Filtering by
Cancer rates vary between people, between cultures, and between tissue types, driven by clinically relevant distinctions in the risk factors that lead to different cancer types. Despite the importance of cancer location in human health, little is known about tissue-specific cancers in non-human animals. We can gain significant insight into how evolutionary history has shaped mechanisms of cancer suppression by examining how life history traits impact cancer susceptibility across species. Here, we perform multi-level analysis to test how species-level life history strategies are associated with differences in neoplasia prevalence, and apply this to mammary neoplasia within mammals. We propose that the same patterns of cancer prevalence that have been reported across species will be maintained at the tissue-specific level. We used a combination of factor analysis and phylogenetic regression on 13 life history traits across 90 mammalian species to determine the correlation between a life history trait and how it relates to mammary neoplasia prevalence. The factor analysis presented ways to calculate quantifiable underlying factors that contribute to covariance of entangled life history variables. A greater risk of mammary neoplasia was found to be correlated most significantly with shorter gestation length. With this analysis, a framework is provided for how different life history modalities can influence cancer vulnerability. Additionally, statistical methods developed for this project present a framework for future comparative oncology studies and have the potential for many diverse applications.
Domestic dogs have assisted humans for millennia. However, the extent to which these helpful behaviors are prosocially motivated remains unclear. To assess the propensity of pet dogs to spontaneously and actively rescue distressed humans, this study tested whether sixty pet dogs would release their seemingly trapped owners from a large box. To examine the causal mechanisms that shaped this behavior, the readiness of each dog to open the box was tested in three conditions: 1) the owner sat in the box and called for help (“Distress” test), 2) an experimenter placed high-value food rewards in the box (“Food” test), and 3) the owner sat in the box and calmly read aloud (“Reading” test).
Dogs were as likely to release their distressed owner as to retrieve treats from inside the box, indicating that rescuing an owner may be a highly rewarding action for dogs. After accounting for ability, dogs released the owner more often when the owner called for help than when the owner read aloud calmly. In addition, opening latencies decreased with test number in the Distress test but not the Reading test. Thus, rescuing the owner could not be attributed solely to social facilitation, stimulus enhancement, or social contact-seeking behavior.
Dogs displayed more stress behaviors in the Distress test than in the Reading test, and stress scores decreased with test number in the Reading test but not in the Distress test. This evidence of emotional contagion supports the hypothesis that rescuing the distressed owner was an empathetically-motivated prosocial behavior. Success in the Food task and previous (in-home) experience opening objects were both strong predictors of releasing the owner. Thus, prosocial behavior tests for dogs should control for physical ability and previous experience.
Extreme events, a type of collective behavior in complex networked dynamical systems, often can have catastrophic consequences. To develop effective strategies to control extreme events is of fundamental importance and practical interest. Utilizing transportation dynamics on complex networks as a prototypical setting, we find that making the network “mobile” can effectively suppress extreme events. A striking, resonance-like phenomenon is uncovered, where an optimal degree of mobility exists for which the probability of extreme events is minimized. We derive an analytic theory to understand the mechanism of control at a detailed and quantitative level, and validate the theory numerically. Implications of our finding to current areas such as cybersecurity are discussed.