876 resultados para digital tools and resources


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Capacity analysis using simulation is not a new thing in literature. Most of the development process of UMTS standardization have used simulation tools; however, we thing that the use of GIS planning tools and matrix manipulation capacity of MATLAB can show us different scenarios and make a more realistic analysis. Some work is been doing in COST 273 in order to have more realistic scenarios for UMTS planning. Our work initially was centered in uplink analysis, but we are now working in downlink analysis, specifically in two areas: capacity in number of users for RT and NRT services, and Node B power. In this work we will show results for up-link capacity and some results for downlink capacity and BS power consumption.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Advances in digital photography and distribution technologies enable many people to produce and distribute images of their sex acts. When teenagers do this, the photos and videos they create can be legally classified as child pornography since the law makes no exception for youth who create sexually explicit images of themselves. The dominant discussions about teenage girls producing sexually explicit media (including sexting) are profoundly unproductive: (1) they blame teenage girls for creating private images that another person later maliciously distributed and (2) they fail to respect—or even discuss—teenagers’ rights to freedom of expression. Cell phones and the internet make producing and distributing images extremely easy, which provide widely accessible venues for both consensual sexual expression between partners and for sexual harassment. Dominant understandings view sexting as a troubling teenage trend created through the combination of camera phones and adolescent hormones and impulsivity, but this view often conflates consensual sexting between partners with the malicious distribution of a person’s private image as essentially equivalent behaviors. In this project, I ask: What is the role of assumptions about teen girls’ sexual agency in these problematic understandings of sexting that blame victims and deny teenagers’ rights? In contrast to the popular media panic about online predators and the familiar accusation that youth are wasting their leisure time by using digital media, some people champion the internet as a democratic space that offers young people the opportunity to explore identities and develop social and communication skills. Yet, when teen girls’ sexuality enters this conversation, all this debate and discussion narrows to a problematic consensus. The optimists about adolescents and technology fall silent, and the argument that media production is inherently empowering for girls does not seem to apply to a girl who produces a sexually explicit image of herself. Instead, feminist, popular, and legal commentaries assert that she is necessarily a victim: of a “sexualized” mass media, pressure from her male peers, digital technology, her brain structures or hormones, or her own low self-esteem and misplaced desire for attention. Why and how are teenage girls’ sexual choices produced as evidence of their failure or success in achieving Western liberal ideals of self-esteem, resistance, and agency? Since mass media and policy reactions to sexting have so far been overwhelmingly sexist and counter-productive, it is crucial to interrogate the concepts and assumptions that characterize mainstream understandings of sexting. I argue that the common sense that is co-produced by law and mass media underlies the problematic legal and policy responses to sexting. Analyzing a range of nonfiction texts including newspaper articles, talk shows, press releases, public service announcements, websites, legislative debates, and legal documents, I investigate gendered, racialized, age-based, and technologically determinist common sense assumptions about teenage girls’ sexual agency. I examine the consensus and continuities that exist between news, nonfiction mass media, policy, institutions, and law, and describe the limits of their debates. I find that this early 21st century post-feminist girl-power moment not only demands that girls live up to gendered sexual ideals but also insists that actively choosing to follow these norms is the only way to exercise sexual agency. This is the first study to date examining the relationship of conventional wisdom about digital media and teenage girls’ sexuality to both policy and mass media.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

“Multiraciality Enters the University: Mixed Race Identity and Knowledge Production in Higher Education,” explores how the category of “mixed race” has underpinned university politics in California, through student organizing, admissions debates, and the development of a new field of study. By treating the concept of privatization as central to both multiraciality and the neoliberal university, this project asks how and in what capacity has the discourses of multiracialism and the growing recognition of mixed race student populations shaped administrative, social, and academic debates at the state’s flagship universities—the University of California at Berkeley and Los Angeles. This project argues that the mixed race population symbolizing so-called “post-racial societies” is fundamentally attached to the concept of self-authorship, which can work to challenge the rights and resources for college students of color. Through a close reading of texts, including archival materials, policy and media debates, and interviews, I assert that the contemporary deployment of mixed race within the US academy represents a particularly post-civil rights development, undergirded by a genealogy of U.S. liberal individualism. This project ultimately reveals the pressing need to rethink ways to disrupt institutionalized racism in the new millennium.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Nigerian scam, also known as advance fee fraud or 419 scam, is a prevalent form of online fraudulent activity that causes financial loss to individuals and businesses. Nigerian scam has evolved from simple non-targeted email messages to more sophisticated scams targeted at users of classifieds, dating and other websites. Even though such scams are observed and reported by users frequently, the community’s understanding of Nigerian scams is limited since the scammers operate “underground”. To better understand the underground Nigerian scam ecosystem and seek effective methods to deter Nigerian scam and cybercrime in general, we conduct a series of active and passive measurement studies. Relying upon the analysis and insight gained from the measurement studies, we make four contributions: (1) we analyze the taxonomy of Nigerian scam and derive long-term trends in scams; (2) we provide an insight on Nigerian scam and cybercrime ecosystems and their underground operation; (3) we propose a payment intervention as a potential deterrent to cybercrime operation in general and evaluate its effectiveness; and (4) we offer active and passive measurement tools and techniques that enable in-depth analysis of cybercrime ecosystems and deterrence on them. We first created and analyze a repository of more than two hundred thousand user-reported scam emails, stretching from 2006 to 2014, from four major scam reporting websites. We select ten most commonly observed scam categories and tag 2,000 scam emails randomly selected from our repository. Based upon the manually tagged dataset, we train a machine learning classifier and cluster all scam emails in the repository. From the clustering result, we find a strong and sustained upward trend for targeted scams and downward trend for non-targeted scams. We then focus on two types of targeted scams: sales scams and rental scams targeted users on Craigslist. We built an automated scam data collection system and gathered large-scale sales scam emails. Using the system we posted honeypot ads on Craigslist and conversed automatically with the scammers. Through the email conversation, the system obtained additional confirmation of likely scam activities and collected additional information such as IP addresses and shipping addresses. Our analysis revealed that around 10 groups were responsible for nearly half of the over 13,000 total scam attempts we received. These groups used IP addresses and shipping addresses in both Nigeria and the U.S. We also crawled rental ads on Craigslist, identified rental scam ads amongst the large number of benign ads and conversed with the potential scammers. Through in-depth analysis of the rental scams, we found seven major scam campaigns employing various operations and monetization methods. We also found that unlike sales scammers, most rental scammers were in the U.S. The large-scale scam data and in-depth analysis provide useful insights on how to design effective deterrence techniques against cybercrime in general. We study underground DDoS-for-hire services, also known as booters, and measure the effectiveness of undermining a payment system of DDoS Services. Our analysis shows that the payment intervention can have the desired effect of limiting cybercriminals’ ability and increasing the risk of accepting payments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Relatório de Estágio apresentado à Escola Superior de Educação do Instituto Politécnico de Castelo Branco para cumprimento dos requisitos necessários à obtenção do grau de Mestre em Educação Pré-Escolar e Ensino do 1º Ciclo do Ensino Básico.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Biobanks represent key resources for clinico-genomic research and are needed to pave the way to personalised medicine. To achieve this goal, it is crucial that scientists can securely access and share high-quality biomaterial and related data. Therefore, there is a growing interest in integrating biobanks into larger biomedical information and communication technology (ICT) infrastructures. The European project p-medicine is currently building an innovative ICT infrastructure to meet this need. This platform provides tools and services for conducting research and clinical trials in personalised medicine. In this paper, we describe one of its main components, the biobank access framework p-BioSPRE (p-medicine Biospecimen Search and Project Request Engine). This generic framework enables and simplifies access to existing biobanks, but also to offer own biomaterial collections to research communities, and to manage biobank specimens and related clinical data over the ObTiMA Trial Biomaterial Manager. p-BioSPRE takes into consideration all relevant ethical and legal standards, e.g., safeguarding donors’ personal rights and enabling biobanks to keep control over the donated material and related data. The framework thus enables secure sharing of biomaterial within open and closed research communities, while flexibly integrating related clinical and omics data. Although the development of the framework is mainly driven by user scenarios from the cancer domain, in this case, acute lymphoblastic leukaemia and Wilms tumour, it can be extended to further disease entities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This dissertation research points out major challenging problems with current Knowledge Organization (KO) systems, such as subject gateways or web directories: (1) the current systems use traditional knowledge organization systems based on controlled vocabulary which is not very well suited to web resources, and (2) information is organized by professionals not by users, which means it does not reflect intuitively and instantaneously expressed users’ current needs. In order to explore users’ needs, I examined social tags which are user-generated uncontrolled vocabulary. As investment in professionally-developed subject gateways and web directories diminishes (support for both BUBL and Intute, examined in this study, is being discontinued), understanding characteristics of social tagging becomes even more critical. Several researchers have discussed social tagging behavior and its usefulness for classification or retrieval; however, further research is needed to qualitatively and quantitatively investigate social tagging in order to verify its quality and benefit. This research particularly examined the indexing consistency of social tagging in comparison to professional indexing to examine the quality and efficacy of tagging. The data analysis was divided into three phases: analysis of indexing consistency, analysis of tagging effectiveness, and analysis of tag attributes. Most indexing consistency studies have been conducted with a small number of professional indexers, and they tended to exclude users. Furthermore, the studies mainly have focused on physical library collections. This dissertation research bridged these gaps by (1) extending the scope of resources to various web documents indexed by users and (2) employing the Information Retrieval (IR) Vector Space Model (VSM) - based indexing consistency method since it is suitable for dealing with a large number of indexers. As a second phase, an analysis of tagging effectiveness with tagging exhaustivity and tag specificity was conducted to ameliorate the drawbacks of consistency analysis based on only the quantitative measures of vocabulary matching. Finally, to investigate tagging pattern and behaviors, a content analysis on tag attributes was conducted based on the FRBR model. The findings revealed that there was greater consistency over all subjects among taggers compared to that for two groups of professionals. The analysis of tagging exhaustivity and tag specificity in relation to tagging effectiveness was conducted to ameliorate difficulties associated with limitations in the analysis of indexing consistency based on only the quantitative measures of vocabulary matching. Examination of exhaustivity and specificity of social tags provided insights into particular characteristics of tagging behavior and its variation across subjects. To further investigate the quality of tags, a Latent Semantic Analysis (LSA) was conducted to determine to what extent tags are conceptually related to professionals’ keywords and it was found that tags of higher specificity tended to have a higher semantic relatedness to professionals’ keywords. This leads to the conclusion that the term’s power as a differentiator is related to its semantic relatedness to documents. The findings on tag attributes identified the important bibliographic attributes of tags beyond describing subjects or topics of a document. The findings also showed that tags have essential attributes matching those defined in FRBR. Furthermore, in terms of specific subject areas, the findings originally identified that taggers exhibited different tagging behaviors representing distinctive features and tendencies on web documents characterizing digital heterogeneous media resources. These results have led to the conclusion that there should be an increased awareness of diverse user needs by subject in order to improve metadata in practical applications. This dissertation research is the first necessary step to utilize social tagging in digital information organization by verifying the quality and efficacy of social tagging. This dissertation research combined both quantitative (statistics) and qualitative (content analysis using FRBR) approaches to vocabulary analysis of tags which provided a more complete examination of the quality of tags. Through the detailed analysis of tag properties undertaken in this dissertation, we have a clearer understanding of the extent to which social tagging can be used to replace (and in some cases to improve upon) professional indexing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

"Behind the world of virtual university is more than a method or system of work, you need to own, develop and master a connectivity structure of both technological and content development in multimedia digital text and then implement teaching methods line. "

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure Multi-party Computation (MPC) enables a set of parties to collaboratively compute, using cryptographic protocols, a function over their private data in a way that the participants do not see each other's data, they only see the final output. Typical MPC examples include statistical computations over joint private data, private set intersection, and auctions. While these applications are examples of monolithic MPC, richer MPC applications move between "normal" (i.e., per-party local) and "secure" (i.e., joint, multi-party secure) modes repeatedly, resulting overall in mixed-mode computations. For example, we might use MPC to implement the role of the dealer in a game of mental poker -- the game will be divided into rounds of local decision-making (e.g. bidding) and joint interaction (e.g. dealing). Mixed-mode computations are also used to improve performance over monolithic secure computations. Starting with the Fairplay project, several MPC frameworks have been proposed in the last decade to help programmers write MPC applications in a high-level language, while the toolchain manages the low-level details. However, these frameworks are either not expressive enough to allow writing mixed-mode applications or lack formal specification, and reasoning capabilities, thereby diminishing the parties' trust in such tools, and the programs written using them. Furthermore, none of the frameworks provides a verified toolchain to run the MPC programs, leaving the potential of security holes that can compromise the privacy of parties' data. This dissertation presents language-based techniques to make MPC more practical and trustworthy. First, it presents the design and implementation of a new MPC Domain Specific Language, called Wysteria, for writing rich mixed-mode MPC applications. Wysteria provides several benefits over previous languages, including a conceptual single thread of control, generic support for more than two parties, high-level abstractions for secret shares, and a fully formalized type system and operational semantics. Using Wysteria, we have implemented several MPC applications, including, for the first time, a card dealing application. The dissertation next presents Wys*, an embedding of Wysteria in F*, a full-featured verification oriented programming language. Wys* improves on Wysteria along three lines: (a) It enables programmers to formally verify the correctness and security properties of their programs. As far as we know, Wys* is the first language to provide verification capabilities for MPC programs. (b) It provides a partially verified toolchain to run MPC programs, and finally (c) It enables the MPC programs to use, with no extra effort, standard language constructs from the host language F*, thereby making it more usable and scalable. Finally, the dissertation develops static analyses that help optimize monolithic MPC programs into mixed-mode MPC programs, while providing similar privacy guarantees as the monolithic versions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis examines digital technologies policies designed for Australian schools and the ways they are understood and interpreted by students, school staff, teachers, principals and policy writers. This study explores the ways these research participant groups interpret and understand the ‘ethical dimension’ of schools’ digital technologies policies for teaching and learning. In this thesis the ethical dimension is considered to be a dynamic concept which encompasses various elements including; decisions, actions, values, issues, debates, education, discourses, and notions of right and wrong, in relation to ethics and uses of digital technologies in schools. In this study policy is taken to mean not only written texts but discursive processes, policy documents including national declarations, strategic plans and ‘acceptable use’ policies to guide the use of digital technologies in schools. The research is situated in the context of changes that have occurred in Australia and internationally over the last decade that have seen a greater focus on the access to and use of digital technologies in schools. In Australian school education, the attention placed on digital technologies in schools has seen the release of policies at the national, state, territory, education office and school levels, to guide their use. Prominent among these policies has been the Digital Education Revolution policy, launched in 2007 and concluded in 2013. This research aims to answers the question: What does an investigation reveal about understandings of the ethical dimension of digital technologies policies and their implementation in school education? The objective of this research is to examine the ethical dimension of digital technologies policies and to interpret and understand the responses of the research participants to the issues, silences, discourses and language, which characterise this dimension. In doing so, it is intended that the research can allow the participants to have a voice that, may be different to the official discourses located in digital technologies policies. The thesis takes a critical and interpretative approach to policies and examines the role of digital technologies policies as discourse. Interpretative theory is utilised as it provides a conceptual lens from which to interpret different perspectives and the implications of these in the construction of meaning in relation to schools’ digital technologies policies. Critical theory is used in tandem with interpretative theory as it represents a conceptual basis from which to critique and question underlying assumptions and discourses that are associated with the ethical dimension of schools’ digital technologies policies. The research methods used are semi-structured interviews and policy document analysis. Policies from the national, state, territory, education office and school level were analysed and contribute to understanding the way the ethical dimension of digital technologies policies is represented as a discourse. Students, school staff, teachers, principals and policy writers participated in research interviews and their views and perspectives were canvassed in relation to the ethical use of digital technologies and the policies that are designed to regulate their use. The thesis presents an argument that the ethical dimension of schools’ digital technologies policies and use is an under-researched area, and there are gaps in understanding and knowledge in the literature which remain to be addressed. It is envisaged that the thesis can make a meaningful contribution to understand the ways in which schools’ digital technologies policies are understood in school contexts. It is also envisaged that the findings from the research can inform policy development by analysing the voices and views of those in schools. The findings of the policy analysis revealed that there is little attention given to the ethical dimension in digital technologies at the national level. A discourse of compliance and control pervades digital technologies policies from the state, education office and school levels, which reduces ethical considerations to technical, legal and regulatory requirements. The discourse is largely instrumentalist and neglects the educative dimension of digital technologies which has the capacity to engender their ethical use. The findings from the interview conversations revealed that students, school staff and teachers perceive digital technologies policies to be difficult to understand, and not relevant to their situation and needs. They also expressed a desire to have greater consultation and participation in the formation and enactment of digital technologies policies, and they believe they are marginalised from these processes in their schools. Arising from the analysis of the policies and interview conversations, an argument is presented that in the light of the prominent role played by digital technologies and their potential for enhancing all aspects of school education, more research is required to provide a more holistic and richer understanding of the policies that are constructed to control and mediate their use.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: To investigate the knowledge and use of asthma control measurement (ACM) tools in the management of asthma among doctors working in family and internal medicine practice in Nigeria. Method: A questionnaire based on the global initiative on asthma (GINA) guideline was self-administered by 194 doctors. It contains 12 test items on knowledge of ACM tools and its application. The knowledge score was obtained by adding the correct answers and classified as good if the score ≥ 9, satisfactory if score was 6-8 and poor if < 6. Results: The overall doctors knowledge score of ACM tools was 4.49±2.14 (maximum of 12). Pulmonologists recorded the highest knowledge score of 10.75±1.85. The majority (69.6%) had poor knowledge score of ACM tools. Fifty (25.8%) assessed their patients’ level of asthma control and 34(17.5%) at every visit. Thirty-nine (20.1%) used ACM tools in their consultation, 29 (15.0%) of them used GINA defined control while 10 (5.2 %) used asthma control test (ACT). The use of the tools was associated with pulmonologists, having attended CME within six months and graduated within five years prior to the survey. Conclusion: The results highlight the poor knowledge and use of ACM tools and the need to address the knowledge gap.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La presente tesis “Estudio de la versión digital de Diario El Tiempo: análisis y propuesta de innovación” tiene como objetivo analizar el sitio web de Diario El Tiempo de Cuenca para comprobar si cumple las expectativas y necesidades de los usuarios, revisar si aprovecha las posibilidades multimedia del mundo digital, y por último, presentar una propuesta para mejorar la edición digital. En el Capítulo I se revisan los conceptos generales de comunicación y periodismo digital, y sus máximos referentes a nivel mundial. El Capítulo II describe brevemente la historia del periodismo en el Ecuador, los sitios web de los principales medios impresos del país, y las nuevas narrativas multimedia. El Capítulo III analiza las características de eltiempo.com.ec, como el diseño, contenido, usabilidad, accesibilidad, arquitectura de información, recursos audiovisuales y multimedia, interacción comunicativa con los usuarios, redes sociales, por último lo compara con otros medios digitales como El Comercio y El Mercurio. El Capítulo IV muestra los resultados de la encuesta realizada para conocer el nivel de aceptación del sitio entre los internautas. Finalmente, el Capítulo V presenta una propuesta de innovación para el sitio y el personal que trabaja en la elaboración de contenidos y mantenimiento del sitio, junto a un manual de redacción web y uso de redes sociales.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O Serviço de Referência (SR), incorporando na sua organização, funcionamento e comunicação com o utilizador um conjunto de potencialidades proporcionadas pela tecnologia, assume um papel fundamental na luta contra a desigualdade e o analfabetismo digital, no fomento da literacia da informação e na criação de conhecimento. A percepção do valor e das fragilidades do SR nas bibliotecas públicas em Portugal levanta a questão sobre como contribuir para o seu desenvolvimento. A presente investigação, visando a construção de alicerces numa perspectiva de evolução, parte da análise de documentos orientadores internacionais da RUSA/ALA (Reference and User Services Association / American Library Association) e da IFLA (International Federation of Library Association) e da observação de características estruturais da Rede Nacional de Biblioteca Públicas (RNBP), para a concepção de soluções de desenvolvimento do SR a aplicar a esta realidade concreta. Seguindo um paradigma compreensivo indutivo, com uma orientação baseada na Grounded Theory, esta pesquisa privilegia o contexto da descoberta e a construção de uma teoria. No plano empírico cumpre uma complementaridade de técnicas qualitativas e quantitativas, com recurso a uma triangulação metodológica. O campo de análise abrange a totalidade das bibliotecas públicas portuguesas integradas na RNBP em Portugal. Visando aspectos funcionais e materiais, são analisados dados preexistentes e aplicadas técnicas de observação directa e inquérito por questionário. Visando aspectos sociais, são efectuadas seis entrevistas semi-estruturadas. Os resultados apontam para uma situação de estagnação das bibliotecas da RNBP e para um funcionamento não estruturado e informal do SR, na maioria dos casos em que se verifica a sua disponibilização. Fundamentada a necessidade de evolução, e do investimento que nele possa ser feito, é construído um modelo, seguindo uma estratégia por níveis, flexíveis e adaptáveis às necessidades e aos recursos de cada biblioteca, que visa o desenvolvimento incremental e congruente daquele serviço; Abstract: The Reference Service in public libraries in Portugal. Development model from international guidelines. Incorporating in its organization, procedures and communication with the users a set of tools brought by technology, Reference Service (RS) plays a key role in the struggle against inequality and digital illiteracy, promoting information literacy and creating knowledge. The perception of the value of RS and the weaknesses in public libraries in Portugal raise the question on how to contribute to its development. In order to build RS foundations on an evolutionary perspective, this research analyzes RUSA / ALA (Reference and User Services Association / American Library Association) and IFLA (International Federation of Library Association) international guidelines and the structural characteristics of the Portuguese National Public Library Network (RNBP), with the objective of creating a solution for the development of that service to be applied to this reality. Following an inductive comprehensive paradigm, with an orientation based on Grounded Theory, this research focuses on the context of discovery and the construction of a theory. Empirically it fulfils complementary qualitative and quantitative techniques, using a methodological triangulation. The field of analysis covers Portuguese public libraries integrating the RNBP. Aiming at functional and material aspects, direct observation techniques and a survey by questionnaire are applied. Targeting social aspects, six semistructured interviews are carried out. The results point to a situation of stagnation in the RNBP as well as the unstructured and informal performance of the SR, which justifies the need for evolution and investment. A model is constructed, following a strategy based on levels, flexible and adaptable to the needs and resources of each library, with the perspective of an incremental and consistent development of this service.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In 2013, a series of posters began appearing in Washington, DC’s Metro system. Each declared “The internet: Your future depends on it” next to a photo of a middle-aged black Washingtonian, and an advertisement for the municipal government’s digital training resources. This hopeful discourse is familiar but where exactly does it come from? And how are our public institutions reorganized to approach the problem of poverty as a problem of technology? The Clinton administration’s ‘digital divide’ policy program popularized this hopeful discourse about personal computing powering social mobility, positioned internet startups as the ‘right’ side of the divide, and charged institutions of social reproduction such as schools and libraries with closing the gap and upgrading themselves in the image of internet startups. After introducing the development regime that builds this idea into the urban landscape through what I call the ‘political economy of hope’, and tracing the origin of the digital divide frame, this dissertation draws on three years of comparative ethnographic fieldwork in startups, schools, and libraries to explore how this hope is reproduced in daily life, becoming the common sense that drives our understanding of and interaction with economic inequality and reproduces that inequality in turn. I show that the hope in personal computing to power social mobility becomes a method of securing legitimacy and resources for both white émigré technologists and institutions of social reproduction struggling to understand and manage the persistent poverty of the information economy. I track the movement of this common sense between institutions, showing how the political economy of hope transforms them as part of a larger development project. This dissertation models a new, relational direction for digital divide research that grounds the politics of economic inequality with an empirical focus on technologies of poverty management. It demands a conceptual shift that sees the digital divide not as a bug within the information economy, but a feature of it.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fungal fruit rots and insect pests are among the most important problems negatively affecting the yield and quality of mid-Atlantic wine. In pathogenicity trials of fungi recovered from diseased Chardonnay and Vidal blanc grapes, Alternaria alternata, Pestalotiopsis telopeae, and Aspergillus japonicus were found to be unreported fruit rot pathogens in the region. Additionally, P. telopeae and A. japonicus had comparable virulence to the region’s common fruit rot pathogens. Furthermore, a timed-exclusion field study was implemented to evaluate vineyard insect-fruit rot relationships. It was found that clusters exposed to early-season insect communities that included Paralobesia viteana had a significantly greater incidence of sour rot than clusters protected from insects all season. These results were contrary to the current assumption that fall insects are the primary drivers of sour rot in the region. This research provides diagnostic tools and information to develop management-strategies against fungal and insect pests for mid-Atlantic grape growers.