-dependent causal linkages between predation risk, herbivore foraging behavior and resource consumption in multiple field experiments. I found that reef complexity, predator hunting mode, light availability and prey hunger influenced prey perception of threat and their willingness to feed. This research argues for more emphasis on the role of predation risk in affecting individual herbivore foraging behavior in order to understand the implications of human-mediated predator removal and recovery in coral reef ecosystems.^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Predators exert strong direct and indirect effects on ecological communities by intimidating their prey. Non-consumptive effects (NCEs) of predators are important features of many ecosystems and have changed the way we understand predator-prey interactions, but are not well understood in some systems. For my dissertation research I combined a variety of approaches to examine the effect of predation risk on herbivore foraging and reproductive behaviors in a coral reef ecosystem. In the first part of my dissertation, I investigated how diet and territoriality of herbivorous fish varied across multiple reefs with different levels of predator biomass in the Florida Keys National Marine Sanctuary. I show that both predator and damselfish abundance impacted diet diversity within populations for two herbivores in different ways. Additionally, reef protection and the associated recovery of large predators appeared to shape the trade-off reef herbivores made between territory size and quality. In the second part of my dissertation, I investigated context-dependent causal linkages between predation risk, herbivore foraging behavior and resource consumption in multiple field experiments. I found that reef complexity, predator hunting mode, light availability and prey hunger influenced prey perception of threat and their willingness to feed. This research argues for more emphasis on the role of predation risk in affecting individual herbivore foraging behavior in order to understand the implications of human-mediated predator removal and recovery in coral reef ecosystems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.