Thematic, Demand-driven Sampling: Economics of Three Strategies David E. Schindel, Executive Board Chairman Scientific Collections International (SciColl) National Museum of Natural History Smithsonian Institution

[email protected]

Investments in collected specimens What do we invest in each specimen? – Costs of: Permitting, collecting, transporting; Preparing, cataloging, curating; Providing suitable environmental conditions, security; Digitizing, mobilizing data; and Loan transactions, hosting visitors.

What returns do we get from investments? – Citations in publications

Is our mission to maximize ROI? Decisions on: – What to collect (Where? When? How many?) – How much destructive sampling? – What to keep? (Whole vouchers? Tissue?) – What to trade? (Specialized centers versus global coverage?) – What to deaccession?

Predicting likelihood of future demand

Three Collecting Strategies Insect Traps: • Many samples • Many samples/species • Low phylogenetic distance

Salle, Arthofer, Lieutier, Stauffer and Kerdelhue, 2007, Phylogeography of a host-specific insect: genetic structure of Ips typographus in Europe does not reflect past fragmentation of its host, Biological Journal of the Linnean Society 90: 239– 246.

Salle, Arthofer, Lieutier, Stauffer and Kerdelhue, 2007, Phylogeography of a host-specific insect: genetic structure of Ips typographus in Europe does not reflect past fragmentation of its host, Biological Journal of the Linnean Society 90: 239– 246.

Three Collecting Strategies Insect Traps: • Many samples • Many samples/species • Low phylogenetic distance Barcode of Wildlife Project: • Limited number of samples • Standard samples/species • Moderate phylogenetic distance

Barcode of Wildlife on Google+

BWP Goals Working with six Partner Countries: Demonstrate use of DNA barcode evidence in investigations, prosecutions; first convictions in Kenya Construct a reference BARCODE library to support Partner Country priorities – 200 Priority Endangered Species per country – 800 closely related/look-alike species

Partner Countries will formally adopt, implement and ‘mainstream’ DNA barcoding

Priority Species Viewer

http://www.barcodeofwildlife.org/priority_species.html

Required Elements for BARCODE Taxonomic identification to species Voucher specimen ID in Darwin Core Triplet format Name of barcode region Country/Ocean/Sea of origin Minimum sequence length and quality Forward and reverse 2 trace files in NCBI Forward/reverse primer sequences, names

Required BWP Data/Metadata Additional datafields in GenBank for BWP: – Name of identifier – Date of identification – Type status of voucher specimen – Basis of identification – Confidence level – Collected under chain of custody? (Y/N)

Basis of Identification The type of information used: – Overall similarity – Diagnostic characters – DNA BARCODE comparison

The form of the identified voucher specimen: – Living organism: Juvenile/Immature – Preserved specimen: Incomplete adult – Digital Image: Complete adult

The references against which the voucher specimen was compared

Levels of Confidence High confidence: There is an extremely high probability that the species-level identification is correct. This level of confidence can be entered only by professional taxonomists with experience in the group to which the voucher specimen has been assigned. Only well-preserved voucher specimens that display diagnostic features can be assigned to this level of confidence. Medium confidence: There is a high probability that the genus-level identification is correct but a lower likelihood that the species-level identification is correct. Experienced nonprofessionals can assign this level of confidence after making comparisons with taxonomic publications. Preliminary identification: The genus and species names are uncertain and a more expert identification is needed.

Scientific Collections International Infectious Diseases, Food Security

Published March 2015

Published January 2016

Stressors and Drivers of Food Security: Evidence from Scientific Collections 19-21 September 2016, Beltsville, MD

www.scicoll.org

Three Collecting Strategies Insect Traps: • Many samples • Many samples/species • Low phylogenetic distance Barcode of Wildlife Project: • Limited number of samples • Standard samples/species • Moderate phylogenetic distance Submersibles: • Few samples • Few samples/species • High phylogenetic distance

Phylogenetic Diversity (branch length)

Collecting Cost per Specimen

Cost of Sampling Genetic Variability Submersibles

Barcode of Wildlife Project

Insect Traps

Specimens per species/higher taxonomic unit

Leray and Knowlton, 2015, DNA barcoding and metabarcoding of standardized samples reveal patterns of marine benthic diversity, PNAS 112(7): 2076–2081

Vacant Dataspace

Crowded Dataspace

Per specimen sampling cost

Communities of Samplers

Submersibles

Barcode of Wildlife Project

Insect Traps

Per specimen likelihood of re-use

Schindel GGBN Berlin keynote 22 Jun 16.pdf

There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Schindel GGBN ...

3MB Sizes 3 Downloads 164 Views

Recommend Documents

keynote YDP.pdf
Sign in. Loading… Page 1. Whoops! There was a problem loading more pages. Retrying... keynote YDP.pdf. keynote YDP.pdf. Open. Extract. Open with. Sign In.

Deployment Keynote
9th & 10th grade campus. Over 50% economically disadvantaged. 2013-2014 Enrollment: 1157. 2014-2015 Enrollment: 1220. iPads deployed to all students in 2013-2014, 9th graders only. 2014-2015. Approximately 50 students per school year opted to not tak

Jun 2014
The Board selects Comerica Bank as its financial institution. b. The Board ... regulations as published in the MHSAA's BULLETIN and current. HANDBOOK and shall .... of a term note (the “Note”) which will be financed in compliance with the ...

Jun-16
(c) Community Based Disaster Management. 8. What is disaster management ? Explain the disaster management process in mountainous areas. 20. MEDS-043.

Jun 2014
Motion: BE IT RESOLVED that the Public School Academies of Detroit approves the agenda as presented and approves the Minutes from the April 17, 2014 ...

Jun-16
processes of management of various natural resources. 20. 2. Explain the third ... (c) Community Based Disaster Management. 8. What is disaster management ...

IHI 2010 Keynote
Nov 11, 2010 - Early emphasis on “doc in the box” e.g. diagnosis programs. Heavy use of ... to capture the expertise of just one man, Jack D. Myers, MD. Dxplain uses modified ... Inventor makes no effort to disseminate. Not interfaced ...

Jun-14
Define "Human Resource Information System. (HRIS)" and throw some light on the key points that are vital for the usefulness and effectivity of the information. 20.

Jun-15
P.G. DIPLOMA IN INFORMATION SECURITY. (PGDIS). Term-End Examination. June, 2015. MSEI-023 : CYBER SECURITY. Time : 2 hours ... Do you think that companies often under value 10 ... develop an effective security policy within the.

CIKM Keynote - Research at Google
How Can We Build More Intelligent Computer. Systems? Need to perceive and understand the world ... Learning by labeled example: supervised learning.

Keynote Bingo March.pdf
makes a typo. Game. demo. Software update. available today ... Buggy demo. crashes. Page 1 of 1. Keynote Bingo March.pdf. Keynote Bingo March.pdf. Open.

keynote @ 7:00 pm - SJSU Events Calendar
Apr 16, 2015 - INEQUALITY AND THE ROLE OF RESISTANCE. SJSU, Morris Dailey Auditorium. Keynote is part of the Social Innovators Speakers Series.

Keynote II - Bambang wibowo.pdf
Download. Connect more apps... Try one of the apps below to open or edit this item. Keynote II - Bambang wibowo.pdf. Keynote II - Bambang wibowo.pdf. Open.

Jun-14
can be carried by Internet protocol ? Also, explain, how IP ... "Internet protocol is an unreliable, best effort ... (a) Compare and contrast between TCP/IP and 10.

Jun-14
examination of Applied Science Course: The student should answer the questions of all the four part in separate answer sheets provided. On the top of each.

JUN SONG
Email: [email protected]. Webpage: ... Fabrication of self-organized carbon nanotubes on alumina template by chemical vapor deposition. TEACHING ...

Employment_News_ Women Jun 2013
Jun 8, 2013 - 2. Flying Branch - 43 SSC COURSE. (a) Age: 19 to 23 years as on 01 ... have passed Maths and Physics at 10+2 level OR BE / B Tech degree (Four year course) from a recognised .... information on AFCAT and AFSB testing.

07 JUN 2016
Jun 7, 2016 - Public and Private Elementary and Secondary Schools Heads ..... be pin,-ed in a licensed or accredited residential care facility or wit h a foster ...

Employment_News_ Women Jun 2013
Jun 8, 2013 - eligible if they have undergone a minimum of four year degree qualification ... (L9) Information Technology (L10) Network Theory Design (L11) ...

Jun Chen
Refactor and improve legacy PHP code for main and internal-facing websites. ○ Built daily task application in PHP currently in use by Systems. Programming ...

Keynote Address to Youth
O Lover of Mankind, Glory to Thee! Very Reverend, Fr. Philip,. Dear beloved in the Lord Brothers and Sisters,. Participants of the 12th BOYA Conference "My Life in Christ". I have the pleasant duty on behalf of His Eminence Joseph, the Metropolitan o

May-Jun Newsletter.pdf
American Military Uni- versity with a B.A. in Emergency and. Disaster Management and is a Candi- date for a M.P.S. in Security and Safe- ty Leadership from The ...

Farmer 2011 PATNet Keynote
compare with (say) the economic and business language games? I didn't say truth;. I said umph – the kind of umph that mathematical economics and the cell phone business ... of policy and co-shapes policies – buying, for instance, contracts.

2017 Khmer Keynote PR.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect ...