326 resultados para stink bug
Resumo:
Forma parte de una serie de cinco libros basada en la consideración de que la fonética es una forma muy eficaz de enseñar la lectura y la escritura a los niños de primaria. Se basa en la relación existente entre letras y sonidos, es decir, entra la unidad de sonido que se llama fonema y la unidad escrita, grafema. En este segundo libro, el niño aprende palabras de tres letras y lee y deletrea palabras como: cat, dog y bug.
Resumo:
Manual diseñado para que profesores de enseñanza secundaria ayuden y apoyen el desarrollo de la inteligencia emocional, que abarca la conciencia y la responsabilidad, la actitud positiva y apreciativa, la empatía y el respeto, la motivación y la persistencia. Las actividades para nueve sesiones desarrollan la inteligencia con respecto a uno mismo, otras personas, el empleo y el futuro.
Resumo:
Resumen tomado de la publicaci??n
Resumo:
SEXTANTE es un marco para el desarrollo de algoritmos dedicados al procesamiento de información geográficamente referenciada, que actualmente cuenta con más de doscientos algoritmos que son capaces de operar sobre datos vectoriales, alfanuméricos y raster. Por otra parte, GearScape es un sistema de información geográfico orientado al geoprocesamiento, que dispone de un lenguaje declarativo que permite el desarrollo de geoprocesos sin necesidad de herramientas de desarrollo complejas. Dicho lenguaje está basado en el estándar SQL y extendido mediante la norma OGC para el acceso a fenómenos simples. Al ser un lenguaje mucho más simple que los lenguajes de programación imperativos (java, .net, python, etc.) la creación de geoprocesos es también más simple, más fácil de documentar, menos propensa a bugs y además la ejecución es optimizada de manera automática mediante el uso de índices y otras técnicas. La posibilidad de describir cadenas de operaciones complejas tiene también valor a modo de documentación: es posible escribir todos los pasos para la resolución de un determinado problema y poder recuperarlo tiempo después, reutilizarlo fácilmente, comunicárselo a otra persona, etc. En definitiva, el lenguaje de geoprocesamiento de GearScape permite "hablar" de geoprocesos. La integración de SEXTANTE en GearScape tiene un doble objetivo. Por una parte se pretende proporcionar la posibilidad de usar cualquiera de los algoritmos con la interfaz habitual de SEXTANTE. Por la otra, se pretende añadir al lenguaje de geoprocesamiento de GearScape la posibilidad de utilizar algoritmos de SEXTANTE. De esta manera, cualquier problema que se resuelva mediante la utilización de varios de estos algoritmes puede ser descrito con el lenguaje de geoprocesamiento de GearScape. A las ventajas del lenguaje de GearScape para la definición de geoprocesos, se añade el abanico de geoprocesos disponible en SEXTANTE, por lo que el lenguaje de geoprocesamiento de GearScape nos permite "hablar" utilizando vocabulario de SEXTANTE
Resumo:
1. Suction sampling is a popular method for the collection of quantitative data on grassland invertebrate populations, although there have been no detailed studies into the effectiveness of the method. 2. We investigate the effect of effort (duration and number of suction samples) and sward height on the efficiency of suction sampling of grassland beetle, true bug, planthopper and spider Populations. We also compare Suction sampling with an absolute sampling method based on the destructive removal of turfs. 3. Sampling for durations of 16 seconds was sufficient to collect 90% of all individuals and species of grassland beetles, with less time required for the true bugs, spiders and planthoppers. The number of samples required to collect 90% of the species was more variable, although in general 55 sub-samples was sufficient for all groups, except the true bugs. Increasing sward height had a negative effect on the capture efficiency of suction sampling. 4. The assemblage structure of beetles, planthoppers and spiders was independent of the sampling method (suction or absolute) used. 5. Synthesis and applications. In contrast to other sampling methods used in grassland habitats (e.g. sweep netting or pitfall trapping), suction sampling is an effective quantitative tool for the measurement of invertebrate diversity and assemblage structure providing sward height is included as a covariate. The effective sampling of beetles, true bugs, planthoppers and spiders altogether requires a minimum sampling effort of 110 sub-samples of duration of 16 seconds. Such sampling intensities can be adjusted depending on the taxa sampled, and we provide information to minimize sampling problems associated with this versatile technique. Suction sampling should remain an important component in the toolbox of experimental techniques used during both experimental and management sampling regimes within agroecosystems, grasslands or other low-lying vegetation types.
Resumo:
Life history parameters and reproductive behaviors of the harlequin bug, Murgantia histrionica Hahn (Heteroptera: Pentatomidae), were determined. Total developmental time from egg to adult was ≈48 d. After a sexual maturation period of ≈7 d, both sexes mated repeatedly, with females laying multiple egg masses of 12 eggs at intervals of 3 d. Adult females lived an average of 41 d, whereas adult males lived an average of 25 d. Courtship and copulation activities peaked in the middle of the photophase. In mating experiments in which mixed sex pairs of virgin and previously mated bugs were combined in all possible combinations, the durations of courtship and copulation by virgin males were significantly longer with both virgin and previously mated females than the same behaviors for previously mated males. When given a choice between a virgin or previously mated female, previously mated males preferred to mate with virgin females, whereas virgin males showed no preference for virgin over previously mated females. Analyses of mating behaviors with ethograms and behavioral transition matrices suggested that a primary reason for failure to copulate by virgin males was the incorrect rotation of their pygophores to the copulation position, so that successful alignment of the genitalia could not occur.
Resumo:
This study tests predictions of the hypothesis of evolution of paternal care via sexual selection by using the Neotropical harvestman Pseudopucrolia sp. as the model organism. Females use natural cavities in roadside banks as nesting sites, which are defended by males against other males. Females leave the nests after oviposition, and all postzygotic parental care is accomplished by males, which protect the eggs and nymphs from predators. We provided artificial mud nests to individuals in the laboratory and conducted observations on the reproduction of the species. Male reproductive success was directly related to nest ownership time: the longer a male held a nest, the higher his chances of obtaining copulations. All males that succeeded in mating and obtaining one clutch eventually mated with additional females that added eggs to the clutch. Thus, desirable males were not limited to monogamy by paternal care. Experimental manipulations demonstrated that guarding males were more attractive to females than were nonguarding males and also that males guarded unrelated eggs. Finally, we found that females and nonguarding males spent more time foraging than guarding males. We use our data to contrast hypotheses on the origin and maintenance of paternal care and to provide a critical assessment of the hypothesis of the evolution of paternal care via sexual selection. (C) 2009 The Association for the Study of Animal Behaviour. Published by Elsevier Ltd. All rights reserved.
Resumo:
I consider the case for genuinely anonymous web searching. Big data seems to have it in for privacy. The story is well known, particularly since the dawn of the web. Vastly more personal information, monumental and quotidian, is gathered than in the pre-digital days. Once gathered it can be aggregated and analyzed to produce rich portraits, which in turn permit unnerving prediction of our future behavior. The new information can then be shared widely, limiting prospects and threatening autonomy. How should we respond? Following Nissenbaum (2011) and Brunton and Nissenbaum (2011 and 2013), I will argue that the proposed solutions—consent, anonymity as conventionally practiced, corporate best practices, and law—fail to protect us against routine surveillance of our online behavior. Brunton and Nissenbaum rightly maintain that, given the power imbalance between data holders and data subjects, obfuscation of one’s online activities is justified. Obfuscation works by generating “misleading, false, or ambiguous data with the intention of confusing an adversary or simply adding to the time or cost of separating good data from bad,” thus decreasing the value of the data collected (Brunton and Nissenbaum, 2011). The phenomenon is as old as the hills. Natural selection evidently blundered upon the tactic long ago. Take a savory butterfly whose markings mimic those of a toxic cousin. From the point of view of a would-be predator the data conveyed by the pattern is ambiguous. Is the bug lunch or potential last meal? In the light of the steep costs of a mistake, the savvy predator goes hungry. Online obfuscation works similarly, attempting for instance to disguise the surfer’s identity (Tor) or the nature of her queries (Howe and Nissenbaum 2009). Yet online obfuscation comes with significant social costs. First, it implies free riding. If I’ve installed an effective obfuscating program, I’m enjoying the benefits of an apparently free internet without paying the costs of surveillance, which are shifted entirely onto non-obfuscators. Second, it permits sketchy actors, from child pornographers to fraudsters, to operate with near impunity. Third, online merchants could plausibly claim that, when we shop online, surveillance is the price we pay for convenience. If we don’t like it, we should take our business to the local brick-and-mortar and pay with cash. Brunton and Nissenbaum have not fully addressed the last two costs. Nevertheless, I think the strict defender of online anonymity can meet these objections. Regarding the third, the future doesn’t bode well for offline shopping. Consider music and books. Intrepid shoppers can still find most of what they want in a book or record store. Soon, though, this will probably not be the case. And then there are those who, for perfectly good reasons, are sensitive about doing some of their shopping in person, perhaps because of their weight or sexual tastes. I argue that consumers should not have to pay the price of surveillance every time they want to buy that catchy new hit, that New York Times bestseller, or a sex toy.
Resumo:
Mesmo depois de todas as novidades tecnológicas nos últimos anos, ainda existem muitos sistemas desenvolvidos com tecnologias antigas, muitas vezes ultrapassadas e obsoletas denominados sistemas legados. O problema do bug do ano 2000 funcionou como um excelente despertador para o fato de que não podemos nos esquecer do grande número de sistemas ainda em produção, e que são importantes para a empresa. Não se pode simplesmente descartar estes sistemas e é muito difícil migrar sistemas legados rapidamente para novas plataformas. Mais ainda, as regras de negócio que regem qualquer empresa são muito complexas para poderem ser modeladas e remodeladas em poucos meses e em seguida automatizadas porque a maior dificuldade em desenvolver sistemas não é escrever código nesta ou naquela linguagem, mas entender o que o sistema deve fazer. Este trabalho enfoca uma solução possível para o problema referente à migração de sistemas legados: a tradução destes sistemas legados da forma mais automatizada possível para que possam se beneficiar das novas tecnologias existentes deve ser o resultado final produzido. Assim, o objetivo desta dissertação é a investigação do problema de migração de sistemas legados e suas soluções assim como o desenvolvimento de uma ferramenta que traduz um sistema legado escrito na linguagem COBOL para PROGRESS, visando o aproveitamento do código e principalmente o aproveitamento de soluções de análise e projeto, que exigiram bastante esforço para serem elaboradas e poderiam ser reutilizadas em novos desenvolvimentos.
Resumo:
Trypanosoma cruzi infection was evaluated in 390 resident individuals in different rural communities of Caicó municipality, State of Rio Grande do Norte (RN). Of 28 investigated communities the soroprevalence of T. cruzi infection was 2.8% in eight rural communities individuals. The epidemiological characteristics of seropositive shown that the age ranged from 22 to 64 years, being significantly raised from 31 years (90.9%). The female gender was predominant and low education degree. Those individuals reported that they never donated blood, but they had direct contact with triatomines bug. The isolation of the parasite was performed by blood culture and xenoculture methods to determine the genetic variability of the samples. Twenty seven T. cruzi isolates were analyzed by RAPD as genetic marker using three random primers (M13-40, gt11-F and L15996). The T. cruzi isolates showed 73.7% of shared bands considering the average obtained with the three primers, and were genetically well correlated. Using this marker it was possible to separate the populations of the parasite in three distinct groups. The first group composed by isolates obtained of triatomines and humans from four different districts (Caicó, Caraúbas, Serra Negra doNorte and Governador Dix-Sept Rosado); the second contained isolates obtained of triatomines of two different species (T. brasiliensis and P. lutzi) captured in Caraúbas and Serra Negra do Norte. The third grouped isolates obtained from humans of Angicos and Caicó municipalities. In different localities of distinct mesoregions, State of RN, a profile genetic well correlated was identified among all isolates and the presence of three distinct groups of the parasite circulating among vertebrate and invertebrate hosts
Resumo:
Funções de pedotransferência são regressões utilizadas para estimar atributos edáficos dependentes a partir de atributos independentes e de fácil determinação. Nesse sentido, são propostas na literatura diversas funções de pedotransferência que visam predizer a resistência do solo à penetração. Objetivou-se, portanto, com este trabalho, desenvolver e comparar a eficiência de cinco funções de pedotransferência para a curva de resistência do solo à penetração, presentes na literatura, por meio do ajuste de dados obtidos tanto com o penetrômetro de impacto (campo) quanto com o penetrômetro eletrônico (laboratório), em um Latossolo manejado sob diferentes modos (convencional e plantio direto). Foram coletadas amostras indeformadas de solo na entrelinha das culturas, nas camadas de 0-0,10, 0,10-0,20 e 0,20-0,30 m, logo após a semeadura, no florescimento e na colheita, para determinação dos atributos físico-hídricos do solo e também da resistência do solo à penetração, com o uso do penetrômetro eletrônico. A resistência do solo à penetração, obtida com o penetrômetro de impacto, foi determinada conforme a variação do conteúdo de água no solo ao longo do ciclo das culturas. As curvas ajustadas de resistência do solo à penetração tiveram a precisão e a acurácia testadas por meio de parâmetros estatísticos e foram comparadas pelo teste F. Houve sobreposição dos valores estimados pelo ajuste das curvas, evidenciando que a maneira de obtenção da resistência do solo à penetração (campo ou laboratório) não influenciou a relação entre a resistência à penetração e os atributos do solo. As equações RP = aUg b; RP = a(1-Ug)b; RP = ae bUg e RP = a + be não diferiram e foram as mais precisas e acuradas na predição da resistência do solo à penetração.
Resumo:
Many prey organisms change their phenotype to reduce the predation risk. However, such changes are associated with trade-offs, and can have negative effects on prey growth or reproduction. Understand how preys assess the predation risk is essential to evaluate the adaptive value of predator-induced phenotypic and its ecological consequences. In this study, we performed a mesocosm experiment to test: i) if growth and stoichiometry of Lithobates catesbeianus tadpoles is altered in response to giant water bug presence (Belostoma spp.); ii) if these responses depend on tadpoles density in environment. Here, we show that tadpoles growth and stoichiometry are not changed by predator presence, neither in low nor in high densities. Our results suggest that tadpoles exposed to predation risk regulate their physiology to preserve the elemental stoichiometric homeostase of their body and excretion. Further, point out to need for future studies that elucidate under what conditions growth and stoichiometry are changed in response to predation risk
Resumo:
The lace bug, Leptopharsa heveae is an insect that causes serious damage on rubber trees. In laboratory condition, the strains of Verticillium lecanii (ARSEF 6430, 6431 e 6432) and Aphanocladium album (ARSEF 6433) were tested on third-and fifth-instar nymphs and adults of L. heveae to evaluate their virulence using 2.4 x 10(5) and 2.4 x 10(7) conidia/mL. The bioassays were carried out using Petri dishes whose inner bottoms were covered with damp filter papers. Each Petri dish contained five insects and one rubber tree leaflet. The plates were covered with PVC film to provide high relative humidity, maintained at 26 +/- 0.5 degrees C and a photophase of 14 hours. The Probit analysis was calculated from mortality date of insects killed by fungi. In the highest concentrations, ARSEF 6430 was more virulent for third instar nymphs, and the LT50 was 1.9 days. For the fifth instar, the strains ARSEF 6430, 6433 and 6432 showed similar virulence with LT50 of 2.6, 2.6 and 3.2 days, respectively. For adults, ARSEF 6431 was the most virulent strain with the LT50 recorded at 2.0 days. The smallest concentration did not always cause more than 50% mortality.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
The rubber tree lace bug, Leptopharsa heveae Drake & Poor occurs in high populations in rubber tree plantations and it is a limiting factor in rubber production due to the loss of photosynthetic tissue. The control of the pest has been made mainly with chemical products, which cause environmental contamination. The alternative would be the use of biological control agents, however, information about L. heveae natural enemies are scarce. The parasitoid Erythmelus tingitiphagus (Soares) parasitize eggs of the rubber tree lace bug. The aim of this study was to verify the occurrence of E. tingitiphagus in plantations of several rubber tree clones, located in Itiquira town, Mato Grosso State. The plant leaflets of the clones RRIM 600, PR 255, GT 1, PB 235 and PB 217 were collected weekly from October 2005 to February 2006. Parasitism was recorded during the entire study period. The parasitism rate of L. heveae eggs in the different clones ranged from 16.8 to 20.6%.