Chemical Camouflage– A Frog's Strategy to Co-Exist with Aggressive Ants

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chemical Camouflage– A Frog's Strategy to Co-Exist with Aggressive Ants

Whereas interspecific associations receive considerable attention in evolutionary, behavioural and ecological literature, the proximate bases for these associations are usually unknown. This in particular applies to associations between vertebrates with invertebrates. The West-African savanna frog Phrynomantis microps lives in the underground nest of ponerine ants (Paltothyreus tarsatus). The a...

متن کامل

a paradigm shift away from method-wise teaching to strategy-wise teaching: an investigation of reconstructive strategy versus communicative strategy

چکیده: هدف اصلی این مطالعه ی توصیفی تحقیقی در حقیقت تلاشی پساروش-گرا به منظور رسیدن به نتیجه ای منطقی در انتخاب مناسبترین راهکار آموزشی بر گرفته از چارچوب راهبردی مطرح شده توسط والدمر مارتن بوده که به بهترین شکل سازگار و مناسب با سامانه ی آموزشی ایران باشد. از این رو، دو راهکار آموزشی، راهکار ارتباطی و راهکار بازساختی، برای تحقیق و بررسی انتخاب شدند. صریحاً اینکه، در راستای هدف اصلی این پژوهش، ر...

15 صفحه اول

Chemical camouflage of antigenic determinants: stealth erythrocytes.

In a number of clinical circumstances it would be desirable to artificially conceal cellular antigenic determinants to permit survival of heterologous donor cells. A case in point is the problem encountered in transfusions of patients with rare blood types or chronically transfused patients who become allosensitized to minor blood group determinants. We have tested the possibility that chemical...

متن کامل

a comparison of teachers and supervisors, with respect to teacher efficacy and reflection

supervisors play an undeniable role in training teachers, before starting their professional experience by preparing them, at the initial years of their teaching by checking their work within the proper framework, and later on during their teaching by assessing their progress. but surprisingly, exploring their attributes, professional demands, and qualifications has remained a neglected theme i...

15 صفحه اول

A game theoretic approach to detect and co-exist with malicious nodes in wireless networks

Identification and isolation of malicious nodes in a distributed system is a challenging problem. This problem is further aggravated in a wireless network because the unreliable channel hides the actions of each node from one another. Therefore, a regular node can only construct a belief about a malicious node through monitoring and observation. In this paper, we use game theory to study the in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: PLoS ONE

سال: 2013

ISSN: 1932-6203

DOI: 10.1371/journal.pone.0081950