335 research outputs found

    Distortion of the Local Magnetic Field Appears to Neither Disrupt Nocturnal Navigation nor Cue Shelter Recognition in the Amblypygid \u3ci\u3eParaphrynus laevifrons\u3c/i\u3e

    Get PDF
    Many arthropods are known to be sensitive to the geomagnetic field and exploit the field to solve spatial problems. The polarity of the geomagnetic field is used, for instance, as an orientation cue by leafcutter ants as they travel on engineered trails in a rainforest and by Drosophila larvae as they move short distances in search of food. A ubiquitous orientation cue like the geomagnetic field may be especially useful in complex, cluttered environments like rainforests, where the reliability of celestial cues used to navigate in more open environments may be poor. The neotropical amblypygid Paraphrynus laevifrons is a nocturnal arachnid that wanders nightly in the vicinity of its shelter and occasionally travels 30 m or more in the rainforest understory before it returns to its shelter. Here, we conducted a field experiment to determine whether navigation by P. laevifrons is guided by the ambient magnetic field and a complementary laboratory experiment to assess whether a magnetic anomaly could be used to pinpoint the entrance of a shelter. In the field experiment, subjects were fitted with a radio transmitter and a small, powerful magnet or a similar-sized brass disk and displaced 10 m from their shelter. The return rate of magnet-fitted subjects was similar to that of brass-fitted subjects and to that of subjects in an earlier study fitted with only a radio transmitter. In the laboratory experiment, we trained P. laevifrons with a protocol under which the amblypygid Phrynus marginemaculatus rapidly learns—in 1–14 trials over two daily sessions—to associate an olfactory stimulus with access to a shelter. The conditioned stimulus here was a magnetic anomaly characterized by a high total field intensity and a 180° reversal of the polarity of the ambient magnetic field. The magnetic anomaly–shelter contingency was not learned in 50 trials conducted over 10 daily sessions. These results imply prima facie that P. laevifrons does not rely on a magnetic compass to locate or recognize a shelter and, perhaps, that the magnetic field cannot be detected, but alternative explanations are discussed

    Web spider defense technique in wireless sensor networks

    Full text link
    Wireless sensor networks (WSNs) are currently widely used in many environments. Some of them gather many critical data, which should be protected from intruders. Generally, when an intruder is detected in the WSN, its connection is immediately stopped. But this way does not let the network administrator gather information about the attacker and/or its purposes. In this paper, we present a bioinspired system that uses the procedure taken by the web spider when it wants to catch its prey. We will explain how all steps performed by the web spider are included in our system and we will detail the algorithm and protocol procedure. A real test bench has been implemented in order to validate our system. It shows the performance for different response times, the CPU and RAM consumption, and the average and maximum values for ping and tracert time responses using constant delay and exponential jitter.This work has been partially supported by the "Ministerio de Ciencia e Innovacion", through the "Plan Nacional de I+D+i 2008-2011" in the "Subprograma de Proyectos de Investigacion Fundamental", Project TEC2011-27516.Cánovas Solbes, A.; Lloret, J.; Macias Lopez, EM.; Suarez Sarmiento, A. (2014). Web spider defense technique in wireless sensor networks. International Journal of Distributed Sensor Networks. 2014:1-7. https://doi.org/10.1155/2014/348606S172014Bri, D., Garcia, M., Lloret, J., & Dini, P. (2009). Real Deployments of Wireless Sensor Networks. 2009 Third International Conference on Sensor Technologies and Applications. doi:10.1109/sensorcomm.2009.69Sendra, S., Lloret, J., Garcia, M., & Toledo, J. F. (2011). Power Saving and Energy Optimization Techniques for Wireless Sensor Neworks (Invited Paper). Journal of Communications, 6(6). doi:10.4304/jcm.6.6.439-459Xie, M., Han, S., Tian, B., & Parvin, S. (2011). Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, 34(4), 1302-1325. doi:10.1016/j.jnca.2011.03.004Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867-880. doi:10.1016/j.jnca.2011.03.005Zhu, W. T., Zhou, J., Deng, R. H., & Bao, F. (2012). Detecting node replication attacks in wireless sensor networks: A survey. Journal of Network and Computer Applications, 35(3), 1022-1034. doi:10.1016/j.jnca.2012.01.002Maleh, Y., & Ezzati, A. (2013). A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Network. International Journal of Wireless & Mobile Networks, 5(6), 79-90. doi:10.5121/ijwmn.2013.5606Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion Detection Systems in Wireless Sensor Networks: A Review. International Journal of Distributed Sensor Networks, 9(5), 167575. doi:10.1155/2013/167575Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5), 56-63. doi:10.1109/mwc.2007.4396943Fatema, N., & Brad, R. (2013). Attacks and Counterattacks on Wireless Sensor Networks. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 4(6), 1-15. doi:10.5121/ijasuc.2013.4601Ankala, R. P., Kavitha, D., & Haritha, D. (2011). MOBILE AGENT BASED ROUTING in MANETS –ATTACKS & DEFENCES. Network Protocols and Algorithms, 3(4). doi:10.5296/npa.v3i4.1351Hylsberg Jacobsen, R., Zhang, Q., & Skjødeberg Toftegaard, T. (2011). Bioinspired Principles for Large-Scale Networked Sensor Systems: An Overview. Sensors, 11(4), 4137-4151. doi:10.3390/s110404137Kofahi, N. (2013). An Empirical Study to Compare the Performance of some Symmetric and Asymmetric Ciphers. International Journal of Security and Its Applications, 7(5), 1-16. doi:10.14257/ijsia.2013.7.5.01Sisodia, M. S., & Raghuwanshi, V. (2011). Anomaly Base Network Intrusion Detection by Using Random Decision Tree and Random Projection: A Fast Network Intrusion Detection Technique. Network Protocols and Algorithms, 3(4). doi:10.5296/npa.v3i4.1342Zhijie, H., & Ruchuang, W. (2012). Intrusion Detection for Wireless Sensor Network Based on Traffic Prediction Model. Physics Procedia, 25, 2072-2080. doi:10.1016/j.phpro.2012.03.352Al-Gharabally, N., El-Sayed, N., Al-Mulla, S., & Ahmad, I. (2009). Wireless honeypots. Proceedings of the 2009 conference on Information Science, Technology and Applications - ISTA ’09. doi:10.1145/1551950.1551969Gopinath V.Success analysis of deception in wireless sensor networks [M.S. thesis]2010Oklahoma State UniversityZhongshan Zhang, Keping Long, Jianping Wang, & Dressler, F. (2014). On Swarm Intelligence Inspired Self-Organized Networking: Its Bionic Mechanisms, Designing Principles and Optimization Approaches. IEEE Communications Surveys & Tutorials, 16(1), 513-537. doi:10.1109/surv.2013.062613.00014Rathore, H., & Jha, S. (2013). Bio-inspired machine learning based Wireless Sensor Network security. 2013 World Congress on Nature and Biologically Inspired Computing. doi:10.1109/nabic.2013.6617852Alrajeh, N. A., & Lloret, J. (2013). Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks. International Journal of Distributed Sensor Networks, 9(10), 351047. doi:10.1155/2013/351047Amirkolaei M. K.Enhancing bio-inspired intrusion response in Ad-hoc networks [Ph.D. thesis]August 2013Edinburgh, UKEdinburgh Napier Universityhttp://researchrepository.napier.ac.uk/6533/Muraleedharan, R., & Osadciw, L. A. (2009). An intrusion detection framework for Sensor Networks using Honeypot and Swarm Intelligence. Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. doi:10.4108/icst.mobiquitous2009.7084Hortos, W. S. (2012). Bio-inspired, cross-layer protocol design for intrusion detection and identification in wireless sensor networks. 37th Annual IEEE Conference on Local Computer Networks -- Workshops. doi:10.1109/lcnw.2012.6424040Benahmed, K., Merabti, M., & Haffaf, H. (2012). Inspired Social Spider Behavior for Secure Wireless Sensor Networks. International Journal of Mobile Computing and Multimedia Communications, 4(4), 1-10. doi:10.4018/jmcmc.2012100101Herberstein, M. E. (Ed.). (2009). Spider Behaviour. doi:10.1017/cbo9780511974496Ficco, M. (2010). Achieving Security by Intrusion-Tolerance Based on Event Correlation. Network Protocols and Algorithms, 2(3). doi:10.5296/npa.v2i3.42

    Sail or sink: novel behavioural adaptations on water in aerially dispersing species

    Get PDF
    Background Long-distance dispersal events have the potential to shape species distributions and ecosystem diversity over large spatial scales, and to influence processes such as population persistence and the pace and scale of invasion. How such dispersal strategies have evolved and are maintained within species is, however, often unclear. We have studied long-distance dispersal in a range of pest-controlling terrestrial spiders that are important predators within agricultural ecosystems. These species persist in heterogeneous environments through their ability to re-colonise vacant habitat by repeated long-distance aerial dispersal (“ballooning”) using spun silk lines. Individuals are strictly terrestrial, are not thought to tolerate landing on water, and have no control over where they land once airborne. Their tendency to spread via aerial dispersal has thus been thought to be limited by the costs of encountering water, which is a frequent hazard in the landscape. Results In our study we find that ballooning in a subset of individuals from two groups of widely-distributed and phylogenetically distinct terrestrial spiders (linyphiids and one tetragnathid) is associated with a hitherto undescribed ability of those same individuals to survive encounters with both fresh and marine water. Individuals that showed a high tendency to adopt ‘ballooning’ behaviour adopted elaborate postures to seemingly take advantage of the wind current whilst on the water surface. Conclusions The ability of individuals capable of long-distance aerial dispersal to survive encounters with water allows them to disperse repeatedly, thereby increasing the pace and spatial scale over which they can spread and subsequently exert an influence on the ecosystems into which they migrate. The potential for genetic connectivity between populations, which can influence the rate of localized adaptation, thus exists over much larger geographic scales than previously thought. Newly available habitat may be particularly influenced given the degree of ecosystem disturbance that is known to follow new predator introductions

    Exposing the structure of an Arctic food web

    Get PDF
    How food webs are structured has major implications for their stability and dynamics. While poorly studied to date, arctic food webs are commonly assumed to be simple in structure, with few links per species. If this is the case, then different parts of the web may be weakly connected to each other, with populations and species united by only a low number of links. We provide the first highly resolved description of trophic link structure for a large part of a high-arctic food web. For this purpose, we apply a combination of recent techniques to describing the links between three predator guilds (insectivorous birds, spiders, and lepidopteran parasitoids) and their two dominant prey orders (Diptera and Lepidoptera). The resultant web shows a dense link structure and no compartmentalization or modularity across the three predator guilds. Thus, both individual predators and predator guilds tap heavily into the prey community of each other, offering versatile scope for indirect interactions across different parts of the web. The current description of a first but single arctic web may serve as a benchmark toward which to gauge future webs resolved by similar techniques. Targeting an unusual breadth of predator guilds, and relying on techniques with a high resolution, it suggests that species in this web are closely connected. Thus, our findings call for similar explorations of link structure across multiple guilds in both arctic and other webs. From an applied perspective, our description of an arctic web suggests new avenues for understanding how arctic food webs are built and function and of how they respond to current climate change. It suggests that to comprehend the community-level consequences of rapid arctic warming, we should turn from analyses of populations, population pairs, and isolated predator-prey interactions to considering the full set of interacting species.Peer reviewe

    Early environmental conditions shape personality types in a jumping spider

    Get PDF
    Individuals of many species across the animal kingdom are found to be less plastic than expected, even in behavioral traits. The existence of consistent behavioral differences between individuals, termed personality differences, is puzzling, since plastic behavior is considered ideal to enable animals to adaptively respond to changes in environmental conditions. In order to elucidate which mechanisms are important for the evolution of personality differences, it is crucial to understand which aspects of the environment are important for the development of personality differences. Here, we tested whether physical or social aspects of the environment during development influence individual differentiation (mean level of behavior) using the jumping spider Marpissa muscosa. Furthermore, we assessed whether those behaviors were repeatable, i.e. whether personalities existed. We applied a split-brood design and raised spider siblings in three different environments: a deprived environment with no enrichment, a socially and a physically enriched environment. We focused on exploratory behavior and repeatedly assessed individual behavior in a novel environment and a novel object test. Results show that the environment during development influenced spiders’ exploratory tendencies: spiders raised in enriched environments tended to be more exploratory. Most investigated behaviors were repeatable (i.e. personalities existed) across all individuals tested, whereas only few behaviors were also repeatable across individuals that had experienced the same environmental condition. Taken together, our results indicate that external stimuli can influence the development of one aspect of personality, the inter-individual variation (mean level of behavior), in a jumping spider. We also found family by environment interactions on behavioral traits potentially suggesting genetic variation in developmental plasticity

    A GIS Model Predicting Potential Distributions of a Lineage: A Test Case on Hermit Spiders (Nephilidae: Nephilengys)

    Get PDF
    BACKGROUND: Although numerous studies model species distributions, these models are almost exclusively on single species, while studies of evolutionary lineages are preferred as they by definition study closely related species with shared history and ecology. Hermit spiders, genus Nephilengys, represent an ecologically important but relatively species-poor lineage with a globally allopatric distribution. Here, we model Nephilengys global habitat suitability based on known localities and four ecological parameters. METHODOLOGY/PRINCIPAL FINDINGS: We geo-referenced 751 localities for the four most studied Nephilengys species: N. cruentata (Africa, New World), N. livida (Madagascar), N. malabarensis (S-SE Asia), and N. papuana (Australasia). For each locality we overlaid four ecological parameters: elevation, annual mean temperature, annual mean precipitation, and land cover. We used linear backward regression within ArcGIS to select two best fit parameters per species model, and ModelBuilder to map areas of high, moderate and low habitat suitability for each species within its directional distribution. For Nephilengys cruentata suitable habitats are mid elevation tropics within Africa (natural range), a large part of Brazil and the Guianas (area of synanthropic spread), and even North Africa, Mediterranean, and Arabia. Nephilengys livida is confined to its known range with suitable habitats being mid-elevation natural and cultivated lands. Nephilengys malabarensis, however, ranges across the Equator throughout Asia where the model predicts many areas of high ecological suitability in the wet tropics. Its directional distribution suggests the species may potentially spread eastwards to New Guinea where the suitable areas of N. malabarensis largely surpass those of the native N. papuana, a species that prefers dry forests of Australian (sub)tropics. CONCLUSIONS: Our model is a customizable GIS tool intended to predict current and future potential distributions of globally distributed terrestrial lineages. Its predictive potential may be tested in foreseeing species distribution shifts due to habitat destruction and global climate change

    Tie them up tight: wrapping by Philoponella vicinaspiders breaks, compresses and sometimes kills their prey

    Get PDF
    We show that uloborid spiders, which lack the poison glands typical of nearly all other spiders, employ thousands of wrapping movements with their hind legs and up to hundreds of meters of silk line to make a shroud that applies substantial compressive force to their prey. Shrouds sometimes break the prey’s legs, buckle its compound eyes inward, or kill it outright. The compressive force apparently results from the summation of small tensions on sticky lines as they are applied to the prey package. Behavioral details indicate that wrapping is designed to compact prey; in turn, compaction probably functions to facilitate these spiders’ unusual method of feeding. This is the first demonstration that prey wrapping by spiders compacts and physically damages their prey, rather than simply restraining them.Instituto Smithsoniano de Investigaciones Tropicales (STRI)Universidad de Costa RicaUCR::Vicerrectoría de Docencia::Ciencias Básicas::Facultad de Ciencias::Escuela de Biologí
    corecore