Many animals possess protective markings to avoid predation, including patterns to reduce the risk of detection (camouflage), to indicate that the animal is toxic or inedible (‘warning colours’), or to mimic another animal or object (‘mimicry’ and ‘masquerade’). In addition, many creatures such as butterflies, moths, and fish possess two or more pairs of circular markings, often referred to as ‘eyespots’. Many eyespots are effective in startling or intimidating predators, and can help to prevent or stop an attack. For the past 150 years it has been assumed that this is because they mimic the eyes of the predator’s own enemies.
However, recent work by University of Cambridge zoologists, Martin Stevens, Chloe Hardman, and Claire Stubbins, indicates that this widely-held hypothesis has no experimental support.
Stevens, Hardman, and Stubbins tested the response of wild avian predators to artificial moths, created from waterproof paper. Specific patterns, such as intimidating eyespots of different shapes, sizes and number, and with different levels of eye mimicry, were printed on to the paper using a high quality printer. These ‘moths’ were then pinned to trees of various species at a height of one to three metres in the mixed deciduous Madingley Woods in Cambridgeshire, UK. Attached to each of the artificial moths was an edible mealworm as a temptation for woodland birds such as the blue tits, great tits, blackbirds, and house sparrows.
The zoologists discovered that artificial moths with circular markings survived no better than those with other conspicuous features and that the features of eyespots which most encouraged predators to avoid them are large size, a high number of spots, and conspicuousness in general.
As Dr Stevens explains, ‘the birds were equally likely to avoid artificial moths with markings such as bars and squares as they were to avoid those with two eye-like markings. This leads us to conclude that eyespots work because they are highly conspicuous features, not because they mimic the eyes of the predators’ own enemies. This suggests that circular markings on many real animals need not necessarily, as most accounts claim, mimic the eyes of other animals.’
 Conspicuousness, not eye mimicry, makes ‘‘eyespots’’ effective antipredator signals (Martin Stevens, Chloe J. Hardman, and Claire L. Stubbins) Behavioral Ecology doi:10.1093/beheco/arm162
Dr Martin Stevens | alfa
Scientists team up on study to save endangered African penguins
16.11.2017 | Florida Atlantic University
Climate change: Urban trees are growing faster worldwide
13.11.2017 | Technische Universität München
The formation of stars in distant galaxies is still largely unexplored. For the first time, astron-omers at the University of Geneva have now been able to closely observe a star system six billion light-years away. In doing so, they are confirming earlier simulations made by the University of Zurich. One special effect is made possible by the multiple reflections of images that run through the cosmos like a snake.
Today, astronomers have a pretty accurate idea of how stars were formed in the recent cosmic past. But do these laws also apply to older galaxies? For around a...
Just because someone is smart and well-motivated doesn't mean he or she can learn the visual skills needed to excel at tasks like matching fingerprints, interpreting medical X-rays, keeping track of aircraft on radar displays or forensic face matching.
That is the implication of a new study which shows for the first time that there is a broad range of differences in people's visual ability and that these...
Computer Tomography (CT) is a standard procedure in hospitals, but so far, the technology has not been suitable for imaging extremely small objects. In PNAS, a team from the Technical University of Munich (TUM) describes a Nano-CT device that creates three-dimensional x-ray images at resolutions up to 100 nanometers. The first test application: Together with colleagues from the University of Kassel and Helmholtz-Zentrum Geesthacht the researchers analyzed the locomotory system of a velvet worm.
During a CT analysis, the object under investigation is x-rayed and a detector measures the respective amount of radiation absorbed from various angles....
The quantum world is fragile; error correction codes are needed to protect the information stored in a quantum object from the deteriorating effects of noise. Quantum physicists in Innsbruck have developed a protocol to pass quantum information between differently encoded building blocks of a future quantum computer, such as processors and memories. Scientists may use this protocol in the future to build a data bus for quantum computers. The researchers have published their work in the journal Nature Communications.
Future quantum computers will be able to solve problems where conventional computers fail today. We are still far away from any large-scale implementation,...
Pillared graphene would transfer heat better if the theoretical material had a few asymmetric junctions that caused wrinkles, according to Rice University...
15.11.2017 | Event News
15.11.2017 | Event News
30.10.2017 | Event News
17.11.2017 | Physics and Astronomy
17.11.2017 | Health and Medicine
17.11.2017 | Studies and Analyses