Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Aggression. --- Intruder. --- Mice.
Choose an application
Aggression. --- Dominance. --- Intruder. --- Pain. --- Rat.
Choose an application
Aggression. --- Fear. --- Intruder. --- Predator. --- Rat.
Choose an application
Activity. --- Female. --- Locomotion. --- Male intruder. --- Mice.
Choose an application
Aggression. --- Animal welfare. --- Behaviour. --- Consequences. --- Intruder. --- Laboratory rat. --- Laboratory rats. --- Laboratory. --- Rat. --- Rats. --- Rattus norvegicus. --- Rattus-norvegicus. --- Welfare.
Choose an application
ABSTRACT To determine the factors affecting agonistic interactions after regrouping, 24 pigs were allocated to six pens that each had a box. Half of the pigs were experienced in using the box. One castrated male and one female pig were transferred from each pen to another pen at random. The number of pigs attacked was particularly large for the pigs that had no experience in using the box and were transferred on the first day (P<0.05). The duration of access to the box was markedly longer for the pigs that had experience in using the box and were not transferred on the first day (P<0.05). The number and duration of attacks were significantly larger and longer toward unfamiliar individuals than toward familiar ones (both P< 0.01). The number of attacks toward the same sex was significantly larger than toward the opposite sex (P<0.01). A negative correlation was found between the number of agonistic interactions on the first day and the range of body weights in the pen mates (r=-0.78, P=0.07). In conclusion, regrouping with unfamiliar individuals should be avoided, but when unavoidable, the following methods are recommended to reduce agonistic interactions: (1) ensure the intruders are experienced in using a box, (2) move experienced intruders in with residents that have no experience in using a box, (3) mix different sexes, and (4) have wide variations in body weights in a pen
Access. --- Agonistic. --- Attacks. --- Body weight. --- Body-weight. --- Boxes. --- Duration. --- Experience. --- Female. --- Interaction. --- Interactions. --- Intruder. --- Male. --- Method. --- Pen. --- Pig. --- Pigs. --- Regrouping. --- Sex. --- Sexes. --- Variation. --- Weight.
Choose an application
Studies concerning aggression after mixing unfamiliar pigs have shown that there is a great variability in the levels of aggression shown by individual pigs. This study examined whether individual aggressiveness can be measured in a resident-intruder situation and whether it is a stable characteristic of individuals, which does not simply reflect the age or sex class of the animal. These latter requirements are of fundamental importance in establishing the existence of individual personality or temperament characteristics in animals. The research was carried out in three datasets, with a total of 218 pigs, females and entire males, at the age of 7 and 11 weeks. For the test, individual pigs were isolated in one half of their home pen, and an intruder pig was introduced. This pig was 2-3 weeks younger than the resident pig. The time from when the resident first made contact to when it attacked the intruder pig was used as a measure of aggressiveness. If the resident did not attack, the test was terminated after 3.5 min. The test was repeatable across two consecutive days as well as across four weeks. Aggressiveness was found to be unrelated to characteristics of the test pigs, such as sex, age, body weight and body weight ranked within litter. Attack latency was not affected by the sex of the intruder pig. If the intruder was less than half the body weight of the test pig, it was less likely to be attacked. Considerable variation was found within as well as between litters. The importance of the nature of the test arena, and implications of the duration of the test are discussed. Using attack latency as a measure of aggressiveness and a relatively short time limit, the test provides a useful tool for measuring aggressiveness without compromising the welfare of the animals involved
Age. --- Aggression. --- Aggressiveness. --- Animal. --- Animals. --- Body weight. --- Body-weight. --- Contact. --- Duration. --- Female. --- Females. --- Growing pigs. --- Growing-pigs. --- Intruder. --- Level. --- Male. --- Males. --- Mixing. --- Pen. --- Personality. --- Pig. --- Pigs. --- Research. --- Sex. --- Sexes. --- Temperament. --- Test. --- Time. --- Tool. --- Variability. --- Variation. --- Weight. --- Welfare.
Choose an application
Faulkner, William --- Faulkner, William, 1897-1962. A Fable --- Faulkner, William, 1897-1962. Intruder in the Dust --- Faulkner, William, 1897-1962. Requiem for a Nun --- Faulkner, William, 1897-1962. Sanctuary --- Faulkner, William, 1897-1962. The Hamlet --- Faulkner, William, 1897-1962. The Mansion --- Faulkner, William, 1897-1962. The Town --- Narration (Rhetoric) --- History --- Faulkner, William, --- Technique --- Technique. --- Criticism and interpretation --- Narration (Rhetoric) - History - 20th century --- Faulkner, William, - 1897-1962 - Technique --- Faulkner, William (1897-1962) --- Critique et interprétation --- Faulkner, William, - 1897-1962 --- Critique et interprétation
Choose an application
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
Computer science. --- Computer Communication Networks. --- Computer network architectures. --- Software engineering. --- Data protection. --- Information Systems. --- Computer Science. --- Systems and Data Security. --- e-Commerce/e-business. --- Computer System Implementation. --- Management of Computing and Information Systems. --- Software Engineering. --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer software engineering --- Architectures, Computer network --- Network architectures, Computer --- Informatics --- Computer communication systems. --- Architecture, Computer. --- Computer security. --- Management information systems. --- E-commerce. --- Computersicherheit. --- Eindringerkennung. --- Kryptoanalyse. --- Malware. --- Softwareschwachstelle. --- Software Vulnerability --- Sicherheitslücke --- Exploit --- Malicious software --- Malicious code --- Böswillige Software --- Schadsoftware --- Schadprogramm --- Computervirus --- Spyware --- Cryptoanalysis --- Angriff --- Attacke --- Kryptoanalytische Attacke --- Kryptoanalytischer Angriff --- Cryptanalysis --- Kryptologie --- Dechiffrierung --- Intrusion Detection --- Einbruchserkennung --- Erkennen von Eindringversuchen --- Erkennung von Eindringlingen --- Intruder Detection --- Eindring-Erkennungssystem --- Intrusion Detection System --- IDS --- Eindringerkennungssystem --- Computersicherheit --- Datenverarbeitungssystem --- Computer --- Datensicherung --- Softwareschutz --- Sicherheit --- Cybersicherheit --- IT-Sicherheit --- Engineering --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Angriffserkennungssystem --- Informationssicherheit --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Architecture, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems --- Distributed processing
Listing 1 - 9 of 9 |
Sort by
|