4.4 Article

All quiet on the western front? Using phenological inference to detect the presence of a latent gypsy moth invasion in Northern Minnesota

期刊

BIOLOGICAL INVASIONS
卷 18, 期 12, 页码 3561-3573

出版社

SPRINGER
DOI: 10.1007/s10530-016-1248-5

关键词

Establishment; Lymantria dispar; Spread; Stratified dispersal

资金

  1. Gypsy Moth Slow-the-Spread Foundation, Inc. [A106307]
  2. USDA Forest Service, Northern Research Station [11-JV-11242303-053]

向作者/读者索取更多资源

Following establishment in a new environment, invasive species expand their range through stratified diffusion, the coupling of local growth and spatial spread with long-distance movement of propagules that found new colonies. Consequently, the stages of arrival and establishment serially repeat until the entire habitat susceptible to invasion is occupied. An empirical example of such a phenomenon is the gypsy moth, Lymantria dispar (L.), invasion of northeastern Minnesota. Under a regional management program, a trapping grid is deployed along the L. dispar leading edge to detect male moth presence and inform management decisions. However, the presence of moths does not always indicate reproducing populations, and moths dispersing from populations behind the front can obscure the presence of latent invasions. We analyzed trapping data during the arrival and establishment of L. dispar in this region (2000-2012), supplemented with sentinel trap data to ascertain the timing of male moth flight (2005-2009), and derived yearly phenological predictions for male moth flight. We also used a male wing morphology metric (2007-2009) to further quantify spatial and temporal patterns associated with the L. dispar invasion. We provide evidence of an established L. dispar population when analyses suggest spatial randomness in trap catch data, and how the presence of phenologically distinct, immigrating adult moths from source populations outside of Minnesota recorded from sentinel traps could lead to the overestimation of the abundance of an established population. This work highlights the complexity of the initial invasion process even in a well-studied system for which a sensitive monitoring program exists.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据