Search results for "Rite"
showing 10 items of 2726 documents
Ex ante evaluation of cropping systems for weed-mediated pests and environmental benefits with simulation–based indicators
2016
SPEEAGESTADAGROSUP; International audience; Integrated crop protection tolerates residual weed floras if they are not harmful for crop production. These weeds can host harmful crop pests, among which parasitic plants such as broomrape (Phelipanche ramosa). They can also contribute to reduce soil erosion as well as nitrate and pesticide leaching. To evaluate these weed impacts of management practices ex ante, we developed indicators for the weed dynamics model FLORSYS (Colbach et al., 2014) and then used the model to predict weed-mediated broomrape risk and environmental benefits in cropping systems from five French regions. Materials and Methods FLORSYS is a virtual field on which cropping …
Management of returned anti-neoplastic treatments and their reuse in oncology patients
2009
Abstract Objective Analyse the profile of parenteral preparation and treatment (anti-neoplastic and supplementary) that were dispensed and returned to the Pharmacy Department, the reasons why they were not administered, their reuse and the associated direct costs. Method Longitudinal study over 8 months (October 2004-May 2005) in a tertiary hospital with centre for preparing anti-neoplastic agents (including supplementary treatment) in its Pharmacy Department. The variables studied, downloaded from the Oncofarm® application, are as follows: a) patients and diagnostics; b) returned treatments, classified by reason returned, pharmaco-therapeutic scheme, cycle, and day; c) returned preparation…
Genome size and chromosomes in marine sponges [Suberites domuncula, Geodia cydonium]
1995
The genome size of the marine sponges Suberites domuncula and Geodia cydonium has been determined by flow cytofluorometric analysis using diamidino-phenylindole [DAPI]. Using human lymphocytes as reference the amount of DNA in cells from S. domuncula has been determined to be 3.7 pg and that of G. cydonium 3.3 pg. While no chromosomes could be identified in G. cydonium, the karyotype of the Suberites domuncula is 32 chromosomes in the diploid state. The size of the chromosomes was between 0.25 and 1.0 micron. No pronounced banding pattern was visible.
The Evolution of the Global Paper Industry: Concluding Remarks
2012
This concluding chapter summarizes the findings of the volume, and combines those findings with a comparative life-cycle perspective. We demonstrate how pulp and paper industry companies have emerged and exited in different countries. We highlight technology, raw materials, markets and products as factors explaining changes in industry structure and dominance. We demonstrate that industrial growth and the accumulation of technological knowledge require a certain maturity of political systems, regulation, and organization of research and development. Likewise, similarities between regions that lose their competitive advantage are characterized by saturation of demand, thereby weakening incen…
An SPM-Enriched Marine Oil Supplement Shifted Microglia Polarization toward M2, Ameliorating Retinal Degeneration in rd10 Mice
2022
Retinitis pigmentosa (RP) is the most common inherited retinal dystrophy causing progressive vision loss. It is accompanied by chronic and sustained inflammation, including M1 microglia activation. This study evaluated the effect of an essential fatty acid (EFA) supplement containing specialized pro-resolving mediators (SPMs), on retinal degeneration and microglia activation in rd10 mice, a model of RP, as well as on LPS-stimulated BV2 cells. The EFA supplement was orally administered to mice from postnatal day (P)9 to P18. At P18, the electrical activity of the retina was examined by electroretinography (ERG) and innate behavior in response to light were measured. Retinal degeneration was …
Aligning Two Specifications for Controlling Information Security
2014
Assuring information security is a necessity in modern organizations. Many recommendations for information security management exist, which can be used to define a baseline of information security requirements. ISO/ IEC 27001 prescribes a process for an information security management system, and guidance to implement security controls is provided in ISO/IEC 27002. Finnish National Security Auditing Criteria (KATAKRI) has been developed by the national authorities in Finland as a tool to verify maturity of information security practices. KATAKRI defines both security control objectives and security controls to meet an objective. Here the authors compare and align these two specifications in…
An AHP-based evaluation procedure for Innovative Educational Projects: A face-to-face vs. computer-mediated case study
2008
In this paper a procedure to evaluate proposals for Educational Innovation Projects is proposed. This methodology should help the Institute of Educational Sciences of the Politechnical University of Valencia to choose the best Educational Project, the final aim being to provide the Administration with a stringent evaluation methodology, since the current evaluation methodology was found to be neither sufficiently objective nor systematic. Since in the definition and evaluation of these Educational Projects diverse stakeholders are involved, the process has been approached as a MCDA carried out by a group of experts. Although a whole methodology is proposed, the paper has been focused on the…
Testing Prospect Theory in a Deterministic Multiple Criteria Decision-Making Environment
1993
Prospect theory by Kahneman and Tversky [7] is tested in a deterministic multiple criteria decision-making context. In two experiments conducted in classroom settings subjects made pairwise preference comparisons of condominiums for sale. The results of the experiments indicate that the traditional value model did not explain the subjects' revealed preferences as well as the prospect model. We conclude that prospect theory is a reasonable model of choice for many individuals in such a context.
Parlons sécurité
2012
National audience; Les questions de sécurité publique sont au cœur de l’actualité française. En témoignent les lois d'orientation et de programmation pour la performance de la sécurité intérieure (dites LOPSI 1 et LOPPSI 2), le débat autour du fichier central d’identité biométrique ou encore celui sur la vidéosurveillance et les violences urbaines avec l’exemple anglais. Quels sont les enjeux et les réalités de la sécurité en France ? Pour sortir du brouhaha médiatique, « Entrez dans l’actu » vous présente l’éventail des informations en mesure de vous éclairer objectivement.