منابع مشابه
Early temperamental traits in an octopus (Octopus bimaculoides).
During their 3rd week of life, 73 Octopus bimaculoides were observed to test whether discrete behaviors could be grouped reliably to reflect dimensions of temperament. Frequencies of behaviors during Week 3 were subjected to principal-components analysis (PCA), resulting in 4 components (active engagement, arousal/readiness, aggression, and avoidance/disinterest) that explain 53% of the varianc...
متن کاملBipedal Walking of an Octopus-Inspired Robot
In this paper a model is presented which describes an octopusinspired robot capable of two kinds of locomotion: crawling and bipedal walking. Focus will be placed on the latter type of locomotion to demonstrate, through model simulations and experimental trials, that the robot’s speed increases by about 3 times compared to crawling. This finding is coherent with the performances of the biologic...
متن کاملAn arm’s length evaluation of Octopus
This paper explores the use of Octopus in Hong Kong (HK). There are over 7.4 million cards sold and 7 million of these are active. The study examines how transport and other sectors can enhance their services through Octopus. Six of the 40 organisations using the Hong Kong Octopus card were interviewed. A convenience sample of 800 actual and potential Octopus customers was sent a questionnaire....
متن کاملDynamic mimicry in an Indo-Malayan octopus.
During research dives in Indonesia (Sulawesi and Bali), we filmed a distinctive long-armed octopus, which is new to science. Diving over 24 h periods revealed that the 'mimic octopus' emerges during daylight hours to forage on sand substrates in full view of pelagic fish predators. We observed nine individuals of this species displaying a repertoire of postures and body patterns, several of whi...
متن کاملOctopus: An Edge-fog Mutual Authentication Scheme
Authentication is an important and challenging issue for the security of Fog computing since, services are offered to massive-scale end users (Fog users or Edge) by front Fog servers (or Fog nodes). In this paper, we propose a secure and efficient mutual authentication scheme for the EdgeFog-Cloud network architecture, to mutually authenticate Fog users at the Edge of the network, with the Fog ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1880
ISSN: 0028-0836,1476-4687
DOI: 10.1038/022585e0