• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • Tagged with
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Studies on the monitor and management of sergestid shrimp¡]Sergia lucens¡^resource in Tung-Kang, Taiwan.

Jiang, Yu-ning 25 June 2010 (has links)
The catch of Sergestid (Sergia lucens) shrimp is one of notable self-managed fishery in Taiwan. In 1992, Tung-Kang fishery association has assembled ship owners for a sale and marketing sector within the local fishery association which is a organization to regulate and manipulate relevant to the fishing guideline and fund management. Up to now, no adjustment has been made on the catch limit under the fishing guideline. Although there is some improvement on such species catch. The result however shows still problem of fishery management resulting from high density of fishing. To better monitor the Sergestid shrimp fishery, this study aims to collect the Sergestid shrimp sample monthly from November, 2006 to December, 2007, for measuring the body length and weight of shrimp. The monitoring data appears that monthly mature female and Sergestid shrimp ratio are as low as 20% during April-June of 2007 and 36.01% in June of 2007 among the monitoring period. After reviewing a correlation between monthly mature female and Sergestid shrimp, the female is heavier than male shrimp at same length. When applying body length into FiSAT ¢º to calculate female and male coefficients, the VBGF (Von Bertalanffy Growth Function) growth coefficient (K) is 0.67 and 0.92 respectively; Limit body long (L¡Û) is 43.47mm and 40.29mm respectively; Total mortality coefficient (Z) is 2.97 and 3.57 respectively; the Fishing mortality coefficient (F) is 1.96 and 2.3 and rate of exploitation (E) is 0.66 and 0.64 respectively. The estimate resource of female can be deduced from above data, for example, annual catches is 562.4 tons in 2007. The estimates resources of female is 1995.5¡Ñ106 per tail; male is 925.0¡Ñ106 per tail; total female and male is 2,920.5¡Ñ106 per tail. In addition to the earlier result of research, this study concludes that the peak season of spawning around marine water of western Taiwan occurs from December to next February and July, which does not correspond to the forbidden period from June to October under the fishing regulation. Thus, two forbidden periods in December to next February and June to August are necessary to avoid the spawning from over fishing. The study also found that the current size of fishing gear such as outer codend in 28.9mm and cover codend in 21.2mm are smaller than size at the first maturity for female in 26.19mm and the L50 for total female and male in 31.88mm. This implied that the size of outer codend and cover codend may catch immature shrimp, which is not bigger enough for spawning. In order to avoid the catch of immature female shrimp, the size of fishing gear should be reset at bigger size. Further studies is needed for the size of fishing gear correction. Finally, the resulting fishing mortality coefficient calculated from FiSAT is 2.10 that the resources of Sergestid shrimp are approximately 2,920.5¡Ñ106 per tail. This shows down trend of stock over time. This suggests that the fishing guideline should reinforce to limit the number of fishing boat and harvest. Another suggestion is to limit the number of fishing per boat daily or adopt fishing boat rotation without reducing the amount of fishing boat. If the shrimp fishery population remain no significant improvement, the implementation of a long-term fishing boat reduction and the total allowance per catch regulation are the useful policy. These measures shall be employed to raise the value of Sergestid shrimp, in order to increasing the income of fisherman and also to achieving the sustainable development of Sergestid shrimp.
2

Är det någon som gräver efter krypto på min dator? : En studie kring hotet av kryptobrytning

Skåås, Filippa, Olsson, Karin January 2023 (has links)
Kryptobrytning är den processen där transaktioner kryptovaluta verifieras.Idag är olaglig kryptobrytning ett stort hot då det utgör en stor del avorganiserad brottslighet. Dessutom kan skadliga kryptobrytningsprogramförkorta en dators livslängd avsevärt. Program som används tillkryptobrytning drar även stora mängder processorkraft, vilket kan göra att endator börjar arbeta långsamt. För att detektera program på en dator går det attta till olika metoder.Syftet med arbetet är att undersöka om det går att identifiera kryptobrytningmed hjälp av verktyg som kan analysera paket som skickas över nätverk frånett kryptobrytningsprogram. Samtidigt observeras det vilka varianter avartefakter som kan urskiljas och vilka andra typer av metoder det finns atttillgå vid detektion av kryptobrytning.Resultatet visar att enbart specifika typer av kryptobrytningsattacker kanupptäckas med paketanalysatorer och systemverktyg eftersom en hackarekan, i de flesta fall, förbipassera verktygen. Däremot visar i de flesta fallresultatet att det finns nackdelar respektive fördelar med varje metod. Detmest effektiva sättet för att skydda privata tillgångar och publikaorganisationers resurser är att använda en flerskiktsstrategi genom attkombinera alla typer av metoder. Ett antal av de artefakter som hittades somkan vara till användning var IP adresser, MAC-adresser, geolokalisering ochmetadata. / Today, illegal crypto mining poses a significant threat because it plays a bigrole in organized crime. In addition, it can shorten the lifespan significantly.Programs dedicated to crypto mining also consume substantial amounts ofprocessing power, which can slow down a computer. Various methods can beemployed to detect such programs on a computer.The purpose of this work is to investigate whether it is possible to identifycrypto mining using tools that can analyze packets transmitted over thenetwork from a crypto mining program. Additionally, it is observed whichvariants of artifacts can be distinguished and what other types of methods areavailable for detecting crypto mining.The result shows that only specific types of crypto mining attacks can bedetected using packet analyzers and system tools, as a hacker can bypass thesetools in most cases. However, the result also indicates that there aredisadvantages and advantages to each method. The most effective way toprotect your assets and organizational resources is to use a multi-layeredstrategy by combining all types of methods. Some of the artifacts found thatmay be useful include IP addresses, MAC addresses, geolocation, andmetadata.

Page generated in 0.0569 seconds