657 resultados para cyber foraging
Resumo:
The relationships among chick feeding, size and type of prey item, and foraging time away from the brood have not been well studied in seabirds. This study investigated spatial and temporal patterns of foraging and chick-provisioning among 23 radio-tagged male common terns nesting at Hamilton Harbour, Lake Ontario during 1991 and 1992. Telemetry data were collected concurrently with behavioural observations from an elevated blind. Terns fitted with transmitters did not differ from controls with respect to either brood attendance, patterns of chick mortality, species and size distributions of prey delivered to offspring, or chick-provisioning rates. There was a clear separation of parental roles: males were primarily responsible for feeding chicks while females allocated more time to brood attendance. The prey species most commonly delivered to chicks by adults were rainbow smelt (Osmerus mordax) and alewife (A/osa pseudoharengus), followed in importance by larval fish, emerald shiner (Notropis antherinoides), salmonids, and fathead minnows (Pimepha/es prome/as). The relative proportions of various fish speCies delivered to chicks by males differed over the course of each breeding season, and there was also much variability in species composition of prey between years. Sizes of prey delivered to chicks also differed between sampling periods. The modal size of fish brought to chicks during Peak 1991 was 1.5 bill lengths, while the majority of prey in Late 1991 were small larval fish. The reverse trend occurred in 1992 when small fish were delivered to chicks predominantly during the Peak nesting period. During periods when predominantly small fish were delivered to chicks, the foraging activity of radio-tagged males was concentrated within a two kilometer radius of the colony. The observed variation in prey composition and foraging locations during the study likely reflects temporal variation in the availability of prey in the vicinity of the colony. Males delivered fish to chicks at a constant rate, while females 4 increased their feeding frequency over the first six to ten brood days. The mean length of fish delivered to chicks by adults increased significantly with increasing chick age. As a group, within each nesting period, transmittered males either foraged predominantly in the same directional bearing (north during Peak 1991, south during Late 1992), or concentrated foraging activity in the immediate vicinity of the colony (Late 1991, Peak 1992). However, individual radio-tagged males exhibited unique and predictable foraging patterns, often favouring specific locations within these areas and differing in their secondary foraging patterns. Overall, the Lake Ontario shoreline between NCB Bay" (3.5 km south of colony) and the lift bridge canal (4 km north of colony) was the foraging area used most frequently by radiotagged males during the chick-rearing period. Foraging patterns of transmittered males at Windermere Basin are similar to patterns of peak-nesting common terns, but differ from those of late-nesters, at a nearby colony (Port Colborne, Lake Erie). Differences between the foraging patterns of late-nesting terns at these colonies likely reflect differences in annual patterns of fish availability between the two locations. No relationship was found between foraging proficiency of adults and survival of offspring. Stochastic factors, such as predation by black-crowned nightherons (Nycticorax nycticorax) and adverse weather conditions during the early stages of chick rearing, may be more important determinants of common tern breeding success than parental quality or fish availability.
Resumo:
Introduction : La cyber santé (CS) a le potentiel d’améliorer l'efficience et l'efficacité des services de santé. Malgré cela, son adoption demeure problématique et jusqu’à 70 % des projets d’implantation échouent. Objectifs : Cette étude vise à évaluer l’état de préparation d’une organisation par rapport à la CS et à identifier les facteurs personnels qui influencent cet état. Méthode : Une étude transversale a été réalisée auprès de 137 cliniciens, 28 gestionnaires et 47 membres du personnel non clinique d’un centre de réadaptation à Montréal. Les participants ont répondu à un questionnaire auto administré sur l’état de préparation organisationnelle vis-à-vis la CS qui comprend trois sous échelles (Individu, Organisation et Technologie) avec chacune un score sur 100. Des données ont aussi été colligées sur le profil des utilisateurs, leur utilisation des technologies et leur style de réponse à la nouvelle information. Résultats : Les participants se perçoivent prêts à adopter la CS dans leur travail ( = 73.8, SD = 8.5) et perçoivent aussi favorablement les technologies disponibles ( = 73.8, SD = 7.2). Toutefois, le personnel perçoit le centre comme étant modérément prête ( = 66.6, SD = 9.8). La charge de travail perçue et la fonction au sein de l'organisation ont été identifiées comme ayant une influence sur l'état de préparation à la CS. Discussion : Ces résultats appuient la pertinence d’aborder l’état de préparation organisationnelle comme un concept multidimensionnel. À partir des résultats obtenus, des stratégies d'implantation adaptées ont pu être identifiées.
Resumo:
Cyber Physical systems (CPS) connect the physical world with cyber world. The events happening in the real world is enormous and most of it go unnoticed and information is lost. CPS enables to embed tiny smart devices to capture the data and send it to Internet for further processing. The entire set-up call for lots of challenges and open new research problems. This talk is a journey through the landscape of research problems in this emerging area.
Resumo:
„Cyber-Mobbing-Tod eines Teenagers“ titelt Spiegel-Online 2007: auch auf Stern.de (2009) findet sich die Meldung: „15-jährige tötet sich nach Cyber-Mobbing“, Zeit Online (2009) berichtet ebenfalls über diesen Vorfall. In Deutschland sind bisher keine derartigen Extremfälle öffentlich bekannt, dennoch ist das Phänomen, vermutlich veranlasst durch diese oder ähnliche Vorfälle, in das Interesse der medialen Öffentlichkeit gerückt. Diese Arbeit geht daher der Frage auf den Grund, ob Cyber-Mobbing auch ein Problem an deutschen Schulen ist und in welchem Ausmaß es dort auftritt. Im Fokus stehen jedoch nicht die genannten Extremfälle, da sie glücklicherweise eher eine Seltenheit darstellen, sondern alltägliche Formen des Cyber-Mobbings, weil genau hier der Grundstein für solch furchtbare Ereignisse gelegt wird. Cyber-Mobbing ist ein recht neues und junges Phänomen, das noch nicht allzu lange im Fokus der wissenschaftlichen Welt steht. Daher gelten viele Facetten als noch nicht ausreichend erschlossen, um eindeutige Aussagen hinsichtlich bestimmter Kausalitäten zu machen. Eine Vielzahl der wissenschaftlichen Arbeiten orientiert sich daher am Konzept des Mobbings, um Unterschiede oder Gemeinsamkeiten zwischen diesen Spielarten der Gewalt herauszuarbeiten. Daher folgt die vorliegende Arbeit dieser Tradition in metaanalytischer Form, untersucht folglich bestehende Literatur und setzt diese in einen kausalen Zusammenhang. Leitend für die Literaturanalyse ist die Frage ob sich die Dimensionen schulischer Gewalt, in diesem Falle Mobbing, durch die neuen Kommunikationsmedien verändert haben. Die Beantwortung dieser Frage zielt primär darauf ab herauszufinden, ob Cyber-Mobbing ähnlichen Strukturen folgt, wie Mobbing oder aber spezifische Muster existieren und ob die Schüler, die in Cyber-Mobbing involviert sind, auch in Mobbing verwickelt sind oder von einer Verschiebung der Interaktionsmuster gesprochen werden kann. Handelt es sich bei Cyber-Mobbing also um eine neue Form des Mobbings, oder um ein eigenständiges und unabhängiges Phänomen?
Resumo:
Talk given by Gary Kibby from SOCA at the Web Science Industry Week in Dec 2012. Readings and task taken from previous years.
Resumo:
This resource is an informational resource that attempts to inform the general public about security and privacy with using the internet.
Resumo:
Resource and flyer produced for INFO2009 12/13. An animation on public-key encryption related to cybercrime and cybersecurity. Target audience is undergraduates, but the resource does not assume prior knowledge of the topics, or any in-depth knowledge of IT.
Resumo:
These are white papers and reports on Command and Control and Cyber Kill Chain. Consider these readings "almost" required. That is, I'd like you to make a serious effort at reading them.
Resumo:
Resumen tomado de la publicaci??n
Resumo:
Breeding seabirds are threatened by human activities that affect nesting and foraging habitat. In Canada, one of the seabirds most at risk of extirpation is the Roseate Tern, Sterna dougallii. Although critical nesting habitat has been identified for the Roseate Tern in Canada, its foraging locations and the diet of its chicks are unknown. Therefore, our goal was to determine the foraging locations and diet of chicks of Roseate Tern breeding on Country Island, Nova Scotia, which is one of Canada's two main breeding colonies. In 2003 and 2004, we radio-tracked the Roseate Tern by plane to locate foraging areas and conducted feeding watches to determine the diet of chicks. Roseate Tern foraged approximately 7 km from the breeding colony over shallow water < 5 m deep. In both years, sand lance, Ammodytes spp., was the most common prey item delivered to chicks, followed by hake, Urophycis spp. Our results are consistent with previous work at colonies in the northeastern United States, suggesting that throughout its range, this species may be restricted in both habitat use and prey selection. The reliance on a specific habitat type and narrow range of prey species makes the Roseate Tern generally susceptible to habitat perturbations and reductions in the availability of prey.
Resumo:
Restrictions in technology have limited past habitat selection studies for many species to the home-range level, as a finer-scale understanding was often not possible. Consequently, these studies may not identify the true mechanism driving habitat selection patterns, which may influence how such results are applied in conservation. We used GPS dataloggers with digital video recorders to identify foraging modes and locations in which endangered Burrowing Owls (Athene cunicularia) captured prey. We measured the coarse and fine-scale characteristics of vegetation at locations in which owls searched for, versus where they caught, vertebrate prey. Most prey items were caught using hover-hunting. Burrowing Owls searched for, and caught, vertebrate prey in all cover types, but were more likely to kill prey in areas with sparse and less dense vegetative cover. Management strategies designed to increase Burrowing Owl foraging success in the Canadian prairies should try to ensure a mosaic of vegetation heights across cover types.
Resumo:
Cybersecurity is a complex challenge that has emerged alongside the evolving global socio-technical environment of social networks that feature connectivity across time and space in ways unimaginable even a decade ago. This paper reports on the preliminary findings of a NATO funded project that investigates the nature of innovation in open collaborative communities and its implications for cyber security. In this paper, the authors describe the framing of relevant issues, the articulation of the research questions, and the derivation of a conceptual framework based on open collaborative innovation that has emerged from preliminary field research in Russia and the UK.