Model of a predatory stealth behaviour camouflaging motion.

نویسندگان

  • Andrew James Anderson
  • Peter William McOwan
چکیده

A computational model of a stealth strategy inspired by the apparent mating tactics of male hoverflies is presented. The stealth strategy (motion camouflage) paradoxically allows a predator to approach a moving prey in such a way that it appears to be a stationary object. In the model, the predators are controlled by neural sensorimotor systems that base their decisions on realistic levels of input information. They are shown to be able to employ motion camouflage to approach prey that move along both real hoverfly flight paths and artificially generated flight paths. The camouflaged approaches made demonstrate that the control systems have an ability to predict future prey movements. This is illustrated using two- and three-dimensional simulations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Manuscript Submission Invitations from ‘Predatory Journals’: What Should Authors Do?

Press freedom and worldwide internet access have opened ample opportunity for a staggering number of poor open access journals and junk publishers to emerge. Dubious publishers are abusing and camouflaging the golden open access model. In 2012, Jeffery Beall shed light on the predatory journals (as he preferred to call them) and the threat to open access scientific publication. Publishing in pr...

متن کامل

Stealth predation and the predatory success of the invasive ctenophore Mnemiopsis leidyi.

In contrast to higher metazoans such as copepods and fish, ctenophores are a basal metazoan lineage possessing a relatively narrow set of sensory-motor capabilities. Yet lobate ctenophores can capture prey at rates comparable to sophisticated predatory copepods and fish, and they are capable of altering the composition of coastal planktonic communities. Here, we demonstrate that the predatory s...

متن کامل

Using camouflaging mobility to protect privacy in mobile ad hoc networks

The open nature of wireless medium has left wireless communications vulnerable to various privacy attacks. Much research work has been proposed to protect the identity anonymity of communicating parties, the anonymity of network routes and the location privacy of the message source and destination. However, with the advent of new radio identification and localization techniques, more advanced p...

متن کامل

Visual motion with pink noise induces predation behaviour

Visual motion cues are one of the most important factors for eliciting animal behaviour, including predator-prey interactions in aquatic environments. To understand the elements of motion that cause such selective predation behaviour, we used a virtual plankton systemwhere the predation behaviour in response to computer-generated prey was analysed. First, we performed motion analysis of zooplan...

متن کامل

Mechanical behaviour of motion for the two-dimensional monolayer system‎

‎In this paper we study the dynamics of the 2D-motion of a particle of monolayer‎. First we consider the usual physical time component and the plan manifold R2, having the polar coordinates. Then a geometric approach to nonholonomic constrained mechanical systems is applied to a problem from the two dimensional geometric dynamics of the Langmuir-Blodgett monolayer‎. We consider a constraint sub...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Proceedings. Biological sciences

دوره 270 1514  شماره 

صفحات  -

تاریخ انتشار 2003