Search results for "Security"

showing 10 items of 1693 documents

Comparing in vivo data and in silico predictions for acute effects assessment of biocidal active substances and metabolites for aquatic organisms.

2020

Abstract The purpose of this study was to determine the acute toxicity in aquatic organisms of one biocidal active substance and six metabolites derived from biocidal active substances and to assess the suitability of available QSAR models to predict the obtained values. We have reported the acute toxicity in sewage treatment plant (STP) microorganisms, in the freshwater microalgae Pseudokirchneriella subcapitata and in Daphnia magna following OECD test methods. We have also identified in silico models for acute toxicity of these trophic levels currently available in widely recognized platforms such as VEGA and the OECD QSAR ToolBox. A total of six, four and two models have been selected fo…

Quantitative structure–activity relationshipBiocideAquatic OrganismsHealth Toxicology and MutagenesisIn silicoMicroorganismDaphnia magna0211 other engineering and technologiesQuantitative Structure-Activity RelationshipFresh Water02 engineering and technology010501 environmental sciences01 natural sciencesDaphniaModels BiologicalChlorophyceaeMicroalgaeAnimalsComputer Simulation0105 earth and related environmental sciencesEC50021110 strategic defence & security studiesbiologyChemistryPublic Health Environmental and Occupational HealthGeneral Medicinebiology.organism_classificationPollutionAcute toxicityDaphniaEnvironmental chemistryWater Pollutants ChemicalDisinfectantsEcotoxicology and environmental safety
researchProduct

Prediction of acute toxicity of phenol derivatives using multiple linear regression approach for Tetrahymena pyriformis contaminant identification in…

2016

In this article, the modeling of inhibitory grown activity against Tetrahymena pyriformis is described. The 0-2D Dragon descriptors based on structural aspects to gain some knowledge of factors influencing aquatic toxicity are mainly used. Besides, it is done by some enlarged data of phenol derivatives described for the first time and composed of 358 chemicals. It overcomes the previous datasets with about one hundred compounds. Moreover, the results of the model evaluation by the parameters in the training, prediction and validation give adequate results comparable with those of the previous works. The more influential descriptors included in the model are: X3A, MWC02, MWC10 and piPC03 wit…

Quantitative structure–activity relationshipEnvironmental EngineeringDatabases FactualHealth Toxicology and Mutagenesis0211 other engineering and technologiesQuantitative Structure-Activity Relationship02 engineering and technology010501 environmental sciencesBiologycomputer.software_genre01 natural sciencesAquatic toxicologyPhenolsLinear regressionEnvironmental Chemistry0105 earth and related environmental sciences021110 strategic defence & security studiesDatabaseTetrahymena pyriformisPublic Health Environmental and Occupational HealthLinear modelGeneral MedicineGeneral ChemistryModels TheoreticalchEMBLPollutionAcute toxicityTetrahymena pyriformisLinear ModelscomputerChemical databaseChemosphere
researchProduct

Prediction of ionic liquid's heat capacity by means of their in silico principal properties

2016

The in silico principal properties (PPs) of ionic liquids (ILs), derived by means of the VolSurf+ approach, were used to develop a Partial Least Squares (PLS) model able to find a quantitative correlation among IL descriptors (accounting for both cationic and anionic structural features) and heat capacity values, providing affordable predictions validated by experimental Cp measurements for an external set of ILs. In silico predictions allowed the selection of a limited number of structurally different ILs with similar Cp values, providing the possibility to select an optimal IL according to efficiency, as well as to environmental and economic sustainability. The present general procedure, …

Quantitative structure–activity relationshipHeat capacity010405 organic chemistryGeneral Chemical EngineeringIn silicoPrincipal (computer security)Chemistry (all)General ChemistrySettore CHIM/06 - Chimica Organica010402 general chemistry01 natural sciencesHeat capacityQuantitative correlation0104 chemical sciencesIonic liquidschemistry.chemical_compoundEconomic sustainabilitychemistryIonic liquids; QSPR; Heat capacityQSPRPartial least squares regressionIonic liquidChemical Engineering (all)Biological systemMathematics
researchProduct

"Table 10" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"

2014

Gaussian radii and intercept parameters in PbPb collisions versus Nch at low KT3.

R lambdaInclusive2760.0Physics::Instrumentation and DetectorsAstrophysics::Earth and Planetary AstrophysicsPB PB --> PI+ XNuclear ExperimentPB PB --> PI- XComputer Science::Cryptography and Security
researchProduct

"Table 13" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"

2014

Gaussian radii and intercept parameters in PbPb collisions versus Nch at high KT3.

R lambdaInclusive2760.0Physics::Instrumentation and DetectorsAstrophysics::Earth and Planetary AstrophysicsPB PB --> PI+ XNuclear ExperimentPB PB --> PI- XComputer Science::Cryptography and Security
researchProduct

"Table 11" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"

2014

Gaussian radii and intercept parameters in pp collisions versus Nch at high KT3.

R lambdaInclusiveProton-Proton Scattering7000.0Astrophysics::Earth and Planetary AstrophysicsP P --> PI+ XNuclear ExperimentP P --> PI- XComputer Science::Cryptography and Security
researchProduct

Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies

2021

Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders are responsible for most security breaches in organizations. Further, the majority of information security research findings are limited to solutions that are technically focused. However, it is now recognized that the technological approach alone does not carry the security level needed. So this led researchers to embark on socio-technical approaches. Thus, this study explores organizational culture's effect on employees' intention to comply w…

Rational Choice TheoryorganisaatiokulttuuriInformation SecuritytietoturvapolitiikkaInformation Security Policy CompliancetietoturvaOrganizational Culturerationaalisen valinnan teoria
researchProduct

An Integrated Architecture for Surveillance and Monitoring in an Archaeological Site

2005

This paper describes an on-going work aimed at designing and deploying a system for the surveillance and monitoring of an archaeological site, namely the "Valley of the Temples" in Agrigento, Italy. Given the relevance of the site from an artistical and historical point of view, it is important to protect the monuments from malicious or simply incautious behavior; however, the vastity of the area to be monitored and the vague definition of its boundaries make it unpractical to provide extensive coverage through traditional sensors or similar devices. We describe the design of an architecture for the surveillance of the site and for the monitoring of the visitors' behavior consisting in an i…

Reasoning systemEngineeringVisual sensor networkbusiness.industryVideo surveillanceComputer securitycomputer.software_genreArchaeologyWireless site surveyKey distribution in wireless sensor networksMobile wireless sensor networkRelevance (information retrieval)Architecturebusinesswireless sensor networksWireless sensor networkcomputer
researchProduct

On strongly tactical codes

1986

We study perfect error correcting codes in which the codewords are protected by Hamming spheres of distinct protective radii. These codes have been introduced by Cohen, Montaron and Frankl [3, 4, 10].

Reed–Solomon error correctionConcatenated error correction codeTurbo codeForward error correctionConstant-weight codeLow-density parity-check codeError detection and correctionHamming codeAlgorithmComputer Science::Cryptography and SecurityComputer Science::Information TheoryMathematics
researchProduct

Beyond the notion of security community: What role for the African regional organizations in peace and security?

2005

African regional organizations' increasing activity in security policy is usually approached through the concept of ‘security community’, which can only partially clarify their difficult situation. A multi-level governance model is suggested as a more useful approach in a situation where economic cooperation is weak, member states' principles of governance diverge, and they themselves might be part of security problems. A security community is not a necessary condition for a regional organization to play a role in the field of security. Through new intra-regional and cross-level relationships with the international community and civil society, regional organizations can become important sec…

Regional organizationCritical security studiesNational securitybusiness.industryPolitical scienceGeography Planning and DevelopmentEconomic securityInternational securitySecurity communityPublic administrationSecurity studiesbusinessCorporate securityThe Round Table
researchProduct