949 resultados para CANDIDATE
Resumo:
The 2008 US election has been heralded as the first presidential election of the social media era, but took place at a time when social media were still in a state of comparative infancy; so much so that the most important platform was not Facebook or Twitter, but the purpose-built campaign site my.barackobama.com, which became the central vehicle for the most successful electoral fundraising campaign in American history. By 2012, the social media landscape had changed: Facebook and, to a somewhat lesser extent, Twitter are now well-established as the leading social media platforms in the United States, and were used extensively by the campaign organisations of both candidates. As third-party spaces controlled by independent commercial entities, however, their use necessarily differs from that of home-grown, party-controlled sites: from the point of view of the platform itself, a @BarackObama or @MittRomney is technically no different from any other account, except for the very high follower count and an exceptional volume of @mentions. In spite of the significant social media experience which Democrat and Republican campaign strategists had already accumulated during the 2008 campaign, therefore, the translation of such experience to the use of Facebook and Twitter in their 2012 incarnations still required a substantial amount of new work, experimentation, and evaluation. This chapter examines the Twitter strategies of the leading accounts operated by both campaign headquarters: the ‘personal’ candidate accounts @BarackObama and @MittRomney as well as @JoeBiden and @PaulRyanVP, and the campaign accounts @Obama2012 and @TeamRomney. Drawing on datasets which capture all tweets from and at these accounts during the final months of the campaign (from early September 2012 to the immediate aftermath of the election night), we reconstruct the campaigns’ approaches to using Twitter for electioneering from the quantitative and qualitative patterns of their activities, and explore the resonance which these accounts have found with the wider Twitter userbase. A particular focus of our investigation in this context will be on the tweeting styles of these accounts: the mixture of original messages, @replies, and retweets, and the level and nature of engagement with everyday Twitter followers. We will examine whether the accounts chose to respond (by @replying) to the messages of support or criticism which were directed at them, whether they retweeted any such messages (and whether there was any preferential retweeting of influential or – alternatively – demonstratively ordinary users), and/or whether they were used mainly to broadcast and disseminate prepared campaign messages. Our analysis will highlight any significant differences between the accounts we examine, trace changes in style over the course of the final campaign months, and correlate such stylistic differences with the respective electoral positioning of the candidates. Further, we examine the use of these accounts during moments of heightened attention (such as the presidential and vice-presidential debates, or in the context of controversies such as that caused by the publication of the Romney “47%” video; additional case studies may emerge over the remainder of the campaign) to explore how they were used to present or defend key talking points, and exploit or avert damage from campaign gaffes. A complementary analysis of the messages directed at the campaign accounts (in the form of @replies or retweets) will also provide further evidence for the extent to which these talking points were picked up and disseminated by the wider Twitter population. Finally, we also explore the use of external materials (links to articles, images, videos, and other content on the campaign sites themselves, in the mainstream media, or on other platforms) by the campaign accounts, and the resonance which these materials had with the wider follower base of these accounts. This provides an indication of the integration of Twitter into the overall campaigning process, by highlighting how the platform was used as a means of encouraging the viral spread of campaign propaganda (such as advertising materials) or of directing user attention towards favourable media coverage. By building on comprehensive, large datasets of Twitter activity (as of early October, our combined datasets comprise some 3.8 million tweets) which we process and analyse using custom-designed social media analytics tools, and by using our initial quantitative analysis to guide further qualitative evaluation of Twitter activity around these campaign accounts, we are able to provide an in-depth picture of the use of Twitter in political campaigning during the 2012 US election which will provide detailed new insights social media use in contemporary elections. This analysis will then also be able to serve as a touchstone for the analysis of social media use in subsequent elections, in the USA as well as in other developed nations where Twitter and other social media platforms are utilised in electioneering.
Resumo:
Genome-wide association studies (GWAS) have identified numerous common prostate cancer (PrCa) susceptibility loci. We have fine-mapped 64 GWAS regions known at the conclusion of the iCOGS study using large-scale genotyping and imputation in 25 723 PrCa cases and 26 274 controls of European ancestry. We detected evidence for multiple independent signals at 16 regions, 12 of which contained additional newly identified significant associations. A single signal comprising a spectrum of correlated variation was observed at 39 regions; 35 of which are now described by a novel more significantly associated lead SNP, while the originally reported variant remained as the lead SNP only in 4 regions. We also confirmed two association signals in Europeans that had been previously reported only in East-Asian GWAS. Based on statistical evidence and linkage disequilibrium (LD) structure, we have curated and narrowed down the list of the most likely candidate causal variants for each region. Functional annotation using data from ENCODE filtered for PrCa cell lines and eQTL analysis demonstrated significant enrichment for overlap with bio-features within this set. By incorporating the novel risk variants identified here alongside the refined data for existing association signals, we estimate that these loci now explain ∼38.9% of the familial relative risk of PrCa, an 8.9% improvement over the previously reported GWAS tag SNPs. This suggests that a significant fraction of the heritability of PrCa may have been hidden during the discovery phase of GWAS, in particular due to the presence of multiple independent signals within the same region.
Resumo:
Prostate cancer is the second most common malignancy among men worldwide. Genome-wide association studies have identified 100 risk variants for prostate cancer, which can explain approximately 33% of the familial risk of the disease. We hypothesized that a comprehensive analysis of genetic variations found within the 3' untranslated region of genes predicted to affect miRNA binding (miRSNP) can identify additional prostate cancer risk variants. We investigated the association between 2,169 miRSNPs and prostate cancer risk in a large-scale analysis of 22,301 cases and 22,320 controls of European ancestry from 23 participating studies. Twenty-two miRSNPs were associated (P<2.3×10(-5)) with risk of prostate cancer, 10 of which were within 7 genes previously not mapped by GWAS studies. Further, using miRNA mimics and reporter gene assays, we showed that miR-3162-5p has specific affinity for the KLK3 rs1058205 miRSNP T-allele, whereas miR-370 has greater affinity for the VAMP8 rs1010 miRSNP A-allele, validating their functional role. SIGNIFICANCE Findings from this large association study suggest that a focus on miRSNPs, including functional evaluation, can identify candidate risk loci below currently accepted statistical levels of genome-wide significance. Studies of miRNAs and their interactions with SNPs could provide further insights into the mechanisms of prostate cancer risk.
Resumo:
The methodology of extracting information from texts has widely been described in the current literature. However, the methodology has been developed mainly for the purposes of other fields than terminology science. In addition, the research has been English language oriented. Therefore, there are no satisfactory language-independent methods for extracting terminological information from texts. The aim of the present study is to form the basis for a further improvement of methods for extraction of terminological information. A further aim is to determine differences in term extraction between subject groups with or without knowledge of the special field in question. The study is based on the theory of terminology, and has mainly a qualitative approach. The research material consists of electronically readable specialized texts in the subject domain of maritime safety. Textbooks, conference papers, research reports and articles from professional journals in Finnish and in Russian are included. The thesis first deals with certain term extraction methods. These are manual term identification and semi-automatic term extraction, the latter of which was carried out by using three commercial computer programs. The results of term extraction were compared and the recall and precision of the methods were evaluated. The latter part of the study is dedicated to the identification of concept relations. Certain linguistic expressions, which some researchers call knowledge probes, were applied to identify concept relations. The results of the present thesis suggest that special field knowledge is an advantage in manual term identification. However, in the candidate term lists the variation between subject groups was not as remarkable as it was between individual subjects. The term extraction software tested here produces candidate term lists which can be useful, but only after some manual work. Therefore, the work emphasizes the need to further develop term extraction software. Furthermore, the analyses indicate that there are a certain number of terms which were extracted by all the subjects and the software. These terms we call core terms. As the result of the experiment on linguistic expressions which signal concept relations, a proposal of Finnish and Russian knowledge probes in the field of maritime safety was made. The main finding was that it would be useful to combine the use of knowledge probes with semi-automatic term extraction since knowledge probes usually occur in the vicinity of terms.
Resumo:
This paper proposes solutions to three issues pertaining to the estimation of finite mixture models with an unknown number of components: the non-identifiability induced by overfitting the number of components, the mixing limitations of standard Markov Chain Monte Carlo (MCMC) sampling techniques, and the related label switching problem. An overfitting approach is used to estimate the number of components in a finite mixture model via a Zmix algorithm. Zmix provides a bridge between multidimensional samplers and test based estimation methods, whereby priors are chosen to encourage extra groups to have weights approaching zero. MCMC sampling is made possible by the implementation of prior parallel tempering, an extension of parallel tempering. Zmix can accurately estimate the number of components, posterior parameter estimates and allocation probabilities given a sufficiently large sample size. The results will reflect uncertainty in the final model and will report the range of possible candidate models and their respective estimated probabilities from a single run. Label switching is resolved with a computationally light-weight method, Zswitch, developed for overfitted mixtures by exploiting the intuitiveness of allocation-based relabelling algorithms and the precision of label-invariant loss functions. Four simulation studies are included to illustrate Zmix and Zswitch, as well as three case studies from the literature. All methods are available as part of the R package Zmix, which can currently be applied to univariate Gaussian mixture models.
Resumo:
The male attractant pheromone of the scarab beetle Holotrichia reynaudi, an agricultural pest native to southern India, was extracted from abdominal glands of females with hexane and analyzed by gas chromatography– mass spectrometry. Field testing of the candidate chemicals, indole, phenol, and anisole, both alone and as binary mixtures, led us to conclude that anisole was the major component of the sex pheromone. Neither male nor female beetles were attracted to indole or phenol on their own. Similarly, when indole and anisole were combined, the attractiveness of the solution did not increase over that obtained with anisole alone. However, combination of phenol and anisole did alter the attractiveness of anisole, with fewer male beetles attracted to the binary mixture than to anisole on its own. The behavior of female beetles was not altered by any of the chemicals tested. Anisole is also the sex pheromone of H. consanguinea, making this the first known example of two melolonthine scarabs sharing the same pheromone.
Resumo:
The sex pheromone of the red banded mango caterpillar, Deanolis sublimbalis (Lepidoptera: Crambidae), a serious pest of the mango Mangifera indica (Anacardiaceae) in India and Southeast Asia and a recent invader into northern Australia, has been identified. Three candidate compounds were identified from pheromone gland extracts of female moths, using gas chromatography (GC), GC-electroantennographic detection and GC-mass spectrometric analyses, in conjunction with dimethyldisulfide derivatization. Field bioassays established that both (Z)-11-hexadecenal (Z11-16:Ald) and (3Z,6Z,9Z)-tricosatriene (3Z,6Z,9Z-23:Hy) were required for attraction of male D. sublimbalis moths, and 1,000 μg of a 1:1 mix of Z11-16:Ald and 3Z,6Z,9Z-23:Hy was more attractive to male moths than caged virgin females. However, the binary blend was only attractive when the isomeric purity of the monounsaturated aldehyde was >99%, suggesting that the (E)-isomer was inhibitory. Although (Z)-11-hexadecen-1-ol (Z11-16:OH) was tentatively identified in gland extracts, the addition of this compound to the binary blend did not increase the numbers of moths captured. The pheromone can now be used in integrated pest management strategies.
Resumo:
An urgent need exists for indicators of soil health and patch functionality in extensive rangelands that can be measured efficiently and at low cost. Soil mites are candidate indicators, but their identification and handling is so specialised and time-consuming that their inclusion in routine monitoring is unlikely. The aim of this study was to measure the relationship between patch type and mite assemblages using a conventional approach. An additional aim was to determine if a molecular approach traditionally used for soil microbes could be adapted for soil mites to overcome some of the bottlenecks associated with soil fauna diversity assessment. Soil mite species abundance and diversity were measured using conventional ecological methods in soil from patches with perennial grass and litter cover (PGL), and compared to soil from bare patches with annual grasses and/or litter cover (BAL). Soil mite assemblages were also assessed using a molecular method called terminal-restriction fragment length polymorphism (T-RFLP) analysis. The conventional data showed a relationship between patch type and mite assemblage. The Prostigmata and Oribatida were well represented in the PGL sites, particularly the Aphelacaridae (Oribatida). For T-RFLP analysis, the mite community was represented by a series of DNA fragment lengths that reflected mite sequence diversity. The T-RFLP data showed a distinct difference in the mite assemblage between the patch types. Where possible, T-RFLP peaks were matched to mite families using a reference 18S rDNA database, and the Aphelacaridae prevalent in the conventional samples at PGL sites were identified, as were prostigmatids and oribatids. We identified limits to the T-RFLP approach and this included an inability to distinguish some species whose DNA sequences were similar. Despite these limitations, the data still showed a clear difference between sites, and the molecular taxonomic inferences also compared well with the conventional ecological data. The results from this study indicated that the T-RFLP approach was effective in measuring mite assemblages in this system. The power of this technique lies in the fact that species diversity and abundance data can be obtained quickly because of the time taken to process hundreds of samples, from soil DNA extraction to data output on the gene analyser, can be as little as 4 days.
Resumo:
To remain competitive, many agricultural systems are now being run along business lines. Systems methodologies are being incorporated, and here evolutionary computation is a valuable tool for identifying more profitable or sustainable solutions. However, agricultural models typically pose some of the more challenging problems for optimisation. This chapter outlines these problems, and then presents a series of three case studies demonstrating how they can be overcome in practice. Firstly, increasingly complex models of Australian livestock enterprises show that evolutionary computation is the only viable optimisation method for these large and difficult problems. On-going research is taking a notably efficient and robust variant, differential evolution, out into real-world systems. Next, models of cropping systems in Australia demonstrate the challenge of dealing with competing objectives, namely maximising farm profit whilst minimising resource degradation. Pareto methods are used to illustrate this trade-off, and these results have proved to be most useful for farm managers in this industry. Finally, land-use planning in the Netherlands demonstrates the size and spatial complexity of real-world problems. Here, GIS-based optimisation techniques are integrated with Pareto methods, producing better solutions which were acceptable to the competing organizations. These three studies all show that evolutionary computation remains the only feasible method for the optimisation of large, complex agricultural problems. An extra benefit is that the resultant population of candidate solutions illustrates trade-offs, and this leads to more informed discussions and better education of the industry decision-makers.
Resumo:
The Internet Engineering Task Force (IETF) is currently developing the next version of the Transport Layer Security (TLS) protocol, version 1.3. The transparency of this standardization process allows comprehensive cryptographic analysis of the protocols prior to adoption, whereas previous TLS versions have been scrutinized in the cryptographic literature only after standardization. This is even more important as there are two related, yet slightly different, candidates in discussion for TLS 1.3, called draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based. We give a cryptographic analysis of the primary ephemeral Diffie–Hellman-based handshake protocol, which authenticates parties and establishes encryption keys, of both TLS 1.3 candidates. We show that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare–Rogaway model. Such a multi-stage approach is convenient for analyzing the design of the candidates, as they establish multiple session keys during the exchange. An important step in our analysis is to consider compositional security guarantees. We show that, since our multi-stage key exchange security notion is composable with arbitrary symmetric-key protocols, the use of session keys in the record layer protocol is safe. Moreover, since we can view the abbreviated TLS resumption procedure also as a symmetric-key protocol, our compositional analysis allows us to directly conclude security of the combined handshake with session resumption. We include a discussion on several design characteristics of the TLS 1.3 drafts based on the observations in our analysis.
Resumo:
Cultivated groundnut (Arachis hypogaea L.) is an agronomically and economically important oilseed crop grown extensively throughout the semi-arid tropics of Asia, Africa and Latin America. Rust (Puccinia arachidis) and late leaf spot (LLS, Phaseoisariopsis personata) are among the major diseases causing significant yield loss in groundnut. The development of varieties with high levels of resistance has been constrained by adaptation of disease isolates to resistance sources and incomplete resistance in resistant sources. Despite the wide range of morphological diversity observed in the cultivated groundnut gene pool, molecular marker analyses have thus far been unable to detect a parallel level of genetic diversity. However, the recent development of simple sequence repeat (SSR) markers presents new opportunities for molecular diversity analysis of cultivate groundnut. The current study was conducted to identify diverse disease resistant germplasm for the development of mapping populations and for their introduction into breeding programs. Twenty-three SSRs were screened across 22 groundnut genotypes with differing levels of resistance to rust and LLS. Overall, 135 alleles across 23 loci were observed in the 22 genotypes screened. Twelve of the 23 SSRs (52%) showed a high level of polymorphism, with PIC values ≥0.5. This is the first report detecting such high levels of genetic polymorphism in cultivated groundnut. Multi-dimensional scaling and cluster analyses revealed three well-separated groups of genotypes. Locus by locus AMOVA and Kruskal-Wallis one-way ANOVA identified candidate SSR loci that may be valuable for mapping rust and LLS resistance. The molecular diversity analysis presented here provides valuable information for groundnut breeders designing strategies for incorporating and pyramiding rust and late leaf spot resistances and for molecular biologists wishing to create recombinant inbred line populations to map these traits.
Resumo:
A bioassay technique was developed to test the efficacy of insecticides against potato moth (Phthorimaea operculella (Zeller)) on tomatoes. The technique tested efficacy against both larvae in mines and neonate larvae that had not yet penetrated the leaf, and explained the failure of some insecticides to control P. operculella infestations in commercial tomato crops. Neonate larvae placed on leaves of potted plants several days before treatment provided larvae for testing of insecticides against larvae in mines; other neonates were placed on leaves after treatment to test efficacy against larvae yet to penetrate the leaf. The plants were sprayed with the candidate insecticides, held for 5-7 days, and larval mortality assessed. Chlorfenapyr (100, 200 g a.i. ha-1) and abamectin (8.1 g a.i. ha-1) were effective against neonate larvae and larvae in mines. Sulprofos (720 g a.i. ha -1), methomyl (450 g a.i. ha-1) and spinosad (96 g a.i. ha-1) were effective against neonate larvae but not against larvae in mines. Methamidophos (1102 g a.i. ha-1), endosulfan (700 g a.i. ha-1) and Bacillus thuringiensis kurstaki (1000 g ha-1) had some effect against exposed larvae but little against larvae in mines. Thiodicarb (525 g a.i. ha-1), azinphos-ethyl (440 g a.i. ha -1), imidacloprid (59.5 g a.i. ha-1), hexaflumuron (50 g a.i. ha-1), methoxyfenozide (300 g a.i. ha-1) and tebufenozide (200 g a.i. ha-1) were ineffective. A field trial using chlorfenapyr (25, 50, 100, 150 and 200 g a.i. ha-1) and methamidophos (1102 g a.i. ha-1) validated the bioassay technique, with chlorfenapyr effective in reducing the numbers of larvae in mines in leaves.
Resumo:
Invasive plants are a serious threat to biodiversity. Yet, in some cases, they may play an important ecological role in heavily modified landscapes, such as where fleshy-fruited invasive plants support populations of native frugivores. How can such conservation conflicts be managed? We advocate an approach in which native fleshy-fruited plants are ranked on their ability to provide the fruit food resources for native frugivores currently being provided by invasive plants. If these native taxa are preferentially used, where ecologically appropriate, in plantings for restoration and in park and garden settings, they could help support native frugivore populations in the event of extensive invasive plant control. We develop and critically examine six approaches to selecting candidate native plant taxa: a multivariate approach based on the frugivore assemblage, a scoring model, and several multivariate approaches (including trait combinations having the greatest correlation with the diet of the native frugivore assemblage) based on the functional traits of fruit morphology, phenology, conspicuousness, and accessibility. To illustrate these approaches, we use a case study with Bitou bush (Chrysanthemoides monilifera subsp. rotundata) (Asteraceae), an Australian Weed of National Significance. The model using a dissimilarity value generated from all available traits identified a set of species used by the frugivores of C. monilifera more than null models. A replacement approach using species ranked by either all traits available or the frugivore community appears best suited to guide selection of plants in restoration practice.
Resumo:
This study examined the fundamental question of what really matters when selecting a new employee. The study focused on tacit knowledge used by personnel recruiters when interviewing employees. Knowledge was defined as the best view available, which helps one not to act haphazardly. Tacit knowledge was also defined as a positive concept, and it was seen as a part of personnel recruiters` improving proficiency. The research topic was chosen based on the observed increase in the amount of employment interviews and their importance in society. As recruiting is becoming a more distinct profession, it was reasonable to approach the topic from an educational point of view. The following research problems guided the examination of the phenomenon: 1) Where does the interviewer seek tacit knowledge from during the employment interview? 2) How is tacit knowledge achieved during the employment interview? 3) How does the interviewer defend the significance of the tacit knowledge gained as knowledge that has influence on the selection decision? The research data was collected by interviewing six personnel recruiters who conduct and evaluate employment interviews as part of their work responsibilities. The interview themes were linked to some recently made selection decision in each organization and the preceding employment interview with the selected candidate. In order to conceptualize tacit knowledge, reflective consideration of the interview event was used in the study. The lettered research data was analyzed inductively. As a result of the study, the objects of tacit knowledge in the context of an employment interview culminated into three areas: the applicant s verbal communication, the applicant s non-verbal communication and the interaction between interview participants. Observations directed toward those objects were shown to be intentional and three schemes were found behind them: experiences from previous interviews, applicant s application papers and the aptitude for the work responsibilities. The question of gaining knowledge was answered with the concept of procedural knowledge. Personnel recruiters were found to have four different, but interconnected ways to encounter knowledge during an employment interview: understanding, evaluative, revealing, and approving knowing. In order to explain the importance given to tacit knowledge, it was examined in connection with the most prevalent practices in the personnel selection industry. The significance of knowledge as the kind of knowledge that has an impact on the decision was supported by references to collective opinion (other people agree with it), circumstance (interview s short duration), or using some instrument (structured interview). The study revealed new aspects of employment selection process through examining tacit knowledge. The characteristics of the inductive analysis of the research data may also be utilized, when applicable, in tacit knowledge research within other contexts.
Resumo:
Weed biocontrol relies on host specificity testing, usually carried out under quarantine conditions to predict the future host range of candidate control agents. The predictive power of host testing can be scrutinised directly with Aconophora compressa, previously released against the weed Lantana camara L. (lantana) because its ecology in its new range (Australia) is known and includes the unanticipated use of several host species. Glasshouse based predictions of field host use from experiments designed a posteriori can therefore be compared against known field host use. Adult survival, reproductive output and egg maturation were quantified. Adult survival did not differ statistically across the four verbenaceous hosts used in Australia. Oviposition was significantly highest on fiddlewood (Citharexylum spinosum L.), followed by lantana, on which oviposition was significantly higher than on two varieties of Duranta erecta (‘‘geisha girl’’ and ‘‘Sheena’s gold’’; all Verbenaceae). Oviposition rates across Duranta varieties were not significantly different from each other but were significantly higher than on the two non-verbenaceous hosts (Jacaranda mimosifolia D. Don: Bignoneaceae (jacaranda) and Myoporum acuminatum R. Br.: Myoporaceae (Myoporum)). Production of adult A. compressa was modelled across the hosts tested. The only major discrepancy between model output and their relative abundance across hosts in the field was that densities on lantana in the field were much lower than predicted by the model. The adults may, therefore, not locate lantana under field conditions and/or adults may find lantana but leave after laying relatively few eggs. Fiddlewood is the only primary host plant of A. compressa in Australia, whereas lantana and the others are used secondarily or incidentally. The distinction between primary, secondary and incidental hosts of a herbivore species helps to predict the intensity and regularity of host use by that herbivore. Populations of the primary host plants of a released biological control agent are most likely to be consistently impacted by the herbivore, whereas secondary and incidental host plant species are unlikely to be impacted consistently. As a consequence, potential biocontrol agents should be released only against hosts to which they have been shown to be primarily adapted.