SYNOPSIS of BIOLOGICAL DATA on SKIPJACK Katsuwonus Pelamis (Linnaeus) 1758 (PACIFIC OCEAN)

Total Page:16

File Type:pdf, Size:1020Kb

SYNOPSIS of BIOLOGICAL DATA on SKIPJACK Katsuwonus Pelamis (Linnaeus) 1758 (PACIFIC OCEAN) Species Synopsis No, 22 FAO Fisheries Biology Synopsis No, 65 FIb/S65 (Distribution restricted) SAST Tuna SYNOPSIS OF BIOLOGICAL DATA ON SKIPJACK Katsuwonus pelamis (Linnaeus) 1758 (PACIFIC OCEAN) Exposé synoptique sur la biologie du bonite à ventre rayé Katsuwonus palamis (Linnaeus) 1758 (Océan Pacifique) Sinopsis sobre la biología del bonito de vientre rayado Katsuwonus pelamis (Linnaeus) 1758 (Océano Pacífico) Prepared by KENNETH D, WALDRON U, S. Bureau of Commercial Fisheries Biological Laboratory Honolulu, Hawaii FISHERIES DIVISION, BIOLOGY BRANCH FOOD AND AGRICULTURE ORGANIZATION OF THE UNITED NATIONS Rome, 1963 695 FIb! S65 Skipjack 1:1 1 IDENTITY 'Body robust, naked outside the corselet; 1, 1 Taxonomy maxillary not concealed by preorbital; teeth present in jaws only; dorsal fins with only a short space between them, the anterior 1, 1, 1Definition (after Schultz, et al, spines of the first fin very high, decreasing 1960) rapidly in length; second dorsal and anal each followed by 7 or 8 finlets; pectoral not very Phylum CHORDATA long, placed at or near level of eye, with Subphylum Craniata about 26 or 27 rays." (Hildebrand, 1946). Superclass Gnatho stomata The foregoing statement is applicable to Class Osteichthys mature adults of the genus. Subclass Teleostomi Superorder Teleosteica Order Percomorphida - Species Katsuwonus pelamis Suborder Scombrina (Linnaeus) (Fig. 1) Family Scombridae "Head 3. 0 to 3,2; depth 3. 8 to 4.1; D. XIV Genus Katsuwonus or XV - I,13 or 14 - VIII; A. II,12 or 13 - VII; Species pelamis P. 26 or 27; vertebrae 40 (one specimen dissected).rnote: Both Kishinouye, 1923 and Some of the larger taxa under which skip- Godsil and Byers, 1944 give the number of jack have been listed are shown in Table I. vertebrae as 4l,j The tendency over the past few decades has been to set the tuna apart from other scorn- "Body robust, its greatest thickness about broids, and further to set up monotypic genera. two-thirds its depth, tapering strongly pos- Within recent years this tendency appears to teriorly; caudal peduncle slender, depressed, be changing to one of re-including tuna in the with a strong, lateral keel, its depth 14 to 15,3 family Scombridae and doing away with some in head, head somewhat compressed, convex of the monotypic genera,Under this system above; snout long, pointed, 3. 3 to 3.7 in head; it is likely that skipjack will be included in the eye moderate, round, 5.7 to 6,1; interorbital genus Euthynnus, 3.7 to 4.0; mouth slightly oblique, terminal; maxillary reaching nearly or quite opposite 1. 1. 2Description middle of eye, 2.6 to 2.8 in head; teeth in jaws in single series, short and rather stocky; gill - Genus Katsuwonus rakers long, slender, about four-fifths length Table I Classification of skipjack according to different authors Authority Group Regan KishinouyeJordan, Evermann Berg Schultz et al, 1909a, b 1923 and Clark 1930 1940 1960 PHYLUM - - - - Chordata SUBPHYLUM - - - - Craniata CLASS Pisces - Pisces Teleostomi Osteichthys SUBCLASS Neopterygíi - Actinopteri ActinopterygilT eleostorni SUPERORDER - - Acanthopterygil - Teleosteica ORDER Percomorphi Plecostei Percomorphi ThunniformesPercomorphida SUBORDER Scombroidei - Rhegnopteri - Scombrina SERIES, SECTIONScombriformes - Scombriformes - DIVISION FAMILY Scornbridae KatsuwonidaeKatsuwonidae Thunnidae Scornbridae SUBFAMILY - - - Auxidini - GENUS - Katsuwonus Katsuwonus Katsuwonus Katsuwonus SPECIES - pelamis vagans - pelarnis 696 FIb/S65 Skipjack Fig. 1Lateral view of an adult skipjack, Katsuwonus pelamis (Linnaeus) (from Walford, 1937) 697 FIb/S65 Skipjack 1:3 of eye, 36 to 40 on lower and 15 or 16 (counted through the kidneys the arteries turn outward in only 3 specimens) on upper limb of first and forward, instead of turning more or less arch; lateral line missing anteriorly, curved backward as in the other plecostean fishes. downward at midlength, attaining a midlateral Each artery reaching to the myotorne of the position under about the first dorsal finlet, first rib is divided into two arteries, epaxial straight from thence to caudal keel; scales and hypaxial.The epaxial artery runs below present anteriorly in region of pectoral, the first rib, while the hypaxial artery runs extending on back to or beyond origin of above the rib.These two arteries, are first dorsal, reduced scales in lateral line, nearly equally developed, and are separated and a pointed area of scales extending about from each other at a distance of 6-8 times an eyets diameter beyond tip of pectoral the breadth of the blood-vessels. These fin; first dorsal composed of slender spines, arteries do not form a ioop at the caudal the anterior ones long, posterior ones short, region. The cutaneous artery and cutaneous scarcely extending above dorsal groove, the vein lie in juxtaposition, nearly flat at the first one 1.8 to ¿.0 in head, origin of fin a surface of the body. Arterioles and venules little behind insertion of pectoral, its connected with these cutaneous canals run in distance from tip of snout 2,6 to 2.9 in opposite directions, along the surface of the length; second dorsal somewhat elevated body and they are not so numerous as in the anteriorly, with deeply concave margin, the tunnies,The rod of the vascular plexus in posterior rays being very short, its origin the haemal canal is called kurochiai by fisher- about equidistant from origin of first dorsal men, and it is thicker than the diameter of the and base of next to last dorsal finlet; anal vertebral column." similar to second dorsal, its origin a little in advance of vertical from base of last ray The spinal column (Fig. 2) differs of second dorsal; ventral somewhat shorter sufficiently from that of other fishes to be than pectoral, inserted slightly posterior to worthy of comment. Godsil and Byers (1944) pectoral, its distance from tip of mandible state "The spinal column is extremely complex 2.7 to 2.9 in length; pectoral moderately in this species.In the posterior half of the pointed, 1.9 to 2.1 in head. precaudal, and the anterior part of the caudal region, haemopophyses arise at both ends of "Color very dark blue above, with each vertebra, with the anterior haemo- metallic reflections; silvery below; lower pophyses of one vertebra articulating with the part of head, chest, and area around ventral posterior haemopophyses of the preceding fins dirty white; lower half of side with two vertebra. These haernopophyses project far to four dark longitudinal strips; spines of below the spinal column and alternate with the first dorsal dusky, anterior margin of first longer haen-ial spines described below. An spine and membranes pale or white; second osseous bridge roughly parallel with the dorsal, dorsal and anal finlets, caudal, anal, spinal column unites the anterior and posterior and pectoral all more or less dusky; pectoral haemopophyses of each vertebra. Viewing the much darker on inner side than outside, the spinal column laterally, the bridge and the upper rays generally silvery; ventral fins circular opening it forms may be easily seen, white on outside, inner side dusky; inside of A branch arises from each bridge and extends mouth largely dusky." (Hildebrand, 1946), downward to unite in the median line with its In life, and in some preserved specimens, fellow from the opposite side. This forms the light vertical bars are evident along the haemal arch from the tip of which a single sides. haemal spine continues veritralward,This complex basketwork occurs only in the Anatomical descriptions of the species skipjack." and genus may be found in Kishinouye (1923), Godsil and Byers (1944), Schultz et al(1960). The skipjack lacks an air bladder. Kishinouye (1923, p. 452) states, "The Some of the organs not mentioned by Gods il cutaneous circulatory system is unique. A and Byers (1944) or not described in detail by pair of cutaneous arteries branch just behind Kishinouye (1923) have been described by other the insertion of the pharyngeal muscles as in authors, Among these descriptions are those the tunnies and other bonitos; but passing of Rivas (1953) and Rasquin (1958) concerning 698 1:4 FIbIS65 Skipjack the pineal region; tJchihashi (1953) on the brain of skipjack since it was first proposed in 1915 as related to ecology; Hanyu (1959) on certain by Kishinouye, although at that time he used structures of the eye; and Suyehiro (1941, 1942, the spelling TTpelamysht.The present tendency 1950) on the pituitary body, the Islets of appears to be towards replacing Katsuwonus Langerhans, arid the digestive system (it might with Euthynnus, retaining the specific name be noted that this author erred in ascribing an pelamis. air bladder to skipjack). 1.2.2 Other scientific names ascribed 1.2 Nomenclature to this species 1.2.1 Valid scientific name The following list of names, taken mainly from Rosa (1950), is arranged in alphabetical Katsuwonus pelarnis (Linnaeus, 1758) has rather than chronological order. Each name been widely accepted as the scientific name is followed by one of the early authors to use the combination. Euthynnus pelamis Tanaka, 1912 Euthynnus (Katsuwonus) pelamis Fraser-Brunner, 1950 Euthynnus pelamys Jordan and Gilbert, 1882 Gymnosarda pelamis Dresslar and Fesler, 1889 Gymnosarda pelamys Barnard, 1925 Katsuwonis pelamis Herre, 1933 Katsuwonus pelamis Kishinouye, 1923 Katsuwonus pelamys Kishinouye, 1915 Katsuwonus vagans Jordan, Evermarin, and Clark, 1930 Orcynus pelamis Goode and Bean, 1879 Pelamys pelamys Bleeker, 1865 Pelamys thynnus Jenkins, 1925 Scomber pelarnides Lacpde, 1802 Scomber pelamis Linnaeus, 1758 Scomber pelamys Bloch and Schneider, 1801 Thynnus pelamis Hoek, 1914 Thynnus pelamys Cuvier and Valenciennes, 1831 Thynnus vagans Lesson, 1830 99 FIb/S65 Skipjack 1:5 1, 2. 3 Standard common names, tions of fish and the stocks of the Eastern and vernacular names Central Pacific also appear to be at least semi- independent, The following list of common names and vernacular names, the latter in parentheses, -Varieties and the countries in which they are used was taken from Rosa (1950).Other common names There are no records of varieties of skip- not included in the list, refer to skipjack of a jack.
Recommended publications
  • Atlantic Highly Migratory Species Stock Assessment and Fisheries Evaluation Report 2019
    Atlantic Highly Migratory Species Stock Assessment and Fisheries Evaluation Report 2019 U.S. Department of Commerce | National Oceanic and Atmospheric Administration | National Marine Fisheries Service 2019 Stock Assessment and Fishery Evaluation Report for Atlantic Highly Migratory Species Atlantic Highly Migratory Species Management Division May 2020 Highly Migratory Species Management Division NOAA Fisheries 1315 East-West Highway Silver Spring, MD 20910 Phone (301) 427-8503 Fax (301) 713-1917 For HMS Permitting Information and Regulations • HMS recreational fishermen, commercial fishermen, and dealer compliance guides: www.fisheries.noaa.gov/atlantic-highly-migratory-species/atlantic-hms-fishery- compliance-guides • Regulatory updates for tunas: hmspermits.noaa.gov For HMS Permit Purchase or Renewals Open Access Vessel Permits Issuer Permits Contact Information HMS Permit HMS Charter/Headboat, (888) 872-8862 Shop Atlantic Tunas (General, hmspermits.noaa.gov Harpoon, Trap), Swordfish General Commercial, HMS Angling (recreational) Southeast Commercial Caribbean Small (727) 824-5326 Regional Boat, Smoothhound Shark www.fisheries.noaa.gov/southeast/resources- Office fishing/southeast-fisheries-permits Greater Incidental HMS Squid Trawl (978) 281-9370 Atlantic www.fisheries.noaa.gov/new-england-mid- Regional atlantic/resources-fishing/vessel-and-dealer- Fisheries permitting-greater-atlantic-region Office Limited Access Vessel Permits Issuer Permits Contact Information HMS Permit Atlantic Tunas Purse Seine (888) 872-8862 Shop category hmspermits.noaa.gov
    [Show full text]
  • Optimizing the Block Cipher Resource Overhead at the Link Layer Security Framework in the Wireless Sensor Networks
    Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008, July 2 - 4, 2008, London, U.K. Optimizing the Block Cipher Resource Overhead at the Link Layer Security Framework in the Wireless Sensor Networks Devesh C. Jinwala, Dhiren R. Patel and Kankar S. Dasgupta, data collected from different sensor nodes. Since the Abstract—The security requirements in Wireless Sensor processing of the data is done on-the-fly, while being Networks (WSNs) and the mechanisms to support the transmitted to the base station; the overall communication requirements, demand a critical examination. Therefore, the costs are reduced [2]. Due to the multi-hop communication security protocols employed in WSNs should be so designed, as and the in-network processing demanding applications, the to yield the optimum performance. The efficiency of the block cipher is, one of the important factors in leveraging the conventional end-to-end security mechanisms are not performance of any security protocol. feasible for the WSN [3]. Hence, the use of the standard In this paper, therefore, we focus on the issue of optimizing end-to-end security protocols like SSH, SSL [4] or IPSec [5] the security vs. performance tradeoff in the security protocols in WSN environment is rejected. Instead, appropriate link in WSNs. As part of the exercise, we evaluate the storage layer security architecture, with low associated overhead is requirements of the block ciphers viz. the Advanced Encryption required. Standard (AES) cipher Rijndael, the Corrected Block Tiny Encryption Algorithm (XXTEA) using the Output Codebook There are a number of research attempts that aim to do so.
    [Show full text]
  • Protocol Failure in the Escrowed Encryption Standard
    Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories [email protected] August 20, 1994 Abstract The proposal, called the Escrowed Encryption Stan- dard (EES) [NIST94], includes several unusual fea- The Escrowed Encryption Standard (EES) de¯nes tures that have been the subject of considerable de- a US Government family of cryptographic processors, bate and controversy. The EES cipher algorithm, popularly known as \Clipper" chips, intended to pro- called \Skipjack", is itself classi¯ed, and implemen- tect unclassi¯ed government and private-sector com- tations of the cipher are available to the private sec- munications and data. A basic feature of key setup be- tor only within tamper-resistant modules supplied by tween pairs of EES processors involves the exchange of government-approved vendors. Software implementa- a \Law Enforcement Access Field" (LEAF) that con- tions of the cipher will not be possible. Although Skip- tains an encrypted copy of the current session key. The jack, which was designed by the US National Security LEAF is intended to facilitate government access to Agency (NSA), was reviewed by a small panel of civil- the cleartext of data encrypted under the system. Sev- ian experts who were granted access to the algorithm, eral aspects of the design of the EES, which employs a the cipher cannot be subjected to the degree of civilian classi¯ed cipher algorithm and tamper-resistant hard- scrutiny ordinarily given to new encryption systems. ware, attempt to make it infeasible to deploy the sys- By far the most controversial aspect of the EES tem without transmitting the LEAF.
    [Show full text]
  • KLEIN: a New Family of Lightweight Block Ciphers
    KLEIN: A New Family of Lightweight Block Ciphers Zheng Gong1, Svetla Nikova1;2 and Yee Wei Law3 1Faculty of EWI, University of Twente, The Netherlands fz.gong, [email protected] 2 Dept. ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Belgium 3 Department of EEE, The University of Melbourne, Australia [email protected] Abstract Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, we describe a new family of lightweight block ciphers named KLEIN, which is designed for resource-constrained devices such as wireless sensors and RFID tags. Compared to the related proposals, KLEIN has ad- vantage in the software performance on legacy sensor platforms, while its hardware implementation can be compact as well. Key words. Block cipher, Wireless sensor network, Low-resource implementation. 1 Introduction With the development of wireless communication and embedded systems, we become increasingly de- pendent on the so called pervasive computing; examples are smart cards, RFID tags, and sensor nodes that are used for public transport, pay TV systems, smart electricity meters, anti-counterfeiting, etc. Among those applications, wireless sensor networks (WSNs) have attracted more and more attention since their promising applications, such as environment monitoring, military scouting and healthcare. On resource-limited devices the choice of security algorithms should be very careful by consideration of the implementation costs. Symmetric-key algorithms, especially block ciphers, still play an important role for the security of the embedded systems.
    [Show full text]
  • IATTC-94-01 the Tuna Fishery, Stocks, and Ecosystem in the Eastern
    INTER-AMERICAN TROPICAL TUNA COMMISSION 94TH MEETING Bilbao, Spain 22-26 July 2019 DOCUMENT IATTC-94-01 REPORT ON THE TUNA FISHERY, STOCKS, AND ECOSYSTEM IN THE EASTERN PACIFIC OCEAN IN 2018 A. The fishery for tunas and billfishes in the eastern Pacific Ocean ....................................................... 3 B. Yellowfin tuna ................................................................................................................................... 50 C. Skipjack tuna ..................................................................................................................................... 58 D. Bigeye tuna ........................................................................................................................................ 64 E. Pacific bluefin tuna ............................................................................................................................ 72 F. Albacore tuna .................................................................................................................................... 76 G. Swordfish ........................................................................................................................................... 82 H. Blue marlin ........................................................................................................................................ 85 I. Striped marlin .................................................................................................................................... 86 J. Sailfish
    [Show full text]
  • Data Encryption Routines for the PIC18
    AN953 Data Encryption Routines for the PIC18 Author: David Flowers ENCRYPTION MODULE OVERVIEW Microchip Technology Inc. • Four algorithms to choose from, each with their own benefits INTRODUCTION • Advanced Encryption Standard (AES) This Application Note covers four encryption - Modules available in C, Assembly and algorithms: AES, XTEA, SKIPJACK® and a simple Assembly written for C encryption algorithm using a pseudo-random binary - Allows user to decide to include encoder, sequence generator. The science of cryptography decoder or both dates back to ancient Egypt. In today’s era of informa- - Allows user to pre-program a decryption key tion technology where data is widely accessible, into the code or use a function to calculate sensitive material, especially electronic data, needs to the decryption key be encrypted for the user’s protection. For example, a • Tiny Encryption Algorithm version 2 (XTEA) network-based card entry door system that logs the persons who have entered the building may be suscep- - Modules available in C and Assembly tible to an attack where the user information can be - Programmable number of iteration cycles stolen or manipulated by sniffing or spoofing the link • SKIPJACK between the processor and the memory storage - Module available in C device. If the information is encrypted first, it has a • Pseudo-random binary sequence generator XOR better chance of remaining secure. Many encryption encryption algorithms provide protection against someone reading - Modules available in C and Assembly the hidden data, as well as providing protection against tampering. In most algorithms, the decryption process - Allows user to change the feedback taps at will cause the entire block of information to be run-time destroyed if there is a single bit error in the block prior - KeyJump breaks the regular cycle of the to to decryption.
    [Show full text]
  • An Introduction to Coastal and Marine Biodiversity and Ecosystem Services
    Ministry of Environment, Forest and Climate Change, Government of India Curriculum on Coastal and Marine Biodiversity and Protected Area Management Module 1 An Introduction to Coastal and Marine Biodiversity and Ecosystem Services For Field-Level MPA Managers Imprint Training Resource Material: Coastal and Marine Biodiversity and Protected Area Management for Field-Level MPA Managers Module 1: An Introduction to Coastal and Marine Biodiversity and Ecosystem Services Module 2: Coastal and Marine Biodiversity and Ecosystems Services in the Overall Environment and Development Context Module 3: Mainstreaming Coastal and Marine Biodiversity into Overall Development and Environmental Planning Module 4: Coastal and Marine Protected Areas and Sustainable Fisheries Management Module 5: Governance, Law and Policies for Managing Coastal and Marine Ecosystems, Biodiversity and Protected Areas Module 6: Assessment and Monitoring of Coastal and Marine Biodiversity and Relevant Issues Module 7: Effective Management Planning of Coastal and Marine Protected Areas Module 8: Communicating Coastal and Marine Biodiversity Conservation and Management Issues ISBN 978-81-933282-1-7 October 2015 Published by: Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH Wildlife Institute of India (WII) Indo-German Biodiversity Programme P.O. Box 18, Chandrabani A-2/18, Safdarjung Enclave Dehradun 248001 New Delhi 110029, India Uttarakhand, India T +91-11-4949 5353 T +91-135-2640 910 E [email protected] E [email protected] W http://www.indo-germanbiodiversity.com W www.wii.gov.in GIZ is a German government-owned not-for-profit enterprise supporting sustainable development. This training resource material has been developed under the Human Capacity Development component of the project ‘Conservation and Sustainable Management of Existing and Potential Coastal and Marine Protected Areas (CMPA)’, under the Indo-German Biodiversity Programme, in partnership with the Ministry of Environment, Forest and Climate Change (MoEFCC), Government of India.
    [Show full text]
  • Development of the Advanced Encryption Standard
    Volume 126, Article No. 126024 (2021) https://doi.org/10.6028/jres.126.024 Journal of Research of the National Institute of Standards and Technology Development of the Advanced Encryption Standard Miles E. Smid Formerly: Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD 20899, USA [email protected] Strong cryptographic algorithms are essential for the protection of stored and transmitted data throughout the world. This publication discusses the development of Federal Information Processing Standards Publication (FIPS) 197, which specifies a cryptographic algorithm known as the Advanced Encryption Standard (AES). The AES was the result of a cooperative multiyear effort involving the U.S. government, industry, and the academic community. Several difficult problems that had to be resolved during the standard’s development are discussed, and the eventual solutions are presented. The author writes from his viewpoint as former leader of the Security Technology Group and later as acting director of the Computer Security Division at the National Institute of Standards and Technology, where he was responsible for the AES development. Key words: Advanced Encryption Standard (AES); consensus process; cryptography; Data Encryption Standard (DES); security requirements, SKIPJACK. Accepted: June 18, 2021 Published: August 16, 2021; Current Version: August 23, 2021 This article was sponsored by James Foti, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST). The views expressed represent those of the author and not necessarily those of NIST. https://doi.org/10.6028/jres.126.024 1. Introduction In the late 1990s, the National Institute of Standards and Technology (NIST) was about to decide if it was going to specify a new cryptographic algorithm standard for the protection of U.S.
    [Show full text]
  • State of the Art in Lightweight Symmetric Cryptography
    State of the Art in Lightweight Symmetric Cryptography Alex Biryukov1 and Léo Perrin2 1 SnT, CSC, University of Luxembourg, [email protected] 2 SnT, University of Luxembourg, [email protected] Abstract. Lightweight cryptography has been one of the “hot topics” in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a “lightweight” algorithm is usually designed to satisfy. We also present an extensive survey of all lightweight symmetric primitives we are aware of. It covers designs from the academic community, from government agencies and proprietary algorithms which were reverse-engineered or leaked. Relevant national (nist...) and international (iso/iec...) standards are listed. We then discuss some trends we identified in the design of lightweight algorithms, namely the designers’ preference for arx-based and bitsliced-S-Box-based designs and simple key schedules. Finally, we argue that lightweight cryptography is too large a field and that it should be split into two related but distinct areas: ultra-lightweight and IoT cryptography. The former deals only with the smallest of devices for which a lower security level may be justified by the very harsh design constraints. The latter corresponds to low-power embedded processors for which the Aes and modern hash function are costly but which have to provide a high level security due to their greater connectivity. Keywords: Lightweight cryptography · Ultra-Lightweight · IoT · Internet of Things · SoK · Survey · Standards · Industry 1 Introduction The Internet of Things (IoT) is one of the foremost buzzwords in computer science and information technology at the time of writing.
    [Show full text]
  • Diet of Larval Albacore Thunnus Alalunga (Bonnaterre, 1788) Off Mallorca Island (NW Mediterranean)
    SCIENTIA MARINA 71(2) June 2007, 347-354, Barcelona (Spain) ISSN: 0214-8358 Diet of larval albacore Thunnus alalunga (Bonnaterre, 1788) off Mallorca Island (NW Mediterranean) IGNACIO ALBERTO CATALÁN1, FRANCISCO ALEMANY1, ANA MORILLAS1 and BEATRIZ MORALES-NIN2 1IEO-Centre Oceanogràfic de Balears, Moll de Ponent s/n, CP 07015, Palma de Mallorca, Illes Balears, Spain. E-mail: [email protected] 2 Grupo de Oceanografía Interdisciplinar, Institut Mediterrani d’Estudis Avançats, UIB/CSIC, 21 Miguel Marques, CP 07190, Esporles, Illes Balears, Spain SUMMARY: These are the first data on the feeding of larval albacore (Thunnus alalunga Bonnaterre, 1788) in the Mediterranean. Specimens were gathered from day-time bongo-hauls conducted over the SW Mallorcan (Balearic Islands) shelf-slope. Ninety eight percent of 101 individuals ranging from 2.65 to 9.4 mm standard length (SL) contained 1 to 15 prey items per gut. Mean number of prey/gut was 3.55 ± 2.19 (SD). A positive correlation was found between larval SL and the number of prey/gut. The analysis of frequency of occurrence (F), numerical frequency (N), weight frequency (W) and the Index of Relative Importance (IRI) showed a dominance of copepodites and nauplii in the smallest size-class. As larvae grew, cladocerans and Calanoida copepodites dominated the diet, and cladocerans and copepodites were important in F, N and W. Piscivory was observed after notochord flexion and was important in terms of W. A positive correlation between mean prey size and both SL and lower jaw length (LJL) was observed. The niche breadth (S) did not vary with LJL, but the raw prey size range did.
    [Show full text]
  • Influence of Environmental Factors on Population Structure of Arrow Squid Nototodarus Gouldi: Implications for Stock Assessment
    INFLUENCE OF ENVIRONMENTAL FACTORS ON POPULATION STRUCTURE OF ARROW SQUID NOTOTODARUS GOULDI: IMPLICATIONS FOR STOCK ASSESSMENT COREY PAUL GREEN, BAPPSC (FISHERIES) SUBMITTED IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF TASMANIA OCTOBER 2011 Arrow squid Nototodarus gouldi (McCoy, 1888) (Courtesy of Robert Ingpen, 1974) FRONTISPIECE DECLARATION STATEMENT OF ORIGINALITY This thesis contains no material which has been accepted for a degree or diploma by the University or any other institution, except by way of background information and duly acknowledged in the thesis, and to the best of the my knowledge and belief no material previously published or written by another person except where due acknowledgement is made in the text of the thesis, nor does the thesis contain any material that infringes copyright. ………………………………………….…. 28th October 2011 Corey Paul Green Date AUTHORITY OF ACCESS This thesis may be made available for loan and limited copying in accordance with the Copyright Act 1968. ………………………………………….…. 28th October 2011 Corey Paul Green Date I ACKNOWLEDGEMENTS This thesis assisted in fulfilling the objectives of the Fisheries Research and Development Corporation Project No. 2006/012 ―Arrow squid — stock variability, fishing techniques, trophic linkages — facing the challenges‖. Without such assistance this thesis would not have come to fruition. Research on statolith element composition was kindly funded by the Holsworth Wildlife Research Endowment (HWRE), and provided much information on arrow squid lifecycles. The University of Tasmania (UTAS), the Victorian Marine Science Consortium (VMSC) and the Department of Primary Industries — Fisheries Victoria, assisted in providing laboratories, desks and utilities, as well as offering a wonderful and inviting working environment.
    [Show full text]
  • A List of Common and Scientific Names of Fishes from the United States And
    t a AMERICAN FISHERIES SOCIETY QL 614 .A43 V.2 .A 4-3 AMERICAN FISHERIES SOCIETY Special Publication No. 2 A List of Common and Scientific Names of Fishes -^ ru from the United States m CD and Canada (SECOND EDITION) A/^Ssrf>* '-^\ —---^ Report of the Committee on Names of Fishes, Presented at the Ei^ty-ninth Annual Meeting, Clearwater, Florida, September 16-18, 1959 Reeve M. Bailey, Chairman Ernest A. Lachner, C. C. Lindsey, C. Richard Robins Phil M. Roedel, W. B. Scott, Loren P. Woods Ann Arbor, Michigan • 1960 Copies of this publication may be purchased for $1.00 each (paper cover) or $2.00 (cloth cover). Orders, accompanied by remittance payable to the American Fisheries Society, should be addressed to E. A. Seaman, Secretary-Treasurer, American Fisheries Society, Box 483, McLean, Virginia. Copyright 1960 American Fisheries Society Printed by Waverly Press, Inc. Baltimore, Maryland lutroduction This second list of the names of fishes of The shore fishes from Greenland, eastern the United States and Canada is not sim- Canada and the United States, and the ply a reprinting with corrections, but con- northern Gulf of Mexico to the mouth of stitutes a major revision and enlargement. the Rio Grande are included, but those The earlier list, published in 1948 as Special from Iceland, Bermuda, the Bahamas, Cuba Publication No. 1 of the American Fisheries and the other West Indian islands, and Society, has been widely used and has Mexico are excluded unless they occur also contributed substantially toward its goal of in the region covered. In the Pacific, the achieving uniformity and avoiding confusion area treated includes that part of the conti- in nomenclature.
    [Show full text]