3 resultados para security assessment

em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Several agricultural fields show high contents of arsenic because of irrigation with arsenic- contaminated groundwater. Vegetables accumulate arse- nic in their edible parts when grown in contaminated soils. Polluted vegetables are one of the main sources of arsenic in the food chain, especially for people living in rural arsenic endemic villages of India and Bangladesh. The aim of this study was to assess the feasibility of floriculture in the crop rotation system of arsenic en- demic areas of the Bengal Delta. The effects of different arsenic concentrations (0, 0.5, 1.0, and 2.0 mg As L−1) and types of flowering plant (Gomphrena globosa and Zinnia elegans) on plant growth and arsenic accumula- tion were studied under hydroponic conditions. Total arsenic was quantified using atomic absorption spec- trometer with hydride generation (HG-AAS). Arsenic was mainly accumulated in the roots (72 %), followed by leaves (12 %), stems (10 %), and flowers (<1 %). The flowering plants studied did not show as high phytoremediation capacities as other wild species, suchas ferns. However, they behaved as arsenic tolerant plants and grew and bloomed well, without showing any phytotoxic signs. This study proves that floriculture could be included within the crop rotation system in arsenic-contaminated agricultural soils, in order to im- prove food safety and also food security by increasing farmer’s revenue.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article explores whether or to what extent the contemporary espionage novel is able to map and interrogate transformations in the post-9/11security environment. It asks how well a form or genre of writing, typically handcuffed to the machinations and demands of the Cold War and state sovereignty, is able to adapt to a new security environment characterized by strategies of “risk assessment” and “resilience-building” and by modes or regimes of power not reducible to, or wholly controlled by, the state. In doing so, it thinks about the capacities of this type of fiction for “resisting” the formations of power it wants to make visible and is partly complicit with.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model (PBSM) for Android does not address this threat, as it is rather limited to mitigating risks due to individual apps. This paper presents a technique for assessing the threat of collusion for apps, which is a first step towards quantifying collusion risk, and allows us to narrow down to candidate apps for collusion, which is critical given the high volume of Android apps available. We present our empirical analysis using a classified corpus of over 29000 Android apps provided by Intel Security.