828 resultados para Web of things
Resumo:
No detailed food web research on macroinvertebrate community of lacustrine ecosystem was reported in China. The present study is the first attempt on the subject in Lake Biandantang, a macrophytic lake in Hubei Province. Food webs of the macroinvertebrate community were compiled bimonthly from March, 2002 to March, 2003. Dietary information was obtained from gut analysis. Linkage strength was quantified by combining estimates of energy flow (secondary production) with data of gut analysis. The macroinvertebrate community of Lake Biandantang was based heavily on detritus. Quantitative food webs showed the total ingestion ranged from 6930 to 36,340 mg dry mass m(-2) bimonthly. The ingestion of macroinvertebrate community was higher in the months with optimum temperature than that in other periods with higher or lower temperature. Through comparison, many patterns in benthic food web of Lake Biandantang are consistent with other detritus-based webs, such as stream webs, but different greatly from those based on autochthonous primary production (e.g. pelagic systems). It suggests that the trophic basis of the web is essential in shaping food web structure.
Resumo:
Strategic innovation has been shown to provide significant value for organisations whilst at the same time challenging traditional ways of thinking and working. There is less known, however, as to how organisations collaborate in innovation networks to achieve strategic innovation. In this paper we explore how innovation networks are orchestrated in developing a strategic innovation initiative around the Internet of Things. We show how a hub actor brings together a diverse group of actors to initially create and subsequently orchestrate the strategic innovation network through the employ of three dialogical strategies, namely persuasive projection, reflective development, and definitional control. Further, we illuminate how different types of legitimacy are established through these various dialogical strategies in orchestrating strategic innovation networks.
Resumo:
Many metals have serious toxic effects when ingested by aquatic organisms, and the process of bioaccumulation intensifies this problem. A better understanding of bioaccumulation trends of anthropogenically introduced metals in freshwater food webs is necessary for the development of effective management strategies to protect aquatic organisms, as well as organisms (including humans) that consume top-predator fish in these food webs. Various fish species representing different trophic levels of a pelagic food chain were sampled from Lake Champlain (VT/NY). Atomic absorption spectrometry (AAS) was used to determine levels of chromium, copper, cobalt, cadmium, lead, zinc, nickel, rubidium, cesium and potassium in the fish samples. Metal concentrations for chromium, cobalt, nickel, cesium, cadmium (<5.0 ppm) and lead (<10.0 ppm) were found to be all below detection limits. Carbon and nitrogen isotopic ratios were analyzed to determine the trophic relationship of each fish species. Stable isotope and AAS metal data were used in tandem to produce linear regressions for each metal against trophic level to assess biomagnification. Both potassium and zinc showed no biomagnification because they are homeostatically regulated essential trace metals. Copper was under the detection limits for all fish species with the exception of the sea lamprey; but showed a significant biodiminution among the invertebrates and lamprey. Rubidium, a rarely studied metal, was shown to increase with trophic level in a marginally significant linear relationship suggesting biomagnification is possible where more trophic levels are sampled.
Resumo:
The myriad of technologies and protocols working at different layers pose significant security challenges in the upcoming Internet of Things (IoT) paradigm. Security features and needs vary from application to application and it is layer specific. In addition, security has to consider the constraints imposed by energy limited sensor nodes and consider the specific target application in order to provide security at different layers. This paper analyses current standardization efforts and protocols. It proposes a generic secured network topology for IoT and describes the relevant security challenges. Some exploitation examples are also provided.
Resumo:
This anthropological essay takes as its ethnographic point of departure two apparently contrasting deployments of the Bible within contemporary Scotland, one as observed among Brethren and Presbyterian fisher-families in Gamrie, coastal Aberdeenshire, and the other as observed among the Orange Order, a Protestant marching fraternity, in Airdrie and Glasgow. By examining how and with what effects the Bible and other objects (plastic crowns, ‘Sunday clothes’, Orange regalia) enter into and extend beyond the everyday practices of fishermen and Orangemen, my aim is to sketch different aspects of the material life of Scottish Protestantism. By offering a critique of Bruno Latour’s early writing on ‘quasi-objects’ via Alfred Gell’s notion of ‘distributed personhood’, I seek to undermine the sociological assumption that modernity and enchantment are mutually exclusive.
Resumo:
The broad capabilities of current mobile devices have paved the way for Mobile Crowd Sensing (MCS) applications. The success of this emerging paradigm strongly depends on the quality of received data which, in turn, is contingent to mass user participation; the broader the participation, the more useful these systems become. However, there is an ongoing trend that tries to integrate MCS applications with emerging computing paradigms such as cloud computing. The intuition is that such a transition can significantly improve the overall efficiency while at the same time it offers stronger security and privacy-preserving mechanisms for the end-user. In this position paper, we dwell on the underpinnings of incorporating cloud computing techniques to facilitate the vast amount of data collected in MCS applications. That is, we present a list of core system, security and privacy requirements that must be met if such a transition is to be successful. To this end, we first address several competing challenges not previously considered in the literature such as the scarce energy resources of battery-powered mobile devices as well as their limited computational resources that they often prevent the use of computationally heavy cryptographic operations and thus offering limited security services to the end-user. Finally, we present a use case scenario as a comprehensive example. Based on our findings, we posit open issues and challenges, and discuss possible ways to address them, so that security and privacy do not hinder the migration of MCS systems to the cloud.
Resumo:
Dissertação para obtenção do Grau de Mestre em Engenharia Electrotécnica e de Computadores
Resumo:
Resumen tomado de la publicaci??n
Resumo:
Resumen tomado de la publicaci??n
Resumo:
Resumen tomado de la publicaci??n