981 resultados para Territorial intrusion


Relevância:

70.00% 70.00%

Publicador:

Resumo:

The possible trade-off between the roles of glucocorticoids as facilitators of energy substrate mobilization and neural inhibitors of sexual behavior during breeding season is under debate. We studied the relationship between calling and territorial behavior with plasma levels of corticosterone (CORT) and plasma levels of testosterone (T) across the breeding season of Hypsiboas faber, a large and territorial Neotropical treefrog. We investigated these relationships through focal observations of males calling naturally, followed by blood sampling for hormonal radioimmunoassay. We additionally used an experimental approach, which consisted of broadcasting recorded advertisement calls for 10 min to simulate an invasion in the territory of the focal subjects, followed by behavioral observation and blood sampling for hormonal radioimmunoassay. Results showed a pattern of co-variation between CORT and T across the breeding season. Furthermore, individual variation in CORT and T was related to different aspects of behavior: individuals with higher CORT showed higher calling rates, and individuals with higher steroid levels, mainly T, showed higher responsivity to social stimulation by other males in the chorus. Experimental simulation of territorial intrusion by using playback of advertisement calls of this species did not elicit consistent changes in agonistic behavior and CORT, but decreased T in focal males. (C) 2012 Elsevier Inc. All rights reserved.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

In many territorial species androgen hormones are known to increase in response to territorial intrusions as a way to adjust the expression of androgen-dependent behaviour to social challenges. The dear enemy effect has also been described in territorial species and posits that resident individuals show a more aggressive response to intrusions by strangers than by other territorial neighbours. Therefore, we hypothesized that the dear enemy effect may also modulate the androgen response to a territorial intrusion. Here we tested this hypothesis in male cichlid fish (Mozambique tilapia, Oreochromis mossambicus) using a paradigm of four repeated territorial intrusions, either by the same neighbour or by four different unfamiliar intruders. Neighbour intruders elicited lower aggression and a weaker androgen response than strangers on the first intrusion of the experiment. With repeated intrusions, the agonistic behaviour of the resident males against familiar intruders was similar to that displayed towards strangers. By the fourth intrusion the androgen response was significantly reduced and there was no longer a difference between the responses to the two types of intruders. These results suggest that the dear enemy effect modulates the androgen response to territorial intrusions and that repeated intrusions lead to a habituation of the androgen response.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The function of fish sounds in territorial defence, in particular its influence on the intruder's behaviour during territorial invasions, is poorly known. Breeding Lusitanian toadfish males (Halobatrachus didactylus) use sounds (boatwhistles) to defend nests from intruders. Results from a previous study suggest that boatwhistles function as a 'keep-out signal' during territorial defence. To test this hypothesis we performed territorial intrusion experiments with muted Lusitanian toadfish. Males were muted by making a cut and deflating the swimbladder (the sound-producing apparatus) under anaesthesia. Toadfish nest-holder males reacted to intruders mainly by emitting sounds (sham-operated and control groups) and less frequently with escalated bouts of fighting. When the nest-holder produced a boatwhistle, the intruder fled more frequently than expected by chance alone. Muted males experienced a higher number of intrusions than the other groups, probably because of their inability to vocalise. Together, our results show that fish acoustic signals are effective deterrents in nest/territorial intrusions, similar to bird song.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent and current socio-cultural trends are significant factors impacting on how business is conduced and correspondingly, on how work environments are designed. New communication technology is helping to break physical boundaries and change the way and speed of conducting business. One of the main characteristics of these new workplaces is non-permanency wherein the individual employee has no dedicated personally assigned office, work station, or desk. In this non-territorial, nomadic situation, employees undertake their work tasks in a wide variety of work settings inside and outside the office building. Such environments are understood to be must suitable where there is the need for high interaction with others as well as a high level of concentrated, independent work. This thesis reports on a project designed to develop a deeper understanding of the relationships between people (P) and their built environment (E) in the context of everyday work practice in a nomadic and non-territorial work environment. To achieve this, the study focuses on the experiences of employees as they understand them in relation to their work and the designed/ physical work environment. In this sense, the study is qualitative and grounded in nature. It does not assume any previously established theory nor test any presenting hypothesis. Instead it interviews the participants about their situations at work in their workplace, interprets natural interaction and creates a foundation for the development of theory informing workplace design, particularly theory that recognises the human nature of work and the need, as highlighted by several seminal researchers, for a greater understanding of how people manage and adapt in dynamic work environments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives. We tested predictions from the elaborated intrusion (EI) theory of desire, which distinguishes intrusive thoughts and elaborations, and emphasizes the importance of imagery. Secondarily, we undertook preliminary evaluations of the Alcohol Craving Experience (ACE) questionnaire, a new measure based on EI Theory. Methods. Participants (N ¼ 232) were in correspondence-based treatment trials for alcohol abuse or dependence. The study used retrospective reports obtained early in treatment using the ACE, and daily self-monitoring of urges, craving, mood and alcohol consumption. Results. The ACE displayed high internal consistency and test – retest reliability and sound relationships with self-monitored craving, and was related to Baseline alcohol dependence, but not to consumption. Imagery during craving was experienced by 81%,with 2.3 senses involved on average. More frequent imagery was associated with longer episode durations and stronger craving. Transient intrusive thoughts were reported by 87% of respondents, and were more common if they frequently attempted to stop alcohol cognitions. Associations between average daily craving and weekly consumption were seen. Depression and negative mood were associated with more frequent, stronger and longer lasting desires for alcohol. Conclusions. Results supported the distinction of automatic and controlled processes in craving, together with the importance of craving imagery. They were also consistent with prediction of consumption from cross-situational averages of craving, and with positive associations between craving and negative mood. However, this study’s retrospective reporting and correlational design require that its results be interpreted cautiously. Research using ecological momentary measures and laboratory manipulations is needed before confident inferences about causality can be made.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The authors argue that human desire involves conscious cognition that has strong affective connotation and is potentially involved in the determination of appetitive behavior rather than being epiphenomenal to it. Intrusive thoughts about appetitive targets are triggered automatically by external or physiological cues and by cognitive associates. When intrusions elicit significant pleasure or relief, cognitive elaboration usually ensues. Elaboration competes with concurrent cognitive tasks through retrieval of target related information and its retention in working memory. Sensory images are especially important products of intrusion and elaboration because they simulate the sensory and emotional qualities of target acquisition. Desire images are momentarily rewarding but amplify awareness of somatic and emotional deficits. Effects of desires on behavior are moderated by competing incentives, target availability, and skills. The theory provides a coherent account of existing data and suggests new directions for research and treatment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The equations governing saltwater intrusion in coastal aquifers are complex. Backward Euler time stepping approaches are often used to advance the solution to these equations in time, which typically requires that small time steps be taken in order to ensure that an accurate solution is obtained. We show that a method of lines approach incorporating variable order backward differentiation formulas can greatly improve the efficiency of the time stepping process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security measures, the RSNs remain vulnerable to a number of attacks. Failure of preventative measures to address all RSN vulnerabilities dictates the need for a comprehensive monitoring capability to detect all attacks on RSNs and also to proactively address potential security vulnerabilities by detecting security policy violations in the WLAN. This research proposes novel wireless intrusion detection techniques to address these monitoring requirements and also studies correlation of the generated alarms across wireless intrusion detection system (WIDS) sensors and the detection techniques themselves for greater reliability and robustness. The specific outcomes of this research are: A comprehensive review of the outstanding vulnerabilities and attacks in IEEE 802.11i RSNs. A comprehensive review of the wireless intrusion detection techniques currently available for detecting attacks on RSNs. Identification of the drawbacks and limitations of the currently available wireless intrusion detection techniques in detecting attacks on RSNs. Development of three novel wireless intrusion detection techniques for detecting RSN attacks and security policy violations in RSNs. Development of algorithms for each novel intrusion detection technique to correlate alarms across distributed sensors of a WIDS. Development of an algorithm for automatic attack scenario detection using cross detection technique correlation. Development of an algorithm to automatically assign priority to the detected attack scenario using cross detection technique correlation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network-based Intrusion Detection Systems (NIDSs) analyse network traffic to detect instances of malicious activity. Typically, this is only possible when the network traffic is accessible for analysis. With the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer access this crucial audit data. In this paper, we present an implementation and evaluation of our approach proposed in Goh et al. (2009). It is based on Shamir's secret-sharing scheme and allows a NIDS to function normally in a VPN without any modifications and without compromising the confidentiality afforded by the VPN.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.