79 resultados para AMERICAS
Resumo:
Background: Potyviruses are found world wide, are spread by probing aphids and cause considerable crop damage. Potyvirus is one of the two largest plant virus genera and contains about 15% of all named plant virus species. When and why did the potyviruses become so numerous? Here we answer the first question and discuss the other. Methods and Findings: We have inferred the phylogenies of the partial coat protein gene sequences of about 50 potyviruses, and studied in detail the phylogenies of some using various methods and evolutionary models. Their phylogenies have been calibrated using historical isolation and outbreak events: the plum pox virus epidemic which swept through Europe in the 20th century, incursions of potyviruses into Australia after agriculture was established by European colonists, the likely transport of cowpea aphid-borne mosaic virus in cowpea seed from Africa to the Americas with the 16th century slave trade and the similar transport of papaya ringspot virus from India to the Americas. Conclusions/Significance: Our studies indicate that the partial coat protein genes of potyviruses have an evolutionary rate of about 1.1561024 nucleotide substitutions/site/year, and the initial radiation of the potyviruses occurred only about 6,600 years ago, and hence coincided with the dawn of agriculture. We discuss the ways in which agriculture may have triggered the prehistoric emergence of potyviruses and fostered their speciation.
Resumo:
With the growth in number and sophistication of services widely available, there is a new urgency for comprehensive service descriptions that take into account both technical and business aspects. The last years have seen a number of efforts for best-of-breed service description focusing on specific aspects of services. The Handbook of Service Description provides the most advanced state of the art insights into these. The main parts of the book provide the most detailed documentation of the Unified Service Description Language (USDL) to date. USDL has been developed across several research institutes and publicly funded projects across Europe and Australia, currently extending to the Americas as part of a standardization push through W3C. The scope of services extends across IT and business, i.e., the socio-technical sense of services scaled to business networks. In this respect, purely human, purely automated and mixed human/automated services were considered, that have a boundary of cognizance that is available through the tasks of service provisioning, discovery, access and delivery. Taken together, the Handbook of Service Description provides a comprehensive reference suitable for a wide-reaching audience including researchers, practitioners, managers, and students who aspire to learn about or to create a deeper scientific foundation for service description and its methodological aspects.
Resumo:
Psittacine beak and feather disease (PBFD) has a broad host range and is widespread in wild and captive psittacine populations in Asia, Africa, the Americas, Europe and Australasia. Beak and feather disease circovirus (BFDV) is the causative agent. BFDV has an ~2 kb single stranded circular DNA genome encoding just two proteins (Rep and CP). In this study we provide support for demarcation of BFDV strains by phylogenetic analysis of 65 complete genomes from databases and 22 new BFDV sequences isolated from infected psittacines in South Africa. We propose 94% genome-wide sequence identity as a strain demarcation threshold, with isolates sharing > 94% identity belonging to the same strain, and strain subtypes sharing> 98% identity. Currently, BFDV diversity falls within 14 strains, with five highly divergent isolates from budgerigars probably representing a new species of circovirus with three strains (budgerigar circovirus; BCV-A, -B and -C). The geographical distribution of BFDV and BCV strains is strongly linked to the international trade in exotic birds; strains with more than one host are generally located in the same geographical area. Lastly, we examined BFDV and BCV sequences for evidence of recombination, and determined that recombination had occurred in most BFDV and BCV strains. We established that there were two globally significant recombination hotspots in the viral genome: the first is along the entire intergenic region and the second is in the C-terminal portion of the CP ORF. The implications of our results for the taxonomy and classification of circoviruses are discussed. © 2011 SGM.
Resumo:
"This essay is a critique of the scientific and policy rationales for transnational standardization. It analyzes two examples of policy export: early childhood standards in one of North America’s oldest Indigenous communities and the ongoing development of international standards for university teaching. It examines calls for American education to look to Finland, Canada, and Singapore for models of reform and innovation, focusing on the complex historical, cultural, and political settlements at work in these countries. The author addresses two affiliated challenges: first, the possibility of a principled understanding of evidence and policy in cultural and political-economic context, and second, the possibility of a mediative educational science that might guide policy formation." -- EDUCATIONAL RESEARCHER November 2011 vol. 40 no. 8 367-377
Resumo:
The common presupposition of Enterprise Systems (ES) is that they lead to significant efficiency gains. However, this is only the case for well-implemented ES that meet organisational requirements. The list of major ES implementation failures is as long as the list of success stories. We argue here that this arises from a more fundamental problem, the functionalist approach to ES development and provision. As long as vendors will continue to develop generic, difficult-to-adapt ES packages, this problem will prevail because organisations have a non-generic character. A solution to this problem can only consist in rethinking the way ES packages are provided. We propose a strict abstraction layer of ES functionalities and their representation as conceptual models. ES vendors must provide sufficient means for configuring these conceptual models. We discuss in this paper what generic situations can occur during process model configuration in order to understand process model configuration in depth.
Resumo:
The success of contemporary organizations depends on their ability to make appropriate decisions. Making appropriate decisions is inevitably bound to the availability and provision of relevant information. Information systems should be able to provide information in an efficient way. Thus, within information systems development a detailed analysis of information supply and information demands has to prevail. Based on Syperski’s information set and subset-model we will give an epistemological foundation of information modeling in general and show, why conceptual modeling in particular is capable of specifying effective and efficient information systems. Furthermore, we derive conceptual modeling requirements based on our findings. A short example illustrates the usefulness of a conceptual data modeling technique for the specification of information systems.
Resumo:
This PhD study has examined the population genetics of the Russian wheat aphid (RWA, Diuraphis noxia), one of the world’s most invasive agricultural pests, throughout its native and introduced global range. Firstly, this study investigated the geographic distribution of genetic diversity within and among RWA populations in western China. Analysis of mitochondrial data from 18 sites provided evidence for the long-term existence and expansion of RWAs in western China. The results refute the hypothesis that RWA is an exotic species only present in China since 1975. The estimated date of RWA expansion throughout western China coincides with the debut of wheat domestication and cultivation practices in western Asia in the Holocene. It is concluded that western China represents the limit of the far eastern native range of this species. Analysis of microsatellite data indicated high contemporary gene flow among northern populations in western China, while clear geographic isolation between northern and southern populations was identified across the Tianshan mountain range and extensive desert regions. Secondly, this study analyzed the worldwide pathway of invasion using both microsatellite and endosymbiont genetic data. Individual RWAs were obtained from native populations in Central Asia and the Middle East and invasive populations in Africa and the Americas. Results indicated two pathways of RWA invasion from 1) Syria in the Middle East to North Africa and 2) Turkey to South Africa, Mexico and then North and South America. Very little clone diversity was identified among invasive populations suggesting that a limited founder event occurred together with predominantly asexual reproduction and rapid population expansion. The most likely explanation for the rapid spread (within two years) from South Africa to the New World is by human movement, probably as a result of the transfer of wheat breeding material. Furthermore, the mitochondrial data revealed the presence of a universal haplotype and it is proposed that this haplotype is representative of a wheat associated super-clone that has gained dominance worldwide as a result of the widespread planting of domesticated wheat. Finally, this study examined salivary gland gene diversity to determine whether a functional basis for RWA invasiveness could be identified. Peroxidase DNA sequence data were obtained for a selection of worldwide RWA samples. Results demonstrated that most native populations were polymorphic while invasive populations were monomorphic, supporting previous conclusions relating to demographic founder effects in invasive populations. Purifying selection most likely explains the existence of a universal allele present in Middle Eastern populations, while balancing selection was evident in East Asian populations. Selection acting on the peroxidase gene may provide an allele-dependent advantage linked to the successful establishment of RWAs on wheat, and ultimately their invasion potential. In conclusion, this study is the most comprehensive molecular genetic investigation of RWA population genetics undertaken to date and provides significant insights into the source and pathway of global invasion and the potential existence of a wheat-adapted genotype that has colonised major wheat growing countries worldwide except for Australia. This research has major biosecurity implications for Australia’s grain industry.
Resumo:
In this research, we suggest appropriate information technology (IT) governance structures to manage the cloud computing resources. The interest in acquiring IT resources a utility is gaining momentum. Cloud computing resources present organizations with opportunities to manage their IT expenditure on an ongoing basis, and are providing organizations access to modern IT resources to innovate and manage their continuity. However, cloud computing resources are no silver bullet. Organizations would need to have appropriate governance structures and policies in place to ensure its effective management and fit into existing business processes to leverage the promised opportunities. Using a mixed method design, we identified four possible governance structures for managing the cloud computing resources. These structures are a chief cloud officer, a cloud management committee, a cloud service facilitation centre, and a cloud relationship centre. These governance structures ensure appropriate direction of cloud computing resources from its acquisition to fit into the organizations business processes.
Resumo:
The United Nations High Commissioner for Refugees' (UNHCR) 2011 statistics on refugee populations residing by region are a stark reminder of the challenge facing states and civil society in the Asia Pacific. In 2011, Africa hosted 2,149,000 refugees; the Americas, Europe, and Middle East and North Africa hosted 513 ,500, 1,605,500 and 1,889,900 respectively, while the Asia Pacific hosted a staggering 3,793,900. The fact that 35 per cent of the world's refugees reside in the Asia Pacific, coupled with the fact that 84 per cent of refugees displaced in Asia remain in the region,raises the questions why so few countries in the region are signatories to the Convention relating to the Status of Refugees ('Refugee Convention') or cognate rights instruments and why no formally binding regional agreement exists for the equitable sharing of responsibilities for refugees...
Resumo:
A victim of phishing emails could be subjected to money loss and identity theft. This paper investigates the different types of phishing email victims, with the goal of increasing such victims' defences. To obtain this kind of information, an experiment which involves sending a phishing email to participants is conducted. Quantitative and qualitative methods are also used to collect users' information. A model for detecting deception has been employed to understand victims' behaviour. This paper reports the qualitative results. The findings suggest that victims of phishing emails do not always exhibit the same vulnerability. The cause of being a victim is a result of three weaknesses in the detection process: (1) lack of knowledge; (2) weak confirmation channel, and; (3) victims' high propensity towards risk-taking. Therefore, it is suggested that users be provided with suitable confirmation channels and be more risk averse in their behaviour so that they would not fall victim to phishing emails.
Resumo:
The concept of cloud computing services is appealing to the small and medium enterprises (SMEs), with the opportunity to acquire modern information technology resources as a utility and avoid costly capital investments in technology resources. However, the adoption of the cloud computing services presents significant challenges to the SMEs. The SMEs need to determine a path to adopting the cloud computing services that would ensure their sustainable presence in the cloud computing environment. Information about approaches to adopting the cloud computing services by the SMEs is fragmented. Through an interpretive design, we suggest that the SMEs need to have a strategic and incremental intent, understand their organizational structure, understand the external factors, consider the human resource capacity, and understand the value expectations from the cloud computing services to forge a successful path to adopting the cloud computing services. These factors would contribute to a model of cloud services for SMEs.
Resumo:
IT resources are indispensable in the management of Public Sector Organizations (PSOs) around the world. We investigate the factors that could leverage the IT resources in PSOs in developing economies. While research on ways to leverage IT resources in private sector organizations of developed countries is substantial, our understanding on ways to leverage the IT resources in the public sector in developing countries is limited. The current study aspires to address this gap in the literature by seeking to determine the key factors required to create process value from public sector IT investments in developing countries. We draw on the resource-centric theories to imply the nature of factors that could leverage the IT resources in the public sector. Employing an interpretive design, we identified three factors necessary for IT process value generation in the public sector. We discuss these factors and state their implications to theory and practice.
Resumo:
This paper examines the extent social media is enabling e-democracy in Fiji, Solomon Islands and Vanuatu. The study conducts an interpretative case study approach interviewing active social media users, political actors, civil servants, civilians, civil society actors and tertiary students. The study also conducts a content analysis of popular “political social media” Facebook pages in these three countries. The findings of the study suggest that social media is playing a role in facilitating citizen engagement with governments, making governments accountable and providing a means for citizens to be informed, to discuss and share views on political matters. However, social media usage is evolving quite differently in these three countries and factors such as high levels of militarism (Fiji), high levels of corruption (Solomon Islands) and also rapid ICT development (Vanuatu) have contributed towards shaping the potential of social media as a democratic enabler and political tool in these countries.
Resumo:
This study investigated the population genetics, demographic history and pathway of invasion of the Russian wheat aphid (RWA) from its native range in Central Asia, the Middle East and Europe to South Africa and the Americas. We screened microsatellite markers, mitochondrial DNA and endosymbiont genes in 504 RWA clones from nineteen populations worldwide. Following pathway analyses of microsatellite and endosymbiont data, we postulate that Turkey and Syria were the most likely sources of invasion to Kenya and South Africa, respectively. Furthermore, we found that one clone transferred between South Africa and the Americas was most likely responsible for the New World invasion. Finally, endosymbiont DNA was found to be a high resolution population genetic marker, extremely useful for studies of invasion over a relatively short evolutionary history time frame. This study has provided valuable insights into the factors that may have facilitated the recent global invasion by this damaging pest.