657 resultados para cyber foraging
Resumo:
With regard to semi-aquatic mammals, Schröpfer & Stubbe (1992) distinguished three riparian guilds: the herbivores with the water vole and the beaver; the megacarnivores with the mink and the otter; and the macrocarnivores with water shrews and desmans. Among water shrews, the evolution of aquatic foraging behaviour occurred several times: Nectogale and Chimarrogale in Asia, several species of the genus Sorex in America, and Neomys in Eurasia (Churchfield, 1990). The fairly common European water shrew N. fodiens is the best known. However, the reports on the degree of adaptation to the water habitat are conflicting. Therefore some important findings from the literature are reviewed in this introduction, whereas new data are presented in the following sections. The swimming locomotion of water shrews was analysed by Ruthardt & Schröpfer (1985) and Köhler (1991), and the related morphological adaptation were reviewed by Hutterer (1985) and Churchfield (this volume pp. 49-51). They obviously present a compromise between the requirements for activity on land and in the water. Thermoregulation is a major problem for semi-aquatic mammals, because heat conductance in water is 25-fold greater than in air (Calder, 1969). According to this author, the body temperature of immersed American Sorex palustris dropped by a rate of 2.8 °C per min. However, this may be an experimental artefact, because Neomys fodiens can maintain its body temperature at 37 °C during an immersion of 6 min (Vogel, 1990).
Resumo:
Twenty Audouin´s gulls, Larus audouinii, breeding in the Ebro Delta (NW Mediterranean) were radio-tracked in 1998 to study their foraging behaviour and activity patterns. Some detrimental effects of tagging on the breeding success of the birds were detected, especially when both members of the pair were tagged. The results were actually constrained by the low number of locations due to natural breeding failure and failure in tag emission, as well as the adverse effect of tagging. However, through a combination of aircraft surveys at sea and a fixed station for automatic tracking of the presence of the birds at the colony, novel individual-based information of home ranges and activity patterns was obtained. Trawler fishing activity seemed to influence both the foraging range and habitat use: while trawlers operated, gulls overlapped their fishing grounds with vessels, probably to scavenge on discards. Very few locations were obtained during a trawling moratorium period, although they were all recorded in coastal bays and terrestrial habitats. During the trawling activity period, gulls ranged over a minimum convex polygon area of 2900 km2. Gulls were tracked up to 40 km from the colony, but some individuals were observed beyond 150 km while still breeding. Arrivals and departures from the colony were in accordance with the trawling timetable. However, most birds also showed some nocturnal foraging activity, probably linked to active fishing of clupeoids (following diel migrations) or to the exploitation of purse-seine fishing activity. Foraging trips lasted on average 15 hours: males performed significantly shorter trips than females, which spent more time outside the colony. The proportion of nocturnal time involved in the foraging trips was the same for males and females, but whilst all males initiated their trips both during the day and at night, some females only initiated their trips during the day. Hatching success was found to be related to foraging effort by males. Gulls spent on average ca. 38% of their time budget outside the nesting territory, representing the time devoted mainly to flying, foraging and other activities.
Resumo:
Stable carbon and nitrogen isotopes in skin and bone of South American sea lions from Brazil and Uruguay were analysed to test the hypothesis that trophic overlap between the sexes is lower during the pre-breeding season than throughout the rest of the year. The isotopic values of skin and bone were used to infer the trophic relationships between the sexes during the pre-breeding period and year round, respectively. Prey species were also analysed to establish a baseline necessary for interpreting the stable isotope ratios of skin and bone. Standard ellipse areas, estimated using Bayesian inference in the SIBER routine of the SIAR package in R, suggested that males and females used a wide diversity of foraging strategies throughout the year and that no differences existed between the sexes. However, the diversity of foraging strategies was largely reduced during the pre-breeding period, with all the individuals of each sex adopting similar strategies, but with the two sexes differing considerably in stable isotope values and the ellipse areas of males and females not overlapping at all. Nevertheless, the results revealed a general increase in the consumption of pelagic prey by both sexes during the pre-breeding period. The progressive crowding of individuals in the areas surrounding the breeding rookeries during the pre-breeding period could lead to an increase in the local population density, which could explain the above reported changes.
Resumo:
Despite the advent of devices to track seabird movements, the extent to which productive areas and oceanic winds influence foraging strategies is still not fully understood. We investigated the main environmental determinants of foraging strategies in Cory"s shearwaters Calonectris diomedea by combining satellite-tracking information from 14 birds breeding on the Canary Islands with concurrent data on chlorophyll a (chl a) concentrations and oceanic winds. Additionally, we took blood samples at the end of each foraging trip and analysed carbon (C) and nitrogen (N) stable isotopes to examine the use of trophic resources. All birds showed commuting trips, concentrating foraging activity exclusively on the African continental shelf. Foraging locations showed a strong association with chl a concentrations, suggesting birds select foraging areas according to prey availability. In contrast with other breeding colonies where Cory"s shearwaters use a dual-foraging method, birds showed a unimodal strategy and did not show differences in C and N isotope signatures in plasma, confirming that close proximity to highly productive areas strongly influences foraging strategies. In addition, birds tracked during 2 consecutive trips foraged in the same area, suggesting that high resource availability promotes fidelity to feeding grounds also at coarse scales. Persistent northeast trade winds blew during the study period, and commuting trips followed a consistent clockwise movement with a southwest heading while the birds foraged along the continental shelf, suggesting that birds used tail winds to reduce their flying costs. Our results corroborate that oceanographic conditions in the vicinity of the breeding colony have a strong effect on foraging strategies of pelagic seabirds.
Resumo:
The Fog of Cyber Defence is a book about cyberspace, cyber security and cyberwar. The book is untangling the ties of the Nordic states with the important, yet complex and foggy phenomenon of cyber. It is adding important perspectives into the ongoing discussion about cyber security and creating room for the deepening of co-operation amongst the Nordic states. The articles in the book contribute to the debate over the implications of cyber for national security and the armed forces. The authors, who come from various professional backgrounds, appreciate and welcome further discussion and comments on the very important themes that impact our everyday lives.
Resumo:
A postgraduate seminar series with a title Cyber Warfare held at the Department of Military Technology of the National Defence University in the fall of 2012. This book is a collection of some of talks that were presented in the seminar. The papers address computer network defence in military cognitive networks, computer network exploitation, non-state actors in cyberspace operations, offensive cyber-capabilities against critical infrastructure and adapting the current national defence doctrine to cyber domain. This set of papers tries to give some insight to current issues of the cyber warfare. The seminar has always made a publication of the papers but this has been an internal publication of the Finnish Defence Forces and has not hindered publication of the papers in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers.
Resumo:
Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.
Resumo:
This thesis aims to find an effective way of conducting a target audience analysis (TAA) in cyber domain. There are two main focal points that are addressed; the nature of the cyber domain and the method of the TAA. Of the cyber domain the object is to find the opportunities, restrictions and caveats that result from its digital and temporal nature. This is the environment in which the TAA method is examined in this study. As the TAA is an important step of any psychological operation and critical to its success, the method used must cover all the main aspects affecting the choice of a proper target audience. The first part of the research was done by sending an open-ended questionnaire to operators in the field of information warfare both in Finland and abroad. As the results were inconclusive, the research was completed by assessing the applicability of United States Army Joint Publication FM 3-05.301 in the cyber domain via a theory-based content analysis. FM 3- 05.301 was chosen because it presents a complete method of the TAA process. The findings were tested against the results of the questionnaire and new scientific research in the field of psychology. The cyber domain was found to be “fast and vast”, volatile and uncontrollable. Although governed by laws to some extent, the cyber domain is unpredictable by nature and not controllable to reasonable amount. The anonymity and lack of verification often present in the digital channels mean that anyone can have an opinion, and any message sent may change or even be counterproductive to the original purpose. The TAA method of the FM 3-05.301 is applicable in the cyber domain, although some parts of the method are outdated and thus suggested to be updated if used in that environment. The target audience categories of step two of the process were replaced by new groups that exist in the digital environment. The accessibility assessment (step eight) was also redefined, as in the digital media the mere existence of a written text is typically not enough to convey the intended message to the target audience. The scientific studies made in computer sciences and both in psychology and sociology about the behavior of people in social media (and overall in cyber domain) call for a more extensive remake of the TAA process. This falls, however, out of the scope of this work. It is thus suggested that further research should be carried out in search of computer-assisted methods and a more thorough TAA process, utilizing the latest discoveries of human behavior. ---------------------------------------------------------------------------------------------------------------------------------- Tämän opinnäytetyön tavoitteena on löytää tehokas tapa kohdeyleisöanalyysin tekemiseksi kybertoimintaympäristössä. Työssä keskitytään kahteen ilmiöön: kybertoimintaympäristön luonteeseen ja kohdeyleisöanalyysin metodiin. Kybertoimintaympäristön osalta tavoitteena on löytää sen digitaalisesta ja ajallisesta luonteesta juontuvat mahdollisuudet, rajoitteet ja sudenkuopat. Tämä on se ympäristö jossa kohdeyleisöanalyysiä tarkastellaan tässä työssä. Koska kohdeyleisöanalyysi kuuluu olennaisena osana jokaiseen psykologiseen operaatioon ja on onnistumisen kannalta kriittinen tekijä, käytettävän metodin tulee pitää sisällään kaikki oikean kohdeyleisön valinnan kannalta merkittävät osa-alueet. Tutkimuksen ensimmäisessä vaiheessa lähetettiin avoin kysely informaatiosodankäynnin ammattilaisille Suomessa ja ulkomailla. Koska kyselyn tulokset eivät olleet riittäviä johtopäätösten tekemiseksi, tutkimusta jatkettiin tarkastelemalla Yhdysvaltojen armeijan kenttäohjesäännön FM 3-05.301 soveltuvuutta kybertoimintaympäristössä käytettäväksi teorialähtöisen sisällönanalyysin avulla. FM 3-05.301 valittiin koska se sisältää kokonaisvaltaisen kohdeyleisöanalyysiprosessin. Havaintoja verrattiin kyselytutkimuksen tuloksiin ja psykologian uusiin tutkimuksiin. Kybertoimintaympäristö on tulosten perusteella nopea ja valtava, jatkuvasti muuttuva ja kontrolloimaton. Vaikkakin lait hallitsevat kybertoimintaympäristöä jossakin määrin, on se silti luonteeltaan ennakoimaton eikä sitä voida luotettavasti hallita. Digitaalisilla kanavilla usein läsnäoleva nimettömyys ja tiedon tarkastamisen mahdottomuus tarkoittavat että kenellä tahansa voi olla mielipide asioista, ja mikä tahansa viesti voi muuttua, jopa alkuperäiseen tarkoitukseen nähden vastakkaiseksi. FM 3-05.301:n metodi toimii kybertoimintaympäristössä, vaikkakin jotkin osa-alueet ovat vanhentuneita ja siksi ne esitetään päivitettäväksi mikäli metodia käytetään kyseisessä ympäristössä. Kohdan kaksi kohdeyleisökategoriat korvattiin uusilla, digitaalisessa ympäristössä esiintyvillä ryhmillä. Lähestyttävyyden arviointi (kohta 8) muotoiltiin myös uudestaan, koska digitaalisessa mediassa pelkkä tekstin läsnäolo ei sellaisenaan tyypillisesti vielä riitä halutun viestin välittämiseen kohdeyleisölle. Tietotekniikan edistyminen ja psykologian sekä sosiologian aloilla tehty tieteellinen tutkimus ihmisten käyttäytymisestä sosiaalisessa mediassa (ja yleensä kybertoimintaympäristössä) mahdollistavat koko kohdeyleisöanalyysiprosessin uudelleenrakentamisen. Tässä työssä sitä kuitenkaan ei voida tehdä. Siksi esitetäänkin että lisätutkimusta tulisi tehdä sekä tietokoneavusteisten prosessien että vielä syvällisempien kohdeyleisöanalyysien osalta, käyttäen hyväksi viimeisimpiä ihmisen käyttäytymiseen liittyviä tutkimustuloksia.
Resumo:
A postgraduate seminar series with a title Critical Infrastructure Protection against Cyber Threats held at the Department of Military Technology of the National Defence University in the fall of 2013 and 2014. This book is a collection of some of talks that were presented in the seminar. The papers address origin of critical infrastructure protection, wargaming cyberwar in critical infrastructure defence, cyber-target categorization, supervisory control and data acquisition systems vulnerabilities, electric power as critical infrastructure, improving situational awareness of critical infrastructure and trust based situation awareness in high security cloud environment. This set of papers tries to give some insight to current issues of the network-centric critical infrastructure protection. The seminar has always made a publication of the papers but this has been an internal publication of the Finnish Defence Forces and has not hindered publication of the papers in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers.
Resumo:
Several studies of the quantitative relationship between sodium need and sodium intake in rats are reviewed. Using acute diuretic treatment 24 h beforehand, intake matches need fairly accurately when intake is spread out in time by using a hypotonic solution of NaCl. In contrast, using a hypertonic solution, intake is typically double the need. Using the same diuretic treatment, although the natriuresis occurs within ~1 h, the appetite appears only slowly over 24 h. Increased plasma levels of aldosterone parallel the increased intake; however, treatment with metyrapone blocks the rise in aldosterone but has no effect on appetite. Satiation of sodium appetite was studied in rats using sodium loss induced by chronic diuretic treatment and daily salt consumption sessions. When a simulated foraging cost was imposed on NaCl access in the form of a progressive ratio lever press task, rats showed satiation for NaCl (break point) after consuming an amount close to their estimated deficit. The chronic diuretic regimen produced hypovolemia and large increases in plasma aldosterone concentration and renin activity. These parameters were reversed to or toward non-depleted control values at the time of behavioral satiation in the progressive ratio protocol. Satiation mechanisms for sodium appetite thus do appear to exist. However, they do not operate quantitatively when concentrated salt is available at no effort, but instead allow overconsumption. There are reasons to believe that such a bias toward overconsumption may have been beneficial over evolutionary time, but such biasing for salt and other commodities is maladaptive in a resource-rich environment.
Resumo:
Phenomena in cyber domain, especially threats to security and privacy, have proven an increasingly heated topic addressed by different writers and scholars at an increasing pace – both nationally and internationally. However little public research has been done on the subject of cyber intelligence. The main research question of the thesis was: To what extent is the applicability of cyber intelligence acquisition methods circumstantial? The study was conducted in sequential a manner, starting with defining the concept of intelligence in cyber domain and identifying its key attributes, followed by identifying the range of intelligence methods in cyber domain, criteria influencing their applicability, and types of operatives utilizing cyber intelligence. The methods and criteria were refined into a hierarchical model. The existing conceptions of cyber intelligence were mapped through an extensive literature study on a wide variety of sources. The established understanding was further developed through 15 semi-structured interviews with experts of different backgrounds, whose wide range of points of view proved to substantially enhance the perspective on the subject. Four of the interviewed experts participated in a relatively extensive survey based on the constructed hierarchical model on cyber intelligence that was formulated in to an AHP hierarchy and executed in the Expert Choice Comparion online application. It was concluded that Intelligence in cyber domain is an endorsing, cross-cutting intelligence discipline that adds value to all aspects of conventional intelligence and furthermore that it bears a substantial amount of characteristic traits – both advantageous and disadvantageous – and furthermore that the applicability of cyber intelligence methods is partly circumstantially limited.
Resumo:
The aim of this thesis was to examine how aquatic organisms, such as fish, behave in an altered environmental condition. Many species of fish use vision as their primary tool to gain information about their surrounding environment. The visual conditions of aquatic habitats are often altered as a result of anthropogenic disturbance, such as eutrophication that initiates algal turbidity. In general, turbidity reduces the visibility and can be hypothesized to have an influence on the behaviour of fish. I used the three-spined stickleback (Gasterosteus aculeatus) as a model species and conducted four studies in the laboratory to test how algal turbidity affects its behaviour. In this thesis, two major behavioural aspects are discussed. The first is antipredator behaviour. In study I, the combined effects of turbidity and shoot density on habitat choice (shelter vs open) behaviour was tested on a group of sticklebacks (20 fish) in the presence and absence of piscivorous perch (Perca fluviatilis). In study II, I examined the behavioural responses of feeding sticklebacks when they were exposed to the sudden appearance of an avian predator (the silhouette of a common tern, Sterna hirundo). The study was done in turbid and clear water using three different groups sizes (1, 3 and 6 fish). The second aspect is foraging behaviour. Study III & IV focused on the effects of algal turbidity on the foraging performance of sticklebacks. In study III, I conducted two separate experiments to examine the effects of turbidity on prey consumption and prey choice of sticklebacks. In this experiment turbidity levels and the proportion of large and small prey (Daphnia spp.) were manipulated. In study IV, I studied whether a group of six sticklebacks can distribute themselves according to food input at two feeding stations in a way that provided each fish with the same amount of food in clear and turbid water. I also observed whether the fish can follow changes in resource distribution between the foraging patches. My results indicate an overall influence of algal turbidity on the antipredator and foraging behaviour of sticklebacks. In the presence of a potential predator, the use of the sheltered habitat was more pronounced at higher turbidity. Besides this, sticklebacks reduced their activity levels with predator presence at higher turbidity and shoot density levels, suggesting a possible antipredator adaptation to avoid a predator. When exposed to a sudden appearance of an avian predator, sticklebacks showed a weaker antipredator response in turbid water, which suggests that turbidity degrades the risk assessment capabilities of sticklebacks. I found an effect of group size but not turbidity in the proportion of sticklebacks that fled to the shelter area, which indicates that sticklebacks are able to communicate among group members at the experimental turbidity levels. I found an overall negative effect of turbidity on food intake. Both turbidity and changes in the proportion of prey sizes played a significant role in a stickleback’s prey selection. At lower turbidity levels (clear <1 and 5 NTU) sticklebacks showed preferences for large prey, whereas in more turbid conditions and when the proportion of large to small prey increased sticklebacks became increasingly random in their prey selection. Finally, my results showed that groups of sticklebacks disperse themselves between feeding stations according to the reward ratios following the predictions of the ideal free distribution theory. However, they took a significantly longer time to reach the equilibrium distribution in turbid water than in clear water. In addition, they showed a slower response to changes in resource distribution in a turbid environment. These findings suggest that turbidity interferes with the information transfer among group foragers. It is important to understand that aquatic animals are often exposed to a degraded environment. The findings of this thesis suggest that algal turbidity negatively affects their behavioural performance. The results also shed light on the underlying behavioural strategies of sticklebacks in turbid conditions that might help them adapt to an altered environmental situation and increase their survival. In conclusion, I hold that although algal turbidity has detrimental effects on the antipredator and foraging behaviour of sticklebacks, their behavioural adjustment might help them adapt to a changing environment.
Resumo:
One component of successful parenting is related to efficiency in foraging behaviour. The relationships among chick feeding, the size and type of food package, and length of parental foraging trips has not been well studied in seabirds. In addition, relatively few data have been collected on the activities of seabirds when foraging away from the nest site. The objectives of this study were: (1) to contrast productivity, feeding rate, and attendance patterns of individuals carrying a novel transmitter with a control group of birds; (2) to use radio-telemetry to assess the variability in foraging locations within and between individual male Common Terns; (3) to determine the seasonal variation in chick diet; (4) to determine for each transmittered bird, the relationships among the foraging patterns, parental behaviour, and seasonal reproductive success. The study took place over two years (1990-91) on a concrete breakwater 1 km offshore on Lake Erie near Port Colbome, Ontario. Ten pairs of terns in 1990 and 12 pairs in 1991 were radio-tracked by boat or car during the chick rearing stage. Concurrent behavioural observations documented the time each sex spent foraging or at the nest. The frequency and prey species composition of feeds to chicks were also recorded. The transmitters had negligible effects on the feeding frequency and brood attendance patterns of transmitter carrying birds. Peak nesting transmittered birds in 1990 and 1991 exhibited some inter-individual variability in foraging locations, however intraindividual variability was low. Birds foraged primarily to the west and northwest of the colony. Late nesters exhibited greater inter-individual variability, however intra-individual variability remained low for most birds. Neither group demonstrated sufficient variability to support the regular use of this colony as an "information centre". Individual transmittered birds had unique and predictable foraging patterns, and corresponding differences in feeding frequencies and brood attendance patterns, yet productivity was essentially equal between nests due to the impact and importance of stochastic events. Individuals that were recaptured in 1991 exhibited very similar foraging patterns to 1990, suggesting littie variability between years. Conservation of foraging patterns between years may have potential implications for mate choice decisions in future breeding seasons. Prey species delivered to chicks differed between morning and evening for peak and late nesters in 1990, but not 1991. Peak nesters in 1990 fed significantiy more Rainbow Smelt fOsmerus mordM) than Emerald Shiner (Notropis atherinoidesV this trend was reversed for late nesters who also fed large numbers of unidentified larval fish. No significant differences were found in 1991. Seasonal changes in prey species delivered to chicks is believed to be attributable to the temperature tolerances of the smelt and shiners, and the presence of large schools of larval fish during the late nesting season.