scholarly journals Observations of Long-tailed Weasel, Mustela frenata, Hunting Behavior in Central West Virginia

2003 ◽  
Vol 117 (2) ◽  
pp. 313
Author(s):  
Brian W. Smith ◽  
Chris A. Dobony ◽  
John W. Edwards ◽  
W. Mark Ford

Using infrared video-surveillance systems during 1999–2000, we observed attempts by two individual Long-tailed Weasels (Mustela frenata) to depredate female Ruffed Grouse (Bonasa umbellus) and their clutch of eggs. Neither female was captured despite Long-tailed Weasel attacks on multiple nights, but all eggs from one nest were either consumed or cached over a two-night period. Although Long-tailed Weasels have been shown to return quickly to areas of abundant prey, return visit behavior to locations where weasels were unsuccessful or only partially successful are poorly described.

Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4419
Author(s):  
Hao Li ◽  
Tianhao Xiezhang ◽  
Cheng Yang ◽  
Lianbing Deng ◽  
Peng Yi

In the construction process of smart cities, more and more video surveillance systems have been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of video surveillance systems has attracted more attention. At present, many researchers focus on how to select the region of interest (RoI) accurately and then realize privacy protection in videos by selective encryption. However, relatively few researchers focus on building a security framework by analyzing the security of a video surveillance system from the system and data life cycle. By analyzing the surveillance video protection and the attack surface of a video surveillance system in a smart city, we constructed a secure surveillance framework in this manuscript. In the secure framework, a secure video surveillance model is proposed, and a secure authentication protocol that can resist man-in-the-middle attacks (MITM) and replay attacks is implemented. For the management of the video encryption key, we introduced the Chinese remainder theorem (CRT) on the basis of group key management to provide an efficient and secure key update. In addition, we built a decryption suite based on transparent encryption to ensure the security of the decryption environment. The security analysis proved that our system can guarantee the forward and backward security of the key update. In the experiment environment, the average decryption speed of our system can reach 91.47 Mb/s, which can meet the real-time requirement of practical applications.


1982 ◽  
Vol 60 (9) ◽  
pp. 2107-2115 ◽  
Author(s):  
Patrick T. K. Woo ◽  
Cheryl M. Bartlett

Two morphologically distinct trypanosomes (Trypanosoma ontarioensis n.sp. and Trypanosoma paddae) were found by the haematocrit centrifuge technique in the blood of 53% (64 of 121) of Corvus brachyrhynchos brachyrhynchos wintering in southern Ontario. Trypanosoma ontarioensis n.sp. is a small trypanosome with subterminal kinetoplast. It is monomorphic and not host specific. It was readily cultured in diphasic blood-agar medium. Two-week cultures were infective and contained dividing sphaeromastigotes, epimastigotes, and trypomastigotes. Blood trypomastigotes were detected in low numbers in the blood of inoculated birds (Corvus brachyrhynchos brachyrhynchos, Bonasa umbellus, Gallus domesticus, Melopsittacus undulatus, and Serinus canarius) at 28 and 48 days postinfection. The crows, ruffed grouse, and domestic chicks were laboratory raised while the budgerigars and canaries were from pet stores. One canary that was further examined at 180, 360, 540, 730, and 910 days postinfection still had detectable numbers of trypanosomes in its blood.


2021 ◽  
Author(s):  
Valentin Ion ◽  
Horia Andrei ◽  
Emil Diaconu ◽  
Mihaita Nicolae Ardeleanu ◽  
Andrei Cosmin Gheorghe

Sign in / Sign up

Export Citation Format

Share Document