Results 291 to 300 of about 5,755,322 (380)

Artificial supplementary food influences hedgehog occupancy and activity patterns more than predator presence or natural food availability

open access: yesWildlife Biology, EarlyView.
Supplementary feeding for declining hedgehog Erinaceus europaeus populations is popular in Great Britain and has been suggested as an important factor in explaining higher densities in urban areas compared with rural ones. Occupancy modelling was used to test whether spatial variation in supplementary feeding, natural food, habitat, or predator ...
Eleanor S. Benjamin   +6 more
wiley   +1 more source

DNA metabarcoding reveals wolf dietary patterns in the northern Alps and Jura Mountains

open access: yesWildlife Biology, EarlyView.
Understanding predator–prey interactions is crucial for wildlife management and human–wildlife coexistence, particularly in multi‐use landscapes such as western Europe. As wolves Canis lupus recolonize their former habitats, knowledge of their diet is essential for conservation, management and public acceptance.
Florin Kunz   +6 more
wiley   +1 more source

Effects of complex soundscapes on the occurrence of Anaxipha pallidula in isolated green spaces in Tokyo

open access: yesWildlife Biology, EarlyView.
Urban green spaces experience a mix of natural and anthropogenic noises, which could disrupt the vocal communication of several species. This study investigated how such complex soundscapes affect the occurrence of Anaxipha pallidula, which communicates through calls, focusing on both sound level and quality.
Hiroki Mori, Takeshi Osawa
wiley   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy