Host Specificity Testing: Why Do We Do It and How We Can Do It Better

ثبت نشده
چکیده

Host specificity testing is universally used in weed biological control to predict nontarget effects of potential agents. Despite this, there is some confusion regarding the role of host specificity testing in making such predictions. One possible role is as an assay of field host range. In this case, the ideal host specificity test will simulate conditions encountered in the field, and the result (the estimated field host range) will be judged according to how accurately it matches the realized field host range. An alternative approach is to separate the description of innate host specificity (which includes fundamental host range, the relative acceptability and suitability of hosts, the ability to learn, and time dependent effects) from the prediction of how it will be expressed in the post-release environment (in terms of field host range and relative attack). In this case, host specificity testing is used to describe properties of the insect, which are then used in combination with ecological information to predict where, when, and to what extent non-target attack would occur. I argue that the latter approach is more powerful because non-target effects under any particular environmental conditions are predicted, rather than being estimated by attempting to experimentally simulate the release environment. Here I discuss this more basic approach to host specificity testing in some detail in relation to the meaning of the terms host specificity and host range, and I point out the implications of this approach for the way that we conduct host specificity testing. My approach to host testing can be divided into three steps: (1) identification of aspects of life history that need to be host-specific if the insect is to be safe for release; (2) description of the fundamental host range of the organism; and (3) if non-target species are included within the fundamental host-range, prediction of whether they will be attacked under field conditions and the frequency and severity of such attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Why we need to read and understand literature: literariness and Hans Rosling’s Factfulness (2018)

My article addresses the qualities of “good” literature and how an understanding of the nature of literary devices, so-called “literariness”, can enhance the reading experience. Focusing on Hans Rosling’s Factfulness (2018), I discuss some of the most important features of good writing. Six literary devices have been selected for special attention: point of view, tone, amplification, anecdotes,...

متن کامل

Welcome to virosphere

Viruses may seem alien, but they are the most abundant and, arguably, the most important organisms on Earth. They are found just about everywhere, from oceans and forests to the people around you and, of course, in and on you as well. This world of strange, quasi-living things has been dubbed the virosphere, and it is a mysterious one – we know less about viruses than any other life form. But t...

متن کامل

Satisfaction Function in Present Undesirable Factors

Data Envelopment Analysis (DEA) is an efficient method to perform evaluation of units. In DEA we try to evaluate units with undesirable factors in input & outputs by satisfaction function, testing some models. On the other hand benefiting this concept, we can identify non-efficient units. Also we can recognize why these units are inefficient and calculate the reason of their inefficiency and ho...

متن کامل

مدیر موفق کیست؟

Who is a really successful manager? A manager who spends less money, or the one who earns more? A manager who can survive for a longer period of time, or an administrator who expands his organization, and opens up new branches? Which one is the most successful? The article tries to answer these questions and provides, some simple guidlines for the managers in every domain of management who wan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000