Chemical Camouflage– A Frog's Strategy to Co-Exist with Aggressive Ants
نویسندگان
چکیده
منابع مشابه
Chemical Camouflage– A Frog's Strategy to Co-Exist with Aggressive Ants
Whereas interspecific associations receive considerable attention in evolutionary, behavioural and ecological literature, the proximate bases for these associations are usually unknown. This in particular applies to associations between vertebrates with invertebrates. The West-African savanna frog Phrynomantis microps lives in the underground nest of ponerine ants (Paltothyreus tarsatus). The a...
متن کاملa paradigm shift away from method-wise teaching to strategy-wise teaching: an investigation of reconstructive strategy versus communicative strategy
چکیده: هدف اصلی این مطالعه ی توصیفی تحقیقی در حقیقت تلاشی پساروش-گرا به منظور رسیدن به نتیجه ای منطقی در انتخاب مناسبترین راهکار آموزشی بر گرفته از چارچوب راهبردی مطرح شده توسط والدمر مارتن بوده که به بهترین شکل سازگار و مناسب با سامانه ی آموزشی ایران باشد. از این رو، دو راهکار آموزشی، راهکار ارتباطی و راهکار بازساختی، برای تحقیق و بررسی انتخاب شدند. صریحاً اینکه، در راستای هدف اصلی این پژوهش، ر...
15 صفحه اولChemical camouflage of antigenic determinants: stealth erythrocytes.
In a number of clinical circumstances it would be desirable to artificially conceal cellular antigenic determinants to permit survival of heterologous donor cells. A case in point is the problem encountered in transfusions of patients with rare blood types or chronically transfused patients who become allosensitized to minor blood group determinants. We have tested the possibility that chemical...
متن کاملa comparison of teachers and supervisors, with respect to teacher efficacy and reflection
supervisors play an undeniable role in training teachers, before starting their professional experience by preparing them, at the initial years of their teaching by checking their work within the proper framework, and later on during their teaching by assessing their progress. but surprisingly, exploring their attributes, professional demands, and qualifications has remained a neglected theme i...
15 صفحه اولA game theoretic approach to detect and co-exist with malicious nodes in wireless networks
Identification and isolation of malicious nodes in a distributed system is a challenging problem. This problem is further aggravated in a wireless network because the unreliable channel hides the actions of each node from one another. Therefore, a regular node can only construct a belief about a malicious node through monitoring and observation. In this paper, we use game theory to study the in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: PLoS ONE
سال: 2013
ISSN: 1932-6203
DOI: 10.1371/journal.pone.0081950