Explore chapters and articles related to this topic
Network Security for EIS and ECS Systems
Published in Barney L. Capehart, Timothy Middelkoop, Paul J. Allen, David C. Green, Handbook of Web Based Energy Information and Control Systems, 2020
In order to mitigate the risk of eavesdroppers and interlopers gaining access to the exchange of operationally valuable data via email, the email should be encrypted using PGP, Kerberos, or some other public key encryption protocol. These methods implement significant barriers to decrypting ciphertext to plaintext. In addition to this technological solution for securing email, such communications should be explicitly marked as private, confidential, etc. and should contain an appropriate statement to that end in the footer of each and every email message. When documents are transmitted by email as attachments, they should be converted to portable document file (PDF) format or rich text format (RTF) before sending them. Microsoft Word and Corel WordPerfect file documents contain metadata (information that is hidden within the document). Such metadata may contain every modification or the change history of the document. PDF and RTF document formats contain minimal metadata about the document itself and therefore should be the only acceptable formats for transmission of formatted attachments. Finally, what little metadata can be extracted from the PDF and RTF file formats cannot be easily obtained by someone who has not had significant technical training.
Text in Multimedia
Published in Sreeparna Banerjee, Elements of Multimedia, 2019
The common data encoding schemes for text representing text are: Plain text, or American Standard Code for Information Interchange (ASCII) text, is text in an electronic format that can be read and interpreted by humans.Rich text embeds special control characters into the plain text to provide additional features.Hypertext is an improvement over rich text that allows the reader to jump to different sections within the document or even jump to a new document.
Learning analytics techniques and visualisation with textual data for determining causes of academic failure
Published in Behaviour & Information Technology, 2020
Clara Nkhoma, Duy Dang-Pham, Ai-Phuong Hoang, Mathews Nkhoma, Tram Le-Hoai, Susan Thomas
Content analysis aims to describe the communicated content in an objective, precise, and systematic manner (Berelson 1952; Lasswell, Lerner, and Pool 1952). Quantitative data analysis has gained its popularity, due to high-powered computing which helps to reduce rich text passages to a standard set of manipulatable symbols systematically and effectively (Mehl 2006; Klüver 2009). Within this domain, there are multiple approaches with different analytical purposes. In the presence of information overload (Tegarden 1999; Mazza 2004), visualisation provides contextual insights that support decision making (Platts and Hua Tan 2004). The combination of quantitative content analysis and visualisation techniques has been employed by studies in the educational data mining area (Romero and Ventura 2010).
Current trends in read-across applications for chemical risk assessments and chemical registrations in the Republic of Korea
Published in Journal of Toxicology and Environmental Health, Part B, 2022
Sang Hee Lee, Jongwoon Kim, Jinyong Kim, Jaehyun Park, Sanghee Park, Kyu-Bong Kim, Byung-Mu Lee, Seok Kwon
Several tools have been developed to support the read-across approach. Table 1 summarizes main attributes of publicly available read-across tools, which are categorized into two types: standalone and web-based tools. The OECD QSAR Toolbox, ToxMatch, and ToxRead are standalone tools. Ambit2, Apellis, and GenRA are web-based tools (Gallegos-Saliner et al. 2008; Gini 2014; OECD 2021). The QSAR Toolbox (version 4.5) currently provides International Uniform Chemical Information Database (IUCLID)-supported endpoints (43 in total) for addressing regulatory requirements. In the QSAR Toolbox, a wide range of chemical identifiers including chemical name, Chemical Abstracts Service (CAS), structure [Simplified Molecular Input Line Entry System (SMILES) or drawing], and Structural Data files (SDF) might be employed as input data. The analog identification method embedded in the toolbox is based upon structural similarity, sub-fragment searching, and category definition (OECD 2021). The toolbox provides output reports in different forms: IUCLID, Portable Document Format (PDF), and Rich Text Format (RTF). ToxMatch (version 1.07) encompasses 6 endpoints based upon its pre-defined training datasets. ToxMatch also provides specific endpoints in the event that user’s own data are readily available as additional training data sets for the tool (Gallegos-Saliner et al. 2008). ToxMatch allows chemical name, CAS, and structure (e.g., SMILES or drawing) to be used as inputs for substance identifiers. Pairwise structural similarity based upon fingerprints or molecular descriptors used as similarity matrix are the basis for analogue identification in ToxMatch, which outputs data as scatter plots, similarity matrices, and text files. ToxRead (version 0.23 embedded in VEGA HUB Platform) (Gini et al. 2014; VEGA HUB Platform 2017) uses structural information – SMILES – to predict 20 (eco)toxicological endpoints on the basis of VEGA similarity calculation algorithm. ToxRead blends fingerprints with key constitutional molecular descriptors (Floris et al. 2014).