Search results for "Security"
showing 10 items of 1693 documents
Comparing in vivo data and in silico predictions for acute effects assessment of biocidal active substances and metabolites for aquatic organisms.
2020
Abstract The purpose of this study was to determine the acute toxicity in aquatic organisms of one biocidal active substance and six metabolites derived from biocidal active substances and to assess the suitability of available QSAR models to predict the obtained values. We have reported the acute toxicity in sewage treatment plant (STP) microorganisms, in the freshwater microalgae Pseudokirchneriella subcapitata and in Daphnia magna following OECD test methods. We have also identified in silico models for acute toxicity of these trophic levels currently available in widely recognized platforms such as VEGA and the OECD QSAR ToolBox. A total of six, four and two models have been selected fo…
Prediction of acute toxicity of phenol derivatives using multiple linear regression approach for Tetrahymena pyriformis contaminant identification in…
2016
In this article, the modeling of inhibitory grown activity against Tetrahymena pyriformis is described. The 0-2D Dragon descriptors based on structural aspects to gain some knowledge of factors influencing aquatic toxicity are mainly used. Besides, it is done by some enlarged data of phenol derivatives described for the first time and composed of 358 chemicals. It overcomes the previous datasets with about one hundred compounds. Moreover, the results of the model evaluation by the parameters in the training, prediction and validation give adequate results comparable with those of the previous works. The more influential descriptors included in the model are: X3A, MWC02, MWC10 and piPC03 wit…
Prediction of ionic liquid's heat capacity by means of their in silico principal properties
2016
The in silico principal properties (PPs) of ionic liquids (ILs), derived by means of the VolSurf+ approach, were used to develop a Partial Least Squares (PLS) model able to find a quantitative correlation among IL descriptors (accounting for both cationic and anionic structural features) and heat capacity values, providing affordable predictions validated by experimental Cp measurements for an external set of ILs. In silico predictions allowed the selection of a limited number of structurally different ILs with similar Cp values, providing the possibility to select an optimal IL according to efficiency, as well as to environmental and economic sustainability. The present general procedure, …
"Table 10" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"
2014
Gaussian radii and intercept parameters in PbPb collisions versus Nch at low KT3.
"Table 13" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"
2014
Gaussian radii and intercept parameters in PbPb collisions versus Nch at high KT3.
"Table 11" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"
2014
Gaussian radii and intercept parameters in pp collisions versus Nch at high KT3.
Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies
2021
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders are responsible for most security breaches in organizations. Further, the majority of information security research findings are limited to solutions that are technically focused. However, it is now recognized that the technological approach alone does not carry the security level needed. So this led researchers to embark on socio-technical approaches. Thus, this study explores organizational culture's effect on employees' intention to comply w…
An Integrated Architecture for Surveillance and Monitoring in an Archaeological Site
2005
This paper describes an on-going work aimed at designing and deploying a system for the surveillance and monitoring of an archaeological site, namely the "Valley of the Temples" in Agrigento, Italy. Given the relevance of the site from an artistical and historical point of view, it is important to protect the monuments from malicious or simply incautious behavior; however, the vastity of the area to be monitored and the vague definition of its boundaries make it unpractical to provide extensive coverage through traditional sensors or similar devices. We describe the design of an architecture for the surveillance of the site and for the monitoring of the visitors' behavior consisting in an i…
On strongly tactical codes
1986
We study perfect error correcting codes in which the codewords are protected by Hamming spheres of distinct protective radii. These codes have been introduced by Cohen, Montaron and Frankl [3, 4, 10].
Beyond the notion of security community: What role for the African regional organizations in peace and security?
2005
African regional organizations' increasing activity in security policy is usually approached through the concept of ‘security community’, which can only partially clarify their difficult situation. A multi-level governance model is suggested as a more useful approach in a situation where economic cooperation is weak, member states' principles of governance diverge, and they themselves might be part of security problems. A security community is not a necessary condition for a regional organization to play a role in the field of security. Through new intra-regional and cross-level relationships with the international community and civil society, regional organizations can become important sec…