Sök:

Sökresultat:

124 Uppsatser om Predator attacks - Sida 1 av 9

Do prey-animals in zoos need predators?

Today is one of the goals with zoos to conserve endangered species and some animals may also become reintroduced. But behaviours can change in generations of captive animals because of environments that differ from the wild. Animals must then be prepared before being reintroduced and predator training enhances the animal?s chance to survive in the wild. When training animals to avoid predators it is often necessary to use frightening stimuli.

Illegal rovdjursjakt : en rättsekonomisk analys av rovdjursproblematiken i Sverige

In this essay a model of a potential illegal hunter?s decision-making is created and presented in order to provide an overview of important parts of the complexities associated with the current Swedish predator policy. A comparison is made between a livestock owner?s economic incentives, and the expected costs faced by the potentially caught lawbreaker. In accordance with economic theory the benefits and costs of illegal hunting are compared and thus the optimal choice is determined where marginal costs and benefits are equal.

Successiv avtalsbundenhet : En beskrivning av modellen och dess närvaro i svensk rättspraxis

Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished?Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means.

Strategisk bombning i cyberspace

Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished?Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means.

Kan fiskpredation reglera populationer av storspigg (Gasterosteus aculeatus) i Östersjön?

Fiskbestånden i Östersjön har sedan början av 1980-talet genomgått en omfattande förändring. Stora predatorer, som torsk (Gadus morhua) och abborre (Perca fluviatilis) har minskat i antal medan det finns tecken på att storspigg (Gasterosteus aculeatus) har ökat. Denna sannolika ökning av storspigg skulle kunna ha att göra med minskningen av både torsk och abborre som predatorer i de kustnära tångbältena. För att undersöka detta utfördes ett mesokosmexperiment där torskens och abborrens förmåga att predera på storspigg undersöktes, både i ljus och mörker. Hypoteserna som arbetet utgick ifrån var att torsk var en bättre predator i mörker än i ljus och att torsk var en bättre predator än abborre i mörker.Resultaten visar på att torsk är den bättre predatorn i både ljus och mörker, samt att den är lika framgångsrik i mörker som i ljus.

Predatorinducerad fekunditet hos Daphnia pulex vid simulerade årstidsbundna temperaturvariationer

Female growth, number of eggs and egg growth of Daphnia pulex were studied at four temperatures, 12, 16, 18 and 20°C. I hypothesized that female growth and number of eggs would be lower and the size of the eggs larger in the presence of a predator (kairomones) than in its absence. This effect was expected to be more evident at lower temperatures. I could not find any effect of kairomones on female growth, number of eggs or egg size, although there was a weak tendency for an effect on number of eggs. There was, however, an effect of temperature, regardless of predator treatment (i.

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Testprogram till hårdvara på en viktindikator

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

DDoS : -Vad är det och går det att skydda sig?

This paper will expose the serious phenonomen Distributed Denial of Service (DDoS). Businesses without a good security policy are easy targets for attackers. We will cover why its hard to protect yourself, present previous attacks and ways for individuals and businesses to secure themselves. We have based our paper on previous cases and done intervjues with companies who specialize in dealing with these kind of threats. Then come up with guidelines wich will be helpful for businesses when they want to strengthen there security against Distributed Denial of Service-attacks..

Rovdjursproblematik i Sverige med fokus på varg och får. Vilka lösningar finns?

The Swedish wolf population is like continue to grow and this will eventually lead to an increase in the predation of livestock. In Sweden carnivore attacks happen most frequent on sheep farms and the majority of these attacks are performed by wolves. Because of this, the main focus in this study is on the sheep and wolf problematic. It is not only the direct killing of livestock that affects the animals and their owners in a negative way. It has also been shown that livestock that lives close to carnivores sometimes change their behaviour in a way that will affect their ability to reproduce and to forage efficiently.

Säkerhet i det trådlösa hemnätverket ? En analys av de vanligaste säkerhetslösningarna

The security solutions used in wireless home networks are examined in this report. Thegrowing number of wireless units have increased the need for reliable security solutions.This report aims to enlighten the reader about the fundamental technology used inwireless security solutions and inform about the existing flaws. A recommendationabout how to achieve a high level of security in the home network is also given to thereader.Several flaws in the security solutions in use have been reported. Of these the mostsevere has been examined in a test network using highly accessible tools to get aperception of how vulnerable the user is.The tests showed that several attacks were efficient and easily carried out. We have alsoseen that several of the home networks in our sample are susceptible to these attacks.Our survey revealed that the Internet service provider's technical support in many caseslacked the knowledge necessary to inform the user about reliable security solutions..

Utvärdering av röstträning på logopedprogrammet i Göteborg

The purpose of this study was to examine if there were anychanges in quality in the voices of speech and language pathology studentsafter four years of study at the University of Gothenburg. Recordings oftwenty student voices from the first and eight semesters were evaluatedperceptually by six speech-language pathologists. The parameters judgedwere: vocal fry, glottal attacks, strain, breathiness and resonant voice, usinga scale from 0 to 10. Acoustical measures were made of F0 mean andmedian to detect possible differences between the two recordings. Theresults show a significant decrease in vocal fry, glottal attacks and strain aswell as an increase in resonant voice and a significant decrease in F0 meanand median.

"Ett lugnt hörn när det är kaos i världen" : en studie om varför barnprogrammet Bolibompa ser ut som det gör under och dagarna efter en katastrof

This study intends to examine why the Swedish children?s programme Bolibompa is produced the way it is during a larger catastrophe. Our intention was to find out how the editorial staff, in the children?s department in the public service television of Sweden (SVT),was handling the Estonia disaster, the September 11 attacks and the Asian Tsunami. To accomplish that, we first had to find out how the children?s programme looked during these catastrophes and also understand how the editorial staff was working with children?s programme during ordinary days.To achieve our purpose we have been interviewing five persons from SVT, who was involved in producing the children?s programme during these three catastrophes.

1 Nästa sida ->