The signature of phylogenetic constraints on food-web structure
نویسندگان
چکیده
Understanding the processes underlying food-web structure and organization remains one of the major tasks of ecology. While first attempts were mostly based on niche theory, with body size of species imposing a hierarchical structure for consumer species, it has been recently suggested that phylogenetic constraints may be more fundamental to understand who eats whom in natural communities. Models of food-web structure built on basic evolutionary assumptions are able to adequately reproduce the topology of real food-webs. Here, we analyze different implications of phylogenetic constraints on trophic structure, and present preliminary results. Our exploration of the relationship between trophic and taxonomic similarity in food-webs shows that phylogeny and trophic structure are closely linked. Interestingly, the relationship is stronger for trophic similarity between prey (similarity measured by shared predators species, or predatory similarity) than between consumer species (similarity measured by shared prey species, or dietary similarity). When relating bodymass of prey and predators, slopes ofmajor axis regressionswithin taxonomic groups differ markedly from the global pattern; similar differences between taxonomic levels appear when exploring the relationship between body mass of predators and the range in body mass of their prey, and vice versa. These results are important to understand how evolutionary processes shaping body sizes can affect food-web structure. * Corresponding author. Tel.: +41 26 300 8869. E-mail address: [email protected] (L.-F. Bersier). 1 Present address: Station de recherche Agroscope Changins-Wädenswil, CP 1012, CH-1260 Nyon, Switzerland. 1 ht tp :// do c. re ro .c h Published in "Ecological Complexity 10.1016/j.ecocom.2007.06.013, 2008" which should be cited to refer to this work.
منابع مشابه
In Silico Analysis of Glutaminase from Different Species of Escherichia and Bacillus
Background: Glutaminase (EC 3.5.1.2) catalyzes the hydrolytic degradation of L-glutamine to L-glutamic acid and has been introduced for cancer therapy in recent years. The present study was an in silico analysis of glutaminase to further elucidate its structure and physicochemical properties.Methods: Forty glutaminase protein sequences from different species of Escherichia and Bacillus obtained...
متن کاملQoS-Based web service composition based on genetic algorithm
Quality of service (QoS) is an important issue in the design and management of web service composition. QoS in web services consists of various non-functional factors, such as execution cost, execution time, availability, successful execution rate, and security. In recent years, the number of available web services has proliferated, and then offered the same services increasingly. The same web ...
متن کاملConstraints to Increasing Agricultural Production and Productivity among Women Farmers in Sub-Saharan Africa: Implications for Agricultural Transformation Agenda
Agriculture is an important engine of growth and poverty reduction in much of Africa, Nigeria inclusive. But the sector is underperforming in part because women, who are often crucial resource in agriculture and rural economy, face constraints that reduce their productivity. An understanding of these constraints is a prerequisite to devising policies to improve agricultural production and produ...
متن کاملComparative Phylogenetic Perspectives on the Evolutionary Relationships in the Brine Shrimp Artemia Leach, 1819 (Crustacea: Anostraca) Based on Secondary Structure of ITS1 Gene
This is the first study on phylogenetic relationships in the genus Artemia Leach, 1819 using the pattern and sequence of secondary structures of internal transcribed spacer 1 (ITS1). Significant intraspecific variation in the secondary structure of ITS1 rRNA was found in Artemia tibetiana. In the phylogenetic tree based on joined primary and secondary structure sequences, Artemia urmiana and pa...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کامل