首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 21 毫秒
1.
2.
3.
The dilution effect as an antipredation behaviour is the main theoretical reason for grouping in animals and states that all individuals in a group have an equal risk of being predated if equally spaced from each other and the predator. Stalking predators, however, increase their chance of attack success by preferentially targeting nonvigilant individuals, potentially making relative vigilance rates in a group relatively important in determining predation compared with the dilution effect. Many predators, however, attack opportunistically without stalking, when targeting of nonvigilant individuals may be less likely, so that the dilution effect will then be a relatively more important antipredation reason for grouping. We tested whether an opportunistically hunting predator, the sparrowhawk, Accipiter nisus, preferentially attacked vigilant or feeding prey models presented in pairs. We found that sparrowhawks attacked vigilant and feeding mounts at similar frequencies. Our results suggest that individuals should prioritize maximizing group size or individual vigilance dependent on the type of predator from which they are at risk. When the most likely predator is a stalker, individuals should aim to have the highest vigilance levels in a group, and there may be relatively little selective advantage to being in the largest group. In contrast, if the most likely predator is an opportunist, then individuals should simply aim to be in the largest group and can also spend more time foraging without compromising predation risk. For most natural systems this will mean a trade-off between the two strategies dependent on the frequency of attack of each predator type. Copyright 2003 The Association for the Study of Animal Behaviour. Published by Elsevier Ltd. All rights reserved.  相似文献   

4.
When the central nervous system (CNS) is under viral attack, defensive antiviral responses must necessarily arise from the CNS itself to rapidly and efficiently curb infections with minimal collateral damage to the sensitive, specialized and non-regenerating neural tissue. This presents a unique challenge because an intact blood–brain barrier (BBB) and lack of proper lymphatic drainage keeps the CNS virtually outside the radar of circulating immune cells that are at constant vigilance for antigens in peripheral tissues. Limited antigen presentation skills of CNS cells in comparison to peripheral tissues is because of a total lack of dendritic cells and feeble expression of major histocompatibility complex (MHC) proteins in neurons and glia. However, research over the past two decades has identified immune effector mechanisms intrinsic to the CNS for immediate tackling, attenuating and clearing of viral infections, with assistance pouring in from peripheral circulation in the form of neutralizing antibodies and cytotoxic T cells at a later stage. Specialized CNS cells, microglia and astrocytes, were regarded as sole sentinels of the brain for containing a viral onslaught but neurons held little recognition as a potential candidate for protecting itself from the proliferation and pathogenesis of neurotropic viruses. Accumulating evidence however indicates that extracellular insult causes neurons to express immune factors characteristic of lymphoid tissues. This article aims to comprehensively analyze current research on this conditional alteration in the protein expression repertoire of neurons and the role it plays in CNS innate immune response to counter viral infections.  相似文献   

5.
6.
Is the membrane attack complex of complement an enzyme?   总被引:11,自引:0,他引:11  
Summary Recent studies on the functional activities of the membrane attack complex of complement, C5b-9, are reviewed. A new speculative hypothesis has been advanced to account for the ability of complement to mediate lysis of various targets. This hypothesis has three major elements: 1) that the membrane attack complex is an enzyme; 2) that the substrate for this putative enzyme is a membrane constituent; 3) that the substrate specificity of the putative enzyme is dependent on the species source of individual complement components within the C5b-9 complex.Abbreviations E = sheep red cells - A = rabbit IgM anti-Forssman antibody - Hu or hu = human - GP or gp = guinea pig  相似文献   

7.
We provide the first evidence of a small-headed fly planidium (first instar larva; Diptera: Acroceridae) associated with a whirligig mite (Acari: Acariformes: Prostigmata: Anystina: Anystidae) in Baltic amber. This fossil is surprising as parasitic nematodes are the only metazoans known to successfully attack acariform mites, and Acroceridae are believed to be host-restricted parasitoids of spiders. The fossil corroborates a previously published, but widely dismissed, paper that first reported parasitism of parasitengone mites by acrocerid planidia. The possible natural history implications of this find are discussed.  © 2008 The Linnean Society of London, Biological Journal of the Linnean Society , 2008, 93 , 9–13.  相似文献   

8.
Our closest nonhuman primate relatives, chimpanzees, engage in potentially lethal between‐group conflict; this collective aggressive behavior shows parallels with human warfare. In some communities, chimpanzee males also severely attack and even kill females of the neighboring groups. This is surprising given their system of resource defense polygyny, where males are expected to acquire potential mates. We develop a simple mathematical model based on reproductive skew among primate males to solve this puzzle. The model predicts that it is advantageous for high‐ranking males but not for low‐ranking males to attack females. It also predicts that more males gain a benefit from attacking females as the community's reproductive skew decreases, i.e., as mating success is more evenly distributed. Thus, fatal attacks on females should be concentrated in communities with low reproductive skew. These attacks should also concur with between‐community infanticide. A review of the chimpanzee literature provides enough preliminary support for this prediction to warrant more detailed testing. Am J Phys Anthropol 155:430–435, 2014. © 2014 Wiley Periodicals, Inc.  相似文献   

9.
10.
Many angiosperms use a remarkable reproductive strategy that relies on attracting animals (insect, avian or mammalian pollinators) to transfer pollen between plants. Relying on other organisms for sexual reproduction seems evolutionarily untenable, but the great diversity of angiosperms illustrates how highly successful this strategy is. To attract pollinators, plants offer a variety of rewards. Perhaps the primary floral reward is floral nectar. Plant nectar has long been considered a simple sugar solution but recent work has demonstrated that nectar is a complex biological fluid containing significant and important biochemistry with the potential function of inhibiting microbial growth. These results lead the way to novel insights into the mechanisms of floral defense and the co-evolution of angiosperms and their pollinators.  相似文献   

11.
Does tent caterpillar attack reduce the food quality of red alder foliage?   总被引:1,自引:0,他引:1  
Summary We assayed the quality of red alder trees for western tent caterpillar growth and survival to test the hypothesis that caterpillar feeding stimulates plant defenses in both attacked and adjacent trees. Three years of high tent caterpillar density were necessary before deterioration in foliage quality occurred, and even then only foliage from trees which were almost completely defoliated in the current year reduced the growth of caterpillars. Both tent size and mean egg mass size increased after the second year of high density which indicates that good conditions still existed for tent caterpillars after 2 to 3 years of heavy feeding.Egg masses which were moved to areas where trees had not recently supported a high caterpillar population produced significantly smaller tents than endemic controls in 1982. Therefore the small tent and egg mass size of the high density population in 1982 was inherent to the insects rather than modified by food source. In 1983 the tents from introduced egg masses were as large as naturally occurring tents.If lightly attacked trees within areas of high caterpillar density are better defended against insect attack, this does not show up in their ability to support caterpillar growth and survival. We found no evidence to support the hypothesis that trees communicate insect attack and stimulate chemical defenses in adjacent trees. Reduced foliage quality seems to be a result of extensive insect damage rather than a defense against insect damage.  相似文献   

12.
Summary The bud-galling sawfly, Euura mucronata, attacked longer shoot length classes on its host, Salix cinerea, more frequently than shorter shoots. Shoot length accounted for 76 to 93 percent of the variance in number of galls per 100 shoots in three habitats: forest, watermeadow, and lakeside. The reasons for this pattern were addressed with studies on shoot length in relation to: 1. Number of resources (buds) per shoot; 2. Success in establishment of larvae in galls; 3. Gall size and resources per gall; and 4. Survival of larvae after establishment as influenced by plant resistance and natural enemy attack. The most important factors proved to be success in establishment of larvae, with percent of variance accounted for ranging from 57 to 77 percent in three of four sites where relationships were significant, and survival after establishment of larvae, with variance accounted for ranging from 40 to 54 percent in the same three sites. The pattern of survival was dictated by plant resistance and not by natural enemies. These two additive factors resulted in a general relationship across all sites of increasing emergence of fully developed larvae per cohort as shoot length increased, accounting for 78 percent of the variance. These adaptive advantages to attacking longer shoots are sufficient to account for the pattern of increased probability of shoots being attacked as they increase in length.  相似文献   

13.
Various types of other fungi colonize glomeromycotinan (Mucoromycota) spores in the Early Devonian Rhynie chert. However, relatively few of these associations have been described and evaluated in detail. One particular type of glomoid spore located in degrading land plant axes from the Rhynie chert provides evidence of (simultaneous) interaction with three different fungi. Massive callosities occur around the intrusion filaments of a chytrid-like parasite with epibiotic sporangia, while the hyphae of a delicate mycelial fungus extend into the spore lumen without triggering a recognizable host response. Several spores show large numbers of inwardly directed projections, which are regularly distributed and consist of a short hyphal branch encased in host wall material. The projections represent the penetration sites of a distinctive, mycelial fungus that forms a mantle-like hyphal sheath around the spores. This type of fungal interaction with glomeromycotinan spores has not previously been reported, and thus expands our knowledge of the numerous interfungal relationships that existed in early continental ecosystems.  相似文献   

14.
Aposematic coloration often has an element of conspicuousness. One suggested benefit of conspicuousness is that it enables the prey to be detected at a greater distance, allowing a predator more time to make a correct decision about attacking it and thus reducing possible recognition errors made by predators. I conducted an experiment, with chicks, Gallus gallus domesticus, as predators on live aposematic and nonaposematic prey, to investigate the effects of decision time and signal size on predator sampling behaviour. The chicks were subjected to different degrees of competition to influence how quickly decisions had to be made. Chicks in four treatment groups, either in the presence or absence of a competing chick, were presented with either solitary prey or prey in groups. In the presence of a competitor, chicks attacked the prey more often and more quickly and needed more attacks before they started to avoid the prey. With prey in groups, chicks took longer to attack, attacked less often, learnt to avoid prey more quickly and killed fewer aposematic prey. This experiment provides evidence for the importance of time and signal size for predators' attack decisions. More time to view prey prior to attack could produce a stronger image and thus encourage avoidance learning and produce a stronger neophobic avoidance effect. Copyright 2000 The Association for the Study of Animal Behaviour.  相似文献   

15.
16.
17.
Precise and deep comprehension of plant responses to herbivorous arthropods requires detailed knowledge of how a plant “notices” the attack. Herbivore attack is not restricted to plant wounding by feeding, but instead different phases of attack that elicit a plant response need to be distinguished: touch, oviposition and feeding. Touch, secretions released with eggs and regurgitate delivered during feeding may act in concert as elicitors of plant defence. Here, we discuss the current knowledge of what a plant “notices” during the different phases of herbivore attack and how it responds at the molecular, physiological and ecological level. Understanding the mechanisms of plant responses to the different phases of herbivore attack will be a key challenge in unravelling the complex communication pathways between plants and herbivores.  相似文献   

18.
1 A field experiment was carried out to test the hypothesis that treatment of Norway spruce trees with the Ips typographus-transmitted blue-stain fungus Ceratocystis polonica enhances tree resistance to later mass attack by this bark beetle. 2 Twenty-five mature trees were pretreated by inoculating a non-lethal dose of the fungus into the bark, while 18 trees served as untreated controls. Three and a half weeks after treatment a bark beetle attack was initiated by attaching dispensers with I. typographus pheromone to the tree trunks. 3 A significantly larger proportion (67%) of the control trees than of the pretreated trees (36%) were killed by the beetle attack. The result is discussed in relation to recent results regarding defence mechanisms in Norway spruce trees.  相似文献   

19.
During a long-term study of wild chimpanzees in Tanzania, an unusual gang attack on a young adult male by the alpha male and seven other members of the same unit group (community) was observed and videotaped. Before the gang attack, the victim had not pant-grunted to the alpha male or to other adult males except for the second-ranked male, but had often bullied adult females without apparent reason. The alpha male's violent behavior, therefore, might have been punishment of or revenge against the ill-mannered young chimpanzee. This is the first record of an adult male other than an ex-alpha male becoming the object of ostracism by wild chimpanzees, although the victimized male did manage to return to the group after more than three months, when an ex-alpha male succeeded in reestablishing his former position.  相似文献   

20.
We used formative research to assess the information needs and information-seeking strategies with general public audience segments in response to a hypothetical attack using plague, and we pretested informational materials about plague. Twelve focus groups were conducted across the country, with 129 individuals being purposively sampled by ethnicity and place of residence. Across groups, participants wanted to understand: the nature of the threat of plague, how to protect themselves from transmission, how to detect exposure and symptoms, how to treat infection, and progress in apprehending perpetrators. Participants reported that they would seek information from both the news media and local authorities. Based on the findings and the challenges posed by a terrorist attack using plague, the authors recommend that message materials answer key questions, provide clear action steps, be clear and easily understood, include sources for credibility, and reflect full government disclosure. A dissemination plan is required to ensure that critical information will be available when people need it and where they look.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号