2,056 research outputs found

    Investigation of the Specht density estimator

    Get PDF
    The feasibility of using the Specht density estimator function on the IBM 360/44 computer is investigated. Factors such as storage, speed, amount of calculations, size of the smoothing parameter and sample size have an effect on the results. The reliability of the Specht estimator for normal and uniform distributions and the effects of the smoothing parameter and sample size are investigated

    Computer programs and documentation

    Get PDF
    Various statistical tests that were used to check out random number generators are described. A total of twelve different tests were considered, and from these, six were chosen to be used. The frequency test, max t test, run test, lag product test, gap test, and the matrix test are included

    A theory for investment across defences triggered at different stages of a predator-prey encounter

    Get PDF
    We introduce a general theoretical description of a combination of defences acting sequentially at different stages in the predatory sequence in order to make predictions about how animal prey should best allocate investment across different defensive stages. We predict that defensive investment will often be concentrated at stages early in the interaction between a predator individual and the prey (especially if investment is concentrated in only one defence, then it will be in the first defence). Key to making this prediction is the assumption that there is a cost to a prey when it has a defence tested by an enemy, for example because this incurs costs of deployment or tested costs as a defence is exposed to the enemies; and the assumption that the investment functions are the same among defences. But if investment functions are different across defences (e.g. the investment efficiency in making resources into defences is higher in later defences than in earlier defences), then the contrary could happen. The framework we propose can be applied to other victim-exploiter systems, such as insect herbivores feeding on plant tissues. This leads us to propose a novel explanation for the observation that herbivory damage is often not well explained by variation in concentrations of toxic plant secondary metabolites. We compare our general theoretical structure with related examples in the literature, and conclude that coevolutionary approaches will be profitable in future work

    Synthesis of finite displacements and displacements in continental margins

    Get PDF
    The scope of the project is the analysis of displacement-rate fields in the transitional regions between cratonal and oceanic lithospheres over Phanerozoic time (last 700 ma). Associated goals are an improved understanding of range of widths of major displacement zones; the partition of displacement gradients and rotations with position and depth in such zones; the temporal characteristics of such zones-the steadiness, episodicity, and duration of uniform versus nonunifrom fields; and the mechanisms and controls of the establishment and kinematics of displacement zones. The objective is to provide a context of time-averaged kinematics of displacement zones. The initial phase is divided topically among the methodology of measurement and reduction of displacements in the lithosphere and the preliminary analysis from geologic and other data of actual displacement histories from the Cordillera, Appalachians, and southern North America

    Patients as researchers - innovative experiences in UK National Health Service research

    Get PDF
    Consumer involvement is an established priority in UK health and social care service development and research. To date, little has been published describing the process of consumer involvement and assessing ‘consumers’ contributions to research. This paper provides a practical account of the effective incorporation of consumers into a research team, and outlines the extent to which they can enhance the research cycle; from project development and conduct, through data analysis and interpretation, to dissemination. Salient points are illustrated using the example of their collaboration in a research project. Of particular note were consumers’ contributions to the development of an ethically enhanced, more robust project design, and enriched data interpretation, which may not have resulted had consumers not been an integral part of the research team

    Groundwater investigation Buntine-Marchagee Natural Diversity Recovery Catchment

    Get PDF
    A groundwater investigation was initiated in the Buntine-Marchagee Natural Diversity Recovery Catchment 200 kms north-east of Perth, Western Australia in 2002. The investigation aimed to install a regional groundwater monitoring network and characterise the regolith throughout the catchment. Drill site selection was based on establishing a series of transects to enable construction of hydrogeological cross-sections to enhance conceptual understanding of the catchment

    Evolutionarily stable defence and signalling of that defence

    Get PDF
    We examine the evolution and maintenance of defence and conspicuousness in prey species using a game theoretic model. In contrast to previous works, predators can raise as well as lower their attack probabilities as a consequence of encountering moderately defended prey. Our model predicts four distinct possibilities for evolutionarily stable strategies (ESSs) featuring maximum crypsis. Namely that such a solution can exist with (1) zero toxicity, (2) a non-zero but non-aversive level of toxicity, (3) a high, aversive level of toxicity or (4) that no such maximally cryptic solution exists. Maximally cryptic prey may still invest in toxins, because of the increased chance of surviving an attack (should they be discovered) that comes from having toxins. The toxin load of maximally cryptic prey may be sufficiently strong that the predators will find them aversive, and seek to avoid similar looking prey in future. However, this aversiveness does not always necessarily trigger aposematic signalling, and highly toxic prey can still be maximally cryptic, because the increased initial rate of attack from becoming more conspicuous is not necessarily always compensated for by increased avoidance of aversive prey by predators. In other circumstances, the optimal toxin load may be insufficient to generate aversion but still be non-zero (because it increases survival), and in yet other circumstances, it is optimal to make no investment in toxins at all. The model also predicts ESSs where the prey are highly defended and aversive and where this defence is advertised at a cost of increased conspicuousness to predators. In many circumstances there is an infinite array of these aposematic ESSs, where the precise appearance is unimportant as long as it is highly visible and shared by all members of the population. Yet another class of solutions is possible where there is strong between-individual variation in appearance between conspicuous, poorly defended prey

    The Haggle-O-Tron:design intervention in secondhand retail

    Get PDF

    Sixth Sense Transport : Challenges in Supporting Flexible Time Travel

    Get PDF
    In this paper, we consider the challenges associated with providing a mobile computing system that helps users enjoy a more flexible relationship between time and travel. Current travel plans, especially in Western cultures, are dominated by a strict notion of time. The need to conform to schedules leads to increased pressures for travellers and inefficiencies when these schedules cannot be met. We are interested in exploring the extent to which mobile computing can be used to help travellers relax these schedules and adopt a more opportunistic approach to travel – potentially helping to reduce the environmental, financial and societal costs of modern travel
    • …
    corecore