1,516 research outputs found

    Adaptive Lévy processes and area-restricted search in human foraging

    Get PDF
    A considerable amount of research has claimed that animals’ foraging behaviors display movement lengths with power-law distributed tails, characteristic of Lévy flights and Lévy walks. Though these claims have recently come into question, the proposal that many animals forage using Lévy processes nonetheless remains. A Lévy process does not consider when or where resources are encountered, and samples movement lengths independently of past experience. However, Lévy processes too have come into question based on the observation that in patchy resource environments resource-sensitive foraging strategies, like area-restricted search, perform better than Lévy flights yet can still generate heavy-tailed distributions of movement lengths. To investigate these questions further, we tracked humans as they searched for hidden resources in an open-field virtual environment, with either patchy or dispersed resource distributions. Supporting previous research, for both conditions logarithmic binning methods were consistent with Lévy flights and rank-frequency methods–comparing alternative distributions using maximum likelihood methods–showed the strongest support for bounded power-law distributions (truncated Lévy flights). However, goodness-of-fit tests found that even bounded power-law distributions only accurately characterized movement behavior for 4 (out of 32) participants. Moreover, paths in the patchy environment (but not the dispersed environment) showed a transition to intensive search following resource encounters, characteristic of area-restricted search. Transferring paths between environments revealed that paths generated in the patchy environment were adapted to that environment. Our results suggest that though power-law distributions do not accurately reflect human search, Lévy processes may still describe movement in dispersed environments, but not in patchy environments–where search was area-restricted. Furthermore, our results indicate that search strategies cannot be inferred without knowing how organisms respond to resources–as both patched and dispersed conditions led to similar Lévy-like movement distributions

    A framework for space-efficient string kernels

    Full text link
    String kernels are typically used to compare genome-scale sequences whose length makes alignment impractical, yet their computation is based on data structures that are either space-inefficient, or incur large slowdowns. We show that a number of exact string kernels, like the kk-mer kernel, the substrings kernels, a number of length-weighted kernels, the minimal absent words kernel, and kernels with Markovian corrections, can all be computed in O(nd)O(nd) time and in o(n)o(n) bits of space in addition to the input, using just a rangeDistinct\mathtt{rangeDistinct} data structure on the Burrows-Wheeler transform of the input strings, which takes O(d)O(d) time per element in its output. The same bounds hold for a number of measures of compositional complexity based on multiple value of kk, like the kk-mer profile and the kk-th order empirical entropy, and for calibrating the value of kk using the data

    Contextual factors among indiscriminate or larger attacks on food or water supplies, 1946-2015

    Get PDF
    This research updates previous inventories of malicious attacks on food and water to include data from 1946 through mid-2015. A systematic search of news reports, databases and previous inventories of poisoning events was undertaken. Incidents that threatened or were intended to achieve direct harm to humans, and that were either relatively large (number of victims > 4 or indiscriminate in intent or realisation were included. Agents could be chemical, biological or radio-nuclear. Reports of candidate incidents were subjected to systematic inclusion and exclusion criteria as well as validity analysis (not always clearly undertaken in previous inventories of such attacks). We summarise contextual aspects of the attacks that may be important for scenario prioritisation, modelling and defensive preparedness. Opportunity is key to most realised attacks, particularly access to dangerous agents. The most common motives and relative success rate in causing harm were very different between food and water attacks. The likelihood that people were made ill or died also varied by food/water mode, and according to motive and opportunity for delivery of the hazardous agent. Deaths and illness associated with attacks during food manufacture and prior to sale have been fewer than those in some other contexts. Valuable opportunities for food defence improvements are identified in other contexts, especially food prepared in private or community settings

    Signatures of a globally optimal searching strategy in the three-dimensional foraging flights of bumblebees

    Get PDF
    Simulated annealing is a powerful stochastic search algorithm for locating a global maximum that is hidden among many poorer local maxima in a search space. It is frequently implemented in computers working on complex optimization problems but until now has not been directly observed in nature as a searching strategy adopted by foraging animals. We analysed high-speed video recordings of the three-dimensional searching flights of bumblebees (Bombus terrestris) made in the presence of large or small artificial flowers within a 0.5 m3 enclosed arena. Analyses of the three-dimensional flight patterns in both conditions reveal signatures of simulated annealing searches. After leaving a flower, bees tend to scan back-and forth past that flower before making prospecting flights (loops), whose length increases over time. The search pattern becomes gradually more expansive and culminates when another rewarding flower is found. Bees then scan back and forth in the vicinity of the newly discovered flower and the process repeats. This looping search pattern, in which flight step lengths are typically power-law distributed, provides a relatively simple yet highly efficient strategy for pollinators such as bees to find best quality resources in complex environments made of multiple ephemeral feeding sites with nutritionally variable rewards

    Non-L\'evy mobility patterns of Mexican Me'Phaa peasants searching for fuelwood

    Full text link
    We measured mobility patterns that describe walking trajectories of individual Me'Phaa peasants searching and collecting fuelwood in the forests of "La Monta\~na de Guerrero" in Mexico. These one-day excursions typically follow a mixed pattern of nearly-constant steps when individuals displace from their homes towards potential collecting sites and a mixed pattern of steps of different lengths when actually searching for fallen wood in the forest. Displacements in the searching phase seem not to be compatible with L\'evy flights described by power-laws with optimal scaling exponents. These findings however can be interpreted in the light of deterministic searching on heavily degraded landscapes where the interaction of the individuals with their scarce environment produces alternative searching strategies than the expected L\'evy flights. These results have important implications for future management and restoration of degraded forests and the improvement of the ecological services they may provide to their inhabitants.Comment: 15 pages, 4 figures. First version submitted to Human Ecology. The final publication will be available at http://www.springerlink.co

    Competing biosecurity and risk rationalities in the Chittagong poultry commodity chain, Bangladesh

    Get PDF
    This paper anthropologically explores how key actors in the Chittagong live bird trading network perceive biosecurity and risk in relation to avian influenza between production sites, market maker scenes and outlets. They pay attention to the past and the present, rather than the future, downplaying the need for strict risk management, as outbreaks have not been reported frequently for a number of years. This is analysed as ‘temporalities of risk perception regarding biosecurity’, through Black Swan theory, the idea that unexpected events with major effects are often inappropriately rationalized (Taleb in The Black Swan. The impact of the highly improbable, Random House, New York, 2007). This incorporates a sociocultural perspective on risk, emphasizing the contexts in which risk is understood, lived, embodied and experienced. Their risk calculation is explained in terms of social consent, practical intelligibility and convergence of constraints and motivation. The pragmatic and practical orientation towards risk stands in contrast to how risk is calculated in the avian influenza preparedness paradigm. It is argued that disease risk on the ground has become a normalized part of everyday business, as implied in Black Swan theory. Risk which is calculated retrospectively is unlikely to encourage investment in biosecurity and, thereby, points to the danger of unpredictable outlier events

    Virtual player design using self-learning via competitive coevolutionary algorithms

    Get PDF
    The Google Artificial Intelligence (AI) Challenge is an international contest the objective of which is to program the AI in a two-player real time strategy (RTS) game. This AI is an autonomous computer program that governs the actions that one of the two players executes during the game according to the state of play. The entries are evaluated via a competition mechanism consisting of two-player rounds where each entry is tested against others. This paper describes the use of competitive coevolutionary (CC) algorithms for the automatic generation of winning game strategies in Planet Wars, the RTS game associated with the 2010 contest. Three different versions of a prime algorithm have been tested. Their common nexus is not only the use of a Hall-of-Fame (HoF) to keep note of the winners of past coevolutions but also the employment of an archive of experienced players, termed the hall-of-celebrities (HoC), that puts pressure on the optimization process and guides the search to increase the strength of the solutions; their differences come from the periodical updating of the HoF on the basis of quality and diversity metrics. The goal is to optimize the AI by means of a self-learning process guided by coevolutionary search and competitive evaluation. An empirical study on the performance of a number of variants of the proposed algorithms is described and a statistical analysis of the results is conducted. In addition to the attainment of competitive bots we also conclude that the incorporation of the HoC inside the primary algorithm helps to reduce the effects of cycling caused by the use of HoF in CC algorithms.This work is partially supported by Spanish MICINN under Project ANYSELF (TIN2011-28627-C04-01),3 by Junta de Andalucía under Project P10-TIC-6083 (DNEMESIS) and by Universidad de Málaga, Campus de Excelencia Internacional Andalucía Tech

    Batch effect confounding leads to strong bias in performance estimates obtained by cross-validation.

    Get PDF
    BACKGROUND: With the large amount of biological data that is currently publicly available, many investigators combine multiple data sets to increase the sample size and potentially also the power of their analyses. However, technical differences ("batch effects") as well as differences in sample composition between the data sets may significantly affect the ability to draw generalizable conclusions from such studies. FOCUS: The current study focuses on the construction of classifiers, and the use of cross-validation to estimate their performance. In particular, we investigate the impact of batch effects and differences in sample composition between batches on the accuracy of the classification performance estimate obtained via cross-validation. The focus on estimation bias is a main difference compared to previous studies, which have mostly focused on the predictive performance and how it relates to the presence of batch effects. DATA: We work on simulated data sets. To have realistic intensity distributions, we use real gene expression data as the basis for our simulation. Random samples from this expression matrix are selected and assigned to group 1 (e.g., 'control') or group 2 (e.g., 'treated'). We introduce batch effects and select some features to be differentially expressed between the two groups. We consider several scenarios for our study, most importantly different levels of confounding between groups and batch effects. METHODS: We focus on well-known classifiers: logistic regression, Support Vector Machines (SVM), k-nearest neighbors (kNN) and Random Forests (RF). Feature selection is performed with the Wilcoxon test or the lasso. Parameter tuning and feature selection, as well as the estimation of the prediction performance of each classifier, is performed within a nested cross-validation scheme. The estimated classification performance is then compared to what is obtained when applying the classifier to independent data

    CD5 expression promotes IL-10 production through activation of the MAPK/Erk pathway and upregulation of TRPC1 channels in B lymphocytes.

    Get PDF
    CD5 is constitutively expressed on T cells and a subset of mature normal and leukemic B cells in patients with chronic lymphocytic leukemia (CLL). Important functional properties are associated with CD5 expression in B cells, including signal transducer and activator of transcription 3 activation, IL-10 production and the promotion of B-lymphocyte survival and transformation. However, the pathway(s) by which CD5 influences the biology of B cells and its dependence on B-cell receptor (BCR) co-signaling remain unknown. In this study, we show that CD5 expression activates a number of important signaling pathways, including Erk1/2, leading to IL-10 production through a novel pathway independent of BCR engagement. This pathway is dependent on extracellular calcium (Ca2+) entry facilitated by upregulation of the transient receptor potential channel 1 (TRPC1) protein. We also show that Erk1/2 activation in a subgroup of CLL patients is associated with TRPC1 overexpression. In this subgroup of CLL patients, small inhibitory RNA (siRNA) for CD5 reduces TRPC1 expression. Furthermore, siRNAs for CD5 or for TRPC1 inhibit IL-10 production. These findings provide new insights into the role of CD5 in B-cell biology in health and disease and could pave the way for new treatment strategies for patients with B-CLL
    corecore