Hostname: page-component-7bb8b95d7b-qxsvm Total loading time: 0 Render date: 2024-09-12T10:30:02.641Z Has data issue: false hasContentIssue false

Predatory interactions between Thermocyclops decipiens Kiefer(Cyclopoida : Copepoda) and two small cladocerans : behavior andprey post-encounter vulnerability

Published online by Cambridge University Press:  15 February 2009

A. Andrade
Affiliation:
Departamento de Biología. Facultad Experimental de Ciencias. Universidad del Zulia. Apdo. 526. Maracaibo 4011-A. Venezuela
C. López
Affiliation:
Departamento de Biología. Facultad Experimental de Ciencias. Universidad del Zulia. Apdo. 526. Maracaibo 4011-A. Venezuela Present address : Limnology Laboratory. Department of Biology. Baylor University. Waco 76798. Texas. U.S.A.
Get access

Abstract

The predatory behavior of adult females of Thermocyclops decipiens in relation to two cladoceran prey, Ceriodaphnia cornuta and Diaphanosoma spinulosum, was analyzed by laboratory observations. The number of attacks, captures, and ingestions were quantified. Probabilities of capture after attack (C/A) and ingestion after capture (I/C) were calculated as indicators of prey post-encounter vulnerability. T. decipiens attacked, captured and ingested both cladoceran species, but vulnerabilities of prey were relatively low. C/A was higher in C. cornuta than in D. spinulosum. Larger individuals of D. spinulosum showed higher C/A and I/C than smaller individuals but no effects of size were observed in C. cornuta. The ability of escape as well as the strength and shape of carapace, seem to partially explain differences in vulnerability among these species. Our results suggest that intensity of mechanical perturbations and other size-dependent factors, but not body size alone, could be important in determining post-encounter prey vulnerability among individuals of a same species.

Type
Research Article
Copyright
© Université Paul Sabatier, 2005

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)