ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Articles  (28,461)
  • Oxford University Press  (28,461)
  • ICES Journal of Marine Science  (1,063)
  • Computer Journal  (800)
  • Behavioral Ecology  (717)
  • Astronomy and Geophysics  (445)
  • 2193
  • 3548
  • 8197
  • 88336
Collection
  • Articles  (28,461)
Publisher
  • Oxford University Press  (28,461)
Years
Topic
  • 1
    Publication Date: 2020-10-28
    Description: Fishermen are known to try to avoid fishing in stormy weather, as storms pose a physical threat to fishers, their vessels, and their gear. In this article, a dataset and methods are developed to investigate the degree to which fishers avoid storms, estimate storm aversion parameters, and explore how this response varies across vessel characteristics and across regions of the United States. The data consist of vessel-level trip-taking decisions from six federal fisheries across the United States combined with marine storm warning data from the National Weather Service. The estimates of storm aversion can be used to parameterize predictive models. Fishers’ aversion to storms decreases with increasing vessel size and increases with the severity of the storm warning. This information contributes to our understanding of the risk-to-revenue trade-off that fishers evaluate every time they consider going to sea, and of the propensity of fishers to take adaptive actions to avoid facing additional physical risk.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2020-08-30
    Description: Sardine Sardinops sagax is an ecologically and economically important Clupeid found off the entire South African coast that includes both coastal upwelling and western boundary current systems. Although the management of the sardine fisheries historically assumed a single, panmictic population, the existence of three, semi-discrete subpopulations has recently been hypothesized. We conducted otolith δ18O and microstructure analyses to investigate nursery habitat temperatures and early life growth rates, respectively, of sardine collected from three biogeographic regions around South Africa’s coast to test that hypothesis. Analyses indicated that for both summer- and winter-captured adults and summer-captured juveniles, fishes from the west coast grew significantly slower in water that was several degrees cooler than those from the south and east coasts. This suggests that mixing of sardines between regions, particularly the west and other coasts, is relatively limited and supports the hypothesis of semi-discrete subpopulations. However, the west-south differences disappeared in the results for winter-captured juveniles, suggesting that differences in early life conditions between regions may change seasonally, and/or that all or most winter-captured juveniles originated from the west coast. Further elucidating the interactions between South African sardine subpopulations and the mechanisms thereof is important for sustainable harvesting of this species.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2020-10-23
    Description: Progress towards ecosystem-based fisheries management calls for useful tools to prioritize actions. To select suitable methods for local circumstances, evaluating approaches used in other jurisdictions can be a cost-effective first step. We tested Productivity Susceptibility Analysis (PSA) to assess the potential vulnerability of the marine fish community in the Skagerrak–Kattegat (Eastern North Sea) to possible interactions with all Swedish fisheries operating in the area. This analysis combines attributes for a species productivity with attributes related to the susceptibility to capture to quantify a single score for vulnerability: high, medium, or low risk. Results indicate that demersal trawl and gillnet fisheries were associated with the highest risk levels if interaction occurs, i.e. having the highest prevalence of species with potentially high vulnerability to the fisheries. Mixed results were seen when comparing the assessment results with available data. The main benefit of utilizing PSA in the area is the comprehensiveness of the assessment, including data-deficient fisheries and species. Drawbacks include potential overestimation of actual risks. Overall, together with available data, PSA in the studied area provides a comprehensive map of potential risks for further actions and may progress a science-based, precautionary management of the area.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2020-08-12
    Description: While fisheries provide food and employment for hundreds of millions of people, they also can have significant impact on biodiversity. We explore the potential of area-based fisheries management to simultaneously maintain biodiversity and high levels of sustainable food production. We used two illustrative examples of fisheries that have different gear types, areas, and species to evaluate the trade-off between biodiversity and harvest. We calculate the optimal effort by gear and area that maximizes a weighted objective function of biodiversity and harvest, ranging from 100% of the weight on harvest to 100% on biodiversity. We found for both case studies that the trade-off was highly convex, with win–win solutions allowing for high levels of both fishery harvest and conservation. This is achieved by reducing or eliminating fishing effort that negatively impacts high conservation value species while maintaining fishing effort with gears and in areas where there is low conservation impact. We suggest that, in most fisheries, such situations can be found and that effective area-based management can provide for high levels of biodiversity protection and food production.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2020-08-08
    Description: Recent application of Fourier transform near infra-red spectroscopy (FT-NIRS) to predict age in fish otoliths has gained attention among fisheries managers as a potential alternative to costly production ageing of managed species. We assessed the age prediction capability of FT-NIRS scans in whole otoliths from red snapper, Lutjanus campechanus, collected from the US Gulf of Mexico and US Atlantic Ocean (South Atlantic). Otoliths were scanned with an FT-NIR spectrometer and resulting spectral signatures were regressed with traditionally estimated ages via partial least squares regression to produce calibration models, which were validated for predictive capability against test sets of otoliths. Calibration models successfully predicted age with R2 ranging 0.94–0.95, mean squared error ≤1.8 years, and bias 31 years were not well predicted, possibly due to light attenuation in the thickest otoliths. Our results suggest that FT-NIRS can improve efficiency in production ageing for fisheries management while maintaining data quality standards.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2020-10-10
    Description: This article investigates the diet of the snow crab (Chionoecetes opilio) and its feeding intensity in the Barents Sea. Data show that snow crab has a diverse diet that includes almost all types of benthic invertebrates living in the Barents Sea. There are differences between the diets of females and males and of juveniles and adults. Juveniles and females typically occupy shallow areas with communities of bivalve molluscs, while males typically live deeper on slopes and depressions where polychaetes and crustaceans are the most abundant groups. Stomach contents were analysed to determine the species composition and frequency of occurrence of various benthic taxa. Consumption of food was estimated and compared with data from the Russian seas of the Pacific region. The total annual consumption of macrozoobenthos by snow crab was calculated in accordance with its current distribution in the Barents Sea. Snow crab consumes at least 30 000 tonnes of benthos annually, which amounts to 0.1–0.2% of the total macrozoobenthic biomass in the investigated area. The population of snow crab causes the largest impact on the benthic communities in the northeastern part of the Barents Sea and near the south side of the Novaya Zemlya archipelago.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Publication Date: 2020-08-24
    Description: Until the late 19th century, extensive beds of flat oyster Ostrea edulis populated the Central North Sea, which have vanished after intensive fisheries. At present, various initiatives are being carried out to investigate the potential to restore this former key species in the area. This historical ecological study contributes by delineating the former oyster bed area and through an assessment of its limits against known gradients in the North Sea. Extensive data from historical maps, texts, and ship-based surveys were used to synthesize our knowledge on the former beds. It was revealed that the area with oyster beds covered ∼6.2% of the total North Sea bottom, with a delineation that could partly be explained by hydrodynamic and temperature gradients. The position and extent of the area are notably different from the area that is used in recent feasibility studies on the restoration of North Sea oyster beds. The offshore oysters lived on muddy sand in relatively cold conditions, and there are several indications that their reproductive rate was low. The apparent disappearance of cold water adapted flat oysters will challenge restoration projects. This study provides indispensable information for the future restoration of flat oyster beds in the North Sea.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Publication Date: 2015-06-06
    Description: Successful implementation of Ecosystem-Based Fisheries Management (EBFM) requires appropriate action as informed by reference points in an ecosystem context. Thresholds in the response of ecological indicators to system drivers have been suggested as reference points for EBFM, though the management performance of these indicators and possible values for their reference points have not been widely evaluated. We used Management Strategy Evaluation to test the performance of control rules that used ecological indicators to adjust the advice from single-species stock assessments, using the Georges Bank finfish fishery as a case study. We compare the performance of control rules that used ecological indicators to that of single-species F MSY control rules when the system dynamics were governed by the same multispecies population model. Control rules that used indicator-based reference points were able to perform better against catch and biodiversity objectives than when harvests were based on single-species advice alone. Indicators and values for reference points associated with good performance varied depending on the management objective. We quantified tradeoffs between total catch, biodiversity, and interannual variability in catch, noting that it was possible in some instances to achieve higher than average biodiversity while maintaining high catches using indicator-based control rules. While improved performance was noted using ecological indicators, outcomes were variable, and the gains in performance obtained may be similar to alternative methods of implementing precaution in single-species fishery control rules.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Publication Date: 2015-06-06
    Description: Climate change and fishing can have major impacts on the distribution of natural marine resources. Climate change alters the distribution of suitable habitat, forcing organisms to shift their range or attempt to survive under suboptimal conditions. Fishing reduces the abundance of marine populations and truncates their age structure leading to range contractions or shifts. Along the east coast of the United States, there have been major changes in fish populations due to the impacts of fishing and subsequent regulations, as well as changes in the climate. Black sea bass, scup, summer flounder, and winter flounder are important commercial and recreational species, which utilize inshore and offshore waters on the northeast shelf. We examined the distributions of the four species with the Northeast Fisheries Science Center trawl surveys to determine if the along-shelf centres of biomass had changed over time and if the changes were attributed to changes in temperature or fishing pressure through changes in abundance and length structure. Black sea bass, scup, and summer flounder exhibited significant poleward shifts in distributions in at least one season while the Southern New England/Mid-Atlantic Bight stock of winter flounder did not shift. Generalized additive modelling indicated that the changes in the centres of biomass for black sea bass and scup in spring were related to climate, while the change in the distribution of summer flounder was largely attributed to a decrease in fishing pressure and an expansion of the length–age structure. While the changes in ocean temperatures will have major impacts on the distribution of marine taxa, the effects of fishing can be of equivalent magnitude and on a more immediate time scale. It is important for management to take all factors into consideration when developing regulations for natural marine resources.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2015-06-06
    Description: Many snow crab fisheries have fluctuated widely over time in a quasi-cyclic way due to highly variable recruitment. The causes of this variability are still debated. Bottom-up processes related to climate variability may strongly affect growth and survival during early life, whereas top-down predator effects may be a major source of juvenile mortality. Moreover, intrinsic density-dependent processes, which have received much less attention, are hypothetically responsible for the cycles in recruitment. This study explored how climate, larval production, intercohort cannibalism and groundfish predation may have affected recruitment of early juvenile snow crab in the northwest Gulf of St Lawrence (eastern Canada) over a period of 23 years. Abundance of early juvenile snow crabs (2.5–22.9 mm in carapace width), representing the first 3 years of benthic life, came from an annual trawl survey and was used to determine cohort strength. Analyses revealed a cyclic pattern in abundance of 0 + crabs that may arise from cohort resonant effects. This pattern consisted of three recruitment pulses but was reduced to two pulses by age 2 + , while the interannual variability of cohort strength was dampened. This reconfiguration of the earliest recruitment pattern was dictated primarily by bottom water temperature and cannibalism, which progressively overruled the pre-settlement factors of larval production and surface water temperature that best explained abundance of 0 + crabs. The results strongly suggest that bottom-up and density-dependent processes prevail over top-down control in setting the long-term trends and higher-frequency oscillations of snow crab early recruitment patterns.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Publication Date: 2015-06-06
    Description: Fisheries biology encompasses a tremendous diversity of research questions, methods, and models. Many sub-fields use observational or experimental data to make inference about biological characteristics that are not directly observed (called "latent states"), such as heritability of phenotypic traits, habitat suitability, and population densities to name a few. Latent states will generally cause model residuals to be correlated, violating the assumption of statistical independence made in many statistical modelling approaches. In this exposition, we argue that mixed-effect modelling (i) is an important and generic solution to non-independence caused by latent states; (ii) provides a unifying framework for disparate statistical methods such as time-series, spatial, and individual-based models; and (iii) is increasingly practical to implement and customize for problem-specific models. We proceed by summarizing the distinctions between fixed and random effects, reviewing a generic approach for parameter estimation, and distinguishing general categories of non-linear mixed-effect models. We then provide four worked examples, including state-space, spatial, individual-level variability, and quantitative genetics applications (with working code for each), while providing comparison with conventional fixed-effect implementations. We conclude by summarizing directions for future research in this important framework for modelling and statistical analysis in fisheries biology.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Publication Date: 2015-06-06
    Description: While the impact of environmental forcing on recruitment variability in marine populations remains largely elusive, studies spanning large spatial areas and many stocks are able to identify patterns common to different regions and species. In this study, we investigate the effects of the environment on the residuals of a Ricker stock–recruitment (SR) model, used as a proxy of prerecruits' survival, of 18 assessed stocks in the Baltic and North Seas. A probabilistic principal components (PCs) analysis permits the identification of groups of stocks with shared variability in the prerecruits' survival, most notably a group of pelagics in the Baltic Sea and a group composed of gadoids and herring in the North Sea. The first two PCs generally grouped the stocks according to their localizations: the North Sea, the Kattegat–Western Baltic, and the Baltic Sea. This suggests the importance of the local environmental variability on the recruitment strength. Hence, the prerecruits' survival variability is studied according to geographically disaggregated and potentially impacting abiotic or biotic variables. Time series (1990–2009) of nine environmental variables consistent with the spawning locations and season for each stock were extracted from a physical–biogeochemical model to evaluate their ability to explain the survival of prerecruits. Environmental variables explained 〉70% of the survival variability for eight stocks. The variables water current, salinity, temperature, and biomass of other fish stocks are regularly significant in the models. This study shows the importance of the local environment on the dynamics of SR. The results provide evidence of the necessity of including environmental variables in stock assessment for a realistic and efficient management of fisheries.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Publication Date: 2015-06-06
    Description: Ecosystem-based fisheries management seeks to consider trade-offs among management objectives for interacting species, such as those that arise through predator–prey linkages. In particular, fisheries-targeting forage fish (small and abundant pelagic fish) might have a detrimental effect on fisheries-targeting predators that consume them. However, complexities in ecological interactions might dampen, negate, or even reverse this trade-off, because small pelagic fish can be important predators on egg stages of piscivorous fish. Further, the strength of this trade-off might depend on the extent to which piscivorous fish targeted by fisheries regulate forage species productivity. Here, we developed a novel delay-differential bioeconomic model of predator–prey and fishing dynamics to quantify how much egg predation or weak top-town control affects the strength of trade-off between forage and piscivore fisheries, and to measure how ecological interactions dictate policies that maximize steady-state profits. We parameterized the model based on ecological and economic data from the North Sea Atlantic cod ( Gadus morhua ) and Atlantic herring ( Clupea harengus ). The optimal policy was very sensitive to the ecological interactions (either egg predation or weak top-down control of forage by predators) at relatively low forage prices but was less sensitive at high forage fish prices. However, the optimal equilibrium harvest rates on forage and piscivores were not substantially different from what might be derived through analyses that did not consider species interactions. Applying the optimal multispecies policy would produce substantial losses (〉25%) in profits in the piscivore fishery, and the extent of loss was sensitive to ecological scenarios. While our equilibrium analysis is informative, a dynamic analysis under similar ecological scenarios is necessary to reveal the full economic and ecological benefits of applying ecosystem-based fishery management policies to predator–prey fishery systems.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Publication Date: 2015-06-06
    Description: Leptocephali, the larvae of eels, grow to large sizes and are widely distributed in tropical and subtropical oceans. Their role in oceanic food webs is poorly known because they are rarely reported as food items in fish stomach content studies. Data from 13 years of research on the trophic dynamics of Pacific Ocean predatory fish indicate that among 8746 fish of 76 species/taxa (33 families) that had been feeding, only 16 fish of 6 species had remains of 34 leptocephali in their stomachs. Only 0.013% of the 256 308 total prey items were leptocephalus larvae, and 0.03% of the total prey items were juvenile or adult eels (mostly snipe eels: Nemichthyidae). There were 10 fish of 2 species of lancetfish ( Alepisaurus spp., n = 152), 2 rainbow runners ( Elagatis bipinnulata , n = 222), and 2 yellowfin tuna ( Thunnus albacares , n = 3103) that had leptocephali in their stomach contents, but all except one T. albacares (contained 15 leptocephali) had each eaten ≤3 leptocephali. A swallower, Pseudoscopelus sp., and a frigate tuna, Auxis thazard , had eaten single leptocephali. Twenty-eight bigeye tuna, Thunnus obesus , had eaten 76 juvenile/adult nemichthyid or serrivomerid eels. A literature survey found that only 15 out of 75 examined publications listed leptocephali in the stomach contents of a total of 6 species out of ~ 42 300 predatory fish of 40 species. The transparency of leptocephali and their apparent mimicry of gelatinous zooplankton could contribute to lower rates of predation. Their soft bodies likely digest rapidly, so although this study and existing literature indicate that leptocephali sometimes contribute to predatory fish diets, particularly for fish that do not exclude gelatinous prey types, and fish with low digestion rates in their stomachs such as lancetfish, their levels of contribution to fish diets and the impacts of predators on eel recruitment remain uncertain.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Publication Date: 2015-06-06
    Description: Effective individual transferable quotas (ITQ) systems rebuild stocks and allow transfer of quotas to more efficient operators. This process requires functional markets for both quota sales and temporary quota leases. These markets are expected to respond to changes in economic rent from the fishery, which is influenced by stock abundance and the international rock lobster price. This research used multistate Markov modelling and Granger causality test to examine changes in the permanent and temporary quota trade in the Tasmanian rock lobster fishery quota market, during periods of both increasing and decreasing stock abundance. The permanent quota trade market was more active during the period of stock growth, while the quota lease market was active in both periods of stock growth and decline. In contrast to theoretical trends in ITQ fisheries, trades in both markets were not linked to the technical efficiency (i.e. catching capability) of operators, but were more driven by the quota owners' financial capacity (i.e. number of owned quotas). Prolonged and unexpected stock decline affected the quota market so that it deviated from the theoretical pattern of ITQ fisheries. Operators previously active in the market reduced their activity, while smaller operators and firms that previously had not traded became more active, so the fleet expanded with smaller operators entering.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Publication Date: 2015-06-06
    Description: Jellyfish disruption of fisheries has been described in some coastal systems, but few thorough investigations have been conducted. To ascertain the economic impact and trend of jellyfish blooms in the Northern California Current (NCC), we mailed surveys to resident commercial shrimpers, salmon trollers, rockfish (blue, black), and groundfish fishers ( n = 872). We asked fishers to estimate the damages caused by jellyfish—including costs of relocating to avoid blooms, lost fishing time, time lost to bycatch sorting, fish depreciation, and gear damage. Of the total respondents ( n = 111), 67% reported that jellyfish reduce their seasonal revenue, but the degree of impact ranged considerably by fishery and location. Highest jellyfish nuisance corresponded to regions with the most salmon trolling effort. Using the mean revenue losses provided by respondents, we estimate that the combined economic impact of jellyfish on Oregon's salmon and pink shrimp fishers was over $650 000 in peak jellyfish season (June–September) in 2012. Fishers reported that jellyfish biomass varies annually, but most respondents (51%) reported observing no appreciable change in jellyfish populations in the last 5 years. Since economic impact analyses have been conducted primarily in areas with anomalous, high-density blooms, data from the NCC, which is not known to be experiencing increases in jellyfish abundance, provides baseline information on the socio-economic impact of jellyfish blooms in this region. In addition, the finding that jellyfish impact hook and line fisheries—not solely net fisheries—has implications for many other regions where fishers employ this gear type.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Publication Date: 2015-06-06
    Description: Odontocete depredation on longlines involves socioeconomic and conservation issues with significant losses for fisheries and potential impacts on wild populations of depredating species. As technical solutions to this conflict are limited and difficult to implement, this study aimed to identify fishing practices that could reduce odontocete depredation, with a focus on killer whales (Orcinus orca) interacting with Patagonian toothfish (Dissostichus eleginoides) longliners off the Crozet islands. Data collected by fishery observers from 6013 longline sets between 2003 and 2013 allowed us to statistically detect the significant influence of five operational variables using GLMMs. The probability of interactions between vessels and killer whales was decreased by (i) the number of vessels operating simultaneously in the area: the limited number of depredating killer whales may induce a dilution effect with increased fleet size, and (ii) depth of longline sets: vessels operating in shallow waters may be more accessible to whales that are initially distributed on peri-insular shelves. The cpue was negatively influenced by (iii) length of longlines: longer sets may provide killer whales access to a greater proportion of hooked fish per set, and positively influenced by (iv) hauling speed: increased speed may shorten the time during which toothfish are accessible to whales during hauling. The time it takes for killer whales to reach vessels was positively correlated to (v) the distance travelled between longline sets with an estimated threshold of 100 km beyond which whales seem to temporarily lose track of vessels. These findings provide insightful guidelines about what fishing strategy to adopt given these variables to reduce killer whale depredation here and in similar situations elsewhere. To a greater extent, this study is illustrative of how collaborative work with fishermen in a fully controlled fishery framework may lead to the definition of cost-limited and easy-to-implement mitigation solutions when facing such human-wildlife conflict.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Publication Date: 2015-06-06
    Description: In Alaskan waters, depredation on sablefish longline gear by sperm whales increases harvesting cost, negatively biases stock assessments, and presents a risk of entanglement for whales. The Southeast Alaska Sperm Whale Avoidance Project (SEASWAP), a collaborative effort involving industry, scientists, and managers, since 2003 has undertaken research to evaluate depredation with a goal of recommending measures to reduce interactions. Prior to 2003, little was known about sperm whale distribution and behaviour in the Gulf of Alaska (GOA). Although fishers were reporting increasing interactions, the level of depredation varied with no apparent predictor of occurrence across vessels. Between 2003 and 2007, fishers were provided with fishery logbooks and recorded information on whale behaviour, whale presence and absence, during the set, soak, and haul for 319 sets in the GOA. Data were evaluated for a vessel, area, and seasonal (month) effect in the presence and absence of sperm whales. Using catch per unit effort ( cpue ) as a metric, in kg/100 hooks, results indicated that depredation depended on both the vessel and the area. More whales associated with vessels from April to August. Sperm whales were also likely to be present when cpue was high, revealing that whales and fishers both knew the most productive fishing areas, but confounding the use of cpue as a metric for depredation. Using a Bayesian mark-recapture analysis and the sightings histories of photo-identified whales, an estimated $$\hat{N}=135$$ (95% CI 124, 153) sperm whales were associating with vessels in 2014. A spatial model was fitted to 319 longline sets and quantified a 3% loss in cpue , comparable to other global studies on sperm whale depredation. Through all phases of SEASWAP, our understanding of depredation has gained significantly. This successful collaboration should be considered as a model to create partnerships and build collaborations between researchers and fisherpeople encountering marine mammal interactions with fishing gear.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Publication Date: 2015-06-06
    Description: This paper provides a synthesis of results obtained as part of a long-term collaborative study involving biologists, fishers, and resource managers—centring on the occurrence of killer whales in the Crozet Archipelago before and after the implementation of a demersal longline fishery for Patagonian toothfish. Depredation behaviour was reported as soon as the fishery was initiated, with dramatic effects on both the demographic trajectories of the killer whales and on the amount of fish lost by the fishers. Killer whales interacting with the fishery exhibited very high mortality rates when illegal fishing took place, while killer whales not interacting were unaffected. However, after illegal fishing ended, killer whales interacting with the fishery exhibited both higher fecundity and survival rates compared with killer whales not interacting. Since whales typically removed fish entirely from the hooks, an adapted methodology that did not rely on determining the number of damaged fish was developed to estimate depredation rates. In the Crozet EEZ over a 10-year period, 33.9% of the total amount of Patagonian toothfish caught, representing a total of 28 million , was estimated to be lost due to the combined effects of killer whale and sperm whale depredation. In an effort to reduce depredation losses, modifications to fishing methods, such as changing the fishing season, changing fishing areas when exposed to depredation and changing longline length and hauling speed were successfully tested. Acoustic deterrent devices were ineffective in deterring killer whales from depredating longlines. Alternative fishing gears, such as fish pots, were also tested. However, while providing encouraging results regarding the suppression of depredation and seabird bycatch, fish pots were not efficient enough to sustain an economically viable fishery. In conclusion, we discuss how the findings of this comprehensive study can be used elsewhere in fisheries confronted with depredation.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-09-23
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-09-23
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-09-23
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-09-23
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-09-23
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-09-23
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-09-23
    Description: Sheila Peacock reports on a meeting that explored the UK's contribution to seismology in the past, present and future.
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-09-23
    Description: Jenny Collier , marine geophysicist and President of the BGA, explains why she is addicted to science.
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Publication Date: 2015-09-29
    Description: In this paper, we present a methodology to evaluate the feasibility, effectiveness and complexity of a class of cache-based side-channel attacks. The methodology provides estimates on the lower bound of the required number of observations on the side channel and the number of trials for a successful attack. As a case study, a weak implementation of the Advanced Encryption Standard algorithm is selected to apply the proposed methodology to three different categories of cache-based attacks; namely, access-driven, trace-driven and time-driven attacks. The approach, however, is generic in the sense that it can be utilized in other algorithms that are subject to the micro-architectural side-channel attacks. The adopted approach bases its analysis method partially on the conditional entropy of secret keys given the observations of the intermediate variables in software implementations of cryptographic algorithms via the side channel and explores the extent to which the observations can be exploited in a successful attack. Provided that the intermediate variables are relatively simple functions of the key material and the known inputs or outputs of cryptographic algorithms, a successful attack is theoretically feasible. Our methodology emphasizes the need for an analysis of this leakage through such intermediate variables and demonstrates a systematic way to measure it. The method allows us to explore every attack possibility, estimate the feasibility of an attack, and compare the efficiency and the costs of different attack strategies to determine an optimal level of effective countermeasures.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Publication Date: 2015-09-29
    Description: In Cramer et al. (2007, Bounded CCA2-Secure Encryption. In Kurosawa, K. (ed.), Advances in Cryptology – ASIACRYPT 2007 , Kuching, Malaysia, December 2–6, Lecture Notes in Computer Science, Vol. 4833, pp. 502–518. Springer, Berlin, Germany) proposed a public-key encryption scheme secure against adversaries with a bounded number of decryption queries based on the decisional Diffie–Hellman problem. In this paper, we show that the same result can be obtained based on weaker computational assumptions, namely: the computational Diffie–Hellman and the hashed Diffie–Hellman assumptions.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Publication Date: 2015-09-29
    Description: Certificateless public key encryption (CLE) and certificate-based encryption (CBE) are motivated to simultaneously solve the heavy certificate management problem inherent in the traditional public key encryption (PKE) and the key escrow problem inherent in the identity-based encryption (IBE). Al-Riyami and Paterson proposed a general conversion from CLE to CBE, which is neat and natural. Kang and Park pointed out a flaw in their security proof. Wu et al. proposed another generic conversion from CLE to CBE which additionally involves collision resistant hash functions. It remains an open problem whether the generic conversion due to Al-Riyami and Paterson is provably secure or not. We are motivated to solve this open problem. Our basic idea is to enhance Type II adversary's power a little by allowing it to conditionally replace a user's public key. We first formalize a new security model of CLE in this way. Then, we succeed in proving that the Al-Riyami–Paterson generic conversion from CLE to CBE is secure, if the CLE scheme is secure in our new security model. Finally, a concrete provably secure CBE scheme is presented to demonstrate the applicability of our result.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Publication Date: 2015-09-29
    Description: Human recognition with heartbeat signal is useful for different applications such as information security, user identification and remote patient monitoring. In this paper, we propose a model-based method for the alignment of heartbeat morphology to enhance the recognition capability. The scale change of different heartbeats of the same individual due to heart rate variability is estimated and inversed to yield better alignment. Recognition capabilities of different alignment methods are analyzed and measured by intra-individual and inter-individual distances of aligned heartbeats. A framework for heartbeat recognition incorporating the model-based alignment method is also presented. We tested the recognition capability of heartbeat morphology by using two different databases. It was found that model-based alignment method was useful to boost the recognition capability of heartbeat morphology. A statistical t -test revealed that the improvement was significant with respect to recognition capabilities of other existing alignment methods. We also used the aligned morphology as a feature, tested the recognition accuracy on both databases and compared the recognition performance to those of four other state-of-the-art features. A large increase in recognition accuracy was obtained especially for a multisession database of heartbeat signals captured from fingers using a handheld ECG device.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Publication Date: 2015-09-29
    Description: Malicious code attacks pose a serious threat to the security of information systems, as malware evolved from innocuous conceptual software to advanced and destructive cyber weapons. However, there is still the lack of a comprehensive and useful taxonomy to classify malware according to their behavior, since commonly used names are obsolete and unable to handle the complex and multipurpose currently observed samples. In this article, we present a brief survey on available malware taxonomies, discuss about issues on existing naming schemes and introduce an extensible taxonomy consisting of an initial set of behaviors usually exhibited by malware during an infection. The main goal of our proposed taxonomy is to address the menace of potentially malicious programs based on their observed behaviors, thus aiding in incident response procedures. Finally, we present a case study to evaluate our behavior-centric taxonomy, in which we apply identification patterns extracted from the proposed taxonomy to over 12 thousand known malware samples. The leveraged results show that it is possible to screen malicious programs that exhibit suspicious behaviors, even when they remain undetected by antivirus tools.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Publication Date: 2015-09-29
    Description: Metamorphism is a technique that mutates the binary code using different obfuscations and never keeps the same sequence of opcodes in the memory. This stealth technique provides the capability to a malware for evading detection by simple signature-based (such as instruction sequences, byte sequences and string signatures) anti-malware programs. In this paper, we present a new scheme named Annotated Control Flow Graph (ACFG) to efficiently detect such kinds of malware. ACFG is built by annotating CFG of a binary program and is used for graph and pattern matching to analyse and detect metamorphic malware. We also optimize the runtime of malware detection through parallelization and ACFG reduction, maintaining the same accuracy (without ACFG reduction) for malware detection. ACFG proposed in this paper: (i) captures the control flow semantics of a program; (ii) provides a faster matching of ACFGs and can handle malware with smaller CFGs, compared with other such techniques, without compromising the accuracy; (iii) contains more information and hence provides more accuracy than a CFG. Experimental evaluation of the proposed scheme using an existing dataset yields malware detection rate of 98.9% and false positive rate of 4.5%.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Publication Date: 2015-09-29
    Description: The success of location-based services is growing together with the diffusion of GPS-equipped smart devices. As a consequence, privacy concerns are raising year by year. Location privacy is becoming a major interest in research and industry world, and many solutions have been proposed for it. One of the simplest and most flexible approaches is obfuscation, in which the precision of location data is artificially degraded before disclosing it. In this paper, we present an obfuscation approach capable of dealing with measurement imprecision, multiple levels of privacy, untrusted servers and adversarial knowledge of the map. We estimate its resistance against statistical-based deobfuscation attacks, and we improve it by means of three techniques, namely extreme vectors , enlarge-and-scale and hybrid vectors .
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-09-29
    Description: We consider the problem of access privilege management in a classical protection environment featuring subjects attempting to access the protected objects. We express an access privilege in terms of an access right and a privilege level. The privilege level and a protection diagram associated with each given object determine whether a nominal access privilege for this object corresponds to an effective, possibly weaker access privilege, or is revoked. We associate a password system with each object; the password system takes the form of a hierarchical bidimensional one-way chain. A subject possesses a nominal access privilege for a given object if it holds a key that matches one of the passwords in the password system of this object; the protection diagram determines the extent of the corresponding effective access privilege. The resulting protection environment has several interesting properties. A key reduction mechanism allows a subject that holds a key for a given object to distribute keys for weaker access rights at lower privilege levels. A subject that owns a given object can review or revoke the passwords for this object by simply modifying the protection diagram. The memory requirements to represent a protection diagram are negligible; as far as password storage is concerned, space–time trade-offs are possible.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Publication Date: 2015-09-29
    Description: A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted data stored on the cloud without revealing the data to an honest-but-curious cloud service provider (i.e. the PRE proxy). Furthermore, the data owner can offload most of the computational operations to the cloud service provider and hence, using PRE for encrypted cloud data sharing can be very effective even for data owners using limited resource devices (e.g. mobile devices). However, PRE schemes only enables data owners to delegate the decryption rights of all their encrypted data. A more practical notion is a conditional PRE (CPRE) that allows us to specify under what condition the decryption of an encrypted data can be delegated, for example, only sharing all the encrypted files under a directory called ‘public’. In this paper, we provide an affirmative result on the long-standing question of building a full chosen-ciphertext attacks (CCA)-secure CPRE system in the standard model and for the first time, we show that a class of Hierarchical Identity-Based Encryption (HIBE) schemes can be transferred to building a CCA-secure CPRE in the standard model. We also list out some concrete HIBE schemes which fall into this class, e.g., Lewko-Waters HIBE. All existing CCA-secure PRE schemes in the standard model are not conditional while all existing CPRE schemes are either not CCA secure or not in the standard model. By instantiating our generic HIBE-based transformation, we show that an efficient and concrete CPRE scheme which is both CCA secure in the standard model and conditional can be built.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Publication Date: 2015-11-20
    Description: Females of many animal species seek mating opportunities with multiple males, despite being able to obtain sufficient sperm to father their offspring from a single male. In animals that live in stable social groups, females often choose to mate outside their group resulting in extra-group paternity (EGP). One reason proposed to explain female choice for extra-group males is to obtain compatible genes, for example, in order to avoid inbreeding depression in offspring. The benefits of such extra-group paternities could be substantial if they result in fitter, outbred offspring. However, avoiding inbreeding in this way could be costly for females, for example, through retaliation by cuckolded males or through receiving aggression while prospecting for extra-group mating opportunities. We investigate the costs and benefits of EGP in the banded mongoose Mungos mungo , a cooperatively breeding mammal in which within-group mates are sometimes close relatives. We find that pups born to females that mate with extra-group males are more genetically heterozygous are heavier and are more likely to survive to independence than pups born to females that mate within their group. However, extra-group matings also involve substantial costs as they occur during violent encounters that sometimes result in injury and death. This appears to lead femalebanded mongooses to adaptively adjust EGP levels according to the current risk of inbreeding associated with mating within the group. For group-living animals, the costs of intergroup interactions may help to explain variation in both inbreeding rates and EGP within and between species.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Publication Date: 2015-11-20
    Description: Many species living in developed areas adjust the timing of their activity and habitat selection to avoid humans, which may reduce their risk of conflict, including vehicle collisions. Understanding the behavioral adaptations to vehicles exhibited by species that thrive in urban areas could improve the conservation of many species that are threatened by road-caused mortality. We explored these behaviors using the seasonal distribution of 80 road-killed coyotes ( Canis latrans ) collected by civic employees and by comparing the activity patterns (step lengths) and road crossings made by 19 coyotes fitted with GPS collars with 3-h fix rates, 7 of which were killed in vehicle collisions. Coyotes were collected on roads most often in spring and fall, which corresponded to the most rapid changes in day length in our northern study area and when collared road-killed coyotes were more active during rush hour. Among collared coyotes, those that were killed on roads were most active and crossed roads most frequently at dusk. By contrast, surviving animals were most active and crossed roads most often near midnight year round and surprisingly, exhibited less avoidance of roads than did road-killed coyotes. Our results suggest that risk of vehicle collision is lower for coyotes that restrict the times at which they cross roads but some coyotes do not or cannot. Such behavioral flexibility to adapt to the timing of human activity relative to exogenous cues such as dawn and dusk may contribute to differences both among and within wildlife species in rates of coexistence with humans.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Publication Date: 2015-11-20
    Description: Group living in animals is a well-studied phenomenon, having been documented extensively in a wide range of terrestrial, freshwater, and marine species. Although social dynamics are complex across space and time, recent technological and analytical advances enable deeper understanding of their nature and ecological implications. While for some taxa, a great deal of information is known regarding the mechanistic underpinnings of these social processes, knowledge of these mechanisms in elasmobranchs is lacking. Here, we used an integrative and novel combination of direct observation, accelerometer biologgers, and recent advances in network analysis to better understand the mechanistic bases of individual-level differences in sociality (leadership, network attributes) and diel patterns of locomotor activity in a widespread marine predator, the lemon shark ( Negaprion brevirostris ). We found that dynamic models of interaction based on Markov chains can accurately predict juvenile lemon shark social behavior and that lemon sharks did not occupy consistent positions within their network. Lemon sharks did however preferentially associate with specific group members, by sex as well as by similarity or nonsimilarity for a number of behavioral (nonsimilarity: leadership) and locomotor traits (similarity: proportion of time swimming "fast," mean swim duration; nonsimilarity: proportion of swimming bursts/transitions between activity states). Our study provides some of the first information on the mechanistic bases of group living and personality in sharks and further, a potential experimental approach for studying fine-scale differences in behavior and locomotor patterns in difficult-to-study organisms.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Publication Date: 2015-11-20
    Description: Sexually selected traits are often driven to costly extremes by persistent directional selection. Energy acquisition and allocation can therefore influence variation in traits subject to both precopulatory and postcopulatory sexual selection, though the later have received much less attention. We tested the condition dependence of sperm morphology, sperm count, and fertilization success in a promiscuous lizard ( Anolis sagrei ) by 1) collecting sperm samples from wild males that varied naturally in body condition, 2) experimentally altering the body condition of captive males through dietary restriction, and 3) analyzing genetic paternity data from competitive mating trials between captive males that differed in body condition. In both wild and captive males, the length of the sperm midpiece decreased with body condition. Experimental food restriction decreased sperm production, decreased length of the sperm head, increased length of the sperm midpiece, and increased variance in sperm morphology within individuals. When restricted to a single copulation, males on high-intake diets exhibited a slight but nonsignificant fertilization advantage. Reanalysis of a previous experiment in which high- and low-condition males were sequentially allowed to copulate ad libitum for 1 week revealed a significant fertilization bias in favor of high-condition males. When controlling for mean treatment effects on the proportion of offspring sired and on sperm phenotypes, multiple regression revealed negative correlations between fertilization success and sperm head length, midpiece length, and sperm count. Collectively, our results suggest that condition-dependent fertilization success in A. sagrei may be partially mediated by underlying condition dependence of sperm morphology and sperm count.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Publication Date: 2015-11-20
    Description: The postfledging dependence period (PFDP) is a crucial stage in the development of altricial birds. This period is regulated by parental investment, in terms of food provisioning and protection, and the demands of young associated with their development and physical condition. We examine the relative role of parental investment, food provisioning, and offspring decisions on the PFDP regulation in the Spanish imperial eagle ( Aquila adalberti ) by comparing the PFDP timing among young from non-manipulated territories, food supplemented territories, and birds translocated by hacking methods in the absence of adults and with ad libitum food supply. We found that extra food homogenized the nutritional condition of young and reduced the length of the first stage of PFDP, which is related to flight development and thus dependent on body condition. However, hacked birds did not reduce this stage despite ad libitum food, likely due to the lack of parental stimulus to develop advanced flights. Although the presence of adults might accelerate young becoming independent, hacked birds did not extend significantly the whole PFDP and all birds eventually started dispersal. Thereby, the PFDP regulation was primarily under offspring control, and modulated secondarily by parental effects independently of food provisioning and laying date. The length of this period seems to be constrained mainly by the inherent benefits of early dispersal on ultimate fitness in accordance with ontogenic hypotheses. In addition, hacking was shown to be an effective translocation method when properly used, without negative drawbacks for young development during the PFDP.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Description: Simon Mitton summarizes the RAS Specialist Discussion Meeting that examined from a historical perspective Hoyle's remarkable career and the impact of his science, in the first of two articles on his scientific legacy.
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Description: Fred Hoyle's interest in geophysics has been largely forgotten; Helge Kragh takes another look.
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Publication Date: 2015-11-21
    Description: Assessments of the risk posed by near-Earth objects ignore the possibility of a giant comet entering the inner solar system. Bill Napier, David Asher, Mark Bailey and Duncan Steel examine the likelihood and potential consequences of the appearance of such a centaur.
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Description: Toby Samuels and Natasha Nicholson report on a debate over the pros and cons of turning humans into martians.
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Description: Nevil Maskelyne became the fifth Astronomer Royal 250 years ago, at a time when science and politics were intertwined. Paul Edwards maps his career.
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Description: Space physicist Mike Lockwood , who was awarded the RAS Gold Medal in 2015, was inspired by his school physics teacher, JFK and Feynman.
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-20
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Publication Date: 2015-11-20
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Publication Date: 2015-11-20
    Description: In antagonistic encounters, the primary decision to be made is to fight or not. Animals may then possess adaptations to assess fighting ability in their opponents. Previous studies suggest that humans can assess strength and fighting ability based on facial appearance. Here we extend these findings to specific contests by examining the perception of male faces from paired winners and losers of individual fights in mixed martial arts sporting competitions. Observers, unfamiliar with the outcome, were presented with image pairs and asked to choose which of the 2 men was more likely to win if they fought while other observers chose between the faces based on masculinity, strength, aggressiveness, and attractiveness. We found that individuals performed at rates above chance in correctly selecting the winner as more likely to win the fight than the loser. We also found that winners were seen to be more masculine, stronger, and more aggressive than losers. Finally, women saw the winners as more attractive than the losers. Together these findings demonstrate that 1) humans can predict the outcome of specific fighting contests based on facial cues, 2) perceived masculinity and strength are putative cues to fighting success available from faces, and 3) facial cues associated with successful male–male competition are attractive to women.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Publication Date: 2015-11-20
    Description: Assessing an opponent’s strength is an important component of attack strategies in territorial combats between males. Body size is often considered to directly influence an individual’s strength, but other honest visual signals may also affect the assessment of opponents. Among such visual signals are the so-called egg-spots, a conspicuous ovoid marking on the anal fin of male haplochromine cichlid fishes, made up of carotenoid-containing and other pigment cells. It has long been assumed that egg-spots are mainly relevant in courtship and spawning behavior, and previous work has focused primarily on their function in intersexual selection. Recently, however, both body size and egg-spots have been suggested to play a role in male–male interactions. To test whether egg-spots function in female choice or whether egg-spots and/or body size function as a predictor of strength and the subsequent attack strategy in male–male interactions, we performed a series of behavioral experiments in the haplochromine cichlid Astatotilapia calliptera . The trials revealed a limited involvement of egg-spots in female choice, yet a much stronger influence in male interactions. Territorial males combined information from the strength assessment based on body size and egg-spots to adopt their attack strategies. They launched more attacks against the larger intruder with many egg-spots compared with the smaller intruder without or with fewer egg-spots. Our study provides evidence that egg-spots serve as honest visual signal and that the level of asymmetries in egg-spot pattern and body size determines the relative impact of each trait in strength assessment.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Publication Date: 2015-11-20
    Description: Evaluating the costs and benefits of dispersal on individual life history is critical to understanding its importance to ecology and evolution. In feral horses ( Equus ferus caballus ), females may permanently move among breeding groups (bands) during their lifetime (termed social dispersal). Here, we assess costs and benefits of adult female social dispersal using 7 years of movement and life history data from an individual-based study of feral horses on Sable Island. Using path and survival analyses, we explored relationships between social dispersal, female reproduction, and survival of offspring. Dispersal negatively correlated with a female’s next reproduction (probability to produce a living foal that was observed during our summer census) and reproductive success (RS) over the longer term (probability of producing foals in subsequent years). Females that dispersed had longer latency before next reproduction than nondispersing (philopatric) females. We could not measure costs in terms of induced abortions or neonatal survival, but we observed no evidence of infanticide during our summer censuses. Furthermore, overwinter survival of foals to 3 years of age was not affected by either dispersal of its mother before conception or as pregnant. Despite a 10% higher rate for foals dispersing with mothers to survive to 3 years compared with those of philopatric females, the difference was not statistically significant. Overall, our results suggest that dispersing individuals have lower RS that may be a cost of social dispersal on future reproduction.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Publication Date: 2015-11-20
    Description: Large mammalian carnivores create areas perceived as having high and low risk by their ungulate prey. Human activities can indirectly shape this landscape of fear by altering behavior and spatial distribution of carnivores. We studied how red deer perceive the landscape of fear in an old-growth forest system (Białowieza Primeval Forest, Poland) both at large and fine spatial scale. Camera traps were placed at locations with and without tree logs (fine-scale risk factor) and at different distances from the core of a wolf territory and human settlements (large-scale risk factor). Red deer avoided coming close to large tree logs and increased their vigilance levels when they were present in close vicinity. The strength of these effects depended on the distance to the wolf core area; deer perceived tree logs as more risky when wolves were more often present. Hence, tree logs inside wolf core areas create fine-scale patches of fear with reduced deer browsing pressure, thereby enhancing chances for successful tree recruitment. Human presence shapes this landscape of fear as wolf core areas are located far from human settlements. This "human shadow" on predator–prey interactions is therefore an important component that should be taken into account in human-dominated landscapes.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Publication Date: 2015-11-20
    Description: Why do females faced with the same array of potential mates often select different males? Variation in choosiness, defined as investment in mate search, is an important potential source of variation in mating decisions. Experimental work suggests such variation is driven by the costs of searching, but data from natural populations are scarce and few studies have addressed explicitly the counteracting benefits expected from search investment. We tracked male visitation behavior of free-ranging females on a lek of lance-tailed manakins ( Chiroxiphia lanceolata ) using automated telemetry at dispersed male display sites. We assessed relationships of female age, experience, body condition, and parasite load with variation in choosiness, quantified as males visited, number of visits, and visit duration. Young females visited more males and made more total visits before choosing a mate, whereas older females conducted longer visits for first nests of the year. Renesting females searched less, but the few monitored females mating faithfully between years nevertheless sampled several males. We found little support for effects of condition on choosiness. Results suggest females sample more widely when they lack information about the distribution of available mates. Though previous work in the study population has shown both female preference for and offspring fitness benefits from heterozygous sires, genetic tests of paternity revealed choosier females did not choose more heterozygous mates. Females’ investment in mate search varied in relation to their own age and within-year experience, but mate search investment did not independently determine variation in choice among individuals.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Publication Date: 2015-11-20
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Publication Date: 2015-11-20
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Publication Date: 2015-11-20
    Description: Urban animals often show differences in aggression relative to their rural counterparts, but the ultimate and proximate origins of these differences are poorly understood. Here, we compared urban and rural song sparrows ( Melospiza melodia ), a species for which higher levels of aggression in urban populations have previously been reported. First, we confirmed elevated territorial aggression levels in urban birds relative to rural birds over multiple years. To begin to identify the environmental variables contributing to these differences, we related aggression to features of the social and physical environment, specifically population density and the availability of suitable nesting vegetation. Population distribution and the availability of suitable nest vegetation were not correlated with territorial aggression levels. Subsequently, we conducted a food supplementation experiment to determine whether potential differences in the relative availability of food between the 2 habitats might drive differences in aggression. Food supplementation increased territorial aggression significantly, particularly in rural birds. Thus, it appears that the availability of food could play a role in determining territorial aggression in song sparrows. The specific combination of these features found in urban areas may cause the increased levels of territorial aggression seen in these populations.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Publication Date: 2015-11-20
    Description: A critical question in the study of the evolution of cognition and the brain concerns the extent to which variation in cognitive processes and associated neural mechanisms is adaptive and shaped by natural selection. In order to be available to selection, cognitive traits and their neural architecture must show heritable variation within a population, yet heritability of cognitive and neural traits is not often investigated in the field of behavioral ecology. In this commentary, we outline existing research pertaining to the relative influences of genes and environment in cognitive and underlying neural trait variation, as well as what is known of their heritable genetic architecture by focusing on several cognitive traits that have received much attention in behavioral ecology. It is important to demonstrate that cognitive traits can respond to selection, and we advocate for an increased emphasis on investigating trait heritability for enhancing our understanding of the ecological, genetic and neurobiological mechanisms that have shaped interspecific and intraspecific variation in cognitive traits.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Publication Date: 2015-11-20
    Description: Two recent observations in behavioral biology have sparked great interest and have already yielded many novel and intriguing insights. Bacteria appear to live lives of unforeseen behavioral complexity, and the consistent behavioral variation among individual animals is often not "noise" but turns out to be a highly relevant ecological and evolutionary feature in itself. Research covering these 2 phenomena has proceeded largely in isolation, and the rich behavioral lives of bacteria have not yet been studied with consistent interindividual behavioral differences in mind. Yet, the parallels between animal and bacterial behavior that are increasingly being uncovered, as well as the particular characteristics of bacteria, point toward a new approach in the study of consistent individual variation in behavior. Using bacteria can bring fruitful opportunities to the field and allows researchers to address questions that are very difficult to pursue using animal model systems. Notwithstanding a few challenges, bacteria can provide an alternative study system that may elucidate several evolutionary and ecological aspects of consistent individual behavioral variation.
    Print ISSN: 1045-2249
    Electronic ISSN: 1465-7279
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2015-11-21
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Publication Date: 2015-11-21
    Description: Alexander Russell , Anthony Yeates and Jonathan Eastwood review the state of the art and interesting future directions in this developing field, drawing on the RAS discussion meeting held on 12 December 2014.
    Print ISSN: 1366-8781
    Electronic ISSN: 1468-4004
    Topics: Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Publication Date: 2015-08-28
    Description: As people increasingly rely on road maps in the digital age, manually maintained maps cannot keep up with the demand for accuracy and freshness, evidenced by the recent iOS map incident and the bidding war for Waze. There are many research works on automatic map inference using GPS data, and some have suggested that Google and Waze automate their map update processes to some degree with user data. However, existing published work focuses on refining road geometry. In reality, connectivity issues at intersections, including missing connections and unmarked turn restrictions, are much more prevalent and also more difficult to infer. In this paper, we report our study on the connectivity issues in the OSM Shanghai map using 21 months of GPS data from over $10\,000$ taxis. We first adapt a robust map matching algorithm. Then, we propose simple algorithms for detecting missing intersections, turn restrictions and road closures. Empirical results show that our algorithms of connectivity refinement for road maps are effective.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Publication Date: 2015-08-28
    Description: The degree distribution is an important characteristic of complex networks. In many data analysis applications, the networks should be represented as fixed-length feature vectors and therefore the feature extraction from the degree distribution is a necessary step. Moreover, many applications need a similarity function for comparison of complex networks based on their degree distributions. Such a similarity measure has many applications, including classification and clustering of network instances, evaluation of network sampling methods, anomaly detection and study of epidemic dynamics. The existing methods are unable to effectively capture the similarity of degree distributions, particularly when the corresponding networks have different sizes. In this paper, we propose a feature extraction method and a similarity function for the degree distributions in complex networks. We propose to calculate the feature values based on the mean and standard deviation of the node degrees in order to decrease the effect of the network size on the extracted features. Experiments on a wide range of real and artificial networks confirms the accuracy, stability and effectiveness of the proposed method.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Publication Date: 2015-08-28
    Description: Given a query photo characterizing a location-aware landmark shot by a user, landmark retrieval is about returning a set of photos ranked in their similarities to the query. Existing studies on landmark retrieval focus on conducting a matching process between candidate photos and a query photo by exploiting location-aware visual features. Notwithstanding the good results achieved, these approaches are based on an assumption that a landmark of interest is well-captured and distinctive enough to be distinguished from others. In fact, distinctive landmarks may be badly selected, e.g. changes on viewpoints or angles. This will discourage the recognition results if a biased query photo is issued. In this paper, we present a novel technique that exploits user communities in social media networks. Given a biased query photo containing some landmarks taken by a user, we select multiple users to complement this user for retrieval. Multiple photos are then used to enrich the query photo, constituting a more representative yet robust multi-query set. A pattern mining method is developed to obtain a compact feature representation of photos from the multi-query set. Such a representation is utilized to efficiently query the database so as to improve retrieval results. Extensive experiments on real-world datasets demonstrate the effectiveness and efficiency of our approach.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Publication Date: 2015-08-28
    Description: Social media have been used by some companies to support customer co-creation in recent years. However, few academic studies have been done to investigate the use of social media in customer co-creation. To understand the current state-of-the-art and future trends about the use of social media in customer co-creation, we conducted two studies to analyze relevant posts on blogs and social media-based online forums. This study reveals some interesting patterns, themes and future trends in this specific area. Recommendations are given to help managers engage in co-creation activities with customers.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Publication Date: 2015-06-02
    Description: Mobile message push has become a ubiquitous technology in various applications such as online resource sharing, traffic surveillance, mobile health care and environmental monitoring. In mobile terminals, energy efficiency optimization is one of the most important issues due to battery power limitations, resource constraints and quality-of-service (QoS) requirements. Considering the timely delivery, network load and terminal diversity, this paper proposes an adaptive message push strategy (AMPS) for energy efficiency optimization in mobile terminals. In AMPS, running parameters including energy parameter, operating system (OS) version and connection/polling cost in mobile terminal are first acquired and sent to the server together with the requisition data, and then the dispatching module will automatically choose a message pushing mode between polling-based and connection-based ones. The AMPS was tested in real environments using mobile phones with different OSs. Experiment results show that AMPS can efficiently optimize energy exploitation with dynamic tradeoff between terminal using time and QoS performance in comparison with polling-based and connection-based message push strategies.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Publication Date: 2015-06-02
    Description: Wireless sensor networks (WSNs) are vulnerable to the unfavorable funneling effect. The optimization of WSN clustering is a natural way to suppress the funneling effect. WSN clusters involve the edge effect that was undervalued in existing techniques. We propose an optimal clustering routing protocol GreenOCR to reduce the detrimental influence of the funnel effect and minimize the energy consumption in WSNs. Our work focuses on the approximate unequal optimal clustering and dropping energy consumption arising from the edge effect. First, according to the data repeat rate among overlapped clusters, we estimate the actual data compression ratio to offset the negative influence of the edge effect and save WSN energy. Secondly, we reduce the issue of minimizing the total energy consumption in a WSN to a nonlinear programming (NLP). We have proved that this NLP problem is NP complete. Third, we turn over to exploring an approximate optimal clustering and propose an approximate optimal clustering algorithm. A GreenOCR enabled WSN clustering minimizes the energy consumption in the whole network and extends the lifetime of the WSN. The simulation experiment shows that GreenOCR outperforms its rivals in alleviating the funnel effect.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Publication Date: 2015-06-02
    Description: To improve the video semantic analysis for video surveillance, a new video semantic analysis method based on the kernel discriminative sparse representation (KSVD) and weighted K nearest neighbors (KNN) is proposed in this paper. A discriminative model is built by introducing a kernel discriminative function to the KSVD dictionary optimization algorithm, mapping the sparse representation features into a high-dimensional space. The optimal dictionary is then generated and applied to compute the sparse representations of video features. For video semantic analysis, a weighted KNN algorithm based on the optimal sparse representation is proposed. In the algorithm, a kernel function is introduced to establish discrimination about sparse representation features and the classification vote result is weighted, the purpose of which is to improve the accuracy and rationality for video semantic analysis. The experimental results show that the proposed method significantly improves the discrimination of sparse representation features when compared with the traditional KSVD-based support vector machine method. The method can effectively detect the concept and event, which can be potentially useful for improving the video surveillance.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Publication Date: 2015-06-02
    Description: In cloud computing, companies usually use high-end storage systems to guarantee the I/O performance of virtual machines (VM). These storage systems cost a lot of energy for their high performance. In this paper, we propose an EEVS, a deduplication-based energy efficiency storage system for VM storage. We firstly investigate some VM image files with general operating systems. With the analysis result, we find there are many redundant data blocks that bring extra energy cost VM storage. Therefore, in the EEVS, we design an online-deduplication mechanism to reduce these redundant data without service interruption, while traditional deduplication technology is used for offline backup. Based on the system design, we implement an EEVS with the existing cloud platform. Since this mechanism needs considerable computing resources, we design a deduplication selection algorithm such that the storage energy consumption is minimized for a given set of VMs with limited resources for deduplication. Experiment results in a para-virtualization environments of the EEVS show that energy consumption is reduced by even up to 66% with negligible performance degradation.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Publication Date: 2015-06-02
    Description: Smarter use of the renewable energy produced by solar panels reduces the return time of the investment necessary for their installation. This improvement consequently motivates more households to use solar panels so as to not only help protect the environment, but also better use the expensive energy. The difference in tariff prices at different hours of the day is one such opportunity for smarter use of solar electricity: we propose and implement a real-time strategy to more economically use the produced solar electrical energy by forecasting future demand of a few days ahead and by using that energy at the most economical time. Evaluation of the proposed technique in an educational building showed that this scheme improves financial advantage of solar panels by 41% compared with the direct connection of production of solar panels to the grid, or using the stored solar energy completely unawares, hence it can reduce the return time of investment by the same amount. Moreover, since our technique reduces power usage from the utility grid at peak tariff hours, it is one way to move toward a uniform consumption at the suppliers’ level that leads to better use and higher quality and stability.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Publication Date: 2015-06-02
    Description: In vehicular networks, since reliable end-to-end paths between data source and destination seldom exist, replication-based routing protocols are widely used to increase the delivery ratio and reduce the transfer delay. However, after a data message is delivered, its replicas still exist and greatly waste network resources, such as transmission bandwidth and storage spaces. In mobile multimedia communications, the large size of multimedia data greatly aggravates this situation. In this paper, we propose a GPS-based replica deletion scheme with anti-packet distribution for vehicular networks, namely RAD. It utilizes vehicle-to-vehicle and vehicle-to-roadside-unit communications to remove redundant data replicas by a certain number of anti-packets. A roadside unit at each crossing distributes its collected anti-packets to nearby vehicles moving for different directions according to the geographical locations of the to-be-deleted targets. This distribution increases the delivery probability of these anti-packets. Experiment results in a real taxi network show that, compared with others, RAD accelerates replica deletion with less extra overhead
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Publication Date: 2015-05-30
    Description: A model combining qualitative and historical quantitative data in an innovative rule-based fuzzy cognitive map framework is used to assess and compare the long-term bioeconomic impact of adopting gear modifications aimed at reducing bycatch in the Portuguese crustacean trawl fishery. The impact of codend-related changes (mesh size and shape) and the introduction of a sorting device (sorting grid system) on the main target crustacean species (deepwater rose shrimp Parapenaeus longirostris and Norway lobster Nephrops norvegicus ) and the main fish bycatch species (blue whiting Micromesistius poutassou , horse mackerel Trachurus trachurus , and European hake Merluccius merluccius ) were evaluated. Horse mackerel was the only fish species for which changing codends negatively affected landings per unit of effort by large percentages. The use of a sorting grid system, only evaluated for blue whiting and Norway lobster, led to a strong decrease in landings per unit of effort, especially for the former species. The impact of gear alterations was negligible on fish spawning-stock biomass, but was significant for crustaceans, particularly rose shrimp. A straightforward evaluation of the economic impact (fishers' revenues) of the three bycatch reduction options showed these to be negligible or small.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Publication Date: 2015-05-30
    Description: The difficulty of ensuring adequate statistical coverage of whole fleets is a challenge for the implementation of observer programmes and may reduce the usefulness of the data they obtain for management purposes. This makes it necessary to find cost-effective alternatives. Electronic monitoring (EM) systems are being used in some fisheries as an alternative or a complement to human observers. The objective of this study was to test the use and reliability of EM on the tropical tuna purse-seine fishery. To achieve this objective, seven trips of tuna purse seiners operating in the three Oceans were closely monitored to compare the information provided by EM and on-board observers to determine if EM can reliably document fishing effort, set type, tuna catch, and bycatch. Total tuna catch per set was not significantly different between EM and observer datasets; however, regarding species composition, only main species matched between EM and observers. Success on set-type identification using EM varied between 98.3 and 56.3%, depending on the camera placement. Overall, bycatch species were underestimated by EM, but large bodied species, such as billfishes, were well documented. The analyses in this study showed that EM can be used to determine the fishing effort (number of sets) and total tuna catch as reliably as observers can. Set-type identification also had very promising results, but indicated that refinement of the methods is still needed. To be fully comparable with observer data, improvements for accurately estimating the bycatch will need to be developed in the application and use of the EM system. Operational aspects that need to be improved for an EM programme to be implemented include standardizing installation and on-board catch handling methodology as well as improvements in video technology deployment.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Publication Date: 2015-05-30
    Description: In this paper, we synthesize information presented at the 2nd Fishery Dependent Information (FDI) Conference, held in Rome, Italy, from 2 to 6 March 2014. We review current issues and advances in the collection, interpretation and application of fishery-dependent data, and highlight emergent findings in the field. Key issues include (i) the design and collection of data associated with commercial and recreational fisheries and the use of these data to support conventional and novel approaches to fisheries science and management and (ii) the role of fishers in co-management and policy setting. We noted that since the 2010 FDI conference a paradigm shift towards full engagement of key stakeholders started to take place. It also became evident that trust between stakeholders, managers, and scientists is necessary to develop efficient fishery monitoring programmes. While building such trust among key players often begins in informal settings, eventually one must evolve structured, formalized, and agreed processes for such interactions. We also conclude that because of the diversity of fisheries any determination of "best practices" may be difficult. Instead, we provide a list of "best principles" emerged from the conference.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Publication Date: 2015-05-30
    Description: The walleye pollock ( Gadus chalcogrammus ) fishery in the Bering Sea is one of the largest fisheries in the world. The North Pacific Fishery Management Council (NPFMC) provides management advice for this fishery, including the development of measures to minimize salmon bycatch to the extent practicable, one of the stated objectives of the US Magnuson–Stevens Fishery Conservation and Management Act National Standard Guidelines. Salmon have a unique cultural and nutritional importance in the State of Alaska and are the subject of fully allocated mixed commercial, recreational, and subsistence fisheries. Chinook salmon ( Oncorhynchus tshawytscha ) stocks in Alaska have been declining for the last decade, and all sources of mortality are being considered to help in rebuilding stocks. Given the extensive scientific National Marine Fisheries Service observer data collection programme, the NPFMC has developed bycatch management measures that place limits by fishery sector on the allowable catch of Chinook salmon. Part of this programme includes industry-proposed incentive programmes designed to encourage lower bycatch. Evaluating the efficacy of the new measures poses a number of challenges, particularly in light of changing ocean conditions (perhaps affecting the degree of overlap between pollock and salmon). In this study, data on pre- and post-programme implementation were evaluated to determine if the programme is meeting stated goals and objectives or if modifications are needed. These evaluations included consideration of fleet-level bycatch numbers and rates, seasonality of bycatch by sector, and individual vessel bycatch rates. Results suggest that revised management regulations appear to have resulted in reduced bycatch of salmon overall. Also, lower bycatch rates seem to reflect changing behaviour in response to new management measures. However, the extent to which the programme is effective at the vessel level remains difficult to ascertain without explicit vessel-specific benchmarks developed for evaluating programme efficacy.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Publication Date: 2015-05-30
    Description: Part of the European Union (EU) Common Fisheries Policy revision of 2013 is a commitment to implement a land-all policy, under which the practice of discarding caught fish back into the sea will be forbidden. This measure will be applied first to the pelagic fleet in 2015, with a phased implementation for the demersal fleet between 2016 and 2019. As part of trials to determine the efficacy of a land-all policy for North Sea cod ( Gadus morhua L.), Remote Electronic Monitoring (REM) systems were installed on seven Scottish demersal vessels in 2008. Vessels were permitted additional days-at-sea and cod quota, and were obliged to land all cod caught in the North Sea. This arrangement has been renewed each year as part of the Scottish Cod Conservation Credits scheme, and while the list of vessels involved has not remained constant, the scheme remains attractive to skippers (27 vessels in 2014), has always been oversubscribed, and is likely to remain a key part of the Scottish Government's approach to land-all enforcement. Marine Scotland Science is granted access to all REM data collected from Scottish vessels. This paper summarizes the scientific analyses carried out using these data from 2008 onwards, including the installation and operation of REM systems for scientific purposes; the programme developed to train REM analysts; systems for combining length measurements with fish counts; the potential use of REM data in management advice; and studies on such aspects as discard-rate estimation, activity mapping, estimating the relative costs of on-board and REM observation, morphometric length inference, and automated image analysis. We conclude that, while further development work is certainly needed, REM provides a rich source of fisheries information for science as well as for compliance and management. However, care will need to be taken to ensure that science monitoring and analysis resources do not become overwhelmed.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Publication Date: 2015-05-30
    Description: Chinook salmon ( Oncorhynchus tshawytscha ) are taken as bycatch in the Bering Sea pollock ( Gadus chalcogrammus ) fishery, with recently revised management measures in place to limit the overall Chinook salmon catch. Historical impact of the bycatch on regional salmon stocks is made difficult because, until recently, sampling for the stock composition of the bycatch was patchy and diverse in approaches. In this study, extensive observer data on the biological attributes (size and age composition) of the bycatch were used to estimate the impact on specific regional stock groups (RSGs), as defined given available genetic stock identification estimates. Our model provides estimates of the impact on Chinook salmon RSGs, given seasonal and spatial variability in the bycatch, and accounts for observed in-river age compositions, uncertainty in age-specific oceanic natural mortality of Chinook salmon, and between-year variability in genetic information. The upper Yukon River stock is transboundary and subject to heightened management interest and international management agreements on escapement goals. Our study updates results from an earlier analysis used to develop the management regulations that went into place in 2011. It shows that the new data result in slight changes in previous estimates, and that the lower overall Chinook salmon bycatch since 2008 has resulted in lower impacts to the main western Alaskan RSGs.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Publication Date: 2015-05-30
    Description: Change is an important feature of commercial fisheries; yet the fishing industry, including fishers, fishery management authorities, and other stakeholders, is, in many respects, highly resistant to change. Examples of this include the application of conservation engineering solutions to bycatch problems and transitions towards ecosystem-based fishery management. A key reason for this resistance may be conditioning, cultural conservatism, and uncertainty. Change is often considered uncontrollable and unpredictable and a threat to established processes and systems that forces individuals to face an unknown future. In the business world, many models of change management have been applied to assist individuals and corporations in responding to an ever-changing environment. While fragments of these models have been applied in a fisheries context, the deliberate application of entire models has not. The application of these models could help to improve many aspects of fishery-dependent data collection such as using fishery-dependent information in stock assessment, implementing technologies such as vessel monitoring systems and electronic logbooks, and sharing information that is traditionally not shared. We present a well-known model for change management and describe how its application in a fisheries context can guide change initiatives and produce enhanced outcomes. We also explore how competing commitments and big assumptions influence a fisher's resistance to change, including conservation engineering initiatives, and posit how this can influence their involvement in the collection of fishery-dependent data.
    Print ISSN: 1054-3139
    Electronic ISSN: 1095-9289
    Topics: Biology , Geosciences , Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Publication Date: 2015-06-02
    Description: The uncertainty and extreme large scale of cloud resources make task scheduling very difficult which affects the user quality of experience and probably result in a waste of cloud resources and energy consumption. Moreover, some resources stay in an unusable state for extended time. To take into account these problems a cloud resource evaluation model is proposed, termed Entropy Optimization Evaluation and ant colony clustering Model (EOEACCM). The model releases long-term unavailable resources to save energy. First, by mean of the entropy increasing minimum principle, the proposed model can maximize the system utilization and balance profits of both cloud resource providers and users. As a consequence, it can shorten task completion time. Secondly, the model narrows the task scheduling size and achieves optimal scheduling by clustering. To make the model more suitable for the dynamics of cloud resources, the model design improves pheromone update policies by fixing total path length in each function cycle when clustering by the ant colony algorithm. Evaluation of results using EOEACCM demonstrate that it may be applicable for resource management strategies for migration and release, an application which can effectively save energy. The proposed model was evaluated by simulation. Experiment results showed the positive effect of user satisfaction from entropy optimization, as well as scheduling time from clustering. Moreover, when the scale of tasks was large, this clustering algorithm performed much better than others. The clustering model also demonstrated better adaptability when some cloud resources were joined or terminated.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Publication Date: 2015-06-02
    Description: To support the sustainable operation of wireless sensor networks using limited energy, duty cycling is a promising solution. However, it is a challenge to guarantee each node communicating with its neighbors under duty cycle when the network is asynchronous. The challenge becomes bigger when nodes’ duty cycles are required to be adjusted separately according to their demands to save energy and achieve high channel utilization. Existing low power listening- and contention-based protocols are not energy-efficient and cannot ensure high channel utility. Additionally, synchronization-based media access control (MAC) protocols suffer from extra energy consumption and low synchronization precision. This paper proposes a localized and on-demand (LOD) duty cycling scheme based on a specifically designed semi-quorum system. LOD can adjust duty cycle of each node adaptively according to its demand so as to avoid channel contention, consequently achieving high channel utilization. This allows the fairness for channel access within asynchronous sensor networks. Extensive experiments are conducted on a real test-bed of 100 TelosB nodes to evaluate the performance of LOD. As compared with B-MAC, LOD substantially reduces contention for channel access and the energy consumption, thus improving the network throughput significantly.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Publication Date: 2015-06-02
    Description: Recently, wireless sensor networks (WSNs) have been widely used in many applications, such as Smart Grid. However, it is generally known that WSNs are energy limited, which makes WSNs vulnerable to malicious attacks. Among these malicious attacks, a sinkhole attack is the most destructive one, since only one sinkhole node can attract surrounding nodes with unfaithful routing information, and it executes severe malicious attacks, e.g. the selective forwarding attack. In addition, a sinkhole node can cause a large amount of energy wastes of surrounding nodes, which results in abnormal energy hole in WSNs. Thus, it is necessary to design an effective mechanism to detect the sinkhole attack. In this paper, we propose a novel Intrusion Detection Algorithm based on neighbor information against Sinkhole Attack (IDASA). Different from traditional intrusion detection algorithms, IDASA takes full advantage of neighbor information of sensor nodes to detect sinkhole nodes. In addition, we evaluate IDASA in terms of malicious node detection accuracy, packet loss rate, energy consumption and network throughput in MATLAB. Simulation results show that the performance of IDASA is better than that of other related algorithms.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Publication Date: 2015-06-02
    Description: Loosely coupled and cross-platform features make Web services accessible and increasingly popular on the Internet. However, efficient service discovery and automated service composition are still challenges under the conventional practice where services are organized into categories. In this paper, we propose a graph-based method to organize Web services into a service ecosystem interlaced with service relationships at the semantic level. First, Web services are modelled as a set of interfaces, whose input and output parameters are annotated with well-defined ontologies. Secondly, semantic associations and interactions between Web services are mined, and services are constructed into a Web services network (SN), a variant of bipartite graph, by projecting the functional aspects of concrete Web services onto the abstract service layer. Thirdly, from the complex network perspective, the services relations are investigated and the structure of SN is analysed. To demonstrate the basic topological properties of SN, an empirical study is conducted on two data sets for comparative purposes, 10 000+ Web services collected from the Internet and 1231 Web services provided by Titan system of Zhejiang University. The experimental results reveal that SNs, which are built by different data sets on the semantic level, exhibit the same features such as small-world and scale-free. In addition, our results yield valuable insight for developing service discovery and automated composition algorithms, and characterizing the evolution of the entire Web service ecosystem.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Publication Date: 2015-06-02
    Description: Mixed Polarity Reed-Muller (MPRM) logic draws more and more attention for its advantages over Boolean logic. This paper works on power optimization in logic synthesis for MPRM logic circuits. We present a power estimation model for MPRM logic circuits from a probabilistic point of view. A key feature of this technique is that it provides an accurate and efficient way to handle temporal signal correlations during estimation of average power by using lag-one Markov chains. Besides, an ordered binary decision diagrams-based procedure is used to propagate the temporal correlations from the primary inputs throughout the network. At last, this power estimation model is used in low power synthesis for MPRM logic circuits. This model has been evaluated in C language and a comparative analysis has been presented for many benchmark circuits. The results show that this model gives very good accuracy and does well in low power design for MPRM logic circuit.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Publication Date: 2015-06-02
    Description: Energy demand in a smart grid is directly related to energy consumption, as defined by user needs and comfort experience. This article presents a multi-agent architecture for smart control of space heating and cooling processes, in an attempt to enable flexible ways of monitoring and adjusting energy supply and demand. In this proposed system, control agents are implemented in order to perform temperature set-point delegation for heating and cooling systems in a building, offering a means to observe and learn from both the environment and the occupant. Operation of the proposed algorithms is compared with traditional algorithms utilized for room heating, using a simulated model of a residential building and real data about user behaviour. The results show (i) the performance of machine learning for the occupancy forecasting problem and for the problem of calculating the time to heat or cool a room; and (ii) the performance of the control algorithms, with respect to energy consumption and occupant comfort. The proposed control agents make it possible to significantly improve an occupant comfort with a relatively small increase in energy consumption, compared with simple control strategies that always maintain predefined temperatures. The findings enable the smart grid to anticipate the energy needs of the building.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Publication Date: 2015-06-02
    Description: Environment reconstruction is to rebuild the physical environment in the cyberspace using the sensory data collected by sensor networks, which is a fundamental method for human to understand the physical world in depth. A lot of basic scientific work such as nature discovery and organic evolution heavily relies on the environment reconstruction. However, gathering large amount of environmental data costs huge energy and storage space. The shortage of energy and storage resources has become a major problem in sensor networks for environment reconstruction applications. Motivated by exploiting the inherent feature of environmental data, in this paper, we design a novel data gathering protocol based on compressive sensing theory and time series analysis to further improve the resource efficiency. This protocol adapts the duty cycle and sensing probability of every sensor node according to the dynamic environment, which cannot only guarantee the reconstruction accuracy, but also save energy and storage resources. We implement the proposed protocol on a 51-node testbed and conduct the simulations based on three real datasets from Intel Indoor, GreenOrbs and Ocean Sense projects. Both the experiment and simulation performances demonstrate that our method significantly outperforms the conventional methods in terms of resource efficiency and reconstruction accuracy.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Publication Date: 2015-06-02
    Description: Computing network paths under worst-case delay constraints has been the subject of abundant literature in the past two decades. Assuming weighted fair queueing scheduling at the nodes, this translates to computing paths and reserving rates at each link. The problem is NP -hard in general, even for a single path; hence polynomial-time heuristics have been proposed in the past that either assume equal rates at each node, or compute the path heuristically and then allocate the rates optimally on the given path. In this paper we show that the above heuristics, albeit finding optimal solutions quite often, can lead to failing of paths at very low loads, and that this could be avoided by solving the problem, i.e. path computation and rate allocation, jointly at optimality . This is possible by modeling the problem as a mixed-integer second-order cone program and solving it optimally in split-second times for relatively large networks on commodity hardware; this approach can also be easily turned into a heuristic one, trading a negligible increase in blocking probability for one order of magnitude of computation time. Extensive simulations show that these methods are feasible in today's Internet service provider networks and they significantly outperform the existing schemes in terms of blocking probability.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Publication Date: 2015-06-02
    Description: There is considerable evidence that exposure to air pollution is harmful to health. In the USA, ambient air quality is monitored by Federal and State agencies for regulatory purposes. There are limited options, however, for people to access this data in real time, which hinders an individual's ability to manage their own risks. This paper describes a new software package that models environmental concentrations of fine particulate matter (PM 2.5 ), coarse particulate matter (PM 10 ) and ozone concentrations for the state of Oregon and calculates personal health risks at the smartphone's current location. Predicted air pollution risk levels can be displayed on mobile devices as interactive maps and graphs color-coded to coincide with Environmental Protection Agency air quality index categories. Users have the option of setting air quality warning levels via color-coded bars and are notified whenever warning levels are exceeded by predicted levels within 10 km. We validated the software using data from participants as well as from simulations, which showed that the application was capable of identifying spatial and temporal air quality trends. This unique application provides a potential low-cost technology for reducing personal exposure to air pollution which can improve quality of life, particularly for people with health conditions, such as asthma, that make them more susceptible to these hazards.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Publication Date: 2015-06-02
    Description: IP address lookup modules for backbone routers should store 100Ks of entries, find the longest prefix match (LPM) for each incoming packet at 10s of Gbps line speed and support thousands of lookup table (LUT) updates each second. It is desired that these updates are non-blocking , that is without disrupting the ongoing lookups. Furthermore, considering the increasing line rates and table sizes, the scalability of the design is very important. Ternary content-addressable memory (TCAM) architectures are widely deployed for hardware IP lookup. In this paper, we propose a novel TCAM architecture, S-DIRECT-Scalable and Dynamically REConfigurable TCAM , that is custom designed for hardware IP lookup. S-DIRECT consists of hierarchically combined TCAM cells with inherent priority encoders (PEs) to support LPM. Hence, its design is scalable without any need for a separate PE or a redesign for different table size. Furthermore, S-DIRECT can perform constant time, non-blocking updates in hardware provided that certain write capabilities are present in the TCAM entries. S-DIRECT architecture is both independent of the hardware platform and the implementation of the TCAM cells. We demonstrate the generality and viability of S-DIRECT by implementing it both with prefix/mask register and LUT-based TCAM cells on FPGA.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Publication Date: 2015-06-02
    Description: The IEEE 802.11 standard defines access categories (AC) and differentiated medium access control mechanisms for wireless local area networks. The preferential or deferral treatment of frames is achieved using configurable Arbitration Inter-Frame Spaces (AIFS) and customizable Contention Window (CW) sizes. In this paper, we address the problem of determining when a station, being a part of wireless communication, will access the medium. We present an algorithm calculating the probability of winning the contention by a given station, characterized by its AIFS and CW values. The probability of collision is calculated by similar means. The results were verified by simulations in Matlab and OPNET Modeler tools. We also introduce a web applet implementing and interactively demonstrating the results.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...