Abstract

Simple SummaryThe red-necked longhorn beetle Aromia bungii is an invasive species that causes damage to Rosaceae trees. In introduced countries, tree damage by A. bungii in many regions, such as orchards, forests, and ornamentals, is a serious problem. Information about the characteristics of pest-infested host trees is helpful for efficiently finding and controlling this beetle. In this study, we investigated the characteristics of infested and uninfested ornamental cherry trees in the field, and speculated as to the traits that are important to infestation. As a result, host trees with rough surface bark, large in size, and weakened conditions are prone to damage by A. bungii. These findings aid in the selection of trees or locations to be surveyed for intrusion detection surveillance, where a high probability of damage can be found, among many candidates in intruded areas. Moreover, this knowledge is useful for prioritizing preventive measures for host trees that are more likely to be attacked in already invaded areas.The expanding distribution and tree damage of the invasive, primary wood-borer Aromia bungii (Coleoptera: Cerambycidae), which kills trees of the Rosaceae family, is a problem in intruded areas. However, the tree characteristics associated with infestation by A. bungii, which are useful for early detection or prioritizing preventive measures, are not well examined. We investigated the presence or absence of tree damage (response variable) in pre- and post- surveys along with tree characteristics (four explanatory variables; bark roughness, size, species, and vigor) on monitoring trees in uninvaded sites (survey for the first trees to be damaged) and already invaded sites (survey for the next trees to be damaged). We evaluated the variables using generalized linear mixed models for each site (i.e., a first trees model and a next trees model). Three tree characteristics (bark roughness, size, and vigor) were included as explanatory variables in both best models, indicating that trees with rough surface bark, large in size, and weakened conditions were more susceptible to A. bungii infestation. The reasons for the difference between the two models (species was only chosen in the next trees model) will be considered in our future work.

Highlights

  • Number of Study Sites and Monitoring Trees Categorized by A. bungii Infestation

  • The infested or uninfested monitoring trees in the post-survey were treated as the presence or absence data for infestation in the first trees model (GLMM; 85 infested trees and 304 uninfested trees in the Category 1 study sites) and in the trees model (GLMM; 105 infested trees and 171 uninfested trees in the Category 3 study sites; Table 1)

  • The total number of monitoring trees with or without infestation in the pre- and postsurvey is presented according to tree characteristics in Appendix A

Read more

Summary

Introduction

To prevent the expansion of the distribution of exotic species and tree damage in introduced areas, early detection is critical [5]. A usual method for finding targets is monitoring surveys for intrusion detection based on the presence or absence of the species near the area where it was first discovered. In such surveillance programs, the use of synthetic pheromone lures, in combination with a trap apparatus to capture the beetles, have been conventionally employed against invaders, including exotic cerambycids beetles [6,7]. The practical application of pheromone traps for the reconnaissance of adults remains a work in progress [11,12]

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.