Philopatry and Migration of Pacific White Sharks
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Dispersal, Philopatry, and the Role of Fissionfusion Dynamics In
MARINE MAMMAL SCIENCE, **(*): ***–*** (*** 2012) C 2012 by the Society for Marine Mammalogy DOI: 10.1111/j.1748-7692.2011.00559.x Dispersal, philopatry, and the role of fission-fusion dynamics in bottlenose dolphins YI-JIUN JEAN TSAI and JANET MANN,1 Reiss Science Building, Rm 406, Department of Biology, Georgetown University, Washington, DC 20057, U.S.A. ABSTRACT In this quantitative study of locational and social dispersal at the individual level, we show that bottlenose dolphins (Tursiops sp.) continued to use their na- tal home ranges well into adulthood. Despite substantial home range overlap, mother–offspring associations decreased after weaning, particularly for sons. These data provide strong evidence for bisexual locational philopatry and mother–son avoidance in bottlenose dolphins. While bisexual locational philopatry offers the benefits of familiar social networks and foraging habitats, the costs of philopatry may be mitigated by reduced mother–offspring association, in which the risk of mother–daughter resource competition and mother–son mating is reduced. Our study highlights the advantages of high fission–fusion dynamics and longitudinal studies, and emphasizes the need for clarity when describing dispersal in this and other species. Key words: bottlenose dolphin, Tursiops sp., association, juvenile, philopatry, locational dispersal, mother-offspring, ranging, site fidelity, social dispersal. Dispersal is a key life history process that affects population demography, spatial distribution, and genetic structure, as well as individual -
Seed Maturity in White Fir and Red Fir. Pacific Southwest Forest and Range Exp
PACIFIC SOUTHWEST Forest and Range FOREST SERVICE U. S. DEPARTMENT OF AGRICULTURE P.O. BOX 245, BERKELEY, CALIFORNIA 94701 Experiment Station USDA FOREST SERVICE RESEARCH PAPER PSW-99 /1974 CONTENTS Page Summary ................................................... 1 Introduction ................................................. 3 Methods .................................................... 3 Testing Fresh Seeds ....................................... 3 Testing Stratified Seeds .................................... 3 Seedling Vigor Tests ...................................... 4 Artificial Ripening Trial ................................... 4 Other Observations ........................................ 4 Results and Discussion ....................................... 5 Cone Specific Gravity ..................................... 5 Seed Germination, byCollection Date ....................... 5 Seed GerminationandCone Specific Gravity ................ 7 Red Fir Seedling Vigor .................................... 9 ArtificialRipening of White Fir Seeds ....................... 9 OtherMaturity Indices ..................................... 9 Application ................................................. 10 Literature Cited.............................................. 12 THE AUTHOR WILLIAM W. OLIVER is doing silvicultural research on Sierra Nevada conifer types with headquarters at Redding, California. He earned a B.S. degree (1956) in forestry from the University of New Hampshire, and an M.F. degree (1960) from the University of Michigan. A native of -
Report on the AES Candidates
Rep ort on the AES Candidates 1 2 1 3 Olivier Baudron , Henri Gilb ert , Louis Granb oulan , Helena Handschuh , 4 1 5 1 Antoine Joux , Phong Nguyen ,Fabrice Noilhan ,David Pointcheval , 1 1 1 1 Thomas Pornin , Guillaume Poupard , Jacques Stern , and Serge Vaudenay 1 Ecole Normale Sup erieure { CNRS 2 France Telecom 3 Gemplus { ENST 4 SCSSI 5 Universit e d'Orsay { LRI Contact e-mail: [email protected] Abstract This do cument rep orts the activities of the AES working group organized at the Ecole Normale Sup erieure. Several candidates are evaluated. In particular we outline some weaknesses in the designs of some candidates. We mainly discuss selection criteria b etween the can- didates, and make case-by-case comments. We nally recommend the selection of Mars, RC6, Serp ent, ... and DFC. As the rep ort is b eing nalized, we also added some new preliminary cryptanalysis on RC6 and Crypton in the App endix which are not considered in the main b o dy of the rep ort. Designing the encryption standard of the rst twentyyears of the twenty rst century is a challenging task: we need to predict p ossible future technologies, and wehavetotake unknown future attacks in account. Following the AES pro cess initiated by NIST, we organized an op en working group at the Ecole Normale Sup erieure. This group met two hours a week to review the AES candidates. The present do cument rep orts its results. Another task of this group was to up date the DFC candidate submitted by CNRS [16, 17] and to answer questions which had b een omitted in previous 1 rep orts on DFC. -
Development of the Advanced Encryption Standard
Volume 126, Article No. 126024 (2021) https://doi.org/10.6028/jres.126.024 Journal of Research of the National Institute of Standards and Technology Development of the Advanced Encryption Standard Miles E. Smid Formerly: Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD 20899, USA [email protected] Strong cryptographic algorithms are essential for the protection of stored and transmitted data throughout the world. This publication discusses the development of Federal Information Processing Standards Publication (FIPS) 197, which specifies a cryptographic algorithm known as the Advanced Encryption Standard (AES). The AES was the result of a cooperative multiyear effort involving the U.S. government, industry, and the academic community. Several difficult problems that had to be resolved during the standard’s development are discussed, and the eventual solutions are presented. The author writes from his viewpoint as former leader of the Security Technology Group and later as acting director of the Computer Security Division at the National Institute of Standards and Technology, where he was responsible for the AES development. Key words: Advanced Encryption Standard (AES); consensus process; cryptography; Data Encryption Standard (DES); security requirements, SKIPJACK. Accepted: June 18, 2021 Published: August 16, 2021; Current Version: August 23, 2021 This article was sponsored by James Foti, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST). The views expressed represent those of the author and not necessarily those of NIST. https://doi.org/10.6028/jres.126.024 1. Introduction In the late 1990s, the National Institute of Standards and Technology (NIST) was about to decide if it was going to specify a new cryptographic algorithm standard for the protection of U.S. -
Symmetric Encryption: AES
Symmetric Encryption: AES Yan Huang Credits: David Evans (UVA) Advanced Encryption Standard ▪ 1997: NIST initiates program to choose Advanced Encryption Standard to replace DES ▪ Why not just use 3DES? 2 AES Process ▪ Open Design • DES: design criteria for S-boxes kept secret ▪ Many good choices • DES: only one acceptable algorithm ▪ Public cryptanalysis efforts before choice • Heavy involvements of academic community, leading public cryptographers ▪ Conservative (but “quick”): 4 year process 3 AES Requirements ▪ Secure for next 50-100 years ▪ Royalty free ▪ Performance: faster than 3DES ▪ Support 128, 192 and 256 bit keys • Brute force search of 2128 keys at 1 Trillion keys/ second would take 1019 years (109 * age of universe) 4 AES Round 1 ▪ 15 submissions accepted ▪ Weak ciphers quickly eliminated • Magenta broken at conference! ▪ 5 finalists selected: • MARS (IBM) • RC6 (Rivest, et. al.) • Rijndael (Belgian cryptographers) • Serpent (Anderson, Biham, Knudsen) • Twofish (Schneier, et. al.) 5 AES Evaluation Criteria 1. Security Most important, but hardest to measure Resistance to cryptanalysis, randomness of output 2. Cost and Implementation Characteristics Licensing, Computational, Memory Flexibility (different key/block sizes), hardware implementation 6 AES Criteria Tradeoffs ▪ Security v. Performance • How do you measure security? ▪ Simplicity v. Complexity • Need complexity for confusion • Need simplicity to be able to analyze and implement efficiently 7 Breaking a Cipher ▪ Intuitive Impression • Attacker can decrypt secret messages • Reasonable amount of work, actual amount of ciphertext ▪ “Academic” Ideology • Attacker can determine something about the message • Given unlimited number of chosen plaintext-ciphertext pairs • Can perform a very large number of computations, up to, but not including, 2n, where n is the key size in bits (i.e. -
Critical Assessment of Reaction Mechanisms Using the Lisbon Kinetics Tool Suit
XXXIV ICPIG & ICRP-10, July 14-19, 2019, Sapporo, Hokkaido, Japan Critical assessment of reaction mechanisms using the LisbOn KInetics tool suit 1 1 1 2 P P P P P A. Tejero-del-Caz P , V.U Guerra UP , M. Lino da Silva P , L. Marques P , 1 1,3 1 1 P P P N. Pinhão P , C. D. Pintassilgo P , T. Silva P and L. L. Alves P 1 P P Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, Av. Rovisco Pais, Lisboa, Portugal 2 P P Centro de Física da Universidade do Minho, Campus de Gualtar, Braga, Portugal 3 P P Faculdade de Engenharia da Universidade do Porto, Porto, Portugal This work uses the LisbOn KInetics (LoKI) tool suit to perform a critical assessment and correction of the collisional, radiative and transport mechanisms and data describing the kinetics of several gas/plasma systems. LoKI comprises two modules: a Boltzmann solver, LoKI-B (to become open- source), and a chemistry solver, LoKI-C. Both modules can run as standalone tools or coupled in a self-consistent manner. LoKI handles simulations in any atomic / molecular gas mixture, considering collisions with any target state (electronic, vibrational and rotational), specified in the reaction mechanism adopted. As output, the tool provides the electron energy distribution function and the corresponding electron macroscopic parameters, along with the densities of species and the corresponding creation / destruction rates. 1. Introduction for the heavy species (charged and neutral) present in Predictive tools for non-equilibrium low- the plasma, receiving as input data the KIT(s) for the temperature plasmas (LTPs) should properly describe gas/plasma system under study, and using several the kinetics of both the electrons and the heavy- modules to describe the mechanisms (collisional, species, the former responsible for inducing plasma radiative and transport) controlling the creation / reactivity and the latter providing the pathways for destruction of species. -
University of Groningen Sociable Schedules Helm, Barbara
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Groningen University of Groningen Sociable schedules Helm, Barbara; Piersma, Theunis; Van der Jeugd, Henk Published in: Animal Behavior DOI: 10.1016/j.anbehav.2005.12.007 IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document version below. Document Version Publisher's PDF, also known as Version of record Publication date: 2006 Link to publication in University of Groningen/UMCG research database Citation for published version (APA): Helm, B., Piersma, T., & Van der Jeugd, H. (2006). Sociable schedules: interplay between avian seasonal and social behaviour. Animal Behavior, 72(2), 245-262. https://doi.org/10.1016/j.anbehav.2005.12.007 Copyright Other than for strictly personal use, it is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license (like Creative Commons). Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Downloaded from the University of Groningen/UMCG research database (Pure): http://www.rug.nl/research/portal. For technical reasons the number of authors shown on this cover page is limited to 10 maximum. Download date: 12-11-2019 ANIMAL BEHAVIOUR, 2006, 72, 245e262 doi:10.1016/j.anbehav.2005.12.007 REVIEWS Sociable schedules: interplay between avian seasonal and social behaviour BARBARA HELM*,THEUNISPIERSMA†‡ & HENK VAN DER JEUGD†§ *Max Planck Institute for Ornithology yAnimal Ecology Group, Centre for Ecological and Evolutionary Studies zDepartment of Ecology and Evolution, Royal Netherlands Institute for Sea Research (NIOZ) xSOVON Dutch Centre for Field Ornithology (Received 26 June 2004; initial acceptance 15 September 2004; final acceptance 6 December 2005; published online 21 June 2006; MS. -
Breeding Site Fidelity in Southern Elephant Seals of the Falkland Islands
Filippo Galimberti 1 and Simona Sanvito 1,2 1 Elephant Seal Research Group, Sea Lion Island, Falkland Islands 2 Dept. of Biology, Memorial University of Newfoundland, St. John’s NF A1B 3X9, Canada ESRG technical report no. 3 Breeding site fidelity in southern elephant seals of the Falkland Islands Milano, 25th April 2000 © Elephant Seal Research Group – 2000 No part of this report can be cited without written permission from the authors. Address for correspondence: Dr. Filippo Galimberti – Via Buonarroti 35 – 20145 Milano – Italy Phone +39 02 4980504 – Fax +39 02 48008145 – Email [email protected] ABSTRACT Breeding site fidelity, i.e., the tendency to return to the same breeding site for consecutive breeding attempts, is an important component of mammal life history strategies, and seems almost ubiquitous in Pinnipedia species, at least for land breeding ones. Site fidelity may entail significant somatic benefits and costs, and, if coupled with return for first breeding attempt to birth site, may produce a genetic sub-structuring of populations. We present data on female and male site fidelity, together with preliminary information on female phylopatry, of southern elephant seals (Mirounga leonina) of Sea Lion Island, the main breeding site of the species in the Falkland Islands. We found a high level of site fidelity at small scale (hundred of metres) in both sexes, although higher in females, even when considering up to five consecutive breeding seasons of the same individual. We discuss the behavioural and genetic implications of site fidelity, emphasizing that it may affect mating tactics, breeding success, and genetic sub-structuring of local populations. -
Author's Personal Copy
Author's personal copy Provided for non-commercial research and educational use. Not for reproduction, distribution or commercial use. This article was originally published in Encyclopedia of Animal Behavior, published by Elsevier, and the attached copy is provided by Elsevier for the author's benefit and for the benefit of the author's institution, for non-commercial research and educational use including without limitation use in instruction at your institution, sending it to specific colleagues who you know, and providing a copy to your institution's administrator. All other uses, reproduction and distribution, including without limitation commercial reprints, selling or licensing copies or access, or posting on open internet sites, your personal or institution’s website or repository, are prohibited. For exceptions, permission may be sought for such use through Elsevier’s permissions site at: https://www.elsevier.com/about/our-business/policies/copyright/permissions From Shen, S-F., Rubenstein, D.R. (2019). Environmental Uncertainty and Social Behavior. In: Choe, J.C. (Ed.), Encyclopedia of Animal Behavior, (2nd ed.). vol. 4, pp. 807–815. Elsevier, Academic Press. ISBN: 9780128132517 Copyright © 2019 Elsevier Ltd. All rights reserved. Academic Press Author's personal copy Environmental Uncertainty and Social Behavior Sheng-Feng Shen, Biodiversity Research Center, Academia Sinica, Taipei, Taiwan Dustin R Rubenstein, Columbia University, New York, NY, United States © 2019 Elsevier Ltd. All rights reserved. Glossary Cooperative breeding A form of social system in which more than two individuals care for your young. In most cooperatively breeding systems, some mature offspring delay dispersal, remain in their natal social groups, and often “help” raise the their parents’ offspring (their siblings) from subsequent breeding attempts. -
Bruce Schneier 2
Committee on Energy and Commerce U.S. House of Representatives Witness Disclosure Requirement - "Truth in Testimony" Required by House Rule XI, Clause 2(g)(5) 1. Your Name: Bruce Schneier 2. Your Title: none 3. The Entity(ies) You are Representing: none 4. Are you testifying on behalf of the Federal, or a State or local Yes No government entity? X 5. Please list any Federal grants or contracts, or contracts or payments originating with a foreign government, that you or the entity(ies) you represent have received on or after January 1, 2015. Only grants, contracts, or payments related to the subject matter of the hearing must be listed. 6. Please attach your curriculum vitae to your completed disclosure form. Signatur Date: 31 October 2017 Bruce Schneier Background Bruce Schneier is an internationally renowned security technologist, called a security guru by the Economist. He is the author of 14 books—including the New York Times best-seller Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World—as well as hundreds of articles, essays, and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over 250,000 people. Schneier is a fellow at the Berkman Klein Center for Internet and Society at Harvard University, a Lecturer in Public Policy at the Harvard Kennedy School, a board member of the Electronic Frontier Foundation and the Tor Project, and an advisory board member of EPIC and VerifiedVoting.org. He is also a special advisor to IBM Security and the Chief Technology Officer of IBM Resilient. -
Dispersal and Gene Flow in a Butterfly with Home Range Behavior: Heliconius Erato (Lepidoptera: Nymphalidae)
Oecologia (Berlin) (1986) 68:210-217 Oecologia Springer-Verlag1986 Dispersal and gene flow in a butterfly with home range behavior: Heliconius erato (Lepidoptera: Nymphalidae) James Mallet Department of Zoology, University of Texas, Austin, TX 78712, USA Summary. Heliconius butterflies have been found to have Endler (1977) and Barton and Hewitt (1981) used measures low rates of dispersal in previous mark-recapture studies, of dispersal to analyse processes in clines and hybrid zones and this lack of movement is due home-range behavior. but came to differing conclusions as to whether divergence An experiment on Heliconius erato was designed to investi- of the hybridizing taxa occurred during a past period of gate movement from the site of pupal eclosion. It was found isolation. Many of these controversies can be traced to inad- that most of the movement occurs before the first capture equate knowledge of natural gene flow. of an individual in a mark-recapture study. After incorpor- Although dispersal and gene flow have never previously ating this early movement, the dispersal parameter, a, is been measured in Heliconius, mark-recapture studies have estimated to be at least 296 m (+_ 30 m jackknifed standard shown low rates of movement. Individuals return daily to error), and the "neighborhood population size", N, is sites for adult and larval hostplants (Turner 1971 a; Ehrlich about 50-150 individuals. These estimates of a and N are and Gilbert 1973; Cook et al. 1976; Mallet and Jackson more than 2 and 5 times larger, respectively, than estimates 1980), and nightly to sites of gregarious roosting (Turner based on standard mark-recapture data, though they are 1971 a; Brown 1981 ; Waller and Gilbert 1982). -
Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
International Journal of Grid and Distributed Computing Vol. 10, No. 11 (2017), pp.79-98 http://dx.doi.org/10.14257/ijgdc.2017.10.11.08 Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1 Rahul Saha1, G. Geetha2, Gulshan Kumar3 and Hye-Jim Kim4 1,3School of Computer Science and Engineering, Lovely Professional University, Punjab, India 2Division of Research and Development, Lovely Professional University, Punjab, India 4Business Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of Korea Abstract Cryptography has always been a core component of security domain. Different security services such as confidentiality, integrity, availability, authentication, non-repudiation and access control, are provided by a number of cryptographic algorithms including block ciphers, stream ciphers and hash functions. Though the algorithms are public and cryptographic strength depends on the usage of the keys, the ciphertext analysis using different functions and operations used in the algorithms can lead to the path of revealing a key completely or partially. It is hard to find any survey till date which identifies different operations and functions used in cryptography. In this paper, we have categorized our survey of cryptographic functions and operations in the algorithms in three categories: block ciphers, stream ciphers and cryptanalysis attacks which are executable in different parts of the algorithms. This survey will help the budding researchers in the society of crypto for identifying different operations and functions in cryptographic algorithms. Keywords: cryptography; block; stream; cipher; plaintext; ciphertext; functions; research problems 1. Introduction Cryptography [1] in the previous time was analogous to encryption where the main task was to convert the readable message to an unreadable format.