13 resultados para Facultative predator
em Queensland University of Technology - ePrints Archive
Resumo:
Outbreaks of the coral-killing seastar Acanthaster planci are intense disturbances that can decimate coral reefs. These events consist of the emergence of large swarms of the predatory seastar that feed on reef-building corals, often leading to widespread devastation of coral populations. While cyclic occurrences of such outbreaks are reported from many tropical reefs throughout the Indo-Pacific, their causes are hotly debated, and the spatio-temporal dynamics of the outbreaks and impacts to reef communities remain unclear. Based on observations of a recent event around the island of Moorea, French Polynesia, we show that Acanthaster outbreaks are methodic, slow-paced, and diffusive biological disturbances. Acanthaster outbreaks on insular reef systems like Moorea's appear to originate from restricted areas confined to the ocean-exposed base of reefs. Elevated Acanthaster densities then progressively spread to adjacent and shallower locations by migrations of seastars in aggregative waves that eventually affect the entire reef system. The directional migration across reefs appears to be a search for prey as reef portions affected by dense seastar aggregations are rapidly depleted of living corals and subsequently left behind. Coral decline on impacted reefs occurs by the sequential consumption of species in the order of Acanthaster feeding preferences. Acanthaster outbreaks thus result in predictable alteration of the coral community structure. The outbreak we report here is among the most intense and devastating ever reported. Using a hierarchical, multi-scale approach, we also show how sessile benthic communities and resident coral-feeding fish assemblages were subsequently affected by the decline of corals. By elucidating the processes involved in an Acanthaster outbreak, our study contributes to comprehending this widespread disturbance and should thus benefit targeted management actions for coral reef ecosystems.
Resumo:
Lack of water can be the least of a farmer’s worries in times of drought. Predatory banks can be just as deadly to a farmer’s livelihood. Former Queensland farmer and grazier Lynton Freeman has become increasingly anxious about the financial tightrope being walked by Australian farmers as the record floods of 2011 have given way in only three years to savage drought. He fears for hundreds of family farmers at risk — not from lack of water, but from lack of knowledge in how to manage their businesses through the drought and keep their heads above the financial water that will threaten many before this drought breaks.
Resumo:
The black rat (Rattus rattus) has been shown to be the primary species responsible for causing significant crop losses within the Australian macadamia industry. This species success within macadamia orchards is directly related to the flexibility expressed in its foraging behaviour. In this paper a conceptual foraging model is presented which proposes that the utilisation of resources by rodents within various components of the system is related not only to their relative abundance, but also to predator avoidance behaviour. Nut removal from high predation risk habitats during periods of low resource abundance in low risk compartments of the system is considered an essential behaviour that allows high rodent densities to be maintained throughout the year.
Resumo:
Rodenticide use in agriculture can lead to the secondary poisoning of avian predators. Currently the Australian sugarcane industry has two rodenticides, Racumin® and Rattoff®, available for in-crop use but, like many agricultural industries, it lacks an ecologically-based method of determining the potential secondary poisoning risk the use of these rodenticides poses to avian predators. The material presented in this thesis addresses this by: a. determining where predator/prey interactions take place in sugar producing districts; b. quantifying the amount of rodenticide available to avian predators and the probability of encounter; and c. developing a stochastic model that allows secondary poisoning risk under various rodenticide application scenarios to be investigated. Results demonstrate that predator/prey interactions are highly constrained by environmental structure. Rodents used crops that provided high levels of canopy cover and therefore predator protection and poorly utilised open canopy areas. In contrast, raptors over-utilised areas with low canopy cover and low rodent densities, but which provided high accessibility to prey. Given this pattern of habitat use, and that industry baiting protocols preclude rodenticide application in open canopy crops, these results indicate that secondary poisoning can only occur if poisoned rodents leave closed canopy crops and become available for predation in open canopy areas. Results further demonstrate that after in-crop rodenticide application, only a small proportion of rodents available in open areas are poisoned and that these rodents carry low levels of toxicant. Coupled with the low level of rodenticide use in the sugar industry, the high toxic threshold raptors have to these toxicants and the low probability of encountering poisoned rodents, results indicate that the risk of secondary poisoning events occurring is minimal. A stochastic model was developed to investigate the effect of manipulating factors that might influence secondary poisoning hazard in a sugarcane agro-ecosystem. These simulations further suggest that in all but extreme scenarios, the risk of secondary poisoning is also minimal. Collectively, these studies demonstrate that secondary poisoning of avian predators associated with the use of the currently available rodenticides in Australian sugar producing districts is minimal. Further, the ecologically-based method of assessing secondary poisoning risk developed in this thesis has broader applications in other agricultural systems where rodenticide use may pose risks to avian predators.
Resumo:
Summary There are four interactions to consider between energy intake (EI) and energy expenditure (EE) in the development and treatment of obesity. (1) Does sedentariness alter levels of EI or subsequent EE? and (2) Do high levels of EI alter physical activity or exercise? (3) Do exercise-induced increases in EE drive EI upwards and undermine dietary approaches to weight management and (4) Do low levels of EI elevate or decrease EE? There is little evidence that sedentariness alters levels of EI. This lack of cross-talk between altered EE and EI appears to promote a positive EB. Lifestyle studies also suggest that a sedentary routine actually offers the opportunity for over-consumption. Substantive changes in non exercise activity thermogenesis are feasible, but not clearly demonstrated. Cross talk between elevated EE and EI is initially too weak and takes too long to activate, to seriously threaten dietary approaches to weight management. It appears that substantial fat loss is possible before intake begins to track a sustained elevation of EE. There is more evidence that low levels of EI does lower physical activity levels, in relatively lean men under conditions of acute or prolonged semi-starvation and in dieting obese subjects. During altered EB there are a number of small but significant changes in the components of EE, including (i) sleeping and basal metabolic rate, (ii) energy cost of weight change alters as weight is gained or lost, (iii) exercise efficiency, (iv) energy cost of weight bearing activities, (v) during substantive overfeeding diet composition (fat versus carbohydrate) will influence the energy cost of nutrient storage by ~ 15%. The responses (i-v) above are all “obligatory” responses. Altered EB can also stimulate facultative behavioural responses, as a consequence of cross-talk between EI and EE. Altered EB will lead to changes in the mode duration and intensity of physical activities. Feeding behaviour can also change. The degree of inter-individual variability in these responses will define the scope within which various mechanisms of EB compensation can operate. The relative importance of “obligatory” versus facultative, behavioural responses -as components of EB control- need to be defined.
Resumo:
The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.
Resumo:
Two representations have dominated public perceptions of the largest living marsupial carnivore, the Tasmanian devil. One is the voracious, hurricane-like innocent savage Taz of Looney Tunes cartoon fame. The other, familiar in nineteenth- and twentieth-century rural Tasmania, is the ferocious predator and scavenger that wantonly kills livestock — and perhaps even people, should they become immobilized in the wilderness at night. Devils can take prey nearly three times their size and eat more than a third of their body weight in a sitting. Even so, it is hard to imagine how this species, being only slightly larger than a fox terrier, could be so maligned in name and image...
Resumo:
Conservation of free-ranging cheetah (Acinonyx jubatus) populations is multi faceted and needs to be addressed from an ecological, biological and management perspective. There is a wealth of published research, each focusing on a particular aspect of cheetah conservation. Identifying the most important factors, making sense of various (and sometimes contrasting) findings, and taking decisions when little or no empirical data is available, are everyday challenges facing conservationists. Bayesian networks (BN) provide a statistical modeling framework that enables analysis and integration of information addressing different aspects of conservation. There has been an increased interest in the use of BNs to model conservation issues, however the development of more sophisticated BNs, utilizing object-oriented (OO) features, is still at the frontier of ecological research. We describe an integrated, parallel modeling process followed during a BN modeling workshop held in Namibia to combine expert knowledge and data about free-ranging cheetahs. The aim of the workshop was to obtain a more comprehensive view of the current viability of the free-ranging cheetah population in Namibia, and to predict the effect different scenarios may have on the future viability of this free-ranging cheetah population. Furthermore, a complementary aim was to identify influential parameters of the model to more effectively target those parameters having the greatest impact on population viability. The BN was developed by aggregating diverse perspectives from local and independent scientists, agents from the national ministry, conservation agency members and local fieldworkers. This integrated BN approach facilitates OO modeling in a multi-expert context which lends itself to a series of integrated, yet independent, subnetworks describing different scientific and management components. We created three subnetworks in parallel: a biological, ecological and human factors network, which were then combined to create a complete representation of free-ranging cheetah population viability. Such OOBNs have widespread relevance to the effective and targeted conservation management of vulnerable and endangered species.
Resumo:
Introduced predators can have pronounced effects on naïve prey species; thus, predator control is often essential for conservation of threatened native species. Complete eradication of the predator, although desirable, may be elusive in budget-limited situations, whereas predator suppression is more feasible and may still achieve conservation goals. We used a stochastic predator-prey model based on a Lotka-Volterra system to investigate the cost-effectiveness of predator control to achieve prey conservation. We compared five control strategies: immediate eradication, removal of a constant number of predators (fixed-number control), removal of a constant proportion of predators (fixed-rate control), removal of predators that exceed a predetermined threshold (upper-trigger harvest), and removal of predators whenever their population falls below a lower predetermined threshold (lower-trigger harvest). We looked at the performance of these strategies when managers could always remove the full number of predators targeted by each strategy, subject to budget availability. Under this assumption immediate eradication reduced the threat to the prey population the most. We then examined the effect of reduced management success in meeting removal targets, assuming removal is more difficult at low predator densities. In this case there was a pronounced reduction in performance of the immediate eradication, fixed-number, and lower-trigger strategies. Although immediate eradication still yielded the highest expected minimum prey population size, upper-trigger harvest yielded the lowest probability of prey extinction and the greatest return on investment (as measured by improvement in expected minimum population size per amount spent). Upper-trigger harvest was relatively successful because it operated when predator density was highest, which is when predator removal targets can be more easily met and the effect of predators on the prey is most damaging. This suggests that controlling predators only when they are most abundant is the "best" strategy when financial resources are limited and eradication is unlikely. © 2008 Society for Conservation Biology.
Resumo:
It is becoming increasingly popular to consider species interactions when managing ecological foodwebs. Such an approach is useful in determining how management can affect multiple species, with either beneficial or detrimental consequences. Identifying such actions is particularly valuable in the context of conservation decision making as funding is severely limited. This paper outlines a new approach that simplifies the resource allocation problem in a two species system for a range of species interactions: independent, mutualism, predator-prey, and competitive exclusion. We assume that both species are endangered and we do not account for decisions over time. We find that optimal funding allocation is to the conservation of the species with the highest marginal gain in expected probability of survival and that, across all except mutualist interaction types, optimal conservation funding allocation differs between species. Loss in efficiency from ignoring species interactions was most severe in predator-prey systems. The funding problem we address, where an ecosystem includes multiple threatened species, will only become more commonplace as increasing numbers of species worldwide become threatened. © 2011 Elsevier B.V.