Concern Re the Red-Tailed Hawk

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Some Prey Preference Factors for a Red-tailed Hawk

SEW•AL studies have reported selection against conspicuous prey. Dice (1947) reported differential selection against conspicuous phenotypes of mice (Peromyscus maniculatus) and Kaufman (1974a) showed that Barn Owls (Tyto alba) and Screech Owls (Otus asio) selected against conspicuous phenotypes of old field mice (Peromyscus polionotus). Metzgar (1967) reported that Screech Owls preferred transi...

متن کامل

Pesticide Analysis, Egg and Eggshell Characteristics of Red-Tailed Hawk Eggs

In this study, addled and viable Red-tailed Hawk eggs were compared in terms of pesticide levels, egg and eggshell parameters, and shell ultrastructure as determined by scanning electron microscopy. These values were then used to compare actual measurements against egg and eggshell indices commonly reported in the literature. Addled eggs of Red-tailed Hawks were of greater length, weight and vo...

متن کامل

Ring-tailed lemurs: a species re-imagined.

For over 50 years, ring-tailed lemurs have been studied continuously in the wild. As one of the most long-studied primate species, the length and breadth of their study is comparable to research on Japanese macaques, baboons and chimpanzees. They are also one of the most broadly observed of all primates, with comprehensive research conducted on their behaviour, biology, ecology, genetics, palae...

متن کامل

Re-engineering Security as a Crosscutting Concern

We have re-engineered a third-party application using a reflective security architecture that allows security to be treated as a crosscutting concern. This has resulted in a considerable reduction in tangling between application code and security code. Prior to the re-engineering, the application was secured using a conventional approach based upon the application of inheritance and the proxy p...

متن کامل

Concern Oriented Programming using Re ection

Building softwares in a concern oriented fashion can be splited in two main steps : rst de ning each concern separately (or reusing existing ones) and then composing (i.e. integrating) those concerns together. Among existing approaches to support this development scheme, we are interested in re ection. This interest is particularly motivated by the natural separation between functional and non-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Blue Jay

سال: 1966

ISSN: 2562-5667,0006-5099

DOI: 10.29173/bluejay3341