SlideShare una empresa de Scribd logo
1 de 27
Using A “Bagh Heralu” Network  To Map The Metapopulation  Structure Of Tigers In Nepal Bhim Gurung J. L. David Smith Mahendra Shrestha University of Minnesota
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Previous Tiger Conservation and Research in Nepal
Is there an adequate land base to support tigers? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic conservation theory suggests that larger connected reserves increases population viability ,[object Object],[object Object]
The goal of our research was to evaluate the role of national forest lands as tiger habitat ,[object Object],[object Object],[object Object],[object Object]
Methods ,[object Object]
 
[object Object]
Pugmark Measurement
Determination of Tiger and Leopard Pugmark   Pad width   Total Length     Front  Rear   Rear Tiger  ≥ 8.5 cm  ≥ 7.5 cm   >12 cm Leopard  < 7.0 cm  < 6.0 cm  < 10 cm
Criteria Used to Determine Tiger or Leopard Kill ,[object Object],[object Object],[object Object],[object Object],[object Object]
Determination of Tiger Kill ,[object Object]
The Criteria Used for Breeding Habitat   ,[object Object],[object Object]
Field Methodology Villagers report livestock kills to the “Bagh Heralu” Together they visit the site and investigate the kill and measure pugmarks
To Provide Quality  Control     ,[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
Discussion ,[object Object],[object Object],[object Object]
Discussion (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social Aspects of the Study ,[object Object],[object Object],[object Object],[object Object]
Future Directions of Research   ,[object Object]
Future Conservation Needs ,[object Object],[object Object],[object Object]
THANK YOU
THANK YOU

Más contenido relacionado

Destacado

A BRIEF OVERVIEW ON WILDLIFE MANAGEMENT
A BRIEF OVERVIEW ON WILDLIFE MANAGEMENTA BRIEF OVERVIEW ON WILDLIFE MANAGEMENT
A BRIEF OVERVIEW ON WILDLIFE MANAGEMENT
Pintu Kabiraj
 
102 1 十九世紀中國分組報告 week2
102 1 十九世紀中國分組報告 week2102 1 十九世紀中國分組報告 week2
102 1 十九世紀中國分組報告 week2
Yi-Chi Tang
 
文社的盛衰 書評口頭報告 Presentation
文社的盛衰 書評口頭報告 Presentation文社的盛衰 書評口頭報告 Presentation
文社的盛衰 書評口頭報告 Presentation
Yi-Chi Tang
 
STEKLO V PROIZVEDENIYAH ISKUSSTVA
STEKLO V PROIZVEDENIYAH ISKUSSTVASTEKLO V PROIZVEDENIYAH ISKUSSTVA
STEKLO V PROIZVEDENIYAH ISKUSSTVA
viktoriya71
 
5. ke toan cac khoan phai thu phai thu noi bo va phai thu khac
5. ke toan cac khoan phai thu   phai thu noi bo va phai thu khac5. ke toan cac khoan phai thu   phai thu noi bo va phai thu khac
5. ke toan cac khoan phai thu phai thu noi bo va phai thu khac
Pham Ngoc Quang
 

Destacado (18)

wildlife biology
wildlife biologywildlife biology
wildlife biology
 
A BRIEF OVERVIEW ON WILDLIFE MANAGEMENT
A BRIEF OVERVIEW ON WILDLIFE MANAGEMENTA BRIEF OVERVIEW ON WILDLIFE MANAGEMENT
A BRIEF OVERVIEW ON WILDLIFE MANAGEMENT
 
PPT on PROJECT TIGER
PPT on PROJECT TIGERPPT on PROJECT TIGER
PPT on PROJECT TIGER
 
041 mark recapture method for population study
041 mark recapture method for population study041 mark recapture method for population study
041 mark recapture method for population study
 
Population Dynamics
Population DynamicsPopulation Dynamics
Population Dynamics
 
Project tiger
Project tigerProject tiger
Project tiger
 
Population Ecology
Population EcologyPopulation Ecology
Population Ecology
 
Fallacies of distributed computing
Fallacies of distributed computingFallacies of distributed computing
Fallacies of distributed computing
 
102 1 十九世紀中國分組報告 week2
102 1 十九世紀中國分組報告 week2102 1 十九世紀中國分組報告 week2
102 1 十九世紀中國分組報告 week2
 
文社的盛衰 書評口頭報告 Presentation
文社的盛衰 書評口頭報告 Presentation文社的盛衰 書評口頭報告 Presentation
文社的盛衰 書評口頭報告 Presentation
 
Ed generic 2014
Ed generic 2014Ed generic 2014
Ed generic 2014
 
my life
my lifemy life
my life
 
Protect Your Brand in the Conversation Age
Protect Your Brand in the Conversation AgeProtect Your Brand in the Conversation Age
Protect Your Brand in the Conversation Age
 
Monumento a la legión
Monumento a la legiónMonumento a la legión
Monumento a la legión
 
STEKLO V PROIZVEDENIYAH ISKUSSTVA
STEKLO V PROIZVEDENIYAH ISKUSSTVASTEKLO V PROIZVEDENIYAH ISKUSSTVA
STEKLO V PROIZVEDENIYAH ISKUSSTVA
 
NRKbeta - Webdagene 2008
NRKbeta - Webdagene 2008NRKbeta - Webdagene 2008
NRKbeta - Webdagene 2008
 
5. ke toan cac khoan phai thu phai thu noi bo va phai thu khac
5. ke toan cac khoan phai thu   phai thu noi bo va phai thu khac5. ke toan cac khoan phai thu   phai thu noi bo va phai thu khac
5. ke toan cac khoan phai thu phai thu noi bo va phai thu khac
 
Belém (Lisboa)
Belém (Lisboa)Belém (Lisboa)
Belém (Lisboa)
 

Similar a Citizen Tiger Rangers

GHI Poster - Rwanda 2015
GHI Poster - Rwanda 2015GHI Poster - Rwanda 2015
GHI Poster - Rwanda 2015
Tanya Witlen
 
Power to the People: Nature and science benefit when people are engaged
 Power to the People:  Nature and science benefit when people are engaged Power to the People:  Nature and science benefit when people are engaged
Power to the People: Nature and science benefit when people are engaged
ConnectingWithTheCrowd
 
Biodiversity and Conservation BiologyUpon completing this .docx
Biodiversity and Conservation BiologyUpon completing this .docxBiodiversity and Conservation BiologyUpon completing this .docx
Biodiversity and Conservation BiologyUpon completing this .docx
AASTHA76
 
Discussion 1 by Sravya Patil Bagli (a) What is the purpose of.docx
Discussion 1 by  Sravya Patil Bagli (a) What is the purpose of.docxDiscussion 1 by  Sravya Patil Bagli (a) What is the purpose of.docx
Discussion 1 by Sravya Patil Bagli (a) What is the purpose of.docx
elinoraudley582231
 

Similar a Citizen Tiger Rangers (20)

Fullbright Proposal
Fullbright ProposalFullbright Proposal
Fullbright Proposal
 
Kuno_2013_Prey survey_report full
Kuno_2013_Prey survey_report fullKuno_2013_Prey survey_report full
Kuno_2013_Prey survey_report full
 
GHI Poster - Rwanda 2015
GHI Poster - Rwanda 2015GHI Poster - Rwanda 2015
GHI Poster - Rwanda 2015
 
IND-ENG-2014-110
IND-ENG-2014-110IND-ENG-2014-110
IND-ENG-2014-110
 
Phenotypic Characterization of Erashy Cattle Type in El-Gash Area (Kassala St...
Phenotypic Characterization of Erashy Cattle Type in El-Gash Area (Kassala St...Phenotypic Characterization of Erashy Cattle Type in El-Gash Area (Kassala St...
Phenotypic Characterization of Erashy Cattle Type in El-Gash Area (Kassala St...
 
Tiger Conservation by Green Yatra
Tiger Conservation by Green YatraTiger Conservation by Green Yatra
Tiger Conservation by Green Yatra
 
Power to the People: Nature and science benefit when people are engaged
 Power to the People:  Nature and science benefit when people are engaged Power to the People:  Nature and science benefit when people are engaged
Power to the People: Nature and science benefit when people are engaged
 
Biodiversity and Conservation BiologyUpon completing this .docx
Biodiversity and Conservation BiologyUpon completing this .docxBiodiversity and Conservation BiologyUpon completing this .docx
Biodiversity and Conservation BiologyUpon completing this .docx
 
WELCOME TO MID-TERM PRESENTATION.pptx
WELCOME TO MID-TERM PRESENTATION.pptxWELCOME TO MID-TERM PRESENTATION.pptx
WELCOME TO MID-TERM PRESENTATION.pptx
 
Strategies adopted to mitigate Human–Elephant Conflict (HEC) in and around Ke...
Strategies adopted to mitigate Human–Elephant Conflict (HEC) in and around Ke...Strategies adopted to mitigate Human–Elephant Conflict (HEC) in and around Ke...
Strategies adopted to mitigate Human–Elephant Conflict (HEC) in and around Ke...
 
Magurran estrutura comunidades
Magurran estrutura comunidadesMagurran estrutura comunidades
Magurran estrutura comunidades
 
Gobi bear.pdf
Gobi bear.pdfGobi bear.pdf
Gobi bear.pdf
 
Mule Deer Research in Utah, April 2011
Mule Deer Research in Utah, April 2011Mule Deer Research in Utah, April 2011
Mule Deer Research in Utah, April 2011
 
Tiger myth and mystery - Tiger Reserves of India
Tiger myth and mystery - Tiger Reserves of IndiaTiger myth and mystery - Tiger Reserves of India
Tiger myth and mystery - Tiger Reserves of India
 
Suitability of Resource Management based on Supernatural Enforcement Mechanis...
Suitability of Resource Management based on Supernatural Enforcement Mechanis...Suitability of Resource Management based on Supernatural Enforcement Mechanis...
Suitability of Resource Management based on Supernatural Enforcement Mechanis...
 
1846-3842-1-SM
1846-3842-1-SM1846-3842-1-SM
1846-3842-1-SM
 
Introduction to the crees research programme
Introduction to the crees research programmeIntroduction to the crees research programme
Introduction to the crees research programme
 
Discussion 1 by Sravya Patil Bagli (a) What is the purpose of.docx
Discussion 1 by  Sravya Patil Bagli (a) What is the purpose of.docxDiscussion 1 by  Sravya Patil Bagli (a) What is the purpose of.docx
Discussion 1 by Sravya Patil Bagli (a) What is the purpose of.docx
 
Dynamics of Human-Sloth Bear Conflict in Kanha-Pench Corridor
Dynamics of Human-Sloth Bear Conflict in Kanha-Pench CorridorDynamics of Human-Sloth Bear Conflict in Kanha-Pench Corridor
Dynamics of Human-Sloth Bear Conflict in Kanha-Pench Corridor
 
project
projectproject
project
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Citizen Tiger Rangers

Notas del editor

  1. The tiger is globally an endangered species. Until 1990, major threat to tigers was habitat loss, fragmentation and degradation. Poisoning of carcasses in the hope of killing tiger also became a problem at the same time. However, after 1990, poaching became a series problem due to the use of tiger bones in Asian medicine. Tigers were killed for the bone as well as other parts.