Complex Movements of Skipjack Schools Based on Sonar Observations during Pelagic Purse Seining
نویسندگان
چکیده
منابع مشابه
An investigation of reactive behavior of yellowfin tuna schools to the purse seining process
The movement parameters of yellow fin tuna schools were analyzed by means of scanning sonar in tuna purse seine capture situations in the Oman Sea in June 2010. There was significant difference in swimming speed and radial swimming direction between the escaped and captured schools. In escaped cases, the fish schools swam faster with mostly horizontal avoidance behavior to the sound stimuli fro...
متن کاملAn investigation of reactive behavior of yellowfin tuna schools to the purse seining process
The movement parameters of yellow fin tuna schools were analyzed by means of scanning sonar in tuna purse seine capture situations in the Oman Sea in June 2010. There was significant difference in swimming speed and radial swimming direction between the escaped and captured schools. In escaped cases, the fish schools swam faster with mostly horizontal avoidance behavior to the sound stimuli fro...
متن کاملInitial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR
Skipjack is the secret key encryption algorithm developed by the NSA for the Clipper chip and Fortezza PC card. It uses an 80-bit key, 128 table lookup operations, and 320 XOR operations to map a 64-bit plaintext into a 64-bit ciphertext in 32 rounds. This paper describes an eecient attack on a variant, which we call Skipjack-3XOR (Skipjack minus 3 XORs). The only diierence between Skipjack and...
متن کاملSonar observations of killer whales (Orcinus orca) feeding on herring schools
Behavior of killer whales feeding on herring schools was recorded with a high frequency (455 kHz) sonar and recorded on a SVHS tape. Synchronization of surfacing behavior of killer whales was analyzed from 8 mm videotapes recorded between 1990–92. Two different feeding techniques, carousel feeding, where killer whales cooperatively herd herring schools into a tight ball towards the surface and ...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Fisheries Science and Technology
سال: 2007
ISSN: 1226-9204
DOI: 10.5657/fas.2007.10.4.220