期刊文献+
共找到320篇文章
< 1 2 16 >
每页显示 20 50 100
高重频激光干扰模式的分析 被引量:28
1
作者 朱陈成 聂劲松 童忠诚 《红外与激光工程》 EI CSCD 北大核心 2009年第6期1060-1063,共4页
在对抗激光半主动制导武器中,高重频激光干扰是一种有效的激光有源干扰技术。从高重频激光干扰的原理出发,通过对干扰重复频率与干扰效果之间关系的理论分析和数值计算,提出高重频激光干扰工作模式的概念,将其分为欺骗式干扰和压制式干... 在对抗激光半主动制导武器中,高重频激光干扰是一种有效的激光有源干扰技术。从高重频激光干扰的原理出发,通过对干扰重复频率与干扰效果之间关系的理论分析和数值计算,提出高重频激光干扰工作模式的概念,将其分为欺骗式干扰和压制式干扰两种工作模式,理清了以往对高重频激光干扰的认识,探讨了各种干扰模式的作用机理和工作特征,并对其工程实践的可行性进行了简单的论述。分析结果较好地解释了不同干扰重频范围对应不同干扰效果的原因。 展开更多
关键词 激光干扰 高重频 压制式 欺骗式
下载PDF
叙事学对小说翻译批评的适用性及其拓展 被引量:19
2
作者 张景华 《天津外国语学院学报》 2007年第6期57-62,共6页
叙事学与小说在文体上有本质联系,将叙事学运用于小说翻译批评能避免小说翻译中形式与内容的二元对立,并可以从多种角度发现小说翻译中的假象等值。但是,叙事学角度的小说翻译批评不能停留在等值层面的探讨。由于源语和目的语小说叙事... 叙事学与小说在文体上有本质联系,将叙事学运用于小说翻译批评能避免小说翻译中形式与内容的二元对立,并可以从多种角度发现小说翻译中的假象等值。但是,叙事学角度的小说翻译批评不能停留在等值层面的探讨。由于源语和目的语小说叙事传统的差异和翻译的目的性,翻译批评还要注意小说翻译中译者的声音,这样能发现促使翻译中叙事形式发生变异的各种历史、文学和文化因素,从而把小说翻译批评拓展为研究性的批评。 展开更多
关键词 小说翻译批评 叙事学 假象等值 译者的声音
下载PDF
Deceptive jamming suppression in multistatic radar based on coherent clustering 被引量:13
3
作者 ABDALLA Ahmed AHMED Mohaned Giess Shokrallah +2 位作者 ZHAO Yuan XIONG Ying TANG Bin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第2期269-277,共9页
This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easi... This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easily discriminated and suppressed with traditional radar systems. Therefore, multistatic radar has attracted considerable interest as it provides improved performance against deception jamming due to several separated receivers. This paper first investigates the received signal model in the presence of multiple false targets in all receivers of the multistatic radar. Then, obtain the propagation time delays of the false targets based on the cross-correlation test of the received signals in different receivers. In doing so, local-density-based spatial clustering of applications with noise(LDBSCAN) is proposed to discriminate the FTs from the physical targets(PTs) after compensating the FTs time delays, where the FTs are approximately coincident with one position, while PTs possess small dispersion.Numerical simulations are carried out to demonstrate the feasibility and validness of the proposed method. 展开更多
关键词 multistatic radar clustering analysis electronic counter-countermeasure(ECCM) deceptive jamming
下载PDF
A Preliminary Study on Pollination Biology of an Endangered Orchid, Changnienia amoena, in Shennongjia 被引量:9
4
作者 孙海芹 罗毅波 葛颂 《Acta Botanica Sinica》 CSCD 2003年第9期1019-1023,共5页
Changnienia amoena Chien is a monotypic species and endemic to China, and was listed on the Chinese Red Book in 1992. The species was once abundant but has become rare and endangered in recent years because of the hab... Changnienia amoena Chien is a monotypic species and endemic to China, and was listed on the Chinese Red Book in 1992. The species was once abundant but has become rare and endangered in recent years because of the habitat fragmentation and unduly commercial collections. Previous observation showed that this species has very low and even no fruit set, and the pollinators are not observed before this report. The present observation was conducted at the Shennongjia, Hubei Province during the spring of 2002. The results showed that Bombus (Diversobombus) trifasciatus Smith, B. imitator Pittion and one species of Apis visited the flowers of the orchid, but only B. tritasciatus could carry pollinaria on its body and was the legitimate pollinators of C amoena. During 113 h of observation, only nine visitations were recorded. The bumblebees mainly appeared during 12:00-15:00 during the day. Bumblebees stayed in a flower only a few seconds and never more than ten seconds. The flowers would persist in fresh for about three weeks when they were not pollinated, but 3 or 4 d after pollinated, the pollinated flowers underwent a series of color and morphological changes including stalk elongation and ovary swelling. Therefore, stalk elongation can be considered an index of fruits set. Artificial pollination indicated that C amoena is a highly self-compatible and outcrossing species, but dependent on pollinators for fruit set. Based on the field observations, we concluded that pollination system of C amoena is deceptive. The fruit set in nature is not very low (26.98% on average) compared to other deceptive orchids, which may be related to small population sizes. The number of pollinia removal is much higher than that of fruit set, indicating that there are some degrees of pollinia wasting in C amoena. 展开更多
关键词 Changnienia amoena Bombus (Diversobombus) trifasciatus deceptive pollination stalk elongation
下载PDF
干扰模式下卫星导航高精度定位方法
5
作者 曾荡 《北京测绘》 2024年第5期780-785,共6页
为提升卫星导航在欺骗式干扰模式下定位的抗干扰能力,设计欺骗式干扰模式下卫星导航高精度定位方法。构建由欺骗干扰信号基本数据以及信号振动幅度组成的欺骗干扰信号数学模型;选择载波相位、信号信噪比、多普勒频移以及伪距作为欺骗干... 为提升卫星导航在欺骗式干扰模式下定位的抗干扰能力,设计欺骗式干扰模式下卫星导航高精度定位方法。构建由欺骗干扰信号基本数据以及信号振动幅度组成的欺骗干扰信号数学模型;选择载波相位、信号信噪比、多普勒频移以及伪距作为欺骗干扰信号发射、接收以及解算过程中的特征参数;利用支持向量机分类模型识别出卫星导航信号中的欺骗干扰信号,抑制欺骗信号干扰源获取真实卫星导航信号;通过双频电离层修正方式消除方程中电离层延迟,获取最终观测方程;利用最小二乘法求解最终观测方程,完成高精度定位。实验结果显示,该方法的定位精度高于90%,平均定位精度为94.44%,优于对比方法,表明该方法能够实现欺骗式干扰模式下对卫星导航的高精度定位。 展开更多
关键词 欺骗式 干扰模式 卫星导航 高精度定位 特征参数选择 支持向量机
下载PDF
欺骗性商业标志认定的现实困境及其化解
6
作者 吴家煦 《电子知识产权》 2024年第5期95-103,共9页
作为商标法绝对禁用条款的规定情形,欺骗性商业标志的规制不仅事关商标管理制度和市场竞争秩序的维护,也关系到商标法保护消费者利益目标的实现。然而,囿于目前欺骗性商业标志认定中统一标准的缺失以及对于消费者利益保护理念的贯彻不到... 作为商标法绝对禁用条款的规定情形,欺骗性商业标志的规制不仅事关商标管理制度和市场竞争秩序的维护,也关系到商标法保护消费者利益目标的实现。然而,囿于目前欺骗性商业标志认定中统一标准的缺失以及对于消费者利益保护理念的贯彻不到位,实践中围绕认定标准所产生的适用分歧仍时有发生,欺骗性商业标志规制中的消费者利益保护问题仍然存在。以消费者保护视角为出发点,为化解欺骗性商业标志认定中面临的现实困境,首先有必要重构以消费者为核心的认定标准,其次还应当发挥消费者调查在认定中的优势证据作用,从而妥善解决欺骗性商业标志规制中的消费者利益保护问题。 展开更多
关键词 商业标志 欺骗性 误认 消费者保护 消费者调查
下载PDF
Parameters Design of Pull-off Deceptive Jamming to Terminal Guidance Radar 被引量:3
7
作者 李云杰 张延彬 高梅国 《Journal of Beijing Institute of Technology》 EI CAS 2010年第3期362-366,共5页
A deceptive pull-off jamming method to terminal guidance radar is put forward in this paper.The design rules about the important jamming parameters are discussed in detail,including the number of the decoy targets in ... A deceptive pull-off jamming method to terminal guidance radar is put forward in this paper.The design rules about the important jamming parameters are discussed in detail,including the number of the decoy targets in range dimension,the velocity of the range gate pull-off,and the number of the decoy targets in velocity dimension and the velocity of the Doppler frequency pull-off.Also,the steps to design these parameters are brought out.The rules and design procedure discussed in this paper have important meaning for the choice of the reasonable jamming parameters in the practical applications,which can help to obtain good jamming effect. 展开更多
关键词 terminal guidance radar deceptive jamming range gate pull-off velocity Doppler frequency pulloff velocity
下载PDF
Deceptive jamming discrimination based on range-angle localization of a frequency diverse array 被引量:4
8
作者 Zhao-jian ZHANG Jun-wei XIE +1 位作者 Chuan SHENG Zhun TANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第9期1437-1446,共10页
We propose a method to suppress deceptive jamming by frequency diverse array (FDA) in radar electronic coun- termeasure environments. FDA offers a new range-angle-dependent beam pattern through a small frequency inc... We propose a method to suppress deceptive jamming by frequency diverse array (FDA) in radar electronic coun- termeasure environments. FDA offers a new range-angle-dependent beam pattern through a small frequency increment across elements. Due to the coupling between the angle and range, a mismatch between the test angle and physical angle occurs when the slant range on which the beam focuses is not equal to the slant range of the real target. In addition, the range of the target can be extracted by sum-difference beam except for time-delay testing, because the beam provides a range resolution in the FDA that cannot be deceived by traditional deceptive jamming. A strategy of using FDA to transmit two pulses with zero and nonzero frequency increments, respectively, is proposed to ensure that the angle of a target can be obtained by FDA. Moreover, the lo- calization performance is examined by analyzing the Cramer-Rao lower bound and detection probability. Effectiveness of the proposed method is confirmed by simulation results. 展开更多
关键词 Frequency diverse array (FDA) deceptive jamming Range-angle coupling Sum-difference beam DOUBLE-PULSE
原文传递
Recognition and interfere deceptive behavior based on inverse reinforcement learning and game theory
9
作者 ZENG Yunxiu XU Kai 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第2期270-288,共19页
In real-time strategy(RTS)games,the ability of recognizing other players’goals is important for creating artifical intelligence(AI)players.However,most current goal recognition methods do not take the player’s decep... In real-time strategy(RTS)games,the ability of recognizing other players’goals is important for creating artifical intelligence(AI)players.However,most current goal recognition methods do not take the player’s deceptive behavior into account which often occurs in RTS game scenarios,resulting in poor recognition results.In order to solve this problem,this paper proposes goal recognition for deceptive agent,which is an extended goal recognition method applying the deductive reason method(from general to special)to model the deceptive agent’s behavioral strategy.First of all,the general deceptive behavior model is proposed to abstract features of deception,and then these features are applied to construct a behavior strategy that best matches the deceiver’s historical behavior data by the inverse reinforcement learning(IRL)method.Final,to interfere with the deceptive behavior implementation,we construct a game model to describe the confrontation scenario and the most effective interference measures. 展开更多
关键词 deceptive path planning inverse reinforcement learning(IRL) game theory goal recognition
下载PDF
广告的误导性、欺骗性、虚假性及其法律管理 被引量:2
10
作者 史鸿文 《经济经纬》 北大核心 2001年第6期107-109,共3页
在涉及广告法律制裁的不良广告现象中,广告的误导性、欺骗性和虚假性三者之间既有联系也有区别。对三者区分,主要是为了明确它们应承担的相应的法律责任和对其进行制裁的法律依据。与此同时,对三者之间的区别与联系的说明还有许多更... 在涉及广告法律制裁的不良广告现象中,广告的误导性、欺骗性和虚假性三者之间既有联系也有区别。对三者区分,主要是为了明确它们应承担的相应的法律责任和对其进行制裁的法律依据。与此同时,对三者之间的区别与联系的说明还有许多更为具体的法律意义。 展开更多
关键词 广告 法律管理 广告误导性 广告欺骗性 广告虚假性 对比分析
下载PDF
澳大利亚南部植物群落中的兰花的结实成功率与周围花卉资源无关
11
作者 Irene Martín-Forés Samantha L.Bywaters +1 位作者 Ben Sparrow Greg R.Guerin 《Journal of Plant Ecology》 SCIE CSCD 2023年第2期204-212,共9页
为保证生态系统不断补充兰花的种群数量,了解兰花周围的花卉资源如何影响兰花的结实成功率是很有必要的。为此,本论文研究了澳大利亚的两种特有物种Diuris pardina和Glossodia major的结实成功率与其周围花卉资源之间的关系。D.pardina... 为保证生态系统不断补充兰花的种群数量,了解兰花周围的花卉资源如何影响兰花的结实成功率是很有必要的。为此,本论文研究了澳大利亚的两种特有物种Diuris pardina和Glossodia major的结实成功率与其周围花卉资源之间的关系。D.pardina模仿豌豆花,通过视觉欺骗手段吸引Pultenaea共花植物的专化传粉者;G.major展现假花药,吸引泛化传粉者。因为吸引密度更高的本地蜜蜂可以促进兰花传粉,我们假设这两个物种的结实成功率与其周围同种花和异种花的密度呈正相关。我们还假设D.pardina的成功结实与其周围Pultenaea花的丰度呈正相关。我们调查了澳大利亚南部的18个地块,统计了同种花和异种花的物种数、个体数和花朵数,以及成功结实的花朵数。对结实成功率与同种花的密度、周围花资源的多度、丰度和香农指数以及单个物种的花卉丰度进行了Pearson相关分析,发现D.pardina的结实成功率与周围同种花的密度相关,但G.major的结实成功率与周围同种花的密度无关,未发现结实成功率与异种花资源之间存在关联。D.pardina的结实成功率与Pultenaea的丰度无关,而与入侵物种法国薰衣草(Lavandula stoechas)呈正相关。 展开更多
关键词 澳大利亚 欺骗性的 特有兰花 花资源 结实成功 授粉
原文传递
The schema deceptiveness and deceptive problems of genetic algorithms 被引量:1
12
作者 李敏强 寇纪淞 《Science in China(Series F)》 2001年第5期342-350,共9页
Genetic algorithms (GA) are a new type of global optimization methodology based on na-ture selection and heredity, and its power comes from the evolution process of the population of feasi-ble solutions by using simpl... Genetic algorithms (GA) are a new type of global optimization methodology based on na-ture selection and heredity, and its power comes from the evolution process of the population of feasi-ble solutions by using simple genetic operators. The past two decades saw a lot of successful industrial cases of GA application, and also revealed the urgency of practical theoretic guidance. This paper sets focus on the evolution dynamics of GA based on schema theorem and building block hypothesis (Schema Theory), which we thought would form the basis of profound theory of GA. The deceptive-ness of GA in solving multi-modal optimization problems encoded on {0,1} was probed in detail. First, a series of new concepts are defined mathematically as the schemata containment, schemata compe-tence. Then, we defined the schema deceptiveness and GA deceptive problems based on primary schemata competence, including fully deceptive problem, consistently deceptive problem, chronically deceptive problem, and fundamentally deceptive problem. Meanwhile, some novel propositions are formed on the basis of primary schemata competence. Finally, we use the trap function, a kind of bit unitation function, and a NiH function (needle-in-a-haystack) newly designed by the authors, to dis-play the affections of schema deceptiveness on the searching behavior of GA. 展开更多
关键词 genetic algorithms schema competition schema deceptiveness GA deceptive problems.
原文传递
Pattern recognitionbased method for radar antideceptive jamming 被引量:1
13
作者 Ma Xiaoyan Qin Jiangmin Li Jianxun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第4期802-805,共4页
In order to make the effective ECCM to the deceptive jamming, especially the angle deceptive jamming, this paper establishes a signal-processing model for anti-deceptive jamming firstly, in which two feature-extractin... In order to make the effective ECCM to the deceptive jamming, especially the angle deceptive jamming, this paper establishes a signal-processing model for anti-deceptive jamming firstly, in which two feature-extracting algorithms, i.e. the statistical algorithm and the neural network (NN) algorithm are presented, then uses the RBF NN as the classitier in the processing model. Finally the two algorithms are validated and compared through some simulations. 展开更多
关键词 angle deceptive jamming ANTI-JAMMING pattern recognition feature extraction neural network.
下载PDF
DCWord: A Novel Deep Learning Approach to Deceptive Review Identification by Word Vectors 被引量:3
14
作者 Wen Zhang Qiang Wang +2 位作者 Xiangjun Li Taketoshi Yoshida Jian Li 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2019年第6期731-746,共16页
Due to the anonymous and free-for-all characteristics of online forums,it is very hard for human beings to differentiate deceptive reviews from truthful reviews.This paper proposes a deep learning approach for text re... Due to the anonymous and free-for-all characteristics of online forums,it is very hard for human beings to differentiate deceptive reviews from truthful reviews.This paper proposes a deep learning approach for text representation called DCWord (Deep Context representation by Word vectors) to deceptive review identification.The basic idea is that since deceptive reviews and truthful reviews are composed by writers without and with real experience on using the online purchased goods or services,there should be different contextual information of words between them.Unlike state-of-the-art techniques in seeking best linguistic features for representation,we use word vectors to characterize contextual information of words in deceptive and truthful reviews automatically.The average-pooling strategy (called DCWord-A) and maxpooling strategy (called DCWord-M) are used to produce review vectors from word vectors.Experimental results on the Spam dataset and the Deception dataset demonstrate that the DCWord-M representation with LR (Logistic Regression) produces the best performances and outperforms state-of-the-art techniques on deceptive review identification.Moreover,the DCWord-M strategy outperforms the DCWord-A strategy in review representation for deceptive review identification.The outcome of this study provides potential implications for online review management and business intelligence of deceptive review identification. 展开更多
关键词 Online BUSINESS INTELLIGENCE skip-gram model DCWord representation deceptive REVIEW IDENTIFICATION deep learning
原文传递
System Design and Signal Processing for Frequency Diverse Array Radar 被引量:3
15
作者 Jingwei Xu Lan Lan +4 位作者 Xiongpeng He Shengqi Zhu Cao Zeng Guisheng Liao Yuhong Zhang 《Journal of Beijing Institute of Technology》 EI CAS 2021年第1期1-19,共19页
Frequency diverse array(FDA)radar has been studied for more than 15 years and has attracted a lot of attention due to its potential advantages over the well-known phased array radar.The representative feature of FDA i... Frequency diverse array(FDA)radar has been studied for more than 15 years and has attracted a lot of attention due to its potential advantages over the well-known phased array radar.The representative feature of FDA is range-angle-time-dependent transmit beampattern and its underlying properties are continuously revealed in the research.The formulation and exploitation of the transmit diversity with a frequency increment is the fundamental principle,which brings extra degrees-of-freedom(DOFs)in the transmit dimension.As the FDA radar carries additional information in range,it provides more flexibility in signal processing and also brings in new technical issues.This article overviews the state-of-the-art in FDA radar area and its applications,mainly based on the progress in our group.There are two main catalogs in FDA radar area,namely coherent FDA and FDA-MIMO(multiple-input multiple-output)radars.Potential applications including target parameter estimation,ambiguous clutter suppression,and deceptive jammer suppression are discussed. 展开更多
关键词 frequency diverse array(FDA) range-angle-time-dependent transmit beampattern parameter estimation ambiguous clutter suppression deceptive jammer suppression
下载PDF
A Security Transfer Model Based on Active Defense Strategy
16
作者 Ying Zheng 《Communications and Network》 2010年第3期187-192,共6页
This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network elem... This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network element together with the self-similar, hierarchical and distributed management structure. Furthermore, we use deceptive packets so that the attackers can not trace back to the encrypted data packets. Finally, according to the digested information from data packets, this model is capable of detecting attacks and tracing back to the attackers immediately. In the meantime, the overlaying routers in the security domain are dynamically administered. In summary, this model not only improves the se-curity of data transfer on the web, but also enhances the effectiveness of the network management and switching efficiency of routers as well. 展开更多
关键词 ACTIVE DEFENSE Digested Information ROUTING Control deceptive PACKETS HIERARCHICAL Management
下载PDF
An Opinion Spam Detection Method Based on Multi-Filters Convolutional Neural Network 被引量:2
17
作者 Ye Wang Bixin Liu +4 位作者 Hongjia Wu Shan Zhao Zhiping Cai Donghui Li Cheang Chak Fong 《Computers, Materials & Continua》 SCIE EI 2020年第10期355-367,共13页
With the continuous development of e-commerce,consumers show increasing interest in posting comments on consumption experience and quality of commodities.Meanwhile,people make purchasing decisions relying on other com... With the continuous development of e-commerce,consumers show increasing interest in posting comments on consumption experience and quality of commodities.Meanwhile,people make purchasing decisions relying on other comments much more than ever before.So the reliability of commodity comments has a significant impact on ensuring consumers’equity and building a fair internet-trade-environment.However,some unscrupulous online-sellers write fake praiseful reviews for themselves and malicious comments for their business counterparts to maximize their profits.Those improper ways of self-profiting have severely ruined the entire online shopping industry.Aiming to detect and prevent these deceptive comments effectively,we construct a model of Multi-Filters Convolutional Neural Network(MFCNN)for opinion spam detection.MFCNN is designed with a fixed-length sequence input and an improved activation function to avoid the gradient vanishing problem in spam opinion detection.Moreover,convolution filters with different widths are used in MFCNN to represent the sentences and documents.Our experimental results show that MFCNN outperforms current state-of-the-art methods on standard spam detection benchmarks. 展开更多
关键词 Opinion spam detection deceptive reviews deep learning convolutional neural network activation function
下载PDF
侦查谋略中欺骗的运用及界限——以审讯为切入点 被引量:2
18
作者 陈龙鑫 《江西公安专科学校学报》 2009年第6期59-64,共6页
侦查谋略带有静态和动态意义上的欺骗性质,使用不当将构成违法取证行为,其所获得的证据也可能因此遭到排除。而由于刑事案件的特殊性、侦查活动的对抗性,使得欺骗性侦查谋略在整个侦查活动中的运用成为一种必要。因此,对侦查谋略中欺骗... 侦查谋略带有静态和动态意义上的欺骗性质,使用不当将构成违法取证行为,其所获得的证据也可能因此遭到排除。而由于刑事案件的特殊性、侦查活动的对抗性,使得欺骗性侦查谋略在整个侦查活动中的运用成为一种必要。因此,对侦查谋略中欺骗手段合法与非法之间的界分十分必要。在侦查过程中,欺骗性侦查谋略的使用应该严格控制在合法范围内,以确保所获供述的真实性。 展开更多
关键词 侦查谋略 欺骗 非法证据排除
下载PDF
违反竞争法的网络广告之法律责任 被引量:1
19
作者 秦燚 蒙柳 郑友德 《网络法律评论》 2004年第2期170-181,共12页
在传统广告中,广告主、广告经营者和广告发布者各自的定位和职责是清楚明晰的。而在网络广告中,广告主、广告经营者、广告发布者这三者的界限日益模糊。加之,新的角色——网络服务商等的介入,而使我们无法用现行法律概念来理解,从而产... 在传统广告中,广告主、广告经营者和广告发布者各自的定位和职责是清楚明晰的。而在网络广告中,广告主、广告经营者、广告发布者这三者的界限日益模糊。加之,新的角色——网络服务商等的介入,而使我们无法用现行法律概念来理解,从而产生法律责任追究认知上的困难。本文就此结合相关国外法律规定,阐述了网络服务提供者等的法律责任。 展开更多
关键词 网络广告 网络服务提供者 法律责任 虚假及误导广告
原文传递
Evolutionary implications of deception in mimicry and masquerade 被引量:1
20
作者 Ximena J. NELSON 《Current Zoology》 SCIE CAS CSCD 2014年第1期6-15,共10页
Aggressive mimicry occurs when an organism resembles some aspect of another organism (the model) in order to obtain prey through its deceptive resemblance. This may function either through the overt response of the ... Aggressive mimicry occurs when an organism resembles some aspect of another organism (the model) in order to obtain prey through its deceptive resemblance. This may function either through the overt response of the receiver or through the lack of response of the receiver. Reviewing selected examples, I discuss some of the difficulties in ascribing a model for the mimic. I also discuss how a single animal can have multiple ploys in its armoury of deceptive signals, thus belonging within two or more categories of deceptive signalling. In addition to aggressive mimicry, these may include crypsis or camouflage, mas- querade (mimicry of inanimate objects), and Batesian or protective mimicry. Each of these examples of deception has multiple evolutionary pathways, and some deceptive signals may be more costly to receivers than others, but no single organism is subject to a single selection pressure, leading to the reality that many evolutionary pathways contribute to the diversity we see around us. New technologies are opening new channels of investigation into deceptive signaling in many different sensory modalities, and this is reflected in the recent increase in studies investigating the structure and function of deceptive signals. In turn, these studies are beginning to expose the fascinating complexity of deceptive signaling systems, allowing us to discover the myriad, non-mutually exclusive, solutions that can be selected for to obtain prey 展开更多
关键词 MIMICRY MASQUERADE CRYPSIS deceptive communication Cleaner fish Pre-existing biases
原文传递
上一页 1 2 16 下一页 到第
使用帮助 返回顶部