908 resultados para Prey defense
Resumo:
The impact of alternative prey and simulated vegetation on Culex annulirostris Skuse predation efficacy by Australian smelt, Retropinna semoni (Retropinnidae); crimson-spotted rainbowfish, Melanotaenia duboulayi (Melanotaeniidae); empire gudgeon, Hypseleotris compressa (Eleotridae); estuary perchlet, Ambassis marianus (Ambassidae); firetail gudgeon, Hypseleotris galii (Eleotridae); fly-specked hardyhead, Craterocephalus stercusmuscarum (Atherinidae); and Pacific blue-eye, Pseudomugil signifer (Atherinidae), was evaluated in Queensland, Australia. The presence of chironomid midge larvae and tusked frog, Adelotus brevis (Leptodactylidae), tadpoles did not have a significant negative impact on the predation rates of Cx. annulirostris by these 7 fish species. Hypseleotris galii, M. duboulayi, and R. semoni demonstrated strong preference for larvae of Cx. annulirostris over both alternative prey species. In the presence of alternative prey species, the mean predation rate of M. duboulayi on larvae of Cx. annulirostris remained greater than that of other fish species tested. When evaluated at varying densities of simulated vegetation, predation rates of all fish species were similar to those reported in open conditions.
Resumo:
Phenotypic plasticity, the ability of a trait to change as a function of the environment, is central to many ideas in evolutionary biology. A special case of phenotypic plasticity observed in many organisms is mediated by their natural predators. Here, we used a predator-prey system of dragonfly larvae and tadpoles to determine if predator-mediated phenotypic plasticity provides a novel way of surviving in the presence of predators (an innovation) or if it represents a simple extension of the way noninduced tadpoles survive predation. Tadpoles of Limnodynastes peronii were raised in the presence and absence of predation, which then entered a survival experiment. Induced morphological traits, primarily tail height and tail muscle height, were found to be under selection, indicating that predator-mediated phenotypic plasticity may be adaptive. Although predator-induced animals survived better, the multivariate linear selection gradients were similar between the two tadpole groups, suggesting that predator-mediated phenotypic plasticity is an extension of existing survival strategies. In addition, nonlinear selection gradients indicated a cost of predator-induced plasticity that may limit the ability of phenotypic plasticity to enhance survival in the presence of predators.
Resumo:
Movements of wide-ranging top predators can now be studied effectively using satellite and archival telemetry. However, the motivations underlying movements remain difficult to determine because trajectories are seldom related to key biological gradients, such as changing prey distributions. Here, we use a dynamic prey landscape of zooplankton biomass in the north-east Atlantic Ocean to examine active habitat selection in the plankton-feeding basking shark Cetorhinus maximus. The relative success of shark searches across this landscape was examined by comparing prey biomass encountered by sharks with encounters by random-walk simulations of ‘model’ sharks. Movements of transmitter-tagged sharks monitored for 964 days (16754km estimated minimum distance) were concentrated on the European continental shelf in areas characterized by high seasonal productivity and complex prey distributions. We show movements by adult and sub-adult sharks yielded consistently higher prey encounter rates than 90% of random-walk simulations. Behavioural patterns were consistent with basking sharks using search tactics structured across multiple scales to exploit the richest prey areas available in preferred habitats. Simple behavioural rules based on learned responses to previously encountered prey distributions may explain the high performances. This study highlights how dynamic prey landscapes enable active habitat selection in large predators to be investigated from a trophic perspective, an approach that may inform conservation by identifying critical habitat of vulnerable species.
Resumo:
Plant oxylipins are a large family of metabolites derived from polyunsaturated fatty acids. The characterization of mutants or transgenic plants affected in the biosynthesis or perception of oxylipins has recently emphasized the role of the so-called oxylipin pathway in plant defense against pests and pathogens. In this context, presumed functions of oxylipins include direct antimicrobial effect, stimulation of plant defense gene expression, and regulation of plant cell death. However, the precise contribution of individual oxylipins to plant defense remains essentially unknown. To get a better insight into the biological activities of oxylipins, in vitro growth inhibition assays were used to investigate the direct antimicrobial activities of 43 natural oxylipins against a set of 13 plant pathogenic microorganisms including bacteria, oomycetes, and fungi. This study showed unequivocally that most oxylipins are able to impair growth of some plant microbial pathogens, with only two out of 43 oxylipins being completely inactive against all the tested organisms, and 26 oxylipins showing inhibitory activity toward at least three different microbes. Six oxylipins strongly inhibited mycelial growth and spore germination of eukaryotic microbes, including compounds that had not previously been ascribed an antimicrobial activity such as 13-keto-9(Z),11(Z),15(Z)- octadecatrienoic acid and 12-oxo-10,15(Z)-phytodienoic acid. Interestingly this first large-scale comparative assessment of the antimicrobial effects of oxylipins reveals that regulators of plant defense responses are also the most active oxylipins against eukaryotic microorganisms, suggesting that such oxylipins might contribute to plant defense through their effects both on the plant and on pathogens, possibly through related mechanisms. © 2005 American Society of Plant Biologists.
Resumo:
Due to wide range of interest in use of bio-economic models to gain insight into the scientific management of renewable resources like fisheries and forestry,variational iteration method (VIM) is employed to approximate the solution of the ratio-dependent predator-prey system with constant effort prey harvesting.The results are compared with the results obtained by Adomian decomposition method and reveal that VIM is very effective and convenient for solving nonlinear differential equations.
Resumo:
The activation-deactivation pseudo-equilibrium coefficient Qt and constant K0 (=Qt x PaT1,t = ([A1]x[Ox])/([T1]x[T])) as well as the factor of activation (PaT1,t) and rate constants of elementary steps reactions that govern the increase of Mn with conversion in controlled cationic ring-opening polymerization of oxetane (Ox) in 1,4-dioxane (1,4-D) and in tetrahydropyran (THP) (i.e. cyclic ethers which have no homopolymerizability (T)) were determined using terminal-model kinetics. We show analytically that the dynamic behavior of the two growing species (A1 and T1) competing for the same resources (Ox and T) follows a Lotka-Volterra model of predator-prey interactions. © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Resumo:
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.
Resumo:
The strong impact of non-native predators in aquatic systems is thought to relate to the evolutionary naiveté of prey. Due to isolation and limited dispersal, this naiveté may be relatively high in freshwater systems. In this study, we tested this notion by examining the antipredator response of native mosquitofish, Gambusia holbrooki, to two non-native predators found in the Everglades, the African jewelfish, Hemichromis letourneuxi, and the Mayan cichlid, Cichlasoma urophthalmus. We manipulated prey naiveté by using two mosquitofish populations that varied in their experience with the recent invader, the African jewelfish, but had similar levels of experience with the longer-established Mayan cichlid. Specifically, we tested these predictions: (1) predator hunting modes differed between the two predators, (2) predation rates would be higher by the novel jewelfish predator, (3) particularly on the naive population living where jewelfish have not invaded yet, (4) antipredator responses would be stronger to Mayan cichlids due to greater experience and weaker and/or ineffective to jewelfish, and (5) especially weakest by the naive population. We assayed prey and predator behavior, and prey mortality in lab aquaria where both predators and prey were free-ranging. Predator hunting modes and habitat domains differed, with jewelfish being more active search predators that used slightly higher parts of the water column and less of the habitat structure relative to Mayan cichlids. In disagreement with our predictions, predation rates were similar between the two predators, antipredator responses were stronger to African jewelfish (except for predator inspections), and there was no difference in response between jewelfish-savvy and jewelfish-naive populations. These results suggest that despite the novelty of introduced predators, prey may be able to respond appropriately if non-native predator archetypes are similar enough to those of native predators, if prey rely on general antipredator responses or predation cues, and/or show neophobic responses.
Resumo:
Novel predator introductions are thought to have a high impact on native prey, especially in freshwater systems. Prey may fail to recognize predators as a threat, or show inappropriate or ineffective responses. The ability of prey to recognize and respond appropriately to novel predators may depend on the prey’s use of general or specific cues to detect predation threats.We used laboratory experiments to examine the ability of three native Everglades prey species (Eastern mosquitofish, flagfish and riverine grass shrimp) to respond to the presence, as well as to the chemical and visual cues of a native predator (warmouth) and a recentlyintroduced non-native predator (African jewelfish). We used prey from populations that had not previously encountered jewelfish. Despite this novelty, the native warmouth and nonnative jewelfish had overall similar predatory effects, except on mosquitofish, which suffered higher warmouth predation. When predators were present, the three prey taxa showed consistent and strong responses to the non-native jewelfish, which were similar in magnitude to the responses exhibited to the native warmouth. When cues were presented, fish prey responded largely to chemical cues, while shrimp showed no response to either chemical or visual cues. Overall, responses by mosquitofish and flagfish to chemical cues indicated low differentiation among cue types, with similar responses to general and specific cues. The fact that antipredator behaviours were similar toward native and non-native predators suggests that the susceptibility to a novel fish predator may be similar to that of native fishes, and prey may overcome predator novelty, at least when predators are confamilial to other common and longer-established non-native threats.
Resumo:
Non-native predators may have negative impacts on native communities, and these effects may be dependent on interactions among multiple non-native predators. Sequential invasions by predators can enhance risk for native prey. Prey have a limited ability to respond to multiple threats since appropriate responses may conflict, and interactions with recent invaders may be novel. We examined predator–prey interactions among two non-native predators, a recent invader, the African jewelfish, and the longer-established Mayan cichlid, and a native Florida Everglades prey assemblage. Using field enclosures and laboratory aquaria, we compared predatory effects and antipredator responses across five prey taxa. Total predation rates were higher for Mayan cichlids, which also targeted more prey types. The cichlid invaders had similar microhabitat use, but varied in foraging styles, with African jewelfish being more active. The three prey species that experienced predation were those that overlapped in habitat use with predators. Flagfish were consumed by both predators, while riverine grass shrimp and bluefin killifish were eaten only by Mayan cichlids. In mixed predator treatments, we saw no evidence of emergent effects, since interactions between the two cichlid predators were low. Prey responded to predator threats by altering activity but not vertical distribution. Results suggest that prey vulnerability is affected by activity and habitat domain overlap with predators and may be lower to newly invading predators, perhaps due to novelty in the interaction.
Resumo:
It is often speculated that the high allocation of funds to retirement pension systems has influenced the capacity of Central American and Dominican Republic military to modernize. Yet, the comparative study of the allocation of pension and social funds in these particular countries suggest that there is not direct linkage between the poor funding of military modernization plans and the allocation of funds to military pension systems. The research conducted on this subject shows the following results: 1. The Dominican Republic is the only country that has embarked on a considerable procurement of modern equipment and still reports the largest proportion of social expenditures. 2. El Salvador’s defense budget allocates minimal funding to Social Welfare Institute, which as alternative sources of funding. In 2009, El Salvador increased 15 percent funding to the military to respond to increased role in domestic security issues. 3. The Guatemalan defense expenditure on social programs is fairly low, but it has grown during the past six years due to processes of demobilization. However, the Military Social Welfare Institute is administered by a decentralized institution funded directly by the Ministry of Finance. If it were to be considered as a part of the defense budget, its social expenses would account for almost 16% of it. 4. The Honduran Defense Budget has faced a considerable enlargement during the past four years, with social spending expenses taken precedence over modernization efforts. 2 5. The Nicaraguan system of military pensions is administered by a decentralized entity (IPSM) through a system of salary deductions. Information on the funding of this entity is inconclusive. The Nicaraguan Defense spending on social services has reported a drastic 90% drop since the year 2007.
Resumo:
The Andean and the amazon, comprised of Venezuela, Colombia, Bolivia, Peru and Ecuador, have recently undertaken significant modernization efforts ranging from equipment, logistics, doctrine, training, deployment and the re-definition of the roles and missions of their forces. In most cases, motivations to modernize have been internal, such as continuing operations against armed groups as in the case of Colombia and Peru, enhance border control and sovereignty enforcement, as in the case of Ecuador and Brazil or regime control in Venezuela. However, they are complemented by perceptions of external threats, including traditional intra-state conventional wars. The increased tensions between Colombia and Venezuela and Ecuador as well as the historic Peru-Chile tensions are the most salient examples. Although diplomacy –especially defence diplomacy- has worked to a good degree in creating and strengthening confidence building measures, the potential for inter-state conflict is higher in this region of the Americas. This region has seen the recent emergence of long-term modernization plans, initially in Colombia followed by Venezuela and Ecuador and probably best embodied in scope and scale by the Brazilian National Defence Plan (for its long term vision). Although it has been speculated that high allocation of funds to retirement pension systems has had an impact on delaying modernization plans, this comparative study on the allocation of pension and social funds in these particular countries concludes that there is no direct linkage between the poor funding of military modernization plans and the diversion of funds to military pension systems.