Results 181 to 190 of about 1,164,479 (246)
Some of the next articles are maybe not open access.

When prey becomes killer: does a double lethal attack on a blue shark reveal a precise defensive strategy in young swordfish?

Journal of the Marine Biological Association of the United Kingdom, 2020
In this paper a rare case of a double swordfish mortal attack against an adult blue shark (Prionace glauca) is reported. A female blue shark, with a total length of 3 m, was found stranded along the southern Sicilian coast (Strait of Sicily ...
T. Romeo   +7 more
semanticscholar   +1 more source

Pathologic Features of Fatal Shark Attacks

The American Journal of Forensic Medicine and Pathology, 2000
To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998.
R W, Byard, J D, Gilbert, K, Brown
openaire   +2 more sources

Shark Attacks

2017
Humans spend more time in or on the water than ever before. We love the beach. But for many people, getting in the water provokes a moment’s hesitation. Shark attacks are big news events and although the risk of shark attack on humans is incredibly low, the fact remains that human lives are lost to sharks every year.
openaire   +1 more source

Shark Attack: Review of 86 Consecutive Cases

The Journal of Trauma: Injury, Infection, and Critical Care, 2001
On average there are approximately 50 confirmed shark attacks worldwide annually. Despite their rarity, such incidents often generate much public and media attention.The injuries of 86 consecutive victims of shark attack were reviewed from 1980 to 1999.
J D, Woolgar   +4 more
openaire   +2 more sources

Efficient Method for Discriminating Flash Event from DoS Attack during Internet Protocol Traceback using Shark Smell Optimization Algorithm

2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf), 2019
Internet Protocol (IP) traceback tool can wrongly identify a Flash event (FE) flow as a Denial of Service (DoS) attack when tracing a DoS attack source because of the symptomatic similarities between them.
O. Salami   +4 more
semanticscholar   +1 more source

Recovery of Human Remains After Shark Attack

American Journal of Forensic Medicine & Pathology, 2006
Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted
Byard, R., James, R., Heath, K.
openaire   +3 more sources

Shark attacks on offshore streamer cables

Engineering Failure Analysis, 2020
Abstract In the search for new subsea oil fields, geologists use vessels to tow streamer cables, which collects seismic data. This activity attracts bull sharks to the magnetic streamer fields causing shark attacks and hence losses and delays. This paper discusses how shark attacks on streamer cables can be modelled and simulated in cable design and ...
Terje Rølvåg   +2 more
openaire   +1 more source

Shark attact in Natal

Injury, 1975
The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and ...
openaire   +2 more sources

Shark Attack. Second Edition.

Archives of Internal Medicine, 1963
This is an extraordinary book by an extraordinary man. It is an exhaustive study by a doctor of a semimedical subject, yet it is written in a narrative style and contains only one reference. Victor Coppleson of Sydney graduated in 1915 and has ever since been a leading surgeon and medical teacher.
openaire   +1 more source

Home - About - Disclaimer - Privacy