An Overview of Pelagic Shark Fisheries in the Northeast Atlantic
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Design of Rijndael: AES - the Advanced Encryption Standard/Joan Daemen, Vincent Rijmen
Joan Daernen · Vincent Rijrnen Theof Design Rijndael AES - The Advanced Encryption Standard With 48 Figures and 17 Tables Springer Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Springer TnL-1Jn Joan Daemen Foreword Proton World International (PWI) Zweefvliegtuigstraat 10 1130 Brussels, Belgium Vincent Rijmen Cryptomathic NV Lei Sa 3000 Leuven, Belgium Rijndael was the surprise winner of the contest for the new Advanced En cryption Standard (AES) for the United States. This contest was organized and run by the National Institute for Standards and Technology (NIST) be ginning in January 1997; Rij ndael was announced as the winner in October 2000. It was the "surprise winner" because many observers (and even some participants) expressed scepticism that the U.S. government would adopt as Library of Congress Cataloging-in-Publication Data an encryption standard any algorithm that was not designed by U.S. citizens. Daemen, Joan, 1965- Yet NIST ran an open, international, selection process that should serve The design of Rijndael: AES - The Advanced Encryption Standard/Joan Daemen, Vincent Rijmen. as model for other standards organizations. For example, NIST held their p.cm. Includes bibliographical references and index. 1999 AES meeting in Rome, Italy. The five finalist algorithms were designed ISBN 3540425802 (alk. paper) . .. by teams from all over the world. 1. Computer security - Passwords. 2. Data encryption (Computer sCIence) I. RIJmen, In the end, the elegance, efficiency, security, and principled design of Vincent, 1970- II. Title Rijndael won the day for its two Belgian designers, Joan Daemen and Vincent QA76.9.A25 D32 2001 Rijmen, over the competing finalist designs from RSA, IBl\!I, Counterpane 2001049851 005.8-dc21 Systems, and an English/Israeli/Danish team. -
Chondrichthyan Fishes (Sharks, Skates, Rays) Announcements
Chondrichthyan Fishes (sharks, skates, rays) Announcements 1. Please review the syllabus for reading and lab information! 2. Please do the readings: for this week posted now. 3. Lab sections: 4. i) Dylan Wainwright, Thursday 2 - 4/5 pm ii) Kelsey Lucas, Friday 2 - 4/5 pm iii) Labs are in the Northwest Building basement (room B141) 4. Lab sections done: first lab this week on Thursday! 5. First lab reading: Agassiz fish story; lab will be a bit shorter 6. Office hours: we’ll set these later this week Please use the course web site: note the various modules Outline Lecture outline: -- Intro. to chondrichthyan phylogeny -- 6 key chondrichthyan defining traits (synapomorphies) -- 3 chondrichthyan behaviors -- Focus on several major groups and selected especially interesting ones 1) Holocephalans (chimaeras or ratfishes) 2) Elasmobranchii (sharks, skates, rays) 3) Batoids (skates, rays, and sawfish) 4) Sharks – several interesting groups Not remotely possible to discuss today all the interesting groups! Vertebrate tree – key ―fish‖ groups Today Chondrichthyan Fishes sharks Overview: 1. Mostly marine 2. ~ 1,200 species 518 species of sharks 650 species of rays 38 species of chimaeras Skates and rays 3. ~ 3 % of all ―fishes‖ 4. Internal skeleton made of cartilage 5. Three major groups 6. Tremendous diversity of behavior and structure and function Chimaeras Chondrichthyan Fishes: 6 key traits Synapomorphy 1: dentition; tooth replacement pattern • Teeth are not fused to jaws • New rows move up to replace old/lost teeth • Chondrichthyan teeth are -
An Introduction to the Classification of Elasmobranchs
An introduction to the classification of elasmobranchs 17 Rekha J. Nair and P.U Zacharia Central Marine Fisheries Research Institute, Kochi-682 018 Introduction eyed, stomachless, deep-sea creatures that possess an upper jaw which is fused to its cranium (unlike in sharks). The term Elasmobranchs or chondrichthyans refers to the The great majority of the commercially important species of group of marine organisms with a skeleton made of cartilage. chondrichthyans are elasmobranchs. The latter are named They include sharks, skates, rays and chimaeras. These for their plated gills which communicate to the exterior by organisms are characterised by and differ from their sister 5–7 openings. In total, there are about 869+ extant species group of bony fishes in the characteristics like cartilaginous of elasmobranchs, with about 400+ of those being sharks skeleton, absence of swim bladders and presence of five and the rest skates and rays. Taxonomy is also perhaps to seven pairs of naked gill slits that are not covered by an infamously known for its constant, yet essential, revisions operculum. The chondrichthyans which are placed in Class of the relationships and identity of different organisms. Elasmobranchii are grouped into two main subdivisions Classification of elasmobranchs certainly does not evade this Holocephalii (Chimaeras or ratfishes and elephant fishes) process, and species are sometimes lumped in with other with three families and approximately 37 species inhabiting species, or renamed, or assigned to different families and deep cool waters; and the Elasmobranchii, which is a large, other taxonomic groupings. It is certain, however, that such diverse group (sharks, skates and rays) with representatives revisions will clarify our view of the taxonomy and phylogeny in all types of environments, from fresh waters to the bottom (evolutionary relationships) of elasmobranchs, leading to a of marine trenches and from polar regions to warm tropical better understanding of how these creatures evolved. -
Feeding Habits of the Common Thresher Shark (Alopias Vulpinus) Sampled from the California-Based Drift Gill Net Fishery, 1998-1 999
PRETI ET AL.: FEEDING HABITS OF COMMON THRESHER SHARK CalCOFl Rep., Vol. 42, 2001 FEEDING HABITS OF THE COMMON THRESHER SHARK (ALOPIAS VULPINUS) SAMPLED FROM THE CALIFORNIA-BASED DRIFT GILL NET FISHERY, 1998-1 999 ANTONELLA PRETI SUSAN E. SMITH AND DARLENE A. RAMON California Department of Fish and Game National Marine Fisheries Service, NOM 8604 La Jolla Shores Dnve Southwest Fisheries Science Center La Jolla, California 92037 P.O. Box 271 sharksharkshark@hotniail coni La Jolla, California 92038 ABSTRACT (Compagno 1984). It is epipelagic, gregarious, and cos- The diet of common thresher shark (Alopius vulpinus) mopolitan, and in the northeastern Pacific seems to be from US. Pacific Coast waters was investigated by means most abundant within 40 miles of shore (Strasburg 1958). of frequency of occurrence, gravimetric and numerical Its known range extends from Clarion Island, Mexico, methods, and calculating the geometric index of im- north to British Columbia; it is common seasonally from portance (GII) of prey taxa taken from stoniachs col- mid-Baja California, Mexico, to Washington state.' It lected by fishery observers from the California-based is the leading commercial shark taken in California, drift gill net fishery. Sampling was done from 16 August where it is highly valued in the fresh fish trade (Holts et 1998 to 24 January 1999, a time when the California al. 1998). It is also sought by recreational anglers for its Current was undergoing rapid change from El Niiio to fighting ability as well as food value, especially in south- La Niiia conhtions. Of the 165 stomachs examined, 107 ern California. -
4 Thresher Shark, Alopias Vulpinus
4 Thresher Shark, Alopias vulpinus Thresher shark, Alopias vulpinus. Photo credit: Dale Sweetnam. History of the Fishery The common thresher shark, Alopias vulpinus, is the most common commercially landed shark in California. They are primarily caught using large mesh drift gill nets and hook and line gear, but are also caught incidentally with small mesh gill nets and harpoon. Prior to 1977, all sharks were reported in one market category and not separated by species, and it is assumed threshers were caught as bycatch in gears at levels similar or greater than today. The first significant fishery for thresher sharks began the late 1970s to early 1980s when drift gill net fishers began to target them close to the southern California coastline. The fishery expanded rapidly and, because of overfishing concerns, the California Department of Fish and Game (Department) as mandated by the State Legislature began an observer program, monitored landings and implemented a logbook program. A limited entry permit program for drift gill net gear was initiated in 1982, with permits issued to fishers rather than boats to prevent false inflation in value. The drift gill net fishery for thresher sharks peaked in 1981 when 113 Status of the Fisheries Report 2008 4-1 drift gill net boats landed nearly 600 tons (544 metric tons). However, total landings using all gears were highest the following year with a total of more than 1700 tons (1542 metric tons) taken by all gears (Figure 4-1). 2000 1500 1000 Landings (short tons) (short Landings 500 0 1977 1979 1981 1983 1985 1987 1989 1991 1993 1995 1997 1999 2001 2003 2005 2007 Year Figure 4-1. -
The Denticle Surface of Thresher Shark Tails: Three-Dimensional Structure and Comparison to Other Pelagic Species
Received: 3 April 2020 Revised: 14 May 2020 Accepted: 21 May 2020 DOI: 10.1002/jmor.21222 RESEARCH ARTICLE The denticle surface of thresher shark tails: Three-dimensional structure and comparison to other pelagic species Meagan Popp1 | Connor F. White1 | Diego Bernal2 | Dylan K. Wainwright1 | George V. Lauder1 1Department of Organismic and Evolutionary Biology, Harvard University, Cambridge, Abstract Massachusetts Shark skin denticles (scales) are diverse in morphology both among species and 2 Department of Biology, University of across the body of single individuals, although the function of this diversity is poorly Massachusetts Dartmouth, Dartmouth, Massachusetts understood. The extremely elongate and highly flexible tail of thresher sharks pro- vides an opportunity to characterize gradients in denticle surface characteristics Correspondence George V. Lauder, Museum of Comparative along the length of the tail and assess correlations between denticle morphology and Zoology, 26 Oxford Street, Cambridge, MA tail kinematics. We measured denticle morphology on the caudal fin of three mature 02138. Email: [email protected] and two embryo common thresher sharks (Alopias vulpinus), and we compared thresher tail denticles to those of eleven other shark species. Using surface Funding information National Oceanic and Atmospheric profilometry, we quantified 3D-denticle patterning and texture along the tail of Administration, Grant/Award Number: threshers (27 regions in adults, and 16 regions in embryos). We report that tails of NA16NMF4270231; National Science Foundation, Grant/Award Numbers: IOS- thresher embryos have a membrane that covers the denticles and reduces surface 1354593, GRF DGE-1144152; Office of Naval roughness. In mature thresher tails, surfaces have an average roughness of 5.6 μm Research, Grant/Award Numbers: N00014-09-1-0352, N000141410533 which is smoother than some other pelagic shark species, but similar in roughness to blacktip, porbeagle, and bonnethead shark tails. -
Classifying Sharks Using a Dichotomous Key
Name:____________________________________________ Date:_______________ Period:_____ Classifying Sharks using a Dichotomous Key A classification system is a way of separating a large group of closely related organisms into smaller subgroups. With such a system, identification of an organism is easy. The scientific names of organisms are based on the classification systems of living organisms. To classify an organism, scientists often use a dichotomous key. A dichotomous key is a listing of specific characteristics, such as structure and behavior, in such a way that an organism can be identified through a process of elimination. In this investigation, it is expected that you: 1) Use a key to identify 14 shark families. 2) Study the method used in phrasing statements in a key. Procedure 1. Read sentences 1A and 1B of the key. Then study shark 1 in figure A for the characteristics referred to in 1A and 1B. Follow the directions in these sentences and continue with this process until a family name for Shark 1 is determined. For example, if the shark has an anal fin, and its body is not kite shaped, following the directions of 1A and go directly to sentence 2. If the shark lacks and anal fin or has a kite shaped body, follow the directions of 1B and go to sentence 10. 2. Continue this process with each shark until all animals have been identified. Write the family name on the line below each animal. 3. Use figure 1 as a guide to the anatomical features used in the key. Figure 1 – Anatomy of a Shark Name:____________________________________________ Date:_______________ Period:_____ Key to Shark Identification Name:____________________________________________ Date:_______________ Period:_____ Name:____________________________________________ Date:_______________ Period:_____ Shark Answer Key 1. -
A Lightweight Encryption Algorithm for Secure Internet of Things
Pre-Print Version, Original article is available at (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 1, 2017 SIT: A Lightweight Encryption Algorithm for Secure Internet of Things Muhammad Usman∗, Irfan Ahmedy, M. Imran Aslamy, Shujaat Khan∗ and Usman Ali Shahy ∗Faculty of Engineering Science and Technology (FEST), Iqra University, Defence View, Karachi-75500, Pakistan. Email: fmusman, [email protected] yDepartment of Electronic Engineering, NED University of Engineering and Technology, University Road, Karachi 75270, Pakistan. Email: firfans, [email protected], [email protected] Abstract—The Internet of Things (IoT) being a promising and apply analytics to share the most valuable data with the technology of the future is expected to connect billions of devices. applications. The IoT is taking the conventional internet, sensor The increased number of communication is expected to generate network and mobile network to another level as every thing mountains of data and the security of data can be a threat. The will be connected to the internet. A matter of concern that must devices in the architecture are essentially smaller in size and be kept under consideration is to ensure the issues related to low powered. Conventional encryption algorithms are generally confidentiality, data integrity and authenticity that will emerge computationally expensive due to their complexity and requires many rounds to encrypt, essentially wasting the constrained on account of security and privacy [4]. energy of the gadgets. Less complex algorithm, however, may compromise the desired integrity. In this paper we propose a A. Applications of IoT: lightweight encryption algorithm named as Secure IoT (SIT). -
Thresher Sharks Common Thresher Alopias Vulpinus Bigeye Thresher Alopias Superciliosus Pelagic Thresher Alopias Pelagicus
Fact sheet for the 11th Meeting of the Conference of the Parties (CoP11) to the Convention on Migratory Species (CMS) Thresher Sharks Common Thresher Alopias vulpinus Bigeye Thresher Alopias superciliosus Pelagic Thresher Alopias pelagicus Proposed action Inclusion on CMS Appendix II Proponents European Union NAOO/SWFSC Overview Thresher Sharks, wide-ranging, largely oceanic species found in warm and temperate seas, make up one of the world’s most vulnerable and threatened shark families. These highly migratory, low-productivity species are at risk in many regions due to demand for their valuable meat and fins, as well as incidental take in a variety of fisheries. Despite some regional prohibitions, global Thresher Shark mortality is under-reported and largely unmanaged. Including the genus (Alopias) in CMS Appendix II could bolster compliance with existing protections and facilitate international cooperation toward more comprehensive national and regional conservation measures, thereby enhancing the chances for sustainable use. SHARK ADVOCATES INTERNATIONAL Fact sheet for the 11th Meeting of the Conference of the Parties (CoP11) to the Convention on Migratory Species (CMS) Biology and Distribution common in the global trade driven by Asian demand for Thresher Sharks are characterized by long, scythe-like tails shark fin soup. Threshers are fished by recreational anglers in that account for half their body length. High-order predators, many countries, including the US, Canada, United Kingdom, they use their tails to corral, disorient, and stun schooling fishes Italy, South Africa, Australia, and New Zealand. In a few and pelagic invertebrates. The largest species – Common places, like Philippines, Thresher Sharks are key attractions for Threshers – can grow to six meters in length (nearly 20 feet). -
Malapascua Philippines Thresher Shark Tourism Factsheet.Pdf
FACTSHEET h Cornis to: Andy Pho Monad Shoal, Philippines Dive operators form a fund to protect a thresher shark site History Monad Shoal is currently the only known location where pelagic thresher sharks All fishing is (Alopias pelagicus) can be predictably found at recreational diving depths. In the early hours of morning, these sharks rise from their normal depths of up to 150 m prohibited within the to be cleaned by reef fishes at several cleaning stations at depths around 30 m. It is believed that the site was found after learning from fishers that thresher sharks Monad Shoal MPA regularly breached at Monad Shoal, and the first diving operation to offer the thresher shark dive started in the late 1990s. The Monad Shoal MPA was established in 2002, and in mid-2015 Monad Shoal and Gato Island were designated at a provincial level as the Philippines’ first shark and ray sanctuary. The Executive Order establishes a participatory Management Board, provision for additional regulations, and increased funding from local government. Furthermore in 2014 the Provincial Fisheries & Aquatic Resources Ordinance of Cebu was amended to penalize the catching, possession, and trading of all shark and ray species in Cebu. Monad Shoal is a standard municipality MPA, and 150 Pesos (US$ 3) per visitor to the island per day is collected by the municipality as a marine park fee. While some of the fees collected have been used to install mooring buoys, how the majority of the funds are used is unclear, and enforcement of the ban on all fishing within the MPA was weak. -
Bigeye Thresher, Alopias Superciliosus
Published Date: 1 March 2019 Bigeye Thresher, Alopias superciliosus Report Card Depleting assessment IUCN Red List IUCN Red List Australian See global assessment Global Vulnerable Assessment Assessment Amorim, A.F., Baum, J.K., Cailliet, G.M., Clò, S., Clarke, S.C., Fergusson, Assessors I., Gonzalez, M., Macias, D., Mancini, P.L., Mancusi, C., Myers, R., Reardon, M.B., Trejo, T., Vacchi, M. & Valenti, S.V. Australian fishing pressure is low; needs reassessment once regional Report Card Remarks connectivity is better understood Summary The Bigeye Thresher is a large bodied, highly migratory species globally distributed throughout pelagic and coastal waters. Life history characteristics result in low potential rate of population increase and make it highly susceptible to fishing pressure. Because of its pelagic distribution, fishing pressure from pelagic fisheries is high. Source: Australian National Fish Collection, CSIRO. License: CC By Attribution-Noncommercial. Globally, fishing pressure has caused serious depletion of Bigeye Threshers. In Australia, the species is likely stable because fishing pressure is low and strictly managed with individuals encountered often returned to the sea alive. However, this stability is dependent of levels of connectivity and migration of Bigeye Threshers across Australia’s exclusive economic zone (EEZ) with regional neighbours. Therefore, it is assessed as globally Vulnerable (IUCN) and in Australia as Declining (SAFS) given the status of the global population. The levels of connectivity within the region could affect the species stability in Australia; once connectivity is better understood the population status needs to be reassessed. This species is listed on CITES Appendix II and CMS Appendix II Distribution The Bigeye Thresher has a circumglobal distribution throughout tropical and temperate waters (Compagno 2001). -
A Novel Construction of Efficient Substitution-Boxes Using Cubic
entropy Article A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation Amjad Hussain Zahid 1,2, Muhammad Junaid Arshad 2 and Musheer Ahmad 3,* 1 Department of Computer Science, University of Management and Technology, Lahore 54000, Pakistan; [email protected] 2 Department of Computer Science, University of Engineering and Technology, Lahore 54000, Pakistan; [email protected] 3 Department of Computer Engineering, Jamia Millia Islamia, New Delhi 110025, India * Correspondence: [email protected]; Tel.: +91-112-698-0281 Received: 27 January 2019; Accepted: 28 February 2019; Published: 5 March 2019 Abstract: A symmetric block cipher employing a substitution–permutation duo is an effective technique for the provision of information security. For substitution, modern block ciphers use one or more substitution boxes (S-Boxes). Certain criteria and design principles are fulfilled and followed for the construction of a good S-Box. In this paper, an innovative technique to construct substitution-boxes using our cubic fractional transformation (CFT) is presented. The cryptographic strength of the proposed S-box is critically evaluated against the state of the art performance criteria of strong S-boxes, including bijection, nonlinearity, bit independence criterion, strict avalanche effect, and linear and differential approximation probabilities. The performance results of the proposed S-Box are compared with recently investigated S-Boxes to prove its cryptographic strength. The simulation and comparison analyses validate that the proposed S-Box construction method has adequate efficacy to generate efficient candidate S-Boxes for usage in block ciphers. Keywords: substitution box; cubic fractional transformation; block ciphers; security 1. Introduction Cryptography helps individuals and organizations to protect their data.