Identification key

Last updated

In biology, an identification key, taxonomic key, or biological key is a printed or computer-aided device that aids the identification of biological entities, such as plants, animals, fossils, microorganisms, and pollen grains. Identification keys are also used in many other scientific and technical fields to identify various kinds of entities, such as diseases, soil types, minerals, or archaeological and anthropological artifacts.[ citation needed ]

Contents

Traditionally identification keys have most commonly taken the form of single-access keys. These work by offering a fixed sequence of identification steps, each with multiple alternatives, the choice of which determines the next step. If each step has only two alternatives, the key is said to be dichotomous, else it is polytomous. Modern multi-access or interactive keys allow the user to freely choose the identification steps and their order.

At each step, the user must answer a question about one or more features (characters) of the entity to be identified. For example, a step in a botanical key may ask about the color of flowers, or the disposition of the leaves along the stems. A key for insect identification may ask about the number of bristles on the rear leg.

Principles of good key design

Identification errors may have serious consequences in both pure and applied disciplines, including ecology, medical diagnosis, pest control, forensics, etc. [1] Therefore, identification keys must be constructed with great care in order to minimize the incidence of such errors.[ citation needed ]

Whenever possible, the character used at each identification step should be diagnostic; that is, each alternative should be common to all members of a group of entities, and unique to that group. It should also be differential, meaning that the alternatives should separate the corresponding subgroups from each other. However, characters which are neither differential nor diagnostic may be included to increase comprehension (especially characters that are common to the group, but not unique).[ citation needed ]

Whenever possible, redundant characters should be used at each step. For example, if a group is to be split into two subgroups, one characterized by six black spots and the other by four brown stripes, the user should be queried about all three characters (number, shape, and color of the markings) — even though any single one of them would be sufficient in theory. This redundancy improves the reliability of identification, provides a consistency check against user errors, and allows the user to proceed even if some of the characters could not be observed. In this case, the characters should be ordered according to their reliability and convenience. Further error tolerance can be achieved by using reticulation.[ citation needed ]

The terminology used in the identification steps should be consistent in meaning and should be uniformly used. The use of alternative terms for the same concept to achieve more "lively prose" should be avoided. Positive statements should be used in preference to negative statements.[ clarification needed ] The wording of the alternatives should be completely parallel sentences; alternatives like "flowers red, size 10-40 cm" versus "flowers yellow" should be avoided.

Geographic distribution characters should be used with caution. Species that have not been observed in a region may still occasionally occur there. Also, the organism may have been transported, particularly to locations near ports and airports, or it may have changed its range (e. g., due to global warming). For Europe and, probably, North Africa a Palaearctic key is advisable.

Rarity is not a viable character. An identification may be correct even though a species is very rare.

Common problems in key usage

Key users must overcome many practical problems, such as:

Verification

The identification obtained from a key should be viewed as only a suggestion of the species's real identity. Full identification requires comparison of the specimen with some authoritative source, such as a full and accurate description of the species, preferably in a monograph. Many keys contain brief descriptions to allow more certain identification, but these should not be assumed sufficient for verification.[ citation needed ]

Comparison with a monographic description is often difficult in practice, as many monographs are expensive, out of print, written in foreign languages, or hard to obtain. Monographs are often several decades old, so that often the species names used in the key do not match those used in the monograph.

Another alternative is comparison with authoritatively identified specimens in natural history museums or other relevant repositories. Authoritatively identified images are becoming more common on the internet. To qualify, the image must be labeled with a voucher specimen number, the name of the scientist who identified the photographed specimen, and the name of the public institution where the specimen is housed (so that interested parties can re-examine the specimen themselves).

See also

Related Research Articles

The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to each of the associated entities. Most prominently, it translates readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols. The Domain Name System has been an essential component of the functionality of the Internet since 1985.

In software and systems engineering, the phrase use case is a polyseme with two senses:

  1. A usage scenario for a piece of software; often used in the plural to suggest situations where a piece of software may be useful.
  2. A potential scenario in which a system receives an external request and responds to it.

Job Control Language (JCL) is a name for scripting languages used on IBM mainframe operating systems to instruct the system on how to run a batch job or start a subsystem. The purpose of JCL is to say which programs to run, using which files or devices for input or output, and at times to also indicate under what conditions to skip a step. Parameters in the JCL can also provide accounting information for tracking the resources used by a job as well as which machine the job should run on.

A surrogate key in a database is a unique identifier for either an entity in the modeled world or an object in the database. The surrogate key is not derived from application data, unlike a natural key.

<span class="mw-page-title-main">Requirements analysis</span> Engineering process

In systems engineering and software engineering, requirements analysis focuses on the tasks that determine the needs or conditions to meet the new or altered product or project, taking account of the possibly conflicting requirements of the various stakeholders, analyzing, documenting, validating and managing software or system requirements.

<span class="mw-page-title-main">Systems development life cycle</span> Systems engineering terms

In systems engineering, information systems and software engineering, the systems development life cycle (SDLC), also referred to as the application development life cycle, is a process for planning, creating, testing, and deploying an information system. The SDLC concept applies to a range of hardware and software configurations, as a system can be composed of hardware only, software only, or a combination of both. There are usually six stages in this cycle: requirement analysis, design, development and testing, implementation, documentation, and evaluation.

Web development is the work involved in developing a website for the Internet or an intranet. Web development can range from developing a simple single static page of plain text to complex web applications, electronic businesses, and social network services. A more comprehensive list of tasks to which Web development commonly refers, may include Web engineering, Web design, Web content development, client liaison, client-side/server-side scripting, Web server and network security configuration, and e-commerce development.

<span class="mw-page-title-main">Checklist</span> Aide-memoire to ensure consistency and completeness in carrying out a task

A checklist is a type of job aid used in repetitive tasks to reduce failure by compensating for potential limits of human memory and attention. Checklists are used both to ensure that safety-critical system preparations are carried out completely and in the correct order, and in less critical applications to ensure that no step is left out of a procedure. they help to ensure consistency and completeness in carrying out a task. A basic example is the "to do list". A more advanced checklist would be a schedule, which lays out tasks to be done according to time of day or other factors, or a pre-flight checklist for an airliner, which should ensure a safe take-off.

<span class="mw-page-title-main">Windows Installer</span> Software

Windows Installer is a software component and application programming interface (API) of Microsoft Windows used for the installation, maintenance, and removal of software. The installation information, and optionally the files themselves, are packaged in installation packages, loosely relational databases structured as COM Structured Storages and commonly known as "MSI files", from their default filename extensions. The packages with the file extensions mst contain Windows Installer "Transformation Scripts", those with the msm extensions contain "Merge Modules" and the file extension pcp is used for "Patch Creation Properties". Windows Installer contains significant changes from its predecessor, Setup API. New features include a GUI framework and automatic generation of the uninstallation sequence. Windows Installer is positioned as an alternative to stand-alone executable installer frameworks such as older versions of InstallShield and NSIS.

In computer science, data validation is the process of ensuring data has undergone data cleansing to confirm they have data quality, that is, that they are both correct and useful. It uses routines, often called "validation rules", "validation constraints", or "check routines", that check for correctness, meaningfulness, and security of data that are input to the system. The rules may be implemented through the automated facilities of a data dictionary, or by the inclusion of explicit application program validation logic of the computer and its application.

Data cleansing or data cleaning is the process of detecting and correcting corrupt or inaccurate records from a record set, table, or database and refers to identifying incomplete, incorrect, inaccurate or irrelevant parts of the data and then replacing, modifying, or deleting the dirty or coarse data. Data cleansing may be performed interactively with data wrangling tools, or as batch processing through scripting or a data quality firewall.

<span class="mw-page-title-main">Plant collecting</span>

Plant collecting is the acquisition of plant specimens for the purposes of research, cultivation, or as a hobby. Plant specimens may be kept alive, but are more commonly dried and pressed to preserve the quality of the specimen. Plant collecting is an ancient practice with records of a Chinese botanist collecting roses over 5000 years ago.

Dimensional modeling (DM) is part of the Business Dimensional Lifecycle methodology developed by Ralph Kimball which includes a set of methods, techniques and concepts for use in data warehouse design. The approach focuses on identifying the key business processes within a business and modelling and implementing these first before adding additional business processes, as a bottom-up approach. An alternative approach from Inmon advocates a top down design of the model of all the enterprise data using tools such as entity-relationship modeling (ER).

Automated species identification is a method of making the expertise of taxonomists available to ecologists, parataxonomists and others via digital technology and artificial intelligence. Today, most automated identification systems rely on images depicting the species for the identification. Based on precisely identified images of a species, a classifier is trained. Once exposed to a sufficient amount of training data, this classifier can then identify the trained species on previously unseen images.

<span class="mw-page-title-main">Loupe</span> Magnifying device

A loupe is a simple, small magnification device used to see small details more closely. They generally have higher magnification than a magnifying glass, and are designed to be held or worn close to the eye. A loupe does not have an attached handle, and its focusing lens(es) are contained in an opaque cylinder or cone. On some loupes this cylinder folds into an enclosing housing that protects the lenses when not in use.

In biology or medicine, a multi-access key is an identification key which overcomes the problem of the more traditional single-access keys of requiring a fixed sequence of identification steps. A multi-access key enables the user to freely choose the characteristics that are convenient to evaluate for the item to be identified.

In phylogenetics, a single-access key is an identification key where the sequence and structure of identification steps is fixed by the author of the key. At each point in the decision process, multiple alternatives are offered, each leading to a result or a further choice. The alternatives are commonly called "leads", and the set of leads at a given point a "couplet".

Domain-specific multimodeling is a software development paradigm where each view is made explicit as a separate domain-specific language (DSL).

In biology, determination is the process of matching a specimen of an organism to a known taxon, for example identifying a plant. The term is also used in cellular biology, where it means the act of the differentiation of stem cells becoming fixed. Various methods are used, for example single or multi-access identification keys.

In computer security, general access control includes identification, authorization, authentication, access approval, and audit. A more narrow definition of access control would cover only access approval, whereby the system makes a decision to grant or reject an access request from an already authenticated subject, based on what the subject is authorized to access. Authentication and access control are often combined into a single operation, so that access is approved based on successful authentication, or based on an anonymous access token. Authentication methods and tokens include passwords, biometric scans, physical keys, electronic keys and devices, hidden paths, social barriers, and monitoring by humans and automated systems.

References

  1. Steve Marshall
  2. Commercial Timbers, an example of a key in five languages.