منابع مشابه
In Like a Lion:
The tornado that struck Milwaukee, WI on March 8, 2000 was the earliest on record. Unlike most tornadoes, this particular tornado was not associated with a supercell or any form of a mesocyclone. The author argues that a lake breeze circulation created a misocyclone in the region, which was elongated vertically by a rapidly deepening convective thunderstorm in the region, producing the tornado.
متن کاملOPTIMUM DESIGN OF SKELETAL STRUCTURES USING ANT LION OPTIMIZER
This paper utilizes recent optimization algorithm called Ant Lion Optimizer (ALO) for optimal design of skeletal structures. The ALO is based on the hunting mechanism of Antlions in nature. The random walk of ants, building traps, entrapment of ants in traps, catching preys, and re-building traps are main steps for this algorithm. The new algorithm is examined by designing three truss and frame...
متن کاملLion, ungulate, and visitor reactions to playbacks of lion roars at Zoo Atlanta.
Felids in captivity are often inactive and elusive in zoos, leading to a frustrating visitor experience. Eight roars were recorded from an adult male lion and played back over speakers as auditory enrichment to benefit the lions while simultaneously enhancing the zoo visitor experience. In addition, ungulates in an adjacent exhibit were observed to ensure that the novel location and increased f...
متن کاملPrey preferences of the lion (Panthera leo)
Lions Panthera leo are generally thought to prey on medium to large ungulates. Knowledge of which species are actually preferred and which are avoided is lacking, however, as is an understanding of why such preference or avoidance may arise. An analysis of 32 studies over 48 different spatial locations or temporal periods throughout the distribution of the lion shows that it preferentially prey...
متن کاملA Critique of BEAR and LION
The paper \Two Practical and Provably Secure Block Ciphers: BEAR and LION" AnBi96] by Ross Anderson and Eli Biham is summarized. The paper presents two new block ciphers (BEAR and LION) which can be built using a hash function and a stream cipher. Both these ciphers are provably secure in that a successful attack on them can be used as an attack on the underlying hash function and stream cipher...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Frontiers in Ecology and the Environment
سال: 2011
ISSN: 1540-9295,1540-9309
DOI: 10.1890/1540-9295-9.6.364