Search results for "ENCR"
showing 10 items of 121 documents
Moving Toward a Strategy for Addressing Climate Displacement of Marine Resources: A Proof-of-Concept
2020
Realistic predictions of climate change effects on natural resources are central to adaptation policies that try to reduce these impacts. However, most current forecasting approaches do not incorporate species-specific, process-based biological information, which limits their ability to inform actionable strategies. Mechanistic approaches, incorporating quantitative information on functional traits, can potentially predict species- and population-specific responses that result from the cumulative impacts of small-scale processes acting at the organismal level, and can be used to infer population-level dynamics and inform natural resources management. Here we present a proof-of-concept study…
Ingestion of microplastics and occurrence of parasite association in Mediterranean anchovy and sardine
2020
10 pages, 6 figures, 1 table, supplementary data https://doi.org/10.1016/j.marpolbul.2020.111399
Planktonic stages of small pelagic fishes (Sardinella aurita and Engraulis encrasicolus) in the central Mediterranean Sea: The key role of physical f…
2018
Abstract Multidisciplinary studies are recently aiming to define diagnostic tools for fishery sustainability by coupling ichthyoplanktonic datasets, physical and bio-geochemical oceanographic measurements, and ocean modelling. The main goal of these efforts is to understand those processes that control the dispersion and fate of fish larvae and eggs, and thus tuning the inter-annual variability of the biomass of small pelagic fish species. In this paper we analyse the distribution of eggs and larvae as well as the biological features of the two species of pelagic fish, Engraulis encrasicolus and Sardinella aurita in the north-eastern sector of the Sicily Channel (Mediterranean Sea) from ich…
Co-inertia multivariate approach for the evaluation of anthropogenic impact on two commercial fish along Tyrrhenian coasts
2019
Abstract Aliphatic hydrocarbon levels were determined by the GC/MS technique in fish livers of Engraulis encrasicolus (Ee) and Trachurus trachurus (Tt), collected from a particular area of the Mediterranean Sea, called GSA 10, which is located exactly in Tyrrhenian Sea between Campania coast and North Sicily coast. The aim was to evaluate their potential use as specific bioindicators towards this class of contaminants. Both Tt and Ee are considered to be pollution monitoring bioindicators, due to their dominance in marine communities and economic fishing interest. Ee showed a higher tendency to bioaccumulate TAHs, due to the lower quantity of fatty acids in liver tissues with respect to Tt.…
Mechanisms of shrub encroachment into Northern Chihuahuan Desert grasslands and impacts of climate change investigated using a cellular automata model
2016
Arid and semiarid grasslands of southwestern North America have changed dramatically over the last 150 years as a result of woody plant encroachment. Overgrazing, reduced fire frequency, and climate change are known drivers of woody plant encroachment into grasslands. In this study, relatively sim- ple algorithms for encroachment factors (i.e., grazing, grassland fires, and seed dispersal by grazers) are proposed and implemented in the ecohydrological Cellular-Automata Tree Grass Shrub Simulator (CAT- GraSS). CATGraSS is used in a 7.3 km 2 rectangular domain located in central New Mexico along a zone of grassland to shrubland transition, where shrub encroachment is currently active. CATGraS…
Small pelagic fish in the new millennium: A bottom-up view of global research effort
2021
The present review is an outcome of discussions at the ICES-PICES Symposium on Drivers of Dynamics of Small Pelagic Fish convened in Victoria, B.C., Canada in spring 2017.-- This review is a first contribution of a new international Working Group on Small Pelagic Fish started jointly by ICES (WGSPF) and PICES (WG43) to continue world-wide collaboration to advance knowledge on the drivers of populations of SPF.
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing
2016
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
2017
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud platforms. Although, outsourcing private health data to third-party platforms is an appealing solution for PHR owners, it may lead to significant privacy concerns, because there is a higher risk of leaking private data to unauthorized parties. As a way of ensuring PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mechanisms have been considered due to the fact that such schemes facilitate a mechanism of sharing encrypted data among a set of intende…
Jaume Vicent: un escultor singular en la encrucijada de dos siglos
2019
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
2020
Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…