44 resultados para database security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A mapping between chains in the Protein Databank and Enzyme Classification numbers is invaluable for research into structure-function relationships. Mapping at the chain level is a non-trivial problem and we present an automatically updated Web-server, which provides this link in a queryable form and as a downloadable XML or flat file.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The current version of this database on CD-ROM contains information on 14 127 cocoa (Theobroma cacao) clones and their 14 112 synonyms, the origin and history of the clones and the clone names, and accession lists for 48 of the major cocoa gene banks including quarantine stations. Also included are morphological data for leaves, fruits and seeds, disease reactions, quality and agronomic characters, and reference information on common abbreviations and acronyms, cocoa gene bank addresses and a full bibliography (with hyperlinked reference to data). New additions are 748 photographs and drawings of 428 individual clones in 11 different locations. Also included are 376 profiles for 15 simple sequence repeat primer pairs on 331 clones held in the University of Reading Intermediate Cocoa Quarantine Facility. Minimum system requirements are Windows 95 or later, a Pentium 166 with 32 MB RAM, CD-ROM drive and a minimum 20 MB hard disk space. A user guide is included in the package.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dysregulation of lipid and glucose metabolism in the postprandial state are recognised as important risk factors for the development of cardiovascular disease and type 2 diabetes. Our objective was to create a comprehensive, standardised database of postprandial studies to provide insights into the physiological factors that influence postprandial lipid and glucose responses. Data were collated from subjects (n = 467) taking part in single and sequential meal postprandial studies conducted by researchers at the University of Reading, to form the DISRUPT (DIetary Studies: Reading Unilever Postprandial Trials) database. Subject attributes including age, gender, genotype, menopausal status, body mass index, blood pressure and a fasting biochemical profile, together with postprandial measurements of triacylglycerol (TAG), non-esterified fatty acids, glucose, insulin and TAG-rich lipoprotein composition are recorded. A particular strength of the studies is the frequency of blood sampling, with on average 10-13 blood samples taken during each postprandial assessment, and the fact that identical test meal protocols were used in a number of studies, allowing pooling of data to increase statistical power. The DISRUPT database is the most comprehensive postprandial metabolism database that exists worldwide and preliminary analysis of the pooled sequential meal postprandial dataset has revealed both confirmatory and novel observations with respect to the impact of gender and age on the postprandial TAG response. Further analysis of the dataset using conventional statistical techniques along with integrated mathematical models and clustering analysis will provide a unique opportunity to greatly expand current knowledge of the aetiology of inter-individual variability in postprandial lipid and glucose responses.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The major technical objectives of the RC-NSPES are to provide a framework for the concurrent operation of reactive and pro-active security functions to deliver efficient and optimised intrusion detection schemes as well as enhanced and highly correlated rule sets for more effective alerts management and root-cause analysis. The design and implementation of the RC-NSPES solution includes a number of innovative features in terms of real-time programmable embedded hardware (FPGA) deployment as well as in the integrated management station. These have been devised so as to deliver enhanced detection of attacks and contextualised alerts against threats that can arise from both the network layer and the application layer protocols. The resulting architecture represents an efficient and effective framework for the future deployment of network security systems.