Understanding how signal properties are optimized for the reliable transmission of information requires accurate de- scription of the signal in time and space. For movement-based signals where movement is restricted t...Understanding how signal properties are optimized for the reliable transmission of information requires accurate de- scription of the signal in time and space. For movement-based signals where movement is restricted to a single plane, measure- ments from a single viewpoint can be used to consider a range of viewing positions based on simple geometric calculations. However, considerations of signal properties from a range of viewing positions for movements extending into three-dimensions (3D) are more problematic. We present here a new framework that overcomes this limitation, and enables us to quantify the extent to which movement-based signals are view-specific. To illustrate its application, a Jacky lizard tail flick signal was filmed with synchronized cameras and the position of the tail tip digitized for both recordings. Camera aligmnent enabled tl^e construction of a 3D display action pattern profile. We analyzed the profile directly and used it to create a detailed 3D animation. In the virtual environment, we were able to film the same signal from multiple viewing positions and using a computational motion analysis algorithm (gradient detector model) to measure local image velocity in order to predict view dependent differences in signal properties. This approach will enable consideration of a range of questions concerning movement-based signal design and evolu- tion that were previously out of reach [Current Zoology 56 (3): 327-336, 2010].展开更多
Sexual deception involves the mimicry of another species' sexual signals in order to exploit behavioural routines linked to those signals. Known sexually deceptive systems use visual, acoustic or olfactory mimicry to...Sexual deception involves the mimicry of another species' sexual signals in order to exploit behavioural routines linked to those signals. Known sexually deceptive systems use visual, acoustic or olfactory mimicry to exploit insects for preda- tion, cleptoparasitism and pollination. It is predicted that where sexual deception inflicts a cost on the receiver, a coevolutionary arms race could result in the evolution of discriminating receivers and increasingly refined mimicry. We constructed a conceptual model to understand the importance of trade-offs in the coevolution of sexually deceptive mimic and receiver. Four components examined were: the cost of mimicry, the cost to receiver for being fooled, the density of mimics and the relative magnitude of a mimicry-independent component of fitness. The model predicts that the exploitation of non-discriminating receivers by accurate signal mimicry will evolve as an evolutionary stable strategy under a wide range of the parameter space explored. This is due to the difficulty in minimising the costs of being fooled without incurring the cost of falsely rejecting real mating opportunities. In the model, the evolution of deception is impeded when mimicry imposes substantial costs for both sides of the arms race. Olfac- tory signals that are potentially cheap to produce are therefore likely to be more vulnerable to exploitation than expensive visual ornaments展开更多
文摘Understanding how signal properties are optimized for the reliable transmission of information requires accurate de- scription of the signal in time and space. For movement-based signals where movement is restricted to a single plane, measure- ments from a single viewpoint can be used to consider a range of viewing positions based on simple geometric calculations. However, considerations of signal properties from a range of viewing positions for movements extending into three-dimensions (3D) are more problematic. We present here a new framework that overcomes this limitation, and enables us to quantify the extent to which movement-based signals are view-specific. To illustrate its application, a Jacky lizard tail flick signal was filmed with synchronized cameras and the position of the tail tip digitized for both recordings. Camera aligmnent enabled tl^e construction of a 3D display action pattern profile. We analyzed the profile directly and used it to create a detailed 3D animation. In the virtual environment, we were able to film the same signal from multiple viewing positions and using a computational motion analysis algorithm (gradient detector model) to measure local image velocity in order to predict view dependent differences in signal properties. This approach will enable consideration of a range of questions concerning movement-based signal design and evolu- tion that were previously out of reach [Current Zoology 56 (3): 327-336, 2010].
文摘Sexual deception involves the mimicry of another species' sexual signals in order to exploit behavioural routines linked to those signals. Known sexually deceptive systems use visual, acoustic or olfactory mimicry to exploit insects for preda- tion, cleptoparasitism and pollination. It is predicted that where sexual deception inflicts a cost on the receiver, a coevolutionary arms race could result in the evolution of discriminating receivers and increasingly refined mimicry. We constructed a conceptual model to understand the importance of trade-offs in the coevolution of sexually deceptive mimic and receiver. Four components examined were: the cost of mimicry, the cost to receiver for being fooled, the density of mimics and the relative magnitude of a mimicry-independent component of fitness. The model predicts that the exploitation of non-discriminating receivers by accurate signal mimicry will evolve as an evolutionary stable strategy under a wide range of the parameter space explored. This is due to the difficulty in minimising the costs of being fooled without incurring the cost of falsely rejecting real mating opportunities. In the model, the evolution of deception is impeded when mimicry imposes substantial costs for both sides of the arms race. Olfac- tory signals that are potentially cheap to produce are therefore likely to be more vulnerable to exploitation than expensive visual ornaments