In a method analogous to analyzing human fingerprints, scientists can make identifications by precisely comparing shark bites to the jaws and teeth of the powerful predators, said George Burgess, director of the International Shark Attack File, which is housed at UF’s Florida Museum of Natural History.
“Every time we investigate a shark attack one of the pieces of information that we want to have is what species was involved and what size it was,” he said. “Because I’ve been looking at shark attack victims for 30 years I can estimate what did the damage, but I have never been able to actually prove it.”
Now scientists can say with a degree of certainty whether the beast was a 14-foot tiger shark or a 9-foot bull shark, a distinction that has unforeseen emotional, ecological and even monetary benefits, said Burgess, who collaborated with researchers from the University of South Florida. Their findings are published in the November issue of Marine Biology.
“There’s a psychological need for many shark attack victims to know what bit them,” Burgess said. “One of the few things shark attack victims have going for them after a bite is bragging rights and the bragging rights include knowing what did the damage.”
Because of the hype surrounding shark attacks, off-the-cuff estimates of shark size are often exaggerated, he said. “This will give an actual basis for determining what species was involved and the size, not that that’s going to affect the size claimed by the victim in a bar,” he said.
Using dried shark jaws from museums and private collections, the researchers were able to identify bite patterns of particular sizes and species of sharks by measuring jaw circumference and the distance between the six frontal teeth on the top and lower jaws, Burgess said. They experimented on 10 to 24 sets of shark jaws for each of the 14 species they analyzed. The technique works not only on human and animal tissue, but also on inanimate objects like surfboards and underground cable lines, he said.
The ability to make predictions from bite patterns is important to understanding the behavioral underpinnings of shark attacks and their prey habits, said lead researcher Dayv Lowry, a biologist with the Washington Department of Fish and Wildlife, who did the work as a graduate student at the University of South Florida.
“Often someone will send us a picture of a dolphin carcass or a sea turtle and want to know what kind of shark bit it,” Lowry said. “Knowing that it’s a large tiger shark, for example, would help us figure out what large tiger sharks like to eat and how they attack their prey. If an animal or person has been bitten on the rear end, then we know these sharks are likely to sneak up to get their prey instead of facing the victims.”
Being able to determine what size shark attacked people in certain geographic areas such as South Africa where offshore nets are used to protect swimmers is valuable because it may influence the size mesh that is used, Lowry said. With larger sharks, beaches can get by with bigger mesh sizes, which are cheaper and less environmentally intrusive, he said.
The technique also has the potential to save thousands of dollars in damages caused by the sharks’ penchant for attacking underwater electronic equipment, which includes intercontinental telephone wires, top-secret communication lines between government officials and sensors companies use to uncover oil fields, Burgess said.
Sharks are equipped with organs on the underside of their snouts – gel filled pits called ampullae of Lorenzini – that allow them to detect electromagnetic fields from their intended food, Burgess said. Unfortunately, sharks often do not distinguish between the signals sent by prey and equipment, which can be ruined by water seeping in through the bite marks, he said.
“That’s one thing that makes them special — they can sense electro-magnetic fields around their prey items,” he said.
Laying cable lines at the bottom of the ocean is extremely expensive, and having to remove a piece, fix it and install it again adds to the cost, Burgess said. “Knowing that a certain species of shark did the damage is useful because in the future cable lines can be placed in a different location, outside the path of that particular shark’s area of distribution,” he said.
And the ability to determine what size shark was involved in an attack by the size and configuration of its bite marks could result in the installation of a heavier seal designed to withstand damage from that kind of shark, he said.
George Burgess | EurekAlert!
New catalyst controls activation of a carbon-hydrogen bond
21.11.2017 | Emory Health Sciences
The main switch
21.11.2017 | Albert-Ludwigs-Universität Freiburg im Breisgau
The WHO reports an estimated 429,000 malaria deaths each year. The disease mostly affects tropical and subtropical regions and in particular the African continent. The Fraunhofer Institute for Silicate Research ISC teamed up with the Fraunhofer Institute for Molecular Biology and Applied Ecology IME and the Institute of Tropical Medicine at the University of Tübingen for a new test method to detect malaria parasites in blood. The idea of the research project “NanoFRET” is to develop a highly sensitive and reliable rapid diagnostic test so that patient treatment can begin as early as possible.
Malaria is caused by parasites transmitted by mosquito bite. The most dangerous form of malaria is malaria tropica. Left untreated, it is fatal in most cases....
The formation of stars in distant galaxies is still largely unexplored. For the first time, astron-omers at the University of Geneva have now been able to closely observe a star system six billion light-years away. In doing so, they are confirming earlier simulations made by the University of Zurich. One special effect is made possible by the multiple reflections of images that run through the cosmos like a snake.
Today, astronomers have a pretty accurate idea of how stars were formed in the recent cosmic past. But do these laws also apply to older galaxies? For around a...
Just because someone is smart and well-motivated doesn't mean he or she can learn the visual skills needed to excel at tasks like matching fingerprints, interpreting medical X-rays, keeping track of aircraft on radar displays or forensic face matching.
That is the implication of a new study which shows for the first time that there is a broad range of differences in people's visual ability and that these...
Computer Tomography (CT) is a standard procedure in hospitals, but so far, the technology has not been suitable for imaging extremely small objects. In PNAS, a team from the Technical University of Munich (TUM) describes a Nano-CT device that creates three-dimensional x-ray images at resolutions up to 100 nanometers. The first test application: Together with colleagues from the University of Kassel and Helmholtz-Zentrum Geesthacht the researchers analyzed the locomotory system of a velvet worm.
During a CT analysis, the object under investigation is x-rayed and a detector measures the respective amount of radiation absorbed from various angles....
The quantum world is fragile; error correction codes are needed to protect the information stored in a quantum object from the deteriorating effects of noise. Quantum physicists in Innsbruck have developed a protocol to pass quantum information between differently encoded building blocks of a future quantum computer, such as processors and memories. Scientists may use this protocol in the future to build a data bus for quantum computers. The researchers have published their work in the journal Nature Communications.
Future quantum computers will be able to solve problems where conventional computers fail today. We are still far away from any large-scale implementation,...
15.11.2017 | Event News
15.11.2017 | Event News
30.10.2017 | Event News
21.11.2017 | Physics and Astronomy
21.11.2017 | Physics and Astronomy
21.11.2017 | Life Sciences