Results 211 to 220 of about 63,288 (246)

The predatory behavior of ants: an impressive panoply of morphological adaptations

open access: yesInsect Science, EarlyView.
This review focuses on predation in ants, showing the wide diversity of cases from solitary foraging to group hunting tactics, as well as the evolution of mandible shape frequently adapted to capture specific prey. Although most ants are generalist feeders, finding their sugary substances directly on plants or indirectly via sap‐sucking insects, some ...
Alain Dejean   +6 more
wiley   +1 more source

Chronic infection perturbs the affinity hierarchy of antiviral B cells. [PDF]

open access: yesProc Natl Acad Sci U S A
Dimitrova M   +17 more
europepmc   +1 more source

Bound by blood and bloodshed: Sibling ties and participation in genocidal violence

open access: yesCriminology, EarlyView.
Abstract Focusing on the 1994 genocide in Rwanda, we examine how sibling relationships—one of the most salient familial bonds—influence individual engagement in violence during mass atrocity. Drawing on an adaptation of differential association and social learning theories for contexts of mass atrocity, we analyze a novel dataset linking over 300,000 ...
Jack G. R. Wippell   +3 more
wiley   +1 more source

Brittle Structural Control and Fluid Progress of the Jinqingding Gold Deposit: Implications for Epizonal Gold Mineralization

open access: yesActa Geologica Sinica - English Edition, EarlyView.
ABSTRACT The Jinqingding gold deposit in eastern Jiaodong is a significant gold mineralization within the Muping–Rushan metallogenic belt. This study integrates structural analysis and trace element geochemistry of sulphides to elucidate ore‐controlling mechanisms and metallogenic models.
Xiaohu Wang   +10 more
wiley   +1 more source

Universities as the Next Counterintelligence Battleground in Geopolitical Contests

open access: yesGlobal Policy, EarlyView.
ABSTRACT Globally, universities are increasingly becoming the target of foreign national security actors, engaging in espionage, sabotage, foreign interference and intellectual property theft. Despite that, there has been no examination of the utilisation of counterintelligence approaches by universities to the threats they face from the subordination ...
Brendan Walker‐Munro   +1 more
wiley   +1 more source

Trait coevolution and causal inference using generalized dynamic phylogenetic models

open access: yesMethods in Ecology and Evolution, EarlyView.
Abstract Phylogenetic comparative methods are widely used to study trait coevolution across biological and cultural domains. The most common methods are phylogenetic generalized linear (mixed) models, phylogenetic path analysis, Pagel's ‘discrete’ method and Ornstein–Uhlenbeck models. While some frameworks like generalized linear mixed models are quite
Erik J. Ringen   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy