Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (533)

Search Parameters:
Keywords = burrows

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 3609 KiB  
Article
Will Wind Turbines Affect the Distribution of Alashan Ground Squirrel? Insights from Large-Scale Wind Farms in China
by Yuan Wang, Wenbin Yang, Qin Li, Min Zhao, Ying Yang, Xiangfeng Shi, Dazhi Zhang and Guijun Yang
Biology 2025, 14(7), 886; https://doi.org/10.3390/biology14070886 - 19 Jul 2025
Viewed by 152
Abstract
The wind energy resources in the northwestern desert and semi-desert grassland regions of China are abundant. However, the ramifications of large-scale centralized wind farm operations on terrestrial rodents remain incompletely understood. In May and September 2024, we employed a grid sampling method combined [...] Read more.
The wind energy resources in the northwestern desert and semi-desert grassland regions of China are abundant. However, the ramifications of large-scale centralized wind farm operations on terrestrial rodents remain incompletely understood. In May and September 2024, we employed a grid sampling method combined with burrow counting and kernel density analysis to investigate the spatial distribution of Alashan ground squirrel (Spermophilus alashanicus) burrows in different wind turbine power zones (control, 750 kW, 1500 kW, 2000 kW, and 2500 kW) at the Taiyangshan wind farm in China. Using generalized additive models and structural equation models, we analysed the relationship between burrow spatial distribution and environmental factors. The results revealed no significant linear correlation between burrow density and turbine layout density, but was significantly positively correlated with turbine power (p < 0.05). The highest burrow density was observed in the 2500 kW zone, with values of 24.43 ± 7.18 burrows/hm2 in May and 21.29 ± 3.38 burrows/hm2 in September (p < 0.05). The squirrels exhibited a tendency to avoid constructing burrows within the rotor sweeping areas of the turbines. The burrow density distribution exhibited a multinuclear clustering pattern in both May and September, with a northwest–southeast spatial orientation. Turbine power, aspect, and plan convexity had significant positive effects on burrow density, whereas vegetation height had a significant negative effect. Moreover, vegetation height indirectly influenced burrow density through its interactions with turbine power and relief degree. Under the combined influence of turbine power, topography, and vegetation, Alashan ground squirrels preferred habitats in low-density, high-power turbine zones with shorter vegetation, sunny slopes, convex landforms, and minimal disturbance. Full article
Show Figures

Graphical abstract

16 pages, 315 KiB  
Article
Development and Validation of the Intimate Partner Violence Workplace Disruptions Assessment (IPV-WDA)
by Kathryn Showalter, Laneshia Conner, Rebecca Bosetti, William Burrows and Rujeko Machinga-Asaolu
Int. J. Environ. Res. Public Health 2025, 22(7), 1147; https://doi.org/10.3390/ijerph22071147 - 19 Jul 2025
Viewed by 107
Abstract
A vast majority of survivors of intimate partner violence (IPV) experience economic abuse, including but not limited to, employment sabotage. The purpose of this study is to further understand IPV by testing a technology-inclusive abuser-initiated workplace disruption measurement in an exploratory factor analysis [...] Read more.
A vast majority of survivors of intimate partner violence (IPV) experience economic abuse, including but not limited to, employment sabotage. The purpose of this study is to further understand IPV by testing a technology-inclusive abuser-initiated workplace disruption measurement in an exploratory factor analysis (EFA) so that future researchers can better examine and address economic abuse. Using a sample of survivors (N = 312) employed in the nursing profession in the United States, who may be uniquely impacted by technology, we used complete data to examine experiences of abuser-initiated workplace disruptions, including those that utilized cellphones (e.g., excessive texting, harassment of coworkers, preventing educational advancement). The results revealed a two-factor structure: one containing a variety of direct and indirect workplace disruptions relevant to the nursing profession (73% of variance) and a second containing only cell-phone related harassment (9% of variance). Implications for healthcare employers seeking to protect employees from IPV, as well as policymakers, are included. Full article
18 pages, 1565 KiB  
Article
The Expression of Social Behaviors in Broiler Chickens Grown in Either Conventional or Environmentally Modified Houses During the Summer Season
by Chloe M. O’Brien and Frank W. Edens
Poultry 2025, 4(3), 32; https://doi.org/10.3390/poultry4030032 - 16 Jul 2025
Viewed by 158
Abstract
Environmentally modified housing [EMH; windowless, insulated sidewalls and ceiling, thermostatically controlled ventilation fans) versus conventional housing [CVH; cross-ventilated, insulated ceiling, ceiling fans) improved broiler performance in the summer. The objective of this investigation was to determine whether social behaviors differed between two population [...] Read more.
Environmentally modified housing [EMH; windowless, insulated sidewalls and ceiling, thermostatically controlled ventilation fans) versus conventional housing [CVH; cross-ventilated, insulated ceiling, ceiling fans) improved broiler performance in the summer. The objective of this investigation was to determine whether social behaviors differed between two population densities (0.06 m2/chick [HD] or 0.07 m2/chick [LD]) in these houses. We used a randomized block statistical design, involving houses, population densities, observation times, and bird age. Behaviors were observed weekly, during the morning and the afternoon. Individual observers focused on the group of broilers in one of three defined 26.76 m2 areas in each of the four pens in each house. Aggressive encounters, tail and back pecking, feather eating, thermoregulatory, preening, and flock mobility were recorded. Feather pecking, eating and aggressive encounters were expressed at greater rates in HD birds in CVH. A salt-deficient diet caused increased feather pecking and aggressive encounters, which decreased after correction of the mistake. Increased heat indices (HIs), HD, and greater light intensity in CVH influenced behaviors and mortality more severely than in EMH. In CVH and EMH, burrowing/thermoregulatory/resting activity increased with increasing HIs. Afternoon preening was elevated significantly in EMH. It was concluded that broilers reared in EMH were more comfortable and experienced improved welfare compared to those reared in CVH. Full article
Show Figures

Figure 1

17 pages, 3482 KiB  
Article
Chinese Pangolins in China Demonstrate Regional Differences in Burrow Habitat Selection
by Dongling Liang, Xinrui Tang, Yilong Chen, Fei Xi, Shibao Wu and Fuhua Zhang
Animals 2025, 15(14), 2093; https://doi.org/10.3390/ani15142093 - 16 Jul 2025
Viewed by 165
Abstract
Knowledge of the habitat characteristics of endangered species is an important basis for in situ conservation, release-site selection, and habitat modification. Although the Chinese pangolin (Manis pentadactyla) is one of the world’s most endangered species, little is known about its habitat [...] Read more.
Knowledge of the habitat characteristics of endangered species is an important basis for in situ conservation, release-site selection, and habitat modification. Although the Chinese pangolin (Manis pentadactyla) is one of the world’s most endangered species, little is known about its habitat preferences, and the results of past studies differ greatly. To clarify the habitat characteristics of the Chinese pangolin, we conducted habitat surveys in Guangdong, Jiangxi, and Zhejiang provinces of China using the transect method. A total of 520 burrow sites of Chinese pangolins were recorded in three study areas. The resulting data were analyzed using a generalized additive model, principal coordinate analysis, and Kruskal–Wallis tests. Nine ecological factors (elevation, slope, soil type, canopy coverage, surface coverage, number of trees, number of logs, tree diameter at breast height, and distance to a settlement) were found to affect pangolins’ distribution. Burrows were preferentially distributed at elevations of 50–150 m (62.3%), in silty soil (88.1%), on 20–40° slopes (83.3%), within young and medium-aged broadleaved forests with a canopy coverage exceeding 70% (65.8%), and close to water (less than 300 m). Among the three study regions, pangolin habitats differed significantly in seven environmental factors: elevation, canopy coverage, surface coverage, number of trees, distance to water, distance to a road, and distance to a settlement. Our findings imply that the Chinese pangolin appears to tolerate a broad range of ecological characteristics; however, food resources may be the key factor affecting its habitat selection, and other factors may indirectly affect its distribution by affecting food abundance. Finally, aside from hunting, a low level of human disturbance does not affect the presence of this species. Full article
(This article belongs to the Section Ecology and Conservation)
Show Figures

Figure 1

18 pages, 4939 KiB  
Article
LiDAR-Based Detection of Field Hamster (Cricetus cricetus) Burrows in Agricultural Fields
by Florian Thürkow, Milena Mohri, Jonas Ramstetter and Philipp Alb
Sustainability 2025, 17(14), 6366; https://doi.org/10.3390/su17146366 - 11 Jul 2025
Viewed by 219
Abstract
Farmers face increasing pressure to maintain vital populations of the critically endangered field hamster (Cricetus cricetus) while managing crop damage caused by field mice. This challenge is linked to the UN Sustainable Development Goals (SDGs) 2 and 15, addressing food security [...] Read more.
Farmers face increasing pressure to maintain vital populations of the critically endangered field hamster (Cricetus cricetus) while managing crop damage caused by field mice. This challenge is linked to the UN Sustainable Development Goals (SDGs) 2 and 15, addressing food security and biodiversity. Consequently, the reliable detection of hamster activity in agricultural fields is essential. While remote sensing offers potential for wildlife monitoring, commonly used RGB imagery has limitations in detecting small burrow entrances in vegetated areas. This study investigates the potential of drone-based Light Detection and Ranging (LiDAR) data for identifying field hamster burrow entrances in agricultural landscapes. A geostatistical method was developed to detect local elevation minima as indicators of burrow openings. The analysis used four datasets captured at varying flight altitudes and spatial resolutions. The method successfully detected up to 20 out of 23 known burrow entrances and achieved an F1-score of 0.83 for the best-performing dataset. Detection was most accurate at flight altitudes of 30 m or lower, with performance decreasing at higher altitudes due to reduced point density. These findings demonstrate the potential of UAV-based LiDAR to support non-invasive species monitoring and habitat management in agricultural systems, contributing to sustainable conservation practices in line with the SDGs. Full article
(This article belongs to the Special Issue Ecology, Biodiversity and Sustainable Conservation)
Show Figures

Figure 1

28 pages, 521 KiB  
Article
Provably Secure and Privacy-Preserving Authentication Scheme for IoT-Based Smart Farm Monitoring Environment
by Hyeonjung Jang, Jihye Choi, Seunghwan Son, Deokkyu Kwon and Youngho Park
Electronics 2025, 14(14), 2783; https://doi.org/10.3390/electronics14142783 - 10 Jul 2025
Viewed by 220
Abstract
Smart farming is an agricultural technology integrating advanced technology such as cloud computing, Artificial Intelligence (AI), the Internet of Things (IoT), and robots into traditional farming. Smart farming can help farmers by increasing agricultural production and managing resources efficiently. However, malicious attackers can [...] Read more.
Smart farming is an agricultural technology integrating advanced technology such as cloud computing, Artificial Intelligence (AI), the Internet of Things (IoT), and robots into traditional farming. Smart farming can help farmers by increasing agricultural production and managing resources efficiently. However, malicious attackers can attempt security attacks because communication in smart farming is conducted via public channels. Therefore, an authentication scheme is necessary to ensure security in smart farming. In 2024, Rahaman et al. proposed a privacy-centric authentication scheme for smart farm monitoring. However, we demonstrated that their scheme is vulnerable to stolen mobile device, impersonation, and ephemeral secret leakage attacks. This paper suggests a secure and privacy-preserving scheme to resolve the security defects of the scheme proposed by Rahaman et al. We also verified the security of our scheme through “the Burrows-Abadi-Needham (BAN) logic”, “Real-or-Random (RoR) model”, and “Automated Validation of Internet Security Protocols and Application (AVISPA) tool”. Furthermore, a performance analysis of the proposed scheme compared with related studies was conducted. The comparison result proves that our scheme was more efficient and secure than related studies in the smart farming environment. Full article
(This article belongs to the Special Issue Trends in Information Systems and Security)
Show Figures

Figure 1

33 pages, 25988 KiB  
Article
Erosion Resistance Assessment of Grass-Covered Embankments: Insights from In Situ Overflow Tests at the Living Lab Hedwige-Prosper Polder
by Davy Depreiter, Jeroen Vercruysse, Kristof Verelst and Patrik Peeters
Water 2025, 17(13), 2016; https://doi.org/10.3390/w17132016 - 4 Jul 2025
Viewed by 213
Abstract
Grass-covered levees commonly protect river and estuarine areas against flooding. Climate-induced water level changes may increasingly expose these levees to overflow events. This study investigates whether grass-covered levees can withstand such events, and under what conditions failure may occur. Between 2020 and 2022, [...] Read more.
Grass-covered levees commonly protect river and estuarine areas against flooding. Climate-induced water level changes may increasingly expose these levees to overflow events. This study investigates whether grass-covered levees can withstand such events, and under what conditions failure may occur. Between 2020 and 2022, full-scale overflow tests were conducted at the Living Lab Hedwige-Prosperpolder along the Dutch–Belgian Scheldt Estuary to assess erosion resistance under varying hydraulic conditions and vegetation states. A custom-built overflow generator was used, with instrumentation capturing flow velocity, water levels, and erosion progression. The results show that well-maintained levees with intact grass cover endured overflow durations up to 30 h despite high terminal flow velocities (4.9–7.7 m/s), without structural damage. In contrast, levee sections with pre-existing surface anomalies, such as animal burrows, slope irregularities, surface damage, or reed-covered soft soils, failed rapidly, often within one to two hours. Animal burrows facilitated subsurface flow and internal erosion, initiating fast, retrograde failure. These findings highlight the importance of preventive maintenance, particularly the timely detection and repair of anomalies. Once slope failure begins, the process unfolds rapidly, leaving no practical window for intervention. Full article
Show Figures

Figure 1

29 pages, 838 KiB  
Article
Blockchain-Based Secure Authentication Protocol for Fog-Enabled IoT Environments
by Taehun Kim, Deokkyu Kwon, Yohan Park and Youngho Park
Mathematics 2025, 13(13), 2142; https://doi.org/10.3390/math13132142 - 30 Jun 2025
Viewed by 249
Abstract
Fog computing technology grants computing and storage resources to nearby IoT devices, enabling a fast response and ensuring data locality. Thus, fog-enabled IoT environments provide real-time and convenient services to users in healthcare, agriculture, and road traffic monitoring. However, messages are exchanged on [...] Read more.
Fog computing technology grants computing and storage resources to nearby IoT devices, enabling a fast response and ensuring data locality. Thus, fog-enabled IoT environments provide real-time and convenient services to users in healthcare, agriculture, and road traffic monitoring. However, messages are exchanged on public channels, which can be targeted to various security attacks. Hence, secure authentication protocols are critical for reliable fog-enabled IoT services. In 2024, Harbi et al. proposed a remote user authentication protocol for fog-enabled IoT environments. They claimed that their protocol can resist various security attacks and ensure session key secrecy. Unfortunately, we have identified several vulnerabilities in their protocol, including to insider, denial of service (DoS), and stolen verifier attacks. We also prove that their protocol does not ensure user untraceability and that it has an authentication problem. To address the security problems of their protocol, we propose a security-enhanced blockchain-based secure authentication protocol for fog-enabled IoT environments. We demonstrate the security robustness of the proposed protocol via informal and formal analyses, including Burrows–Abadi–Needham (BAN) logic, the Real-or-Random (RoR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. Moreover, we compare the proposed protocol with related protocols to demonstrate the excellence of the proposed protocol in terms of efficiency and security. Finally, we conduct simulations using NS-3 to verify its real-world applicability. Full article
(This article belongs to the Special Issue Advances in Mobile Network and Intelligent Communication)
Show Figures

Figure 1

22 pages, 3738 KiB  
Article
Field Experiments of Mineral Deposition by Cathodic Polarization as a Sustainable Management Strategy for the Reuse of Marine Steel Structures
by Tiziano Bellezze, Giuseppina Colaleo, Pasquale Contestabile, Pietro Forcellese, Simone Ranieri, Nicola Simoncini, Gianni Barucca, Cinzia Corinaldesi, Fabio Conversano, Oriano Francescangeli, Luigi Montalto, Michela Pisani, Simona Sabbatini, Francesco Vita, Diego Vicinanza and Antonio Dell’Anno
Sustainability 2025, 17(13), 5720; https://doi.org/10.3390/su17135720 - 21 Jun 2025
Viewed by 399
Abstract
This paper presents field experiments of mineral deposition on steel, induced by cathodic polarization in natural seawater, as a sustainable strategy for the life extension of marine steel structures. Although this approach is quite well known, the ability of the mineral deposit to [...] Read more.
This paper presents field experiments of mineral deposition on steel, induced by cathodic polarization in natural seawater, as a sustainable strategy for the life extension of marine steel structures. Although this approach is quite well known, the ability of the mineral deposit to both protect steel from corrosion in the absence of a cathodic current, thus operating as an inorganic coating, and provide an effective substrate for colonization by microorganisms still needs to be fully explained. To this end, two identical steel structure prototypes were installed at a depth of 20 m: one was submitted to cathodic polarization, while the other was left under free corrosion for comparison. After 6 months, the current supplied to the electrified structure was interrupted. A multidisciplinary approach was used to analyze the deposits on steel round bars installed in the prototypes over time, in the presence and in the absence of a cathodic current. Different investigation techniques were employed to provide the following information on the deposit: the composition in terms of elements, compounds and macro-biofouling; the morphology; the thickness and the degree of protection estimated by electrochemical impedance spectroscopy (EIS). The results showed that under cathodic polarization, the thickness of the deposit increased to 2.5 mm and then remained almost constant after the current was interrupted. Conversely, the surface impedance decreased from 3 kΩ cm2 to about 1.5 kΩ cm2 at the same time, and the aragonite–brucite ratio also decreased. This indicates a deterioration in the protection performance and soundness of the deposit, respectively. Considering the trends in thickness and impedance together, it can be concluded that the preformed mineral deposit does not undergo generalized deterioration after current interruption, which would result in a reduction in thickness, but rather localized degradation. This phenomenon was attributed to the burrowing action of marine organisms, which created porosities and/or capillary pathways through the deposit. Therefore, the corrosion protection offered by the mineral deposit without a cathodic current is insufficient because it loses its protective properties. However, the necessary current can be quite limited in the presence of the deposit, which in any case provides a suitable substrate for sustaining the colonization and growth of sessile marine organisms, thus promoting biodiversity. Full article
Show Figures

Figure 1

25 pages, 528 KiB  
Article
Lightweight and Security-Enhanced Key Agreement Protocol Using PUF for IoD Environments
by Sangjun Lee, Seunghwan Son and Youngho Park
Mathematics 2025, 13(13), 2062; https://doi.org/10.3390/math13132062 - 21 Jun 2025
Viewed by 320
Abstract
With the increasing demand for drones in diverse tasks, the Internet of Drones (IoD) has recently emerged as a significant technology in academia and industry. The IoD environment enables various services, such as traffic and environmental monitoring, disaster situation management, and military operations. [...] Read more.
With the increasing demand for drones in diverse tasks, the Internet of Drones (IoD) has recently emerged as a significant technology in academia and industry. The IoD environment enables various services, such as traffic and environmental monitoring, disaster situation management, and military operations. However, IoD communication is vulnerable to security threats due to the exchange of sensitive information over insecure public channels. Moreover, public key-based cryptographic schemes are impractical for communication with resource-constrained drones due to their limited computational capability and resource capacity. Therefore, a secure and lightweight key agreement scheme must be developed while considering the characteristics of the IoD environment. In 2024, Alzahrani proposed a secure key agreement protocol for securing the IoD environment. However, Alzahrani’s protocol suffers from high computational overhead due to its reliance on elliptic curve cryptography and is vulnerable to drone and mobile user impersonation attacks and session key disclosure attacks by eavesdropping on public-channel messages. Therefore, this work proposes a lightweight and security-enhanced key agreement scheme for the IoD environment to address the limitations of Alzahrani’s protocol. The proposed protocol employs a physical unclonable function and simple cryptographic operations (XOR and hash functions) to achieve high security and efficiency. This work demonstrates the security of the proposed protocol using informal security analysis. This work also conducted formal security analysis using the Real-or-Random (RoR) model, Burrows–Abadi–Needham (BAN) logic, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation to verify the proposed protocol’s session key security, mutual authentication ability, and resistance to replay and MITM attacks, respectively. Furthermore, this work demonstrates that the proposed protocol offers better performance and security by comparing the computational and communication costs and security features with those of relevant protocols. Full article
Show Figures

Figure 1

12 pages, 8905 KiB  
Communication
First Recorded Evidence of Invasive Rodent Predation on a Critically Endangered Galápagos Petrel (Pterodroma phaeopygia) Nestling in the Galápagos Islands
by Isabela Tapia-Jaramillo, Joel Arica, Alejandra Espín, Víctor Carrión, Juan Pablo Mayorga, Christian Sevilla, Eliécer Cruz and Paola Sangolquí
Birds 2025, 6(3), 33; https://doi.org/10.3390/birds6030033 - 20 Jun 2025
Viewed by 534
Abstract
The Galápagos Petrel (Pterodroma phaeopygia) is a long-lived Critically Endangered seabird endemic to the Galápagos Islands and faces severe threats from invasive species, particularly rodents. Until now, evidence of rat predation on Galápagos Petrel nestlings has been largely indirect, inferred from [...] Read more.
The Galápagos Petrel (Pterodroma phaeopygia) is a long-lived Critically Endangered seabird endemic to the Galápagos Islands and faces severe threats from invasive species, particularly rodents. Until now, evidence of rat predation on Galápagos Petrel nestlings has been largely indirect, inferred from indirect evidence and predator control outcomes. Here, we present the first photographic documentation of a presumed black rat (Rattus rattus) preying on a Galápagos Petrel nestling, captured by a camera trap on private farmland on Santa Cruz Island. The predation event occurred during a period of parental absence, when the nestling was left unattended while adults foraged at sea. Notably, the parent Petrels continued returning to the nest for 91 days following nestling loss, suggesting strong nest fidelity and highlighting potential energetic costs associated with breeding failure. Our findings reveal critical vulnerabilities during the nestling-rearing phase and emphasize the urgent need to enhance rodent control efforts and protect nesting areas, particularly on farmland outside the Galápagos National Park boundaries. We conclude by providing targeted conservation recommendations to mitigate invasive predator impacts and improve breeding success for this emblematic and imperiled seabird. Full article
Show Figures

Figure 1

20 pages, 1074 KiB  
Article
The Epidemiology of Coccidioidomycosis (Valley fever) and the Disease Ecology of Coccidioides spp. in New Mexico (2006–2023)
by Paris S. Salazar-Hamm, Sarah Shrum Davis, Jovani Catalán-Dibene, Adriana L. Romero-Olivares, Karen Edge, Andrew W. Bartlow, Donald O. Natvig and Morgan E. Gorris
Pathogens 2025, 14(6), 607; https://doi.org/10.3390/pathogens14060607 - 19 Jun 2025
Viewed by 919
Abstract
Coccidioidomycosis (Valley fever), caused by Coccidioides spp., is a fungal infection endemic to semi-arid regions of the Americas. Despite 80 years of disease recognition in New Mexico, there is limited disease awareness. We incorporated clinical, epidemiological, and ecological datasets to summarize the knowledge [...] Read more.
Coccidioidomycosis (Valley fever), caused by Coccidioides spp., is a fungal infection endemic to semi-arid regions of the Americas. Despite 80 years of disease recognition in New Mexico, there is limited disease awareness. We incorporated clinical, epidemiological, and ecological datasets to summarize the knowledge of Valley fever in New Mexico. We analyzed 1541 human cases from 2006 to 2023. On average, 86 cases were reported each year (4.1 cases per 100,000 population per year). The highest levels of incidence were in southwestern New Mexico. American Indian or Alaska Natives in New Mexico had a 1.9 times higher incidence rate of coccidioidomycosis than White people, and among age groups, older populations in New Mexico had the highest incidence rates. We analyzed 300 soil samples near Las Cruces, New Mexico, for the presence of Coccidioides and reported the first known positive soil samples collected from the state, the majority of which were from grassland-dominated sites and from animal burrows. Sequence analyses in clinical specimens, wild animals, and soil samples confirmed that Coccidioides posadasii is the main causative species of coccidioidomycosis in New Mexico. Environmental surveillance validated that locally acquired infections could occur in, but are not limited to, Catron, Doña Ana, Sierra, and Socorro Counties. Full article
(This article belongs to the Special Issue An Update on Fungal Infections)
Show Figures

Figure 1

19 pages, 1200 KiB  
Article
Effects of Rice–Fish Coculture on Greenhouse Gas Emissions: A Case Study in Terraced Paddy Fields of Qingtian, China
by Qixuan Li, Lina Xie, Shiwei Lin, Xiangbing Cheng, Qigen Liu and Yalei Li
Agronomy 2025, 15(6), 1480; https://doi.org/10.3390/agronomy15061480 - 18 Jun 2025
Viewed by 468
Abstract
Rice–fish coculture, a traditional integrated agriculture–aquaculture system, has been recognized as a “Globally Important Agricultural Heritage System” due to its ecological and socio-economic benefits. However, the impact of rice–fish coculture on greenhouse gas emissions remains controversial. This study investigated the effects of rice–fish [...] Read more.
Rice–fish coculture, a traditional integrated agriculture–aquaculture system, has been recognized as a “Globally Important Agricultural Heritage System” due to its ecological and socio-economic benefits. However, the impact of rice–fish coculture on greenhouse gas emissions remains controversial. This study investigated the effects of rice–fish coculture on methane (CH4) and nitrous oxide (N2O) emissions in the Qingtian rice–fish system, a 1200-year-old terraced paddy field system in Zhejiang Province, China. A field experiment with two treatments, rice–fish coculture (RF) and rice monoculture (RM), was conducted to examine the relationships between fish activities, water and soil properties, microbial communities, and greenhouse gas fluxes. Results showed that the RF system had significantly higher CH4 emissions, particularly during the early rice growth stage, compared to the RM system. This increase was attributed to the lower dissolved oxygen levels and higher methanogen abundance in the RF system, likely driven by the grazing, “muddying”, and burrowing activities of fish. In contrast, no significant differences in N2O emissions were observed between the two systems. Redundancy analysis revealed that water variables contributed more to the variation in greenhouse gas emissions than soil variables. Microbial community analysis indicated that the RF system supported a more diverse microbial community involved in methane cycling processes. These findings provide new insights into the complex interactions between fish activities, environmental factors, and microbial communities in regulating greenhouse gas emissions from rice–fish coculture systems. The results suggest that optimizing water management strategies and exploring the potential of microbial community manipulation could help mitigate greenhouse gas emissions while maintaining the ecological and socio-economic benefits of these traditional integrated agriculture–aquaculture systems. Full article
Show Figures

Figure 1

15 pages, 2083 KiB  
Article
Comparison of the Burrowing Ability of Different Groups of Manila Clams (Ruditapes philippinarum)
by Xiang Li, Jianing Wang, Zelin Zhang, Jin Wen, Yu Li, Haoyang Zhang, Pan Lu and Lei Chen
Biology 2025, 14(6), 689; https://doi.org/10.3390/biology14060689 - 12 Jun 2025
Viewed by 700
Abstract
Clams from the Fujian group, the Laizhou group, and the zebra strain group were used in this investigation; their shell lengths were 1.0 cm, 1.5 cm, and 2.0 cm, respectively. Tests were conducted on substrates with particle sizes ranging from 151 to 180 [...] Read more.
Clams from the Fujian group, the Laizhou group, and the zebra strain group were used in this investigation; their shell lengths were 1.0 cm, 1.5 cm, and 2.0 cm, respectively. Tests were conducted on substrates with particle sizes ranging from 151 to 180 µm, 181 to 250 µm, 251 to 425 µm, and 426 to 850 µm. Both centralized and decentralized sowing modes were used. According to the findings, the clams with the 1.0 cm shell length had the highest burrowing rate and the lowest ET50. From 0 to 120 min, the burrowing rate of the zebra strain group was higher than that of the other groups. Clams with shell lengths of 1.0 cm and 1.5 cm had similar burrowing rates at the end of the test, with the zebra strain group having the highest burrowing rate. Manila clams burrowed more quickly when the substrate’s particle sizes were between 181 and 425 µm. The clam burrowing rates in the decentralized sowing mode were high during the first 20 min of the test, but at the end of the test, there was no significant difference between the two sowing modes (p > 0.05). In summary, there were differences in the burrowing ability among the three groups. The clams with a shell length of 1.0 cm in the three groups had a higher burrowing efficiency, and the decentralized sowing mode was more conducive to the clams quickly burrowing into the substrate. Full article
(This article belongs to the Special Issue Global Fisheries Resources, Fisheries, and Carbon-Sink Fisheries)
Show Figures

Figure 1

22 pages, 6037 KiB  
Article
Mapping Wheat Stem Sawfly (Cephus cinctus Norton) Infestations in Spring and Winter Wheat Fields via Multiway Modelling of Multitemporal Sentinel 2 Images
by Lochlin S. Ermatinger, Scott L. Powell, Robert K. D. Peterson and David K. Weaver
Remote Sens. 2025, 17(11), 1950; https://doi.org/10.3390/rs17111950 - 5 Jun 2025
Viewed by 542
Abstract
The wheat stem sawfly (WSS, Cephus cinctus Norton) is a major insect pest of wheat (Triticum aestivum L.) in North America. Few management tactics exist, and quantifying their efficacy is confounded by the difficulty in monitoring infestation at the field scale. Accurate [...] Read more.
The wheat stem sawfly (WSS, Cephus cinctus Norton) is a major insect pest of wheat (Triticum aestivum L.) in North America. Few management tactics exist, and quantifying their efficacy is confounded by the difficulty in monitoring infestation at the field scale. Accurate estimates of WSS infestation are cost prohibitive as they rely on comprehensive stem dissection surveys due to the concealed life cycle of the pest. Consolidating the available management tactics into an effective strategy requires inexpensive, spatially explicit estimates of WSS infestation that are compatible with the large field sizes dryland wheat is often sown to. Therefore, we investigated using multitemporal satellite passive remote sensing (RS) to estimate various metrics of WSS infestation collected from field surveys at the subfield scale. To achieve this, we dissected 43,155 individual stems collected from 1158 unique locations across 9 production wheat fields in Montana, USA. The dissected stem samples from each location were then quantified using the following metrics: the proportion of total WSS-infested stems, proportion of stems with more than one node burrowed through (adequate WSS infestations), and proportion of WSS cut stems only. Cloud-free Sentinel 2 images were collected from Google Earth Engine for each field from across the growing season and sparse multiway partial least squares regression was used to produce a model for total WSS infestations, adequate WSS infestations, and WSS cut stems, for each sampled field. Upon comparing the performance of these models, we found that, on average, the metrics for total (R2 = 0.57) and adequate WSS infestations (R2 = 0.57) were more accurately estimated than WSS cut (R2 = 0.34). The results of this study indicate that multitemporal RS can help estimate total and adequate WSS infestations, but more holistic methods of field level sensing should be explored, especially for estimating WSS cutting. Full article
(This article belongs to the Section Remote Sensing in Agriculture and Vegetation)
Show Figures

Figure 1

Back to TopTop