scholarly journals Extra-pair paternity in a species with frequent extra-pair courtship feedings, few extra-pair copulations, and male-biased parental care

Author(s):  
Mateusz Ledwoń ◽  
Patricia Szczys

AbstractPatterns of extra pair paternity (EPP) and intraspecific brood parasitism (IBP) were studied in a Whiskered Tern Chlidonias hybrida population characterized by female brood desertion, a high level of extra pair courtship feedings (10%) and a low level of extra pair copulation (EPC; 0.6%). In this study, we used a set of microsatellite loci to analyse parentage in 56 Whiskered Tern families from southern Poland. Depending on the method, we detected that 1.4%–3.6% of chicks were sired by an extra-pair male, and extra-pair chicks were present in 3.6%–8.9% of broods. IBP was observed in 8.9%–14.3% of broods, corresponding to 3.6%–6.4% of the chicks. The low rate of EPP is in agreement with the hypothesis that in species with high male parental investment, females should avoid EPC. The low level of IBP indicates that intraspecific egg dumping is not a common female strategy in Whiskered Tern, similar to many other colonial waterbird species.

2019 ◽  
Vol 1 (1) ◽  
pp. 31-39
Author(s):  
Ilham Safitra Damanik ◽  
Sundari Retno Andani ◽  
Dedi Sehendro

Milk is an important intake to meet nutritional needs. Both consumed by children, and adults. Indonesia has many producers of fresh milk, but it is not sufficient for national milk needs. Data mining is a science in the field of computers that is widely used in research. one of the data mining techniques is Clustering. Clustering is a method by grouping data. The Clustering method will be more optimal if you use a lot of data. Data to be used are provincial data in Indonesia from 2000 to 2017 obtained from the Central Statistics Agency. The results of this study are in Clusters based on 2 milk-producing groups, namely high-dairy producers and low-milk producing regions. From 27 data on fresh milk production in Indonesia, two high-level provinces can be obtained, namely: West Java and East Java. And 25 others were added in 7 provinces which did not follow the calculation of the K-Means Clustering Algorithm, including in the low level cluster.


Author(s):  
Margarita Khomyakova

The author analyzes definitions of the concepts of determinants of crime given by various scientists and offers her definition. In this study, determinants of crime are understood as a set of its causes, the circumstances that contribute committing them, as well as the dynamics of crime. It is noted that the Russian legislator in Article 244 of the Criminal Code defines the object of this criminal assault as public morality. Despite the use of evaluative concepts both in the disposition of this norm and in determining the specific object of a given crime, the position of criminologists is unequivocal: crimes of this kind are immoral and are in irreconcilable conflict with generally accepted moral and legal norms. In the paper, some views are considered with regard to making value judgments which could hardly apply to legal norms. According to the author, the reasons for abuse of the bodies of the dead include economic problems of the subject of a crime, a low level of culture and legal awareness; this list is not exhaustive. The main circumstances that contribute committing abuse of the bodies of the dead and their burial places are the following: low income and unemployment, low level of criminological prevention, poor maintenance and protection of medical institutions and cemeteries due to underperformance of state and municipal bodies. The list of circumstances is also open-ended. Due to some factors, including a high level of latency, it is not possible to reflect the dynamics of such crimes objectively. At the same time, identification of the determinants of abuse of the bodies of the dead will reduce the number of such crimes.


2021 ◽  
pp. 002224372199837
Author(s):  
Walter Herzog ◽  
Johannes D. Hattula ◽  
Darren W. Dahl

This research explores how marketing managers can avoid the so-called false consensus effect—the egocentric tendency to project personal preferences onto consumers. Two pilot studies were conducted to provide evidence for the managerial importance of this research question and to explore how marketing managers attempt to avoid false consensus effects in practice. The results suggest that the debiasing tactic most frequently used by marketers is to suppress their personal preferences when predicting consumer preferences. Four subsequent studies show that, ironically, this debiasing tactic can backfire and increase managers’ susceptibility to the false consensus effect. Specifically, the results suggest that these backfire effects are most likely to occur for managers with a low level of preference certainty. In contrast, the results imply that preference suppression does not backfire but instead decreases false consensus effects for managers with a high level of preference certainty. Finally, the studies explore the mechanism behind these results and show how managers can ultimately avoid false consensus effects—regardless of their level of preference certainty and without risking backfire effects.


Author(s):  
Richard Stone ◽  
Minglu Wang ◽  
Thomas Schnieders ◽  
Esraa Abdelall

Human-robotic interaction system are increasingly becoming integrated into industrial, commercial and emergency service agencies. It is critical that human operators understand and trust automation when these systems support and even make important decisions. The following study focused on human-in-loop telerobotic system performing a reconnaissance operation. Twenty-four subjects were divided into groups based on level of automation (Low-Level Automation (LLA), and High-Level Automation (HLA)). Results indicated a significant difference between low and high word level of control in hit rate when permanent error occurred. In the LLA group, the type of error had a significant effect on the hit rate. In general, the high level of automation was better than the low level of automation, especially if it was more reliable, suggesting that subjects in the HLA group could rely on the automatic implementation to perform the task more effectively and more accurately.


2020 ◽  
Vol 4 (POPL) ◽  
pp. 1-32 ◽  
Author(s):  
Michael Sammler ◽  
Deepak Garg ◽  
Derek Dreyer ◽  
Tadeusz Litak
Keyword(s):  

2021 ◽  
pp. 0308518X2199781
Author(s):  
Xinyue Luo ◽  
Mingxing Chen

The nodes and links in urban networks are usually presented in a two-dimensional(2D) view. The co-occurrence of nodes and links can also be realized from a three-dimensional(3D) perspective to make the characteristics of urban network more intuitively revealed. Our result shows that the external connections of high-level cities are mainly affected by the level of cities(nodes) and less affected by geographical distance, while medium-level cities are affected by the interaction of the level of cities(nodes) and geographical distance. The external connections of low-level cities are greatly restricted by geographical distance.


2020 ◽  
Vol 9 (2) ◽  
pp. 169-198
Author(s):  
Chen Chen ◽  
Feng-hsi Liu

Abstract A major claim in the constructionist approach to language acquisition is that grammar is learned by pairings of form and function. In this study we test this claim by examining how L2 learners of Mandarin Chinese acquire the bei passive construction, a construction that is associated with the meaning of adversity. Our goal is to find out whether L2 learners make the association between the passive and adversity. Participants performed a sentence choice task under four conditions: an adversative context with an adversative verb, an adversative context with a neutral verb, a neutral context with a neutral verb and a positive context with a neutral verb. In each context participants were asked to select either the bei passive construction or its active counterpart. We found that high-level learners consistently chose the bei passive significantly more in adversative contexts than in non-adversative contexts regardless of the connotations of the verbs, while low-level learners made the distinction half of the time. In addition, while low-level learners did not yet associate adversity with the form of the construction, high-level learners did. We conclude that L2 learners do learn the bei passive construction as a form-meaning pair. The constructionist approach is supported.


1969 ◽  
Vol 52 (3) ◽  
pp. 438-441
Author(s):  
Glenn M George ◽  
A C Daftsios ◽  
Joseph L Morrison

Abstract The coccidiostat aklomide is extracted from feed with methanol and assayed colorimetrically by reduction of the nitro group to anamine with titanium trichloride and subsequent color development with t he Bratton-Marshall reaction. Thirteen laboratories studied the method collaboratively on two levels of medicated feed. Overall average recovery was 106.5% of the oretical for the low level and 104.5% of the oretical for the high level. The method is recommended for adoption as official first action


Author(s):  
Breno A. de Melo Menezes ◽  
Nina Herrmann ◽  
Herbert Kuchen ◽  
Fernando Buarque de Lima Neto

AbstractParallel implementations of swarm intelligence algorithms such as the ant colony optimization (ACO) have been widely used to shorten the execution time when solving complex optimization problems. When aiming for a GPU environment, developing efficient parallel versions of such algorithms using CUDA can be a difficult and error-prone task even for experienced programmers. To overcome this issue, the parallel programming model of Algorithmic Skeletons simplifies parallel programs by abstracting from low-level features. This is realized by defining common programming patterns (e.g. map, fold and zip) that later on will be converted to efficient parallel code. In this paper, we show how algorithmic skeletons formulated in the domain specific language Musket can cope with the development of a parallel implementation of ACO and how that compares to a low-level implementation. Our experimental results show that Musket suits the development of ACO. Besides making it easier for the programmer to deal with the parallelization aspects, Musket generates high performance code with similar execution times when compared to low-level implementations.


Sign in / Sign up

Export Citation Format

Share Document