300 likes | 460 Views
Signal Costs and Constraints. Signal detection theory (pp. 429-438) Costs to senders of signaling Constraints on senders Costs to receivers Constraints on receivers Transmission constraints. Decision threshold. Four possibilities: hit or correct detection, false alarm,
E N D
Signal Costs and Constraints • Signal detection theory (pp. 429-438) • Costs to senders of signaling • Constraints on senders • Costs to receivers • Constraints on receivers • Transmission constraints
Decision threshold Four possibilities: hit or correct detection, false alarm, miss, and correct rejection
Signal detection theory ROC = receiver operating characteristic: plots correct detection against false alarms. As the threshold criterion moves left to right, the PCD vs PFA moves down to the left. Greater separation between signal and noise increases d.
Implications • Communication is never perfect • Can improve communication • if senders create more distinctive signals • if receivers acquire greater discrimination ability • Which of these will happen depends on the relative costs to sender and receiver as well as constraints on signal production or reception
Sender Costs • Conspicuousness to predators and parasites • Visual, auditory, or olfactory signals • Energetic costs of signaling • Lost time • Conflict with original function See Kotiaho, J.S. 2001 Costs of sexual traits: a mismatch between theoretical considerations and empirical evidence. Biol. Rev. 76: 365-376.
Male crickets attract females and parasitic Ormia ochracea flies
Female red-winged blackbird calls attract predators and defense
Singing consumes energy Gray treefrogs Carolina wrens
Conflict with original function Elongated tails create drag during turns
Constraints • Phylogenetic • Implies insufficient time or genetic variation for evolution to modify trait • Physical • Production of signal is impossible given the organism’s morphology and physiology
Body size constrains frequency Leptodactyline frogs Birds
Receiver costs • Vulnerability to predation while inspecting or comparing signals • Time lost • Susceptibility to exploitation, i.e. code-breakers
Receiver constraints Phylogeny, memory