logo
    The Recalcitrance and Toxicity of Polycyclic Aromatic Hydrocarbons within Crude Oil Residues in Beach Sediments at the Bios Site, Nearly Forty Years Later
    0
    Citation
    0
    Reference
    10
    Related Paper
    Abstract:
    Sites of the Baffin Island Oil Spill (BIOS) project (Cape Hatt, Baffin Island, Canadian Arctic) were revisited nearly 40 years after the original oil application to provide long-term monitoring data for Arctic oil spill research. Surface and subsurface sediment samples were collected from the intertidal zone of the 1981 nearshore oil spill experiment (Bay 11), from 1980 supratidal control plots (Crude Oil Point) and 1982 supratidal treatment plots (Bay 106). Samples were analyzed for Polycyclic Aromatic Hydrocarbons (PAHs) and alkylated homologues using an Agilent 7010B Triple Quadrupole GC/MS system in the MRM mode. Our results suggest that total mean concentrations of all monitored PAHs range from 0.05 – 14 mg/kg, whereas total mean concentrations of the 16 EPA priority PAHs range from 0.003 – 3 mg/kg. All three sites featured samples where concentrations of various priority PAHs exceeded the established Interim Marine Sediment Quality Guidelines. All supratidal samples contained potentially toxic levels of PAHs. Even after nearly four decades of weathering, the recalcitrant crude oil residues remain a potential hazard for the native organisms. Continued monitoring of this unique study site is crucial for establishing a timeline for oil degradation, and to observe a reduction in toxicity over time.
    Keywords:
    BIOS
    This article introduces the progress and characteristics of BIOS security threat,summarizes the BIOS security risk classification,advances a model of BIOS security threat and a model of BIOS security detection which based on scanning of BIOS vulnerabilities and measuring of BIOS code integrity.A BIOS security detection system,based on the libraries of BIOS vulnerabilities and BIOS standard code samples,is implemented.Further study directions about enhancing and extending BIOS security role in information security fundamental solution are also presented.
    BIOS
    Code (set theory)
    Citations (0)
    BIOS is very important as control function of a computer,we can learn from BIOS and get to know it. We can update BIOS from old, such we can promote the function of a computer.
    BIOS
    Booting
    Citations (0)
    Intel has released EFI BIOS framework for solving the limitations of traditional BIOS. Some new functions have been added to EFI BIOS. At the same time,it has to enhance its self-security. This paper introduces an EFI BIOS self security enhancements based root of trust.
    BIOS
    Root (linguistics)
    Citations (0)
    In order to solve the computer BIOS existing security problems,after researching the theory of BIOS principle and technology,study the principle and technology of BIOS systematically and thoroughly.A computer BIOS security detection system which based on the libraries of BIOS vulnerabilities and BIOS standard code samples was proposed,through building the libraries of BIOS vulnerabilities and BIOS standard code samples.Aiming at their own or external physical BIOS trojans,viruses attack,adopting different hardware and software protection methods,it realized the system of computer's BIOS security detection.The analysis on simulation results indicate that the method has a certain theory and applications,and the system could give the user to provide real-time security detection and security patch module.
    BIOS
    Booting
    Code (set theory)
    Citations (0)
    A good understanding of computer BIOS setup and the characteristic of each BIOS configuration is key to fully improve a computer's capability and make it assist our teaching and scientific research more effectively.
    BIOS
    Citations (0)
    This text proposes here a new BIOS implementation scheme by changing the working mode of CPU. This kind of changing enables BIOS codes to run in a linear memory space so that many shortcomings of traditional BIOS are overcome. An example implementation under IA32 architecture is also presented.
    BIOS
    Mode (computer interface)
    Citations (0)
    A summary is not available for this content so a preview has been provided. Please use the Get access link above for information on how to access this content.
    BIOS
    Citations (0)
    BIOS is foundation of computer, By the update of BIOS, capability and compatibility can be improved.An overall description is given in this article for the basic function of BIOS why to update BIOS,the update of mainboard BIOS and the method to handle problems in case of update failure.
    BIOS
    Booting
    Citations (0)
    Basic Input Output System(BIOS) trapdoor has huge impact on computer system,and it is difficult to detect the existence of BIOS trapdoor effectively with the existing tools.After researching BIOS structure and BIOS code obfuscation technique based on reverse analysis,BIOS trapdoors were divided into module-level BIOS trapdoor and instruction-level BIOS trapdoor according to implementation granularity,followed by analyzing the implementation principle and characteristics of these two BIOS trapdoors in detail.Finally the detection method of module-level trapdoor based on analyzing module structure and the detection method of instruction-level trapdoor based on integrity measurement were presented.The experimental results show that these two methods can detect the existence of their corresponding BIOS trapdoors effectively.
    BIOS
    Granularity
    Code (set theory)
    Citations (0)