WorldWideScience

Sample records for austrian meat authenticity

  1. Halal authenticity issues in meat and meat products.

    Science.gov (United States)

    Nakyinsige, Khadijah; Man, Yaakob Bin Che; Sazili, Awis Qurni

    2012-07-01

    In the recent years, Muslims have become increasingly concerned about the meat they eat. Proper product description is very crucial for consumers to make informed choices and to ensure fair trade, particularly in the ever growing halal food market. Globally, Muslim consumers are concerned about a number of issues concerning meat and meat products such as pork substitution, undeclared blood plasma, use of prohibited ingredients, pork intestine casings and non-halal methods of slaughter. Analytical techniques which are appropriate and specific have been developed to deal with particular issues. The most suitable technique for any particular sample is often determined by the nature of the sample itself. This paper sets out to identify what makes meat halal, highlight the halal authenticity issues that occur in meat and meat products and provide an overview of the possible analytical methods for halal authentication of meat and meat products. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Game meat authentication through rare earth elements fingerprinting

    International Nuclear Information System (INIS)

    Danezis, G.P.; Pappas, A.C.; Zoidis, E.; Papadomichelakis, G.; Hadjigeorgiou, I.; Zhang, P.; Brusic, V.; Georgiou, C.A.

    2017-01-01

    Accurate labelling of meat (e.g. wild versus farmed, geographical and genetic origin, organic versus conventional, processing treatment) is important to inform the consumers about the products they buy. Meat and meat products declared as game have higher commercial value making them target to fraudulent labelling practices and replacement with non-game meat. We have developed and validated a new method for authentication of wild rabbit meat using elemental metabolomics approach. Elemental analysis was performed using rapid ultra-trace multi-element measurement by inductively coupled plasma mass spectrometry (ICP-MS). Elemental signatures showed excellent ability to discriminate the wild rabbit from non-wild rabbit meat. Our results demonstrate the usefulness of metabolic markers -rare earth signatures, as well as other trace element signatures for game meat authentication. - Highlights: • Elemental metabolomics is a powerful new methodology for authentication of game rabbit meat. • New method for meat authentication utilizing rare earths elemental signatures. • Samples are compared to group signatures using angular and Euclidean distances. • Meat reference materials (>70 elements) can be used for cross-comparison between studies.

  3. Game meat authentication through rare earth elements fingerprinting.

    Science.gov (United States)

    Danezis, G P; Pappas, A C; Zoidis, E; Papadomichelakis, G; Hadjigeorgiou, I; Zhang, P; Brusic, V; Georgiou, C A

    2017-10-23

    Accurate labelling of meat (e.g. wild versus farmed, geographical and genetic origin, organic versus conventional, processing treatment) is important to inform the consumers about the products they buy. Meat and meat products declared as game have higher commercial value making them target to fraudulent labelling practices and replacement with non-game meat. We have developed and validated a new method for authentication of wild rabbit meat using elemental metabolomics approach. Elemental analysis was performed using rapid ultra-trace multi-element measurement by inductively coupled plasma mass spectrometry (ICP-MS). Elemental signatures showed excellent ability to discriminate the wild rabbit from non-wild rabbit meat. Our results demonstrate the usefulness of metabolic markers -rare earth signatures, as well as other trace element signatures for game meat authentication. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. In-gel and OFFGEL-based proteomic approach for authentication of meat species from minced meat and meat products.

    Science.gov (United States)

    Naveena, Basappa M; Jagadeesh, Deepak S; Kamuni, Veeranna; Muthukumar, Muthupalani; Kulkarni, Vinayak V; Kiran, Mohan; Rapole, Srikanth

    2018-02-01

    Fraudulent mislabelling of processed meat products on a global scale that cannot be detected using conventional techniques necessitates sensitive, robust and accurate methods of meat authentication to ensure food safety and public health. In the present study, we developed an in-gel (two-dimensional gel electrophoresis, 2DE) and OFFGEL-based proteomic method for authenticating raw and cooked water buffalo (Bubalus bubalis), sheep (Ovis aries) and goat (Caprus hircus) meat and their mixes. The matrix-assisted liquid desorption/ionization time-of-flight mass spectrometric analysis of proteins separated using 2DE or OFFGEL electrophoresis delineated species-specific peptide biomarkers derived from myosin light chain 1 and 2 (MLC1 and MLC2) of buffalo-sheep-goat meat mix in definite proportions at 98:1:1, 99:0.5:0.5 and 99.8:0.1:0.1 that were found stable to resist thermal processing. In-gel and OFFGEL-based proteomic approaches are efficient in authenticating meat mixes spiked at minimum 1.0% and 0.1% levels, respectively, in triple meat mix for both raw and cooked samples. The study demonstrated that authentication of meat from a complex mix of three closely related species requires identification of more than one species-specific peptide due to close similarity between their amino acid sequences. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  5. Significance of authenticity in meat and meat products in Iran

    Directory of Open Access Journals (Sweden)

    Tahereh Rezazadeh

    2014-06-01

    Full Text Available The Authenticity of meat products is very important for religious and health reasons in Iran. According to legislation in Iran, the consumption and importation of pork, horse, donkey and cat products should be banned. Therefore, the identification of meat products cannot be judged solely by its appearance. This issue led to the authenticity of bovine, sheep, pig, horse, donkey, chicken and soya (Glycine max in raw and processed meat products.In this study, specific primers were designed for the identification of pig ( base pair, donkey (325 base pair, chicken (391 base pair, sheep (499 base pair, horse (607 base pair, soya (707 base pair and bovine (853 base pair by Polymerase chain reaction. Following PCR, expected,, , 499,,  and  base pair fragments were detectable in pig, donkey, chicken, sheep, horse, soya and bovine, respectively. This protocol can be used for identification of raw and processed meat products in various animal species for replication to regulatory obligations for meat species safety in Iran.

  6. Authentic sheep meat in the European Union: Factors influencing and validating its unique meat quality.

    Science.gov (United States)

    Erasmus, Sara W; Muller, Magdalena; Hoffman, Louwrens C

    2017-05-01

    Authentic meat products are gaining attention through their unique quality characteristics linked to their origin. Various factors are known to influence the quality of fresh meat. This review describes the different Protected Designation of Origin (PDO) and Protected Geographical Indication (PGI) lamb types and discusses the factors which influences its unique sensory and chemical characteristics. Flavour, aroma, texture and colour play an integral part in the sensory quality of denomination of origin fresh meat products. For authentic fresh sheep meat the sensory (as well as chemical) quality is largely influenced by diet followed by breed, age and gender. However, diet forms the link with the geographical area of origin, which together with the traditional production system and sheep breeds used, lends the product its authentic nature. This review shows how diet linked to origin can affect the quality of the meat and furthermore how other factors such as breed can also have an effect. Research relating to the authentic lamb types were evaluated and the shortcomings highlighted in order to assist with the development of PDO and PGI specifications in the future. © 2016 Society of Chemical Industry. © 2016 Society of Chemical Industry.

  7. Authentication of meat and meat products vs. detection of animal species in feed - what is the difference?

    Science.gov (United States)

    Nešić, K.; Stojanović, D.; Baltić, Ž. M.

    2017-09-01

    Authenticity of food is an issue that is growing in awareness and concern. Although food adulteration has been present since antiquity, it has broadened to include entire global populations as modern food supply chains have expanded, enriched and become more complex. Different forms of adulteration influence not only the quality of food products, but also may cause harmful health effects. Meat and meat products are often subjected to counterfeiting, mislabelling and similar fraudulent activities, while substitutions of meat ingredients with other animal species is one among many forms of food fraud. Feed is also subject to testing for the presence of different animal species, but as part of the eradication process of transmissible spongiform encephalopathies (TSE). In both food and feed cases, the final goal is consumer protection, which should be provided by quick, precise and specific tools. Several analytical tests have been employed for such needs. This paper provides an overview of authentication of meat and meat products compared with species identification in feed control, highlighting the most prevalent laboratory methods.

  8. Authentication of traditional game meat products by the use of species-specific PCR

    OpenAIRE

    Santos, Cristina; Melo, Vítor S.; Mafra, I.; Amaral, J.S.; Estevinho, Leticia M.; Oliveira, M.B.P.P.

    2011-01-01

    Authenticity evaluation in meat products encompasses many issues, including the fraudulent substitution of higher commercial valued meats by cheaper meats and the presence of undeclared species. Due to its characteristic and intensive flavour and its healthier composition, game meats are considered as delicacy products and command higher prices compared to other meats, thus being susceptible targets for frauds. The manufacture of traditional meat products is a long-established practice in ...

  9. Meat species identification and Halal authentication analysis using mitochondrial DNA.

    Science.gov (United States)

    Murugaiah, Chandrika; Noor, Zainon Mohd; Mastakim, Maimunah; Bilung, Lesley Maurice; Selamat, Jinap; Radu, Son

    2009-09-01

    A method utilizing PCR-restriction fragment length polymorphism (RFLP) in the mitochondrial genes was developed for beef (Bos taurus), pork (Sus scrofa), buffalo (Bubalus bubali), quail (Coturnix coturnix), chicken (Gallus gallus), goat (Capra hircus), rabbit (Oryctolagus cuniculus) species identification and Halal authentication. PCR products of 359-bp were successfully obtained from the cyt b gene of these six meats. AluI, BsaJI, RsaI, MseI, and BstUI enzymes were identified as potential restriction endonucleases to differentiate the meats. The genetic differences within the cyt b gene among the meat were successfully confirmed by PCR-RFLP. A reliable typing scheme of species which revealed the genetic differences among the species was developed.

  10. Authentication of beef versus horse meat using 60 MHz 1H NMR spectroscopy.

    Science.gov (United States)

    Jakes, W; Gerdova, A; Defernez, M; Watson, A D; McCallum, C; Limer, E; Colquhoun, I J; Williamson, D C; Kemsley, E K

    2015-05-15

    This work reports a candidate screening protocol to distinguish beef from horse meat based upon comparison of triglyceride signatures obtained by 60 MHz (1)H NMR spectroscopy. Using a simple chloroform-based extraction, we obtained classic low-field triglyceride spectra from typically a 10 min acquisition time. Peak integration was sufficient to differentiate samples of fresh beef (76 extractions) and horse (62 extractions) using Naïve Bayes classification. Principal component analysis gave a two-dimensional "authentic" beef region (p=0.001) against which further spectra could be compared. This model was challenged using a subset of 23 freeze-thawed training samples. The outcomes indicated that storing samples by freezing does not adversely affect the analysis. Of a further collection of extractions from previously unseen samples, 90/91 beef spectra were classified as authentic, and 16/16 horse spectra as non-authentic. We conclude that 60 MHz (1)H NMR represents a feasible high-throughput approach for screening raw meat. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  11. OFFGEL electrophoresis and tandem mass spectrometry approach compared with DNA-based PCR method for authentication of meat species from raw and cooked ground meat mixtures containing cattle meat, water buffalo meat and sheep meat.

    Science.gov (United States)

    Naveena, Basappa M; Jagadeesh, Deepak S; Jagadeesh Babu, A; Madhava Rao, T; Kamuni, Veeranna; Vaithiyanathan, S; Kulkarni, Vinayak V; Rapole, Srikanth

    2017-10-15

    The present study compared the accuracy of an OFFGEL electrophoresis and tandem mass spectrometry-based proteomic approach with a DNA-based method for meat species identification from raw and cooked ground meat mixes containing cattle, water buffalo and sheep meat. The proteomic approach involved the separation of myofibrillar proteins using OFFGEL electrophoresis, SDS-PAGE and protein identification by MALDI-TOF MS. Species-specific peptides derived from myosin light chain-1 and 2 were identified for authenticating buffalo meat spiked at a minimum 0.5% level in sheep meat with high confidence. Relative quantification of buffalo meat mixed with sheep meat was done by quantitative label-free mass spectrometry using UPLC-QTOF and PLGS search engine to substantiate the confidence level of the data. In the DNA-based method, PCR amplification of mitochondrial D loop gene using species specific primers found 226bp and 126bp product amplicons for buffalo and cattle meat, respectively. The method was efficient in detecting a minimum of 0.5% and 1.0% when buffalo meat was spiked with cattle meat in raw and cooked meat mixes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Where is the game? Wild meat products authentication in South Africa: a case study

    OpenAIRE

    D?Amato, Maria Eugenia; Alechine, Evguenia; Cloete, Kevin Wesley; Davison, Sean; Corach, Daniel

    2013-01-01

    Background Wild animals? meat is extensively consumed in South Africa, being obtained either from ranching, farming or hunting. To test the authenticity of the commercial labels of meat products in the local market, we obtained DNA sequence information from 146 samples (14 beef and 132 game labels) for barcoding cytochrome c oxidase subunit I and partial cytochrome b and mitochondrial fragments. The reliability of species assignments were evaluated using BLAST searches in GenBank, maximum lik...

  13. Stable isotope ratio analysis: A potential analytical tool for the authentication of South African lamb meat.

    Science.gov (United States)

    Erasmus, Sara Wilhelmina; Muller, Magdalena; van der Rijst, Marieta; Hoffman, Louwrens Christiaan

    2016-02-01

    Stable isotope ratios ((13)C/(12)C and (15)N/(14)N) of South African Dorper lambs from farms with different vegetation types were measured by isotope ratio mass spectrometry (IRMS), to evaluate it as a tool for the authentication of origin and feeding regime. Homogenised and defatted meat of the Longissimus lumborum (LL) muscle of lambs from seven different farms was assessed. The δ(13)C values were affected by the origin of the meat, mainly reflecting the diet. The Rûens and Free State farms had the lowest (p ⩽ 0.05) δ(15)N values, followed by the Northern Cape farms, with Hantam Karoo/Calvinia having the highest δ(15)N values. Discriminant analysis showed δ(13)C and δ(15)N differences as promising results for the use of IRMS as a reliable analytical tool for lamb meat authentication. The results suggest that diet, linked to origin, is an important factor to consider regarding region of origin classification for South African lamb. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Authentication of beef versus horse meat using 60 MHz 1H NMR spectroscopy

    Science.gov (United States)

    Jakes, W.; Gerdova, A.; Defernez, M.; Watson, A.D.; McCallum, C.; Limer, E.; Colquhoun, I.J.; Williamson, D.C.; Kemsley, E.K.

    2015-01-01

    This work reports a candidate screening protocol to distinguish beef from horse meat based upon comparison of triglyceride signatures obtained by 60 MHz 1H NMR spectroscopy. Using a simple chloroform-based extraction, we obtained classic low-field triglyceride spectra from typically a 10 min acquisition time. Peak integration was sufficient to differentiate samples of fresh beef (76 extractions) and horse (62 extractions) using Naïve Bayes classification. Principal component analysis gave a two-dimensional “authentic” beef region (p = 0.001) against which further spectra could be compared. This model was challenged using a subset of 23 freeze–thawed training samples. The outcomes indicated that storing samples by freezing does not adversely affect the analysis. Of a further collection of extractions from previously unseen samples, 90/91 beef spectra were classified as authentic, and 16/16 horse spectra as non-authentic. We conclude that 60 MHz 1H NMR represents a feasible high-throughput approach for screening raw meat. PMID:25577043

  15. Meat species identification and Halal authentication using PCR analysis of raw and cooked traditional Turkish foods.

    Science.gov (United States)

    Ulca, Pelin; Balta, Handan; Çağın, Ilknur; Senyuva, Hamide Z

    2013-07-01

    The method performance characteristics of commercially available PCR kits for animal species identification were established. Comminuted meat products containing different levels of pork were prepared from authentic beef, chicken, and turkey. These meat products were analysed in the raw state and after cooking for 20 min at 200 °C. For both raw and cooked meats, the PCR kit could correctly identify the animal species and could reliably detect the addition of pork at a level below 0.1%. A survey of 42 Turkish processed meat products such as soudjouk, salami, sausage, meatball, cured spiced beef and doner kebap was conducted. Thirty-six samples were negative for the presence of pork (meatball sample labelled as 100% beef was found to contain chicken. Another turkey meatball sample was predominantly chicken. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. Assessment of meat authenticity using bioinformatics, targeted peptide biomarkers and high-resolution mass spectrometry.

    Science.gov (United States)

    Ruiz Orduna, Alberto; Husby, Erik; Yang, Charles T; Ghosh, Dipankar; Beaudry, Francis

    2015-01-01

    In recent years a significant increase of food fraud has been observed, ranging from false label claims to the use of additives and fillers to increase profitability. Recently in 2013 horse and pig DNAs were detected in beef products sold from several retailers. Mass spectrometry (MS) has become the workhorse in protein research, and the detection of marker proteins could serve for both animal species and tissue authentication. Meat species authenticity is performed in this paper using a well-defined proteogenomic annotation, carefully chosen surrogate tryptic peptides and analysis using a hybrid quadrupole-Orbitrap MS. Selected mammalian meat samples were homogenised and proteins were extracted and digested with trypsin. The samples were analysed using a high-resolution MS. Chromatography was achieved using a 30-min linear gradient along with a BioBasic C8 100 × 1 mm column at a flow rate of 75 µl min(-1). The MS was operated in full-scan high resolution and accurate mass. MS/MS spectra were collected for selected proteotypic peptides. Muscular proteins were methodically analysed in silico in order to generate tryptic peptide mass lists and theoretical MS/MS spectra. Following a comprehensive bottom-up proteomic analysis, we detected and identified a proteotypic myoglobin tryptic peptide (120-134) for each species with observed m/z below 1.3 ppm compared with theoretical values. Moreover, proteotypic peptides from myosin-1, myosin-2 and β-haemoglobin were also identified. This targeted method allowed comprehensive meat speciation down to 1% (w/w) of undesired product.

  17. Multiresistant Bacteria Isolated from Chicken Meat in Austria

    Directory of Open Access Journals (Sweden)

    Gernot Zarfel

    2014-12-01

    Full Text Available Multidrug resistant bacteria (MDR bacteria, such as extended spectrum beta-lactamase (ESBL Enterobacteriaceae, methicillin resistant Staphylococcus aureus (MRSA, and vancomycin-resistant Enterococci (VRE, pose a challenge to the human health care system. In recent years, these MDR bacteria have been detected increasingly outside the hospital environment. Also the contamination of food with MDR bacteria, particularly of meat and meat products, is a concern. The aim of the study was to evaluate the occurrence of MDR bacteria in chicken meat on the Austrian market. For this study, 50 chicken meat samples were analysed. All samples originated from chickens slaughtered in Austrian slaughterhouses and were marked as produced in Austria. Samples were analysed for the presence of ESBL Enterobacteriaceae, methicillin resistant Staphylococci and VRE. Resistance genes of the isolated bacteria were characterised by PCR and sequencing. In the present study 26 ESBL producing E. coli, five mecA gene harbouring Staphylococci (but no MRSA, and four VRE were detected in chicken meat samples of Austrian origin. In 24 (48% of the samples no ESBL Enterobacteriaceae, MRSA, methicillin resistant coagulase negative Staphylococcus (MRCNS or VRE could be detected. None of the samples contained all three types of investigated multiresistant bacteria. In concordance to previous studies, CTX-M-1 and SHV-12 were the dominant ESBL genes.

  18. Species Authentication of Common Meat Based on PCR Analysis of the Mitochondrial COI Gene.

    Science.gov (United States)

    Dai, Zhenyu; Qiao, Jiao; Yang, Siran; Hu, Shen; Zuo, Jingjing; Zhu, Weifeng; Huang, Chunhong

    2015-07-01

    Adulteration of meat products and costly animal-derived commodities with their inferior/cheaper counterparts is a grievous global problem. Species authentication is still technical challenging, especially to those deep processed products. The present study described the design of seven sets of species-specific primer based on a high heterozygous region of mitochondrial cytochrome c oxidase subunit I (COI) gene. These primers were proven to have high species specificity and no cross-reactions and unexpected products to different DNA source. Multiplex PCR assay was achieved for rapid and economical identification of four commonly consumed meats (pork, beef, chicken, and mutton). The conventional PCR assay was sensitive down to 0.001 ng of DNA template in the reactant. The developed method was also powerful in detecting as low as 0.1-mg adulterated pork (0.05 % in wt/wt) in an artificial counterfeited mutton. Validation test showed that the assay is specific, reproducible, and robust in commercial deep processed meats, leatherware, and feather commodities. This proposed method will be greatly beneficial to the consumers, food industry, leather, and feather commodity manufacture.

  19. THE EFFECTS OF HORSE MEAT SCANDAL ON ROMANIAN MEAT MARKET

    OpenAIRE

    Silvius STANCIU; Nicoleta STANCIUC; Loredana DUMITRASCU; Roxana ION; Costel NISTOR

    2013-01-01

    Sustainable business in the domestic production of meat must meet both the usual Requirements regarding quality, safety for customer and New Challenges in the European meat market. The Romanian food industry must meet the challenge of recent suspicions regarding the substitution of beef meat with horse meat. The modern applicable to meat traceability systems and authentication procedures can be considered as new ways to support fair trade and transparency, THUS, removing suspicions that appea...

  20. THE EFFECTS OF HORSE MEAT SCANDAL ON ROMANIAN MEAT MARKET

    Directory of Open Access Journals (Sweden)

    Silvius STANCIU

    2013-06-01

    Full Text Available Sustainable business in the domestic production of meat must meet both the usual Requirements regarding quality, safety for customer and New Challenges in the European meat market. The Romanian food industry must meet the challenge of recent suspicions regarding the substitution of beef meat with horse meat. The modern applicable to meat traceability systems and authentication procedures can be considered as new ways to support fair trade and transparency, THUS, removing suspicions that appeared lately. Lack of safety measures in the field can affect business continuity critically, creating significant losses.

  1. Authentication of Meat Species in Sucuk by Multiplex PCR

    Directory of Open Access Journals (Sweden)

    Osman İrfan İLHAK

    2015-01-01

    Full Text Available The identification of meat species used in meat products is important by reason of economic considerations, religious factors, verification of label, and prevention of unfair-market competition. In this paper, multiplex PCR method was experienced for routine detection of equine (horse and donkey, poultry (chicken and turkey, pig and cattle meat in sucuk (sausage. The primers used for these animals generated specific fragments, and they did not show cross reactions with the DNA from the other genus of animal. After multiplex PCR was successfully optimized, a field study was carried out to investigate the presence of horse, donkey, chicken, turkey and pig meat in 50 sucuks (30 beef and 20 beef + poultry collected from markets. The result of the field study indicated that 23.3% of 30 beef sucuk samples were containing poultry meat. None of the 50 sucuk samples was containing pig meat, but one (2% of the samples generated equine fragment. The present study showed that the multiplex PCR method can be used for routine analysis of meat species identification, verification and control of label information of meat products.

  2. “What is so Austrian about Austrian Economics?”

    OpenAIRE

    David Colander

    2009-01-01

    Modern mainstream economics is a plurocracy in which there is no orthodoxy of ideas, only an orthodoxy of method. Given the training it provides its students, mainstream economic’s natural domain is science. With the mainstream’s acceptance of complexity views of the economy, Austrian economist’s views can now get a hearing within the mainstream. Thus, within the science of economics, there is no need for a separate Austrian economics. However, there is a need for Austrian economics in politi...

  3. Austrian highlights

    International Nuclear Information System (INIS)

    Jones, Simon

    2001-01-01

    An overview of recent development in the Austrian hydroelectric industry is presented, and details of the installed capacity, the Austrian government's power market reform package, and the promotion of small-scale hydroelectric power plants are given. The operation of Verbund - Austria's largest power generator and distributor - and the restructuring of the Verbund's main Austrian Hydro Power (AHP) generating group are discussed. The export of power, the joint venture of Verbund with CIR Energia in Italy to market power to commercial and industrial users, and the controversy surrounding the Freudenau run-of-the river plant which successfully tested a matrix turbine are reported

  4. Where is the game? Wild meat products authentication in South Africa: a case study.

    Science.gov (United States)

    D'Amato, Maria Eugenia; Alechine, Evguenia; Cloete, Kevin Wesley; Davison, Sean; Corach, Daniel

    2013-03-01

    Wild animals' meat is extensively consumed in South Africa, being obtained either from ranching, farming or hunting. To test the authenticity of the commercial labels of meat products in the local market, we obtained DNA sequence information from 146 samples (14 beef and 132 game labels) for barcoding cytochrome c oxidase subunit I and partial cytochrome b and mitochondrial fragments. The reliability of species assignments were evaluated using BLAST searches in GenBank, maximum likelihood phylogenetic analysis and the character-based method implemented in BLOG. The Kimura-2-parameter intra- and interspecific variation was evaluated for all matched species. The combined application of similarity, phylogenetic and character-based methods proved successful in species identification. Game meat samples showed 76.5% substitution, no beef samples were substituted. The substitutions showed a variety of domestic species (cattle, horse, pig, lamb), common game species in the market (kudu, gemsbok, ostrich, impala, springbok), uncommon species in the market (giraffe, waterbuck, bushbuck, duiker, mountain zebra) and extra-continental species (kangaroo). The mountain zebra Equus zebra is an International Union for Conservation of Nature (IUCN) red listed species. We also detected Damaliscus pygargus, which is composed of two subspecies with one listed by IUCN as 'near threatened'; however, these mitochondrial fragments were insufficient to distinguish between the subspecies. The genetic distance between African ungulate species often overlaps with within-species distance in cases of recent speciation events, and strong phylogeographic structure determines within-species distances that are similar to the commonly accepted distances between species. The reliability of commercial labeling of game meat in South Africa is very poor. The extensive substitution of wild game has important implications for conservation and commerce, and for the consumers making decisions on the basis of

  5. Label Authentication of Minced Meat by Automated Near Infrared Spectroscopy

    Science.gov (United States)

    Inspections are needed for minced meat because physical characteristics cannot be used to identify its content in terms of meat species or part, i.e. pork, chicken, beef, bacon, shank or internal organs. In addition, a rapid technique to verify meat labels in the viewpoint of nutritional content and...

  6. Review: Authentication and traceability of foods from animal origin by polymerase chain reaction-based capillary electrophoresis.

    Science.gov (United States)

    Rodríguez-Ramírez, Roberto; González-Córdova, Aarón F; Vallejo-Cordoba, Belinda

    2011-01-31

    This work presents an overview of the applicability of PCR-based capillary electrophoresis (CE) in food authentication and traceability of foods from animal origin. Analytical approaches for authenticating and tracing meat and meat products and fish and seafood products are discussed. Particular emphasis will be given to the usefulness of genotyping in food tracing by using CE-based genetic analyzers. Copyright © 2010 Elsevier B.V. All rights reserved.

  7. The consumer in Austrian economics and the Austrian perspective on consumer policy

    NARCIS (Netherlands)

    Leen, A.R.

    1999-01-01

    In this thesis I examined the place of the competitive-entrepreneurial consumer in Austrian economic thought. For a neoclassical economist, competition among consumers is hard to find. For an Austrian economist, however, it is a necessity. The introduction puts forward the problem that although an

  8. On Austrian regional economics

    NARCIS (Netherlands)

    Heijman, W.J.M.; Leen, A.R.

    2004-01-01

    The aim of this research note is two-fold, firstly, to clarify the growing interaction between regional science and Austrian economics and their awareness of each other. We elucidate the Austrian methodology, called praxeology, which is especially misunderstood in regional science. Secondly, we

  9. Multiplex-PCR As a Rapid and Sensitive Method for Identification of Meat Species in Halal-Meat Products.

    Science.gov (United States)

    Alikord, Mahsa; Keramat, Javad; Kadivar, Mahdi; Momtaz, Hassan; Eshtiaghi, Mohammad N; Homayouni-Rad, Aziz

    2017-01-01

    Species identification and authentication in meat products are important subjects for ensuring the health of consumers. The multiplex-PCR amplification and species- specific primer set were used for the identification of horse, donkey, pig and other ruminants in raw and processed meat products. Oligonucleotid primers were designed and patented for amplification of species-specific mitochondrial DNA sequences of each species and samples were prepared from binary meat mixtures. The results showed that meat species were accurately determined in all combinations by multiplex-PCR, and the sensitivity of this method was 0.001 ng, rendering this technique open to and suitable for use in industrial meat products. It is concluded that more fraud is seen in lower percentage industrial meat products than in higher percentage ones. There was also more fraud found in processed products than in raw ones. This rapid and useful test is recommended for quality control firms for applying more rigorous controls over industrial meat products, for the benefit of target consumers. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  10. Austrian natural scientists in exile

    International Nuclear Information System (INIS)

    Broda, E.

    1978-01-01

    This text was written by E. Broda for the international symposium for exploration of the Austrian exile from 1934 to 1945 (“Internationales Symposiums zur Erforschung des österreichischen Exils von 1934 bis 1945”) in the year 1978. The article is about the specific problems of the Austrian scientific landscape, caused by the political events in the first half of the 20th century. The focus is primarily on the enormous ‘brain drain’, triggered by political repression in the period of Nazi rule (1938 - 1945), the Austro-fascism period (1934 - 1938) and the economic regression, anti-intellectual and anti-Semitic sentiment in the Country since 1918. The article emphasizes the importance of exile organizations, such as the ‘Free Austrian Movement’ or the ‘Association of Austrian Engineers, Chemists and Scientific Workers in Great Britain’ for the reconstruction of a scientific culture in Austria, after the Second World War. (rössner) [de

  11. Detection of adulterations in tradictional portuguese game meat products by polymerase chain reaction technique

    OpenAIRE

    Santos, C.G.; Melo, V.S.; Amaral, J.S.; Oliveira, M.B.P.P.; Mafra, I.

    2013-01-01

    Authenticity assessment and fraud detection in processed meat products have becn attracting an increased attention driven by public health, economic and legal cancems, and also for religiolls reasons. Currcntly, ooe af the major issues conceming adulterations in the meat indust:ry regards the fraudulent substitution af higher commercial valued meat species by less expensive oDes [1]. The manufacture af traditional meat products is a long-established practice in the Northeast of Po...

  12. Quantitative Detection of Horse Contamination in Cooked Meat Products by ELISA.

    Science.gov (United States)

    Thienes, Cortlandt P; Masiri, Jongkit; Benoit, Lora A; Barrios-Lopez, Brianda; Samuel, Santosh A; Cox, David P; Dobritsa, Anatoly P; Nadala, Cesar; Samadpour, Mansour

    2018-05-01

    Concerns about the contamination of meat products with horse meat and new regulations for the declaration of meat adulterants have highlighted the need for a rapid test to detect horse meat adulteration. To address this need, Microbiologique, Inc., has developed a sandwich ELISA that can quantify the presence of horse meat down to 0.1% (w/w) in cooked pork, beef, chicken, goat, and lamb meats. This horse meat authentication ELISA has an analytical sensitivity of 0.000030 and 0.000046% (w/v) for cooked and autoclaved horse meat, respectively, and an analytical range of quantitation of 0.05-0.8% (w/v) in the absence of other meats. The assay is rapid and can be completed in 1 h and 10 min. Moreover, the assay is specific for cooked horse meat and does not demonstrate any cross-reactivity with xenogeneic cooked meat sources.

  13. Proton-transfer reaction mass spectrometry (PTR-MS) for the authentication of regionally unique South African lamb

    NARCIS (Netherlands)

    Erasmus, Sara W.; Muller, Magdalena; Alewijn, Martin; Koot, Alex H.; Ruth, van Saskia M.; Hoffman, Louwrens C.

    2017-01-01

    The volatile fingerprints of South African lamb meat and fat were measured by proton-transfer mass spectrometry (PTR-MS) to evaluate it as an authentication tool. Meat and fat of the Longissimus lumborum (LL) of lambs from six different regions were assessed. Analysis showed that the volatile

  14. The reception of Austrian economics in Italy

    Directory of Open Access Journals (Sweden)

    Antonio Magliulo

    2018-04-01

    Full Text Available Nowadays the Austrian School enjoys high reputation in Italy: books by Mises, Hayek and other Austrian economists are constantly republished and reviewed with great interest, both inside and outside academic circles. The situation was very different decades ago, when just a few Italian economists devoted attention to the Austrian School. This work studies the reception of Austrian Economics in Italy, from the beginning to our days, so as to bring out, by way of comparison, relevant features of Italian economic culture. We will try to offer just an overview of the entire story, in an attempt to provide useful elements for a deeper analysis of further topics and periods.

  15. Communicating food safety, authenticity and consumer choice. Field experiences.

    Science.gov (United States)

    Syntesa, Heiner Lehr

    2013-04-01

    The paper reviews patented and non-patented technologies, methods and solutions in the area of food traceability. It pays special attention to the communication of food safety, authenticity and consumer choice. Twenty eight recent patents are reviewed in the areas of (secure) identification, product freshness indicators, meat traceability, (secure) transport of information along the supply chain, country/region/place of origin, automated authentication, supply chain management systems, consumer interaction systems. In addition, solutions and pilot projects are described in the areas of Halal traceability, traceability of bird's nests, cold chain management, general food traceability and other areas.

  16. [Pain care in Austrian health care centers: Questionnaire study on the current status of Austrian pain clinics].

    Science.gov (United States)

    Szilagyi, I-S; Bornemann-Cimenti, H; Messerer, B; Vittinghoff, M; Sandner-Kiesling, A

    2015-12-01

    Pain clinics provide interdisciplinary therapy to treat chronic pain patients and to increase the return-to-work rate. In recent years and due to increased economic pressure in health care, a change in the management of pain in Austrian health care centers has been observed. For the analysis of the current situation, two surveys addressing all Austrian pain clinics were performed. In total, 133 heads of Austrian Anesthesia Departments were interviewed online and personally. The data from the first interview were confirmed by an additional telephone survey that was performed by one anesthetist per Austrian state (n = 9). Currently, 44 Austrian pain clinics are active. During the last 5 years, 9 pain clinics closed. Adding the current active pain clinics together, they represent a total of 17.5 full-time-operated clinics. The most common reasons for closing the pain clinics were lack of personnel (47%), lack of time resources (26%), lack of space resources (11%), and financial difficulties (11%). A reduction of >50% of operating hours during the last 3 years was reported by 9 hospitals. The reasons for not running a pain clinic were lack of personnel (36%), lack of time (25%) and department too small (16%). Estimates between actual and required clinics indicate that 49.5 full-time-operating pain clinics are lacking in Austria, resulting in 74% of the Austrian chronic pain patients not receiving interdisciplinary pain management. Our survey confirmed the closure of 9 pain clinics during the last 5 years due to lack of personnel and time. Pain clinics appear to provide the simplest economic saving potential. This development is a major concern. Although running a pain clinic seems to be expensive at the first sight, it reduces pain, sick leave, complications, and potential legal issues against health care centers, while simultaneously increasing the hospital's competitiveness. Our results show that 74% of Austrian chronic pain patients do not have access to an

  17. Molecular assay to fraud identification of meat products.

    Science.gov (United States)

    Doosti, Abbas; Ghasemi Dehkordi, Payam; Rahimi, Ebrahim

    2014-01-01

    Detection of species fraud in meat products is important for consumer protection and food industries. A molecular technique such as PCR method for detection of beef, sheep, pork, chicken, donkey, and horse meats in food products was established. The purpose of this study was to identification of fraud and adulteration in industrial meat products by PCR-RFLP assay in Iran. In present study, 224 meat products include 68 sausages, 48 frankfurters, 55 hamburgers, 33 hams and 20 cold cut meats were collected from different companies and food markets in Iran. Genomic DNA was extracted and PCR was performed for gene amplification of meat species using specific oligonucleotid primers. Raw meat samples are served as the positive control. For differentiation between donkey's and horse's meat, the mitochondrial DNA segment (cytochrome-b gene) was amplified and products were digested with AluI restriction enzyme. Results showed that 6 of 68 fermented sausages (8.82%), 4 of 48 frankfurters (8.33%), 4 of 55 hamburgers (7.27%), 2 of 33 hams (6.6%), and 1 of 20 cold cut meat (5%) were found to contain Haram (unlawful or prohibited) meat. These results indicate that 7.58% of the total samples were not containing Halal (lawful or permitted) meat and have another meat. These findings showed that molecular methods such as PCR and PCR-RFLP are potentially reliable techniques for detection of meat type in meat products for Halal authentication.

  18. The Austrian Space Plan

    Science.gov (United States)

    Pseiner, K.; Balogh, W.

    2002-01-01

    After several years of preparation and discussion among the involved players, the Austrian Space Plan was approved for implementation in November 2001. Based on careful benchmarking and analysis of the capabilities of the Austrian space sector it aims to create excellent conditions for the sector's further development. The new space strategy embraces Austria's participation in the mandatory and optional programmes of the European Space Agency and establishes a National Space Programme supported by separate funding opportunities. A set of clearly-defined indicators ensures that the progress in implementing the Space Plan can be objectively judged through independent, annual reviews. The National Space Programme promotes international cooperation in space research and space activities with the aim to strengthen the role of space science and to better prepare Austrian space industry for the commercial space market. In the framework of the Space Plan the Austrian Space Agency has been tasked with integrating the industry's growing involvement in aeronautics activities to better utilize synergies with the space sector. This paper reviews the various steps leading to the approval of the new space strategy and discusses the hurdles mastered in this process. It reports on the Space Plan's first results, specifically taking into account projects involving international cooperation. For the first the Austria aerospace-sector can rely on an integrated strategy for aeronautics- and space activities which is firmly rooted in the efforts to enhance the country's R&D activities. It may also act as a useful example for other small space- using countries planning to enhance their involvement in space activities.

  19. Product Liability: A Neo-Austrian Based Perspective

    NARCIS (Netherlands)

    Folmer, H.; Heijman, W.J.M.; Leen, A.R.

    2002-01-01

    The paper is an exercise in a neo-Austrian based economic analysis of product liability. After a short historical introduction, we take two of the basic premises of Austrian economic thought and see which system of product liability results. If costs are subjective and entrepreneurship is the

  20. Meat species identification by polymerase chain reaction technique to authenticate alheiras de caça

    OpenAIRE

    Santos, C.G.; Melo, V.S.; Amaral, J.S.; Oliveira, M.B.P.P.; Mafra, I.

    2012-01-01

    The manufacture of traditional meat products is a long-established practice in the Northeast of Portugal, being Alheiras one of the most appreciated products. Alheiras are traditional smoked fermented sausages, mainly produced with pork and poultry meat in a mixture with bread and spices. Currently, game meat Alheiras (Alheiras de caça) are also available as very attractive meat products and prone to adulterations. To allow accurate information for consumers and avoid unfair co...

  1. Application of FTIR Spectroscopy and Chemometrics for Halal Authentication of Beef Meatball Adulterated with Dog Meat

    OpenAIRE

    Rahayu, Wiranti Sri; Rohman, Abdul; Martono, Sudibyo; Sudjadi, Sudjadi

    2018-01-01

    Beef meatball is one of the favorite meat-based food products among Indonesian community. Currently, beef is very expensive in Indonesian market compared to other common meat types such as chicken and lamb. This situation has intrigued some unethical meatball producers to replace or adulterate beef with lower priced-meat like dog meat. The objective of this study was to evaluate the capability of FTIR spectroscopy combined with chemometrics for identification and quantification of dog meat (D...

  2. Mr. Wolfgang Petritsch, Austrian Ambassador

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    Dr.Peter Schmid/CERN/EP, Dr.Wolfgang Petritsch, Austrian Ambassador, Permanent representative at UN, Mrs.Nora Petritsch, Dr.Kurt Hubner/CERN/AC, Mrs. Frederike Klaus-Salesin, Adviser, Mrs.Andrea Strohmeier, Secretary of the Ambassador, Mr.Heinz Klaus, Attaché, Dr.Theodor Tortschanoff/CERN/LHC, Mr.Peter Storer, Advisor. Dr.Peter Schmid/CERN/EP, Dr.Wolfgang Petritsch, Austrian Ambassador, Permanent representative at UN, Mrs.Nora Petritsch, Dr.Kurt Hubner/CERN/AC, Mrs. Frederike Klaus-Salesin, Adviser, Mrs.Andrea Strohmeier, Secretary of the Ambassador, Mr.Heinz Klaus, Attaché, Dr.Theodor Tortschanoff/CERN/LHC, Mr.Peter Storer, Advisor.

  3. Austrian emission under international comparison

    International Nuclear Information System (INIS)

    Anderl, M.; Gager, M.; Gugele, B.; Huttunen, K.; Kurzweil, A.; Poupa, S.; Ritter, M.; Wappel, D.; Wieser, M.

    2004-01-01

    A comparison between anthropogenic emissions of CO 2 , CH 4 , N 2 O, SO 2 , NO x , volatile organic compounds (NMVOC), NH 3 and CO from the European Union, European Union candidate countries and Austria is presented. Data covers the years 1999-2001 and the emissions values per habitant are provided as well as a comparison against the Kyoto goals. In the middle of the European mean values are the austrian emissions values, austrian SO 2 emissions are the smallest, however CH 4 , CO and NMVOC emissions are over the European mean values. 8 figs., 6 tabs. (nevyjel)

  4. Sika deer (Cervus nippon)-specific real-time PCR method to detect fraudulent labelling of meat and meat products.

    Science.gov (United States)

    Kaltenbrunner, Maria; Hochegger, Rupert; Cichna-Markl, Margit

    2018-05-08

    Since game meat is more valuable and expensive than meat from domesticated animal species it is a potential target for adulteration. Analytical methods must allow the identification and quantification of meat species to be applicable for the detection of fraudulent labelling. We developed a real-time PCR assay for the authentication of sika deer (Cervus nippon) and products thereof. The primer/probe system amplifies a 71 bp fragment of the kappa-casein precursor gene. Since the target sequence contained only one sika deer-specific base, we introduced a deliberate base mismatch in the forward primer. The real-time PCR assay did not show cross-reactivity with 19 animal and 49 plant species tested. Low cross-reactivity was observed with red deer, fallow deer, reindeer and moose. However, with a ΔCt value of ≥11.79 between sika deer and the cross-reacting species, cross-reactivity will not affect the accuracy of the method. LOD and LOQ, determined by analysing serial dilutions of a DNA extract containing 1% (w/w) sika deer DNA in pig DNA, were 0.3% and 0.5%, respectively. The accuracy was evaluated by analysing DNA mixtures and DNA isolates from meat extract mixtures and meat mixtures. In general, recoveries were in the range from 70 to 130%.

  5. Identification of duck, partridge, pheasant, quail, chicken and turkey meats by species-specific PCR assays to assess the authenticity of traditional game meat Alheira sausages

    OpenAIRE

    Amaral, J.S.; Santos, Cristina G.; Melo, Vitor S.; Costa, Joana; Oliveira, M.B.P.P.; Mafra, I.

    2015-01-01

    Game meat Alheira (Alheira de caça) sausage is a traditional fermented product typical from the Northeast region of Portugal, having bread and meats (including game) as main ingredients. It is a particularly appreciated product by consumers that commands higher prices, especially in comparison with the common Alheira produced with pork and poultry meats. Following our previous work in which several mammalian game meat species were successfully identified in game meat Alheira sausages for auth...

  6. Identification of hare meat by a species-specific marker of mitochondrial origin.

    Science.gov (United States)

    Santos, Cristina G; Melo, Vitor S; Amaral, Joana S; Estevinho, Letícia; Oliveira, M Beatriz P P; Mafra, Isabel

    2012-03-01

    Meat species identification in food has gained increasing interest in recent years due to public health, economic and legal concerns. Following the consumer trend towards high quality products, game meat has earned much attention. The aim of the present work was to develop a DNA-based technique able to identify hare meat. Mitochondrial cytochrome b gene was used to design species-specific primers for hare detection. The new primers proved to be highly specific to Lepus species, allowing the detection of 0.01% of hare meat in pork meat by polymerase chain reaction (PCR). A real-time PCR assay with the new intercalating EvaGreen dye was further proposed as a specific and fast tool for hare identification with increased sensitivity (1pg) compared to end-point PCR (10pg). It can be concluded that the proposed new primers can be used by both species-specific end-point PCR or real-time PCR to accurately authenticate hare meat. Copyright © 2011 Elsevier Ltd. All rights reserved.

  7. Novel TaqMan real-time polymerase chain reaction assay for verifying the authenticity of meat and commercial meat products from game birds.

    Science.gov (United States)

    Rojas, María; González, Isabel; Pavón, Miguel Angel; Pegels, Nicolette; Lago, Adriana; Hernández, Pablo E; García, Teresa; Martín, Rosario

    2010-06-01

    Species-specific real-time polymerase chain reaction (PCR) assays using TaqMan probes have been developed for verifying the labeling of meat and commercial meat products from game birds, including quail, pheasant, partridge, guinea fowl, pigeon, Eurasian woodcock and song thrush. The method combines the use of species-specific primers and TaqMan probes that amplify small fragments (amplicons meat products from the target species demonstrated the suitability of the assay for the detection of the target DNAs.

  8. THE YIELD OF DNA IN THERMAL TERATED DEER MEAT

    Directory of Open Access Journals (Sweden)

    Jozef Golian

    2011-07-01

    Full Text Available Residuals of DNA are one of the most important factors for detection, traceability and reverse authentication of deer meat. In this project we isolated DNA from deer processed meat and analysed by electrophoresis. Goal of the study was compute ratio between raw meat and several heat processed deer meat. Samples were prepared by five heat treatment techniques (pan roasted with temperature 180-240°C, fried with 156°C, braised with temperature 100-150°C, boiled in 100.2°C water and autoclaved in different time intervals. The highest amount of residual DNA 1927ng was obtained with two hours boiled sample. The lowest value 89.89ng was obtained with one hour braised sample. In technological adjustments highest amount of DNA and 1927ng, so the total yield of 192.7ng.-l was observed in the sample we cooked for two hours at boiling temperature.   doi:10.5219/153 

  9. Efforts to overcome vegetarian-induced dissonance among meat eaters.

    Science.gov (United States)

    Rothgerber, Hank

    2014-08-01

    Meat eaters face dissonance whether it results from inconsistency ("I eat meat; I don't like to hurt animals"), aversive consequences ("I eat meat; eating meat harms animals"), or threats to self image ("I eat meat; compassionate people don't hurt animals"). The present work proposes that there are a number of strategies that omnivores adopt to reduce this dissonance including avoidance, dissociation, perceived behavioral change, denial of animal pain, denial of animal mind, pro-meat justifications, reducing perceived choice, and actual behavioral change. The presence of vegetarians was speculated to cause meat eating to be a scrutinized behavior, remind meat eaters of their discomfort, and undermine the effectiveness of these strategies. It was therefore hypothesized that exposure to a description of a vegetarian would lead omnivores to embrace dissonance-reducing strategies. Supporting this hypothesis, participants who read a vignette about a vegetarian denied animal mind more than participants who read about a gluten-free individual. It was also hypothesized that omnivores would be sensitive to individual differences between vegetarians and would demonstrate using dissonance-reducing strategies more when the situation failed to provide cognitions consonant with eating meat or to reduce dissonant cognitions. Four experiments supported this prediction and found that authentic vegetarians, vegetarians freely making the decision to abandon meat, consistent vegetarians, and anticipating moral reproach from vegetarians produced greater endorsement of dissonance-reducing strategies than their counterpart conditions. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. The Austrian Toxoplasmosis Register, 1992-2008.

    Science.gov (United States)

    Prusa, Andrea-Romana; Kasper, David C; Pollak, Arnold; Gleiss, Andreas; Waldhoer, Thomas; Hayde, Michael

    2015-01-15

    We aimed to determine the incidence of primary gestational infections with Toxoplasma gondii and congenital toxoplasmosis in Austria, a country with a nationwide prenatal serological screening program since 1974. We analyzed retrospective data from the Austrian Toxoplasmosis Register of pregnant women with Toxoplasma infection and their offspring with births between 1992 and 2008, identified by the prenatal mandatory screening program. Treatment was administered to women from diagnosis of a Toxoplasma infection until delivery. Infected infants were treated up to 1 year of life routinely. Clinical manifestations in infected infants were monitored at least for 1 year and documented in the register. The Austrian Toxoplasmosis Register included 2147 pregnant women with suspected Toxoplasma infection. Annually, 8.5 per 10 000 women acquired Toxoplasma infection during pregnancy, and 1.0 per 10 000 infants had congenital toxoplasmosis (13% mean transmission rate). Our data showed that women treated according to the Austrian scheme had a 6-fold decrease in the maternofetal transmission rate compared to women without treatment. Results from the Austrian Toxoplasmosis Register show the efficiency of the prenatal screening program. Our results are of clinical relevance for infants, healthcare systems, and policy makers to consider preventive Toxoplasma screening as a potential tool to reduce the incidence of congenital toxoplasmosis. © The Author 2014. Published by Oxford University Press on behalf of the Infectious Diseases Society of America. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  11. Emission factors of Austrian industry production and international comparison. Final report

    International Nuclear Information System (INIS)

    Turi, K.

    1997-05-01

    During the last few years a number of measures have been implemented in the Austrian industries to reduce air pollution and energy use. Therefore specific emissions in the various sectors were changed considerably during this period. The aim of this research project was to better characterize air pollutant emissions of the Austrian industry. Emission data as measured by the Austrian industry was compared with published emission factors from international literature. The results show that the emission factors of the Austrian industry are generally lower than literature emission factors. This is because on the one hand many older data from the literature do not reflect current state of the knowledge, and on the other hand because emission reduction measures and new technologies were introduced in the Austrian industry. (author)

  12. The Austrian school in Bulgaria: A history

    Directory of Open Access Journals (Sweden)

    Nikolay Nenovsky

    2018-04-01

    Full Text Available The main goal of this study is to highlight the acceptance, dissemination, interpretation, criticism and make some attempts at contributing to Austrian economics made in Bulgaria during the last 120 years. We consider some of the main characteristics of the Austrian school, such as subjectivism and marginalism, as basic components of the economic thought in Bulgaria and as incentives for the development of some original theoretical contributions. Even during the first few years of Communist regime (1944–1989, with its Marxist monopoly over intellectual life, the Austrian school had some impact on the economic thought in the country. Subsequent to the collapse of Communism, there was a sort of a Renaissance and rediscovery of this school. Another contribution of our study is that it illustrates the adaptability and spontaneous evolution of ideas in a different and sometimes hostile environment.

  13. Hospital admissions for traumatic brain injury of Austrian residents vs. of visitors to Austria.

    Science.gov (United States)

    Mauritz, Walter; Brazinova, Alexandra; Majdan, Marek; Leitgeb, Johannes

    2014-01-01

    The goal was to compare epidemiology of hospital admissions for traumatic brain injury (TBI) in Austrian residents vs. visitors to Austria. Data on all hospital admissions due to TBI (ICD-10 codes S06.0-S06.9; years 2009-2011) was provided by the Austrian Statistical Office. Data on Austrian population and on tourism (visitor numbers, nights spent) was retrieved from www.statistik.at . Age, sex, mechanism of injury, season and mortality was analysed for Austrian residents vs. visitors. Visitors contributed 3.9% to the total population and 9.2% of all TBI cases. Incidence of hospital admissions was 292/100,000/year in Austrian residents and was 727/100,000/year in visitors. Male:female ratio was 1.39:1 in Austrian residents and 1.55:1 in visitors. Austrian cases were older than visitors' cases (mean age 41 vs. 28 years). Austrian cases were distributed evenly over the seasons, while 75% of the visitors' cases happened during winter and spring. The most frequently observed causes of TBI in Austrian residents were private accidents, while sports caused almost half of the visitors' cases. Hospital mortality was lower in visitors than in Austrian residents (0.8 vs. 2.1%). Sports-related TBI of visitors causes a significant workload for Austrian hospitals. Better prevention is warranted.

  14. Finding horse meat in beef products--a global problem.

    LENUS (Irish Health Repository)

    O'Mahony, P J

    2013-06-01

    The Food Safety Authority of Ireland (FSAI) oversees the implementation of food safety controls in Ireland which are set out in EU and Irish law. The FSAI, a science-based consumer protection organization, has nurtured a close relationship with the scientific community allowing it to utilize the best scientific advice available to underpin risk assessments. In early 2013, a 2-month long investigation in to the authenticity of beef products culminated in the publication of results that demonstrated the presence of horse meat in a frozen burger produced in Ireland. The events that followed revealed a pan-European food fraud which will likely result in significant changes in the way this small section of the meat industry will be regulated in the future in the EU. Although revelations of implicated products and food businesses have relented, the EU-wide investigation is continuing in an effort to determine how a food fraud of this scale could have occurred in such a highly regulated industry and who was involved. The FSAI initially received some criticism after publication of the results, but was also commended for its scientific approach as well as its openness and transparency. The end result of this incident is likely to be that the complexity of the food chain will be addressed again and DNA-based or similar methods will become a regular feature in verifying the authenticity of meat-based foods.

  15. Proton-transfer reaction mass spectrometry (PTR-MS) for the authentication of regionally unique South African lamb.

    Science.gov (United States)

    Erasmus, Sara W; Muller, Magdalena; Alewijn, Martin; Koot, Alex H; van Ruth, Saskia M; Hoffman, Louwrens C

    2017-10-15

    The volatile fingerprints of South African lamb meat and fat were measured by proton-transfer mass spectrometry (PTR-MS) to evaluate it as an authentication tool. Meat and fat of the Longissimus lumborum (LL) of lambs from six different regions were assessed. Analysis showed that the volatile fingerprints were affected by the origin of the meat. The classification of the origin of the lamb was achieved by examining the calculated and recorded fingerprints in combination with chemometrics. Four different partial least squares discriminant analysis (PLS-DA) models were fitted to the data to classify lamb meat and fat samples into "region of origin" (six different regions) and "origin" (Karoo vs. Non-Karoo). The estimation models classified samples 100% correctly. Validation of the first two models gave 42% (fat) and 58% (meat) correct classification of region, while the second two models performed better with 92% (fat) and 83% (meat) correct classification of origin. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Authentication of beef, carabeef, chevon, mutton and pork by a PCR-RFLP assay of mitochondrial cytb gene

    OpenAIRE

    Kumar, Deepak; Singh, S. P.; Karabasanavar, Nagappa S.; Singh, Rashmi; Umapathi, V.

    2012-01-01

    Authentication of meat assumes significance in view of religious, quality assurance, food safety, public health, conservation and legal concerns. Here, we describe a PCR-RFLP (Polymerase Chain Reaction- Restriction Fragment Length Polymorphism) assay targeting mitochondrial cytochrome-b gene for the identification of meats of five most common food animals namely cattle, buffalo, goat, sheep and pig. A pair of forward and reverse primers (VPH-F & VPH-R) amplifying a conserved region (168–776 b...

  17. Authentic Teachers: Student Criteria Perceiving Authenticity of Teachers

    Science.gov (United States)

    De Bruyckere, Pedro; Kirschner, Paul A.

    2016-01-01

    Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…

  18. Analytical methods used for the authentication of food of animal origin.

    Science.gov (United States)

    Abbas, Ouissam; Zadravec, Manuela; Baeten, Vincent; Mikuš, Tomislav; Lešić, Tina; Vulić, Ana; Prpić, Jelena; Jemeršić, Lorena; Pleadin, Jelka

    2018-04-25

    Since adulteration can have serious consequences on human health, it affects market growth by destroying consumer confidence. Therefore, authentication of food is important for food processors, retailers and consumers, but also for regulatory authorities. However, a complex nature of food and an increase in types of adulterants make their detection difficult, so that food authentication often poses a challenge. This review focuses on analytical approaches to authentication of food of animal origin, with an emphasis put on determination of specific ingredients, geographical origin and adulteration by virtue of substitution. This review highlights a current overview of the application of target approaches in cases when the compound of interest is known and non-target approaches for screening issues. Papers cited herein mainly concern milk, cheese, meat and honey. Moreover, advantages, disadvantages as well as challenges regarding the use of both approaches in official food control but also in food industry are investigated. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Control of Authenticity and Geographic Origin of Austrian, Slovenian, Romanian, Montenegrin and Argentinean wine

    Science.gov (United States)

    Horacek, Micha; Papesch, Wolfgang; Ogrinc, Nives; Magdas, Alina; Wunderlin, Daniel; Misurovic, Ana

    2014-05-01

    Consumers are willing to pay elevated prices for specific product qualities, e.g. for food from a certain region, thus there is the need to control the correct declaration of origin of these products. Conventionally this is done by estimating the flow of goods and by controlling the documentation accompanying the products. However, this means are often not sufficient to detect intentional deception. Since the 1990-ies the EU controls the authenticity of wine by isotope analyses of authentic wine samples from every wine-producing EU-country. Initially this was implemented to counteract adulteration of wine, but the produced data can also be used for the control geographic origin of wine samples. The measurement of the stable isotope composition of wine offers the possibility to investigate the product itself. The stable isotope ratios of the elements C and O are varying geographically due to diverse environmental conditions (e.g.: climate, soil, altitude, geography, cultivation…) thus creating individual patterns for different regions. Therefore analysis of the stable isotope pattern can be a potent tool for geographic differentiation. We investigated the stable isotope composition (C and O) of wine samples from Austria, Slovenia, Romania, Montenegro and Argentina from the years 2008 and 2009. Significant isotope variations are identified within samples from the same country as well as between samples from different countries, evidencing the potential of identifying wine from different regions in an individual country as well as discriminating wine from different countries. Also differences between the two investigated vintages exist, due to variations in the respective climate conditions.

  20. 4th February 2011 - Austrian Academy of Sciences President H. Denk visiting CMS underground area with Collaboration Spokesperson G. Tonelli, Austrian Academy of Sciences Secretary General A. Suppan, CERN Head of International Relations F. Pauss and Director, High Energy Physics Laboratory, Austrian Academy of Sciences C Fabjan.

    CERN Multimedia

    Maximilien Brice

    2011-01-01

    4th February 2011 - Austrian Academy of Sciences President H. Denk visiting CMS underground area with Collaboration Spokesperson G. Tonelli, Austrian Academy of Sciences Secretary General A. Suppan, CERN Head of International Relations F. Pauss and Director, High Energy Physics Laboratory, Austrian Academy of Sciences C Fabjan.

  1. CS-137 in Austrian domestic animals: determination of transfer parameters and meat contamination by live animal measurements

    International Nuclear Information System (INIS)

    Henrich, E.

    1987-01-01

    Soon after the Chernobyl accident several programs were initiated by provincial and federal authorities to check the validity of transfer factors and biological lifetimes as given in the literature; to test the possibility of reducing the cesium content in meat and milk by chemical agents; and to determine the cesium content of meat in live animals to assist of slaughtering decisions. Details and results of these programs are presented. 1 tab., 3 figs., 9 refs. (qui)

  2. Application of Raman Spectroscopy for Quality Monitoring in the Meat Processing Industry

    DEFF Research Database (Denmark)

    Berhe, Daniel Tsegay

    parameters related to the final product quality. The work further shows that Raman spectroscopy has great potential for authentication of ‘ready to eat’ cooked meat products in the retail market to be used by the quality control authority. Finally, it should be stressed that the results in this thesis were...

  3. Austrian Economics and the Transaction Cost Approach to the Firm

    Directory of Open Access Journals (Sweden)

    Nicolai J. Foss

    2009-10-01

    Full Text Available As the transaction cost theory of the firm was taking shape in the 1970s, another important movement in economics was emerging: a revival of the ‘Austrian’ tradition in economic theory associated with such economists as Ludwig von Mises and F. A. Hayek (1973; Dolan, 1976; Spadaro, 1978. As Oliver Williamson has pointed out, Austrian economics is among the diverse sources for transaction cost economics. In particular, Williamson frequently cites Hayek (e.g., Williamson, 1985, p. 8; 1991, p. 162, particularly Hayek’s emphasis on adaptation as a key problem of economic organisation (Hayek, 1945. Following Williamson’s lead, a reference to Hayek’s ‘The Use of Knowledge in Society’ (Hayek, 1945 has become almost mandatory in discussions of economic organisation (e.g., Ricketts, 1987, p. 59; Milgrom and Roberts, 1992, p. 56; Douma and Schreuder 1991, p. 9. However, there are many other potential links between Austrian and transaction cost economics that have not been explored closely and exploited.This article argues that characteristically Austrian ideas about property, entrepreneurship, economic calculation, tacit knowledge, and the temporal structure of capital have important implications for theories of economic organisation, transaction cost economics in particular. Austrian economists have not, however, devoted substantial attention to the theory of the firm, preferring to focus on business-cycle theory, welfare economics, political economy, comparative economic systems, and other areas. Until recently the theory of the firm was an almost completely neglected area in Austrian economics, but over the last decade, a small Austrian literature on the firm has emerged. While these works cover a wide variety of theoretical and applied topics, their authors share the view that Austrian insights have something to offer students of firm organisation.

  4. The voice of Austrians at CERN

    CERN Multimedia

    2009-01-01

    On 7 May the Austrian Minister for Science announced that, after over 50 years of membership, Austria would withdraw from CERN. By 18 May the Austrian Chancellor had reversed the decision. The Bulletin spoke to some of the Austrian community at CERN about the rollercoaster of events in between. var flash_video_player=get_video_player_path(); insert_player_for_external('Video/Public/Movies/2009/CERN-MOVIE-2009-056/CERN-MOVIE-2009-056-0753-kbps-640x360-25-fps-audio-64-kbps-44-kHz-stereo', 'mms://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2009/CERN-MOVIE-2009-056/CERN-MOVIE-2009-056-Multirate-200-to-753-kbps-640x360-25-fps.wmv', 'false', 533, 300, 'https://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2009/CERN-MOVIE-2009-056/CERN-MOVIE-2009-056-posterframe-640x360-at-10-percent.jpg', '1180837', true, 'Video/Public/Movies/2009/CERN-MOVIE-2009-056/CERN-MOVIE-2009-056-0600-kbps-maxH-360-25-fps-audio-128-kbps-48-kHz-stereo.mp4'); To watch this video in German click here. There was jubil...

  5. Ultra-fast DNA-based multiplex convection PCR method for meat species identification with possible on-site applications.

    Science.gov (United States)

    Song, Kyung-Young; Hwang, Hyun Jin; Kim, Jeong Hee

    2017-08-15

    The aim of this study was to develop an ultra-fast molecular detection method for meat identification using convection Palm polymerase chain reaction (PCR). The mitochondrial cytochrome b (Cyt b) gene was used as a target gene. Amplicon size was designed to be different for beef, lamb, and pork. When these primer sets were used, each species-specific set specifically detected the target meat species in singleplex and multiplex modes in a 24min PCR run. The detection limit was 1pg of DNA for each meat species. The convection PCR method could detect as low as 1% of meat adulteration. The stability of the assay was confirmed using thermal processed meats. We also showed that direct PCR can be successfully performed with mixed meats and food samples. These results suggest that the developed assay may be useful in the authentication of meats and meat products in laboratory and rapid on-site applications. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Acidification and Nitrogen Eutrophication of Austrian Forest Soils

    Directory of Open Access Journals (Sweden)

    Robert Jandl

    2012-01-01

    Full Text Available We evaluated the effect of acidic deposition and nitrogen on Austrian forests soils. Until thirty years ago air pollution had led to soil acidification, and concerns on the future productivity of forests were raised. Elevated rates of nitrogen deposition were believed to cause nitrate leaching and imbalanced forest nutrition. We used data from a soil monitoring network to evaluate the trends and current status of the pH and the C : N ratio of Austrian forest soils. Deposition measurements and nitrogen contents of Norway spruce needles and mosses were used to assess the nitrogen supply. The pH values of soils have increased because of decreasing proton depositions caused by reduction of emissions. The C : N ratio of Austrian forest soils is widening. Despite high nitrogen deposition rates the increase in forest stand density and productivity has increased the nitrogen demand. The Austrian Bioindicator Grid shows that forest ecosystems are still deficient in nitrogen. Soils retain nitrogen efficiently, and nitrate leaching into the groundwater is presently not a large-scale problem. The decline of soil acidity and the deposition of nitrogen together with climate change effects will further increase the productivity of the forests until a limiting factor such as water scarcity becomes effective.

  7. Gazing behavior reactions of Vietnamese and Austrian consumers to Austrian wafers and their relations to wanting, expected and tasted liking.

    Science.gov (United States)

    Vu, Thi Minh Hang; Tu, Viet Phu; Duerrschmid, Klaus

    2018-05-01

    Predictability of consumers' food choice based on their gazing behavior using eye-tracking has been shown and discussed in recent research. By applying this observational technique and conventional methods on a specific food product, this study aims at investigating consumers' reactions associated with gazing behavior, wanting, building up expectations, and the experience of tasting. The tested food products were wafers from Austria with hazelnut, whole wheat, lemon and vanilla flavors, which are very well known in Austria and not known in Vietnam. 114 Vietnamese and 128 Austrian participants took part in three sections: The results indicate that: i) the gazing behavior parameters are highly correlated in a positive way with the wanting-to-try choice; ii) wanting to try is in compliance with the expected liking for the Austrian consumer panel only, which is very familiar with the products; iii) the expected and tasted liking of the products are highly country and product dependent. The expected liking is strongly correlated with the tasted liking for the Austrian panel only. Differences between the reactions of the Vietnamese and Austrian consumers are discussed in detail. The results, which reflect the complex process from gazing for "wanting to try" to the expected and tasted liking, are discussed in the context of the cognitive theory and food choice habits of the consumers. Copyright © 2018. Published by Elsevier Ltd.

  8. Evaluation of air pollution-related risks for Austrian mountain forests

    International Nuclear Information System (INIS)

    Smidt, Stefan; Herman, Friedl

    2004-01-01

    The present paper describes air pollution status and evaluation of risks related to effects of phytotoxic pollutants in the Austrian mountain forests. The results are based on Austrian networks (Forest Inventory, Forest Damage Monitoring System, Austrian Bioindicator Grid), the Austrian sample plots of the European networks of the UN-ECE (ICP Forests, Level I and Level II) and interdisciplinary research approaches. Based on the monitoring data and on modelling and mapping of Critical Thresholds, the evaluation of risk factors was possible. Cause-effect relationships between air pollution and tree responses were shown by tree-physiological measurements. Sulfur impact, proton and lead input, concentrations of nitrogen oxides, nitrogen input and ozone were evaluated. The risk was demonstrated at a regional and large-scale national level. Especially the increasing O 3 level and the accumulation of Pb with altitude present most serious risk for mountain forests. - Despite strong reduction of emissions in Europe, pollutants are still a potential stress factor, especially for sensitive mountain forest ecosystems in Austria

  9. Development and validation of a rapid test system for detection of pork meat and collagen residues.

    Science.gov (United States)

    Masiri, J; Benoit, L; Barrios-Lopez, B; Thienes, C; Meshgi, M; Agapov, A; Dobritsa, A; Nadala, C; Samadpour, M

    2016-11-01

    Mislabeling, contamination, and economic adulteration of meat products with undeclared pork tissues are illegal under regulations promulgated by numerous regulatory agencies. Nonetheless, analysis of the European meat industry has revealed pervasive meat adulteration, necessitating more extensive application of meat authentication testing. As existing methods for meat speciation require specialized equipment and/or training, we developed a detection system based on a lateral flow device (LFD) assay format capable of rapidly (~35min) identifying porcine residues derived from raw meat, cooked meat, and gelatin down to 0.01%, 1.0%, and 2.5% contamination, respectively. Specificity analysis revealed no cross-reactivity with meat derived from chicken, turkey, horse, beef, lamb, or goat. Comparison with a commercial ELISA kit and PCR method revealed similar if not improved sensitivity, with the added feature that the LFD-based system required considerably less time to perform. Accordingly, this test system should aid the food industry and food control authorities in monitoring for adulteration with pork. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Integrity of nuclear genomic deoxyribonucleic acid in cooked meat: Implications for food traceability.

    Science.gov (United States)

    Aslan, O; Hamill, R M; Sweeney, T; Reardon, W; Mullen, A M

    2009-01-01

    It is essential to isolate high-quality DNA from muscle tissue for PCR-based applications in traceability of animal origin. We wished to examine the impact of cooking meat to a range of core temperatures on the quality and quantity of subsequently isolated genomic (specifically, nuclear) DNA. Triplicate steak samples were cooked in a water bath (100 degrees C) until their final internal temperature was 75, 80, 85, 90, 95, or 100 degrees C, and DNA was extracted. Deoxyribonucleic acid quantity was significantly reduced in cooked meat samples compared with raw (6.5 vs. 56.6 ng/microL; P 800 bp) were observed only when using DNA from raw meat and steak cooked to lower core temperatures. Small amplicons (food authentication, it is less abundant, and results suggest that analyses should be designed to use small amplicon sizes for meat cooked to high core temperatures.

  11. [Austrian guideline for palliative sedation therapy (long version) : Results of a Delphi process of the Austrian Palliative Society (OPG)].

    Science.gov (United States)

    Weixler, Dietmar; Roider-Schur, Sophie; Likar, Rudolf; Bozzaro, Claudia; Daniczek, Thomas; Feichtner, Angelika; Gabl, Christoph; Hammerl-Ferrari, Bernhard; Kletecka-Pulker, Maria; Körtner, Ulrich H J; Kössler, Hilde; Meran, Johannes G; Miksovsky, Aurelia; Pusswald, Bettina; Wienerroither, Thomas; Watzke, Herbert

    2017-02-01

    Palliative sedation therapy (PST) is an important and ethically accepted therapy in the care of selected palliative care patients with otherwise unbearable suffering from refractory distress. PST is increasingly used in end-of-life care. Austria does not have a standardized ethical guideline for this exceptional practice near end of life, but there is evidence that practice varies throughout the country. The Austrian Palliative Society (OPG) nominated a multidisciplinary working group of 16 palliative care experts and ethicists who established the national guideline on the basis of recent review work with the aim to adhere to the Europeans Association of Palliative Care's (EAPC) framework on palliative sedation therapy respecting Austrians legal, structural and cultural background. Consensus was achieved by a four-step sequential Delphi process. The Delphi-process was strictly orientated to the recently published EUROIMPACT-sedation-study-checklist and to the AGREE-2-tool. Additionally national stakeholders participated in the reflection of the results. As a result of a rigorous consensus process the long version of the Austrian National Palliative Sedation Guideline contains 112 statements within eleven domains and is supplemented by a philosophers excursus on suffering. By establishing a national guideline for palliative sedation therapy using the Delphi technique for consensus and stakeholder involvement the Austrian Palliative Society aims to ensure nationwide good practice of palliative sedation therapy. Screening for the practicability and efficacy of this guideline will be a future task.

  12. Asymmetric Mutual Social Perception of Austrians and Germans: A Social Identity Approach Assessing Implicit and Explicit Attitudes

    Directory of Open Access Journals (Sweden)

    Walter Renner

    2014-07-01

    Full Text Available Whereas Austrians tend to perceive Germans as "competent but cold", Germans tend to see Austrians as "incompetent but nice" in the sense of Fiske's Stereotype Content Model. With respect to the unequal distribution of power between Austria and Germany, which outnumbers Austria by approximately the tenfold population, Social Identity Theory (SIT predicts that Austrians will tend to devalue Germans, attempting to preserve their self-esteem and cultural identity, whereas Germans will perceive Austrians more positively. We tested this expectation with N = 31 Austrian and N = 49 German students at an Austrian university. Our hypotheses of asymmetrical mutual attitudes and massive devaluation of Germans by Austrians were confirmed by the Implicit Association Test, whereas on adjective lists as an explicit measure, Austrians described Germans more favourably, obviously out of a desire not to appear prejudiced. The results support SIT and have important implications for the development of Austrian academic education.

  13. Detection of partridge meat for the authentication of “alheiras de caça” using polymerase chain reaction

    OpenAIRE

    Santos, C.G.; Melo, V.S.; Mafra, I.; Amaral, J.S.; Costa, J.; Oliveira, M.B.P.P.

    2011-01-01

    The manufacture or traditional meat products is a long-eslablished lradition in Northeastern region of Portugal, in particular the case of "Alheiras" Besides the traditional "Alheiras" mainly produced with pork and poultry meat, others are currently available in lhe market. which are produced with diffcrcnt game meats, such as "Alhciras de caça" Since this kind of mcat products are prepared using more expensive meats, they are prone to adulterations due to the economic profit t...

  14. The Continuing Relevance of Austrian Capital Theory

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul

    2012-01-01

    The article presents a speech by Professor Nicolai J. Foss of Copenhagen Business School, delivered at the Austrian Scholars Conference held on March 8, 2012 in Auburn, Alabama, in which he discussed the knowledge essays by economist Friedrich A. von Hayek, the concept of capital theory and the w......The article presents a speech by Professor Nicolai J. Foss of Copenhagen Business School, delivered at the Austrian Scholars Conference held on March 8, 2012 in Auburn, Alabama, in which he discussed the knowledge essays by economist Friedrich A. von Hayek, the concept of capital theory...... and the works of Hayek on political philosophy and cultural evolution....

  15. Publications of the Austrian Research Centre Seibersdorf 1976-1985

    International Nuclear Information System (INIS)

    Ranz, F.; Nevyjel, A.

    1989-02-01

    About 3000 publications, written by staff members of the Austrian Research Centre Seibersdorf (OEFZS) within the period 1976-1985 are cited. The bibliography includes citations of journal articles, proceedings, books, technical reports as well as dissertations and diploma works, carried out in Seibersdorf by students of Austrian universities. It covers the subject areas of chemistry, physics, biology, radiation protection, reactor safety, isotope applications, materials technology, environmental research, mathematics and information, electronics and agriculture. 10 refs. (Author)

  16. State aid in the Austrian electricity industry law

    International Nuclear Information System (INIS)

    Rehulka, J.

    2009-01-01

    The present work deals with the existence of State aid in the Austrian electricity industry and focuses on three selected areas of the Austrian legal system, which are examined for their compatibility with Community law. Subject of the first part of this work is a representation of the article 87 ff Treaty of Rome and its impact on Austrian provisions on the promotion of electricity from renewable energies or on the promotion of cogeneration energy. In this context, the first principles of the European state aid law and in particular the European Court are presented regarding the existence of State aid. Here, the Rsp of the Court in connection with the use of State resources in the Rs PreussenElektra Stardust Marine and Pearle is paid in connection with para-fiscal levies special attention. The evaluation of the Austrian support model is based on PreussenElektra, Stardust Marine and Pearle. Then the system of green electricity production in Austria represented. In addition to the Community law principles (green power directive, frameworks and guidelines for environmental aid) is here in particular the 'Oekostromgesetz' and treated it's novellas. It is an intensive discussion with the Commission's decisions on the compatibility of the green power and CHP funding and the funding of the countries with state aid rules. As part of this analysis is to attempt a classification of the Commission's practice in the Community legal system. The second part of the work deals with the determination of absorbed. System utilization rates and their distribution to the network operator. After a presentation of the Community legislation (EC regulations, the internal electricity market directives) and Rsp of the European Court of Justice (Case ADBHu, Ferring, Altmark Trans) to services of general economic interest is first attempted to determine the presence of these services in the 216 Austrian legislation. Here, the question will be, entrusted with services of general economic

  17. Application of FTIR Spectroscopy and Chemometrics for Halal Authentication of Beef Meatball Adulterated with Dog Meat

    Directory of Open Access Journals (Sweden)

    Wiranti Sri Rahayu

    2018-05-01

    Full Text Available Beef meatball is one of the favorite meat-based food products among Indonesian community. Currently, beef is very expensive in Indonesian market compared to other common meat types such as chicken and lamb. This situation has intrigued some unethical meatball producers to replace or adulterate beef with lower priced-meat like dog meat. The objective of this study was to evaluate the capability of FTIR spectroscopy combined with chemometrics for identification and quantification of dog meat (DM in beef meatball (BM. Meatball samples were prepared by adding DM into BM ingredients in the range of 0–100% wt/wt and were subjected to extraction using Folch method. Lipid extracts obtained from the samples were scanned using FTIR spectrophotometer at 4000–650 cm-1. Partial least square (PLS calibration was used to quantify DM in the meatball. The results showed that combined frequency regions of 1782–1623 cm-1 and 1485-659 cm-1 using detrending treatment gave optimum prediction of DM in BM. Coefficient of determination (R2 for correlation between the actual value of DM and FTIR predicted value was 0.993 in calibration model and 0.995 in validation model. The root mean square error of calibration (RMSEC and standard error of cross validation (SECV were 1.63% and 2.68%, respectively. FTIR spectroscopy combined with multivariate analysis can serve as an accurate and reliable method for analysis of DM in meatball.

  18. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session....... In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post......-session authentication, although a new term, is not a new concept; it is the basis of at least a few practical schemes. We, for the first time, systematically study it and present the underlying authentication model. Further, we show that an important class of problems is solvable using post-session authentication...

  19. The Remembrance of World War One and the Austrian Federation of Jewish War Veterans

    Directory of Open Access Journals (Sweden)

    Gerald Lamprecht

    2016-10-01

    Full Text Available This paper discusses discourses and activities of memory of the Austrian “Federation of Jewish War Veterans” (Bund jüdischer Frontsoldaten/BJF, based primarily on the analysis of the journal “Jewish Front” (Jüdische Front as well as on archival sources. A remarkable increase in anti-Semitic activities as well as acts of violence committed by the National Socialists led former Jewish soldiers of the Austrian army to found the BJF in 1932. The aim of the BJF was to defend the Austrian Jewry against anti-Semitic accusations as well as to strengthen their Jewish self-consciousness by focusing on the remembrance of the Jewish military service during the Great War and an idealized and exaggerated war experience. To reach their objectives, the BJF was organized hierarchically and militarily. The members wore uniforms, and the BJF organized military inspections, spread propaganda via the journal “Jewish Front” and initiated the erection of Jewish war memorials in several Austrian cities. Due to the fact that the BJF wanted to unify the Austrian Jewry under its leadership, it claimed to be above all party lines and propagandized a common Austrian Jewish identity.

  20. "Thick" Authenticity: New Media and Authentic Learning.

    Science.gov (United States)

    Shaffer, David Williamson; Resnick, Mitchel

    1999-01-01

    Discusses authenticity as it is applied to educational interventions and argues that the concept should be analyzed more closely. Describes four kinds of authenticity; analyzes how computational media are well-suited to support different aspects of authentic learning; and discusses connectivity, modeling, and pluralism. Contains 75 references.…

  1. Authentication method for authenticating a first party to a second party

    NARCIS (Netherlands)

    2014-01-01

    An authentication system and method is presented for authenticating a first party to a second party, where an operation is performed on condition that the authentication succeeds. The authentication method verifies whether the first party is authenticated. If the first party is not authenticated,

  2. Identification of fraud (with pig stuffs) in chicken-processed meat through information of mitochondrial cytochrome b.

    Science.gov (United States)

    Yacoub, Haitham A; Sadek, Mahmoud A

    2017-11-01

    This study was conducted to find out the fraud in chicken-processed meat ingredients to protect consumers from commercial adulteration and authentication through a reliable way: direct amplification of conserved segment of cytochrome b gene of mitochondrial DNA, in addition, using species-specific primer assay for a certain cytochrome b. The results reported that chicken-processed meats were identified as a chicken meat based on amplification of conserved cytochrome b gene of mtDNA, while different fragments sizes were produced after the application of species-specific primer as follows: 227, 157, 274, 331, 389 and 439 bp for raw meat of chicken, goat, cattle, sheep, pig and horse, respectively. The results revealed that all chicken meat products are produced with 227 bp in size. While, an adulteration with pork stuffs was observed in some of the chicken meat products using a species-specific primer of cytochrome b gene, namely, chicken luncheon and chicken burger. This study represents a reliable technique that could be used to provide a promising solution for identifying the commercial adulteration and substitutions in processed meat in retail markets.

  3. Determination of the species specificity of the primers for the detection of chicken and turkey meat by realtime PCR method

    Directory of Open Access Journals (Sweden)

    Lenka Maršálková

    2014-07-01

    Full Text Available The aim of this work was to use TaqMan Real-Time PCR for quantitative authentication of chicken and turkey meat. To meet this purpose, a specific pair of primers and TaqMan probe was used. The test was aimed at identifying the reaction cycle of turkey and chicken meat using by two sets of primers. With first set of primer designed for chicken we obtained the following results: Cp = 16.18 for 100% chicken DNA Cp = 29, 18 100% turkey DNA It was also amplified DNA of pig that exceeded the detection threshold fluorescence intensities in the 31.07 cycle (Cp = 31.07. Using primers designed for turkey we obtained the following results Cp = 31.16 for 100% CHDNA, Cp =16.18 100% TDNA. It was also amplified the 100% DNA of rabbit in 31.63 cycle (Cp = 31.63 and deer in cycle 32 (Cp = 32. The DNA of all other animal species was amplificated after more than 35 cycles (Cp >35. It follows that the second detection primer pair is specific enough to unrelated species of animals by 30 cycles of the reaction. Species authentication based on DNA analysis from this perspective overcomes all the shortcomings of proteins. At present, DNA analysis use different types of PCR. Is the most progressive Real-time PCR, which is suitable for the specific use of detection (primers and TaqMan probe. The TaqMan Real-time PCR is within the sensitivity and specificity, clearly one of the best methods for identifying the species of chicken and turkey meat. The specificity of this method, however, depends primarily on the specificity of the primers and TaqMan probe. The 30 cycle reaction was chosen by us as the threshold for specificity using primers for authentication chicken and turkey meat.

  4. Compositional Signatures of Conventional, Free Range, and Organic Pork Meat Using Fingerprint Techniques

    Directory of Open Access Journals (Sweden)

    Gislene B. Oliveira

    2015-08-01

    Full Text Available Consumers’ interest in the way meat is produced is increasing in Europe. The resulting free range and organic meat products retail at a higher price, but are difficult to differentiate from their counterparts. To ascertain authenticity and prevent fraud, relevant markers need to be identified and new analytical methodology developed. The objective of this pilot study was to characterize pork belly meats of different animal welfare classes by their fatty acid (Fatty Acid Methyl Ester—FAME, non-volatile compound (electrospray ionization-tandem mass spectrometry—ESI-MS/MS, and volatile compound (proton-transfer-reaction mass spectrometry—PTR-MS fingerprints. Well-defined pork belly meat samples (13 conventional, 15 free range, and 13 organic originating from the Netherlands were subjected to analysis. Fingerprints appeared to be specific for the three categories, and resulted in 100%, 95.3%, and 95.3% correct identity predictions of training set samples for FAME, ESI-MS/MS, and PTR-MS respectively and slightly lower scores for the validation set. Organic meat was also well discriminated from the other two categories with 100% success rates for the training set for all three analytical approaches. Ten out of 25 FAs showed significant differences in abundance between organic meat and the other categories, free range meat differed significantly for 6 out of the 25 FAs. Overall, FAME fingerprinting presented highest discrimination power.

  5. Compositional Signatures of Conventional, Free Range, and Organic Pork Meat Using Fingerprint Techniques.

    Science.gov (United States)

    Oliveira, Gislene B; Alewijn, Martin; Boerrigter-Eenling, Rita; van Ruth, Saskia M

    2015-08-25

    Consumers' interest in the way meat is produced is increasing in Europe. The resulting free range and organic meat products retail at a higher price, but are difficult to differentiate from their counterparts. To ascertain authenticity and prevent fraud, relevant markers need to be identified and new analytical methodology developed. The objective of this pilot study was to characterize pork belly meats of different animal welfare classes by their fatty acid (Fatty Acid Methyl Ester-FAME), non-volatile compound (electrospray ionization-tandem mass spectrometry-ESI-MS/MS), and volatile compound (proton-transfer-reaction mass spectrometry-PTR-MS) fingerprints. Well-defined pork belly meat samples (13 conventional, 15 free range, and 13 organic) originating from the Netherlands were subjected to analysis. Fingerprints appeared to be specific for the three categories, and resulted in 100%, 95.3%, and 95.3% correct identity predictions of training set samples for FAME, ESI-MS/MS, and PTR-MS respectively and slightly lower scores for the validation set. Organic meat was also well discriminated from the other two categories with 100% success rates for the training set for all three analytical approaches. Ten out of 25 FAs showed significant differences in abundance between organic meat and the other categories, free range meat differed significantly for 6 out of the 25 FAs. Overall, FAME fingerprinting presented highest discrimination power.

  6. The implications across Europe of the ‘horse meat scandal’ on the monetary value of meat authenticity and food safety in ready to heat lasagne: evidence from six countries

    OpenAIRE

    Boeri, Marco; Brown, Hannah; Longo, Alberto

    2014-01-01

    The recent ‘horse meat scandal’ in Europe has sparked huge concerns among consumers, as horse meat was found in beef lasagne ready to be consumed. This study investigates consumers’ preferences towards characteristics of ready to heat lasagne, including origin of the meat, whether the meat is tested as beef, safety of the lasagne, and nutritional value, using Discrete Choice Experiments in six EU. Our sample of 4,598 consumers makes this the largest cross sectional study of this kind. The res...

  7. Authenticating the Leader

    DEFF Research Database (Denmark)

    Johnsen, Christian Garmann

    As authentic leadership, with its dictum of being true to the self, has become increasingly influential among practitioners and mainstream leadership scholars, critical writers have drawn attention to the negative consequences of this development. Yet, few scholars have investigated the problem...... of authentication within discourse of authentic leadership. If authentic leadership is to make any sense, it is necessary to be able to distinguish the authentic from the inauthentic leader – in other words, it is necessary to authenticate the leader. This paper uses Gilles Deleuze’s reading of Plato as the point...... of departure for discussing the problem of authentication – separating the authentic leader form the inauthentic one – in the leadership guru Bill George’s model of authentic leadership. By doing so, the paper offers a way of conceptualizing the problem of authenticating leaders, as well as challenging...

  8. The Austrian Research Centers activities in energy risks

    International Nuclear Information System (INIS)

    Sdouz, Gert

    1998-01-01

    Among the institutions involved in energy analyses in Austria the risk context is being treated by three different entities: the Energy Consumption Agency, internationally known as EVA, the Federal Environmental Protection Agency, or Urnweltbundesarnt assessing mainly the environmental risks involved and the Austrian Research Centers, working on safety and risk evaluation. The Austrian Research Center Seibersdorf draws form its proficiency in Reactor Safety and Fusion Research, two fields of experience it has been involved in since its foundation, for some 40 years now. Nuclear energy is not well accepted by the Austrian population. Therefore in our country only energy systems with advanced safety level might be accepted in the far future. This means that the development of methods to compare risks is an important task. The characteristics of energy systems featuring advanced safety levels are: A very low hazard potential and a focus on deterministic safety instead of probabilistic safety, meaning to rely on inherently safe physics concepts, confirmed by probabilistic safety evaluation results. This can be achieved by adequate design of fusion reactors, advanced fission reactors and all different renewable sources of energy

  9. Aeroradiometric conducted by the Austrian police

    International Nuclear Information System (INIS)

    Timal, G.

    2009-01-01

    The Austrian Police has specially trained and equipped radiation protection personnel which are intervention personnel for radiological emergencies, following the law of the Intervention Regulation, BGBl. II Nr. 145/2007. The training which consists of three consecutive courses follows the Intervention Regulation and the Austrian Standard S5207. It is held at the certified Security Academy of the Federal Ministry of the Interior in Traiskirchen near Vienna. As a follow-up training, there are special courses held for the conduction of aeroradiometric measures (radiation measurements by helicopters). All over Austria, the Police have ten aeroradiometric sets at their disposal which can be brought into action within almost no time. The contribution informs about the technics involved, the installation of the system in the helicopter and about the training for the aeroradiometric specialists. Furthermore, practical knowledge from flights conducted at trainings and exercises will be included. (orig.)

  10. Authentication of meat from game and domestic species by SNaPshot minisequencing analysis.

    Science.gov (United States)

    La Neve, Fabio; Civera, Tiziana; Mucci, Nadia; Bottero, Maria Teresa

    2008-10-01

    The aim of the present study is to develop an assay for the specific identification of meat from Capreolus capreolus, Cervus elaphus, Capra ibex, Rupicapra rupicapra, targeting sequences of the cytochrome b (cyt b) gene of mitochondrial DNA. The assay is also intended to enable differentiation between meat from these wild species as well as Ovis aries, Capra hircus, Bubalus bubalis, Bos taurus and Sus scrofa domestic species. The primers used in the preliminary PCR were designed in well conserved regions upstream and downstream of the diagnosis sites. They successfully amplified a conserved 232bp region from the cyt b gene of all the species taken into consideration. The sites of diagnosis have been interrogated using a minisequencing reaction and capillary electrophoresis. All the results of the multiplex PER (primer extension reaction) test were confirmed by fragment sequencing. The assay offers the possibility of discriminating nine species at the same time.

  11. Visit of the Austrian Ambassador

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    The Austrian Ambassador Wolfgang Petritsch (light raincoat) learns about superconducting magnets at the LHC magnet test facility in building SM18 during a visit to CERN. The blue pipe-like structure in the left background is String 2: the 120-m long full-scale model of an LHC cell, which is used to test LHC systems.

  12. Quantifying low-value services by using routine data from Austrian primary care.

    Science.gov (United States)

    Sprenger, Martin; Robausch, Martin; Moser, Adrian

    2016-12-01

    Open debates about the reduction of low-value services, unnecessary diagnostic tests and ineffective therapeutic procedures and initiatives like "Choosing Wisely "in the USA and Canada are still absent in Austria. The objectives of this study are: (i) to establish a list of ineffective or low-value services possibly provided in Austrian primary care, (ii) to explore how many of these services are quantifiable using routine data and (iii) to estimate the number of affected beneficiaries and avoidable costs arising from the provision of these services. In May 2014, we identified low-value care services relevant for primary care in Austria. For our analysis we used routine data sets from the Austrian health insurance. All analysis refer to the insured population of the Lower Austrian Sickness Fund (n = 1 168 433) in the year 2013. (i) We found 453 low-value services possibly offered in Austrian primary care. (ii) Only 34 (7.5%) services were quantifiable using routine data. (iii) In the year 2013, these 34 services were provided to at least 246 131 beneficiaries and the estimated avoidable costs arising were at least 11.38 million Euros. This accounts for 1.2% of overall spending of the Lower Austrian Sickness Fund for drugs and services provided by primary care doctors in the year 2013. The absence of a homogeneous, transparent and accessible coding system for diagnosis in Austrian primary care restrained our assessment. However, our study findings illustrate the potential utility and limitations of using claims-based measures to identify low-value care. © The Author 2016. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  13. Qubit authentication

    International Nuclear Information System (INIS)

    Curty, Marcos; Santos, David J.; Perez, Esther; Garcia-Fernandez, Priscila

    2002-01-01

    Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties with the minimum amount of resources. Specifically, our objective is to determine whether one elementary quantum message (a qubit) can be authenticated with a key of minimum length. We show that, unlike the case of classical-message quantum authentication, this is not possible

  14. Authentic feminist? Authenticity and feminist identity in teenage feminists' talk.

    Science.gov (United States)

    Calder-Dawe, Octavia; Gavey, Nicola

    2017-12-01

    This article explores how young people's feminist identities take shape in conjunction with a contemporary ideal of personal authenticity: to know and to express the 'real me'. Drawing from interviews with 18 teenagers living in Auckland, New Zealand, we examine a novel convergence of authenticity and feminism in participants' identity talk. For social psychologists interested in identity and politics, this convergence is intriguing: individualizing values such as authenticity are generally associated with disengagement with structural critique and with a repudiation of politicized and activist identities. Rather than seeking to categorize authentic feminism as an instance of either 'good/collective' or 'bad/individualized' feminist politics, we use discourse analysis to examine how the identity position of authentic feminist was constructed and to explore implications for feminist politics. On one hand, interviewees mobilized authentic feminism to affirm their commitment to normative liberal values of authenticity and self-expression. At the same time, the position of authentic feminist appeared to authorize risky feminist identifications and to justify counter-normative feelings, desires, and actions. To conclude, we explore how encountering others' intolerance of authentic feminism exposed interviewees to the limits of authenticity discourse, propelling some towards new understandings of the social world and their space for action within it. © 2017 The British Psychological Society.

  15. Development of loop-mediated isothermal amplification (LAMP assay for rapid and sensitive identification of ostrich meat.

    Directory of Open Access Journals (Sweden)

    Amir Abdulmawjood

    Full Text Available Animal species identification is one of the primary duties of official food control. Since ostrich meat is difficult to be differentiated macroscopically from beef, therefore new analytical methods are needed. To enforce labeling regulations for the authentication of ostrich meat, it might be of importance to develop and evaluate a rapid and reliable assay. In the present study, a loop-mediated isothermal amplification (LAMP assay based on the cytochrome b gene of the mitochondrial DNA of the species Struthio camelus was developed. The LAMP assay was used in combination with a real-time fluorometer. The developed system allowed the detection of 0.01% ostrich meat products. In parallel, a direct swab method without nucleic acid extraction using the HYPLEX LPTV buffer was also evaluated. This rapid processing method allowed detection of ostrich meat without major incubation steps. In summary, the LAMP assay had excellent sensitivity and specificity for detecting ostrich meat and could provide a sampling-to-result identification-time of 15 to 20 minutes.

  16. From the 'Austrian Foundation for Atomic Energy Research' to the 'Seibersdorf Laboratories'

    International Nuclear Information System (INIS)

    Rößner, M.

    2013-01-01

    The aim of this thesis is the description of the process of institutionalization of nuclear research in Austria in the context of the „Atoms for Peace“ program in the 1950s. This aspect of the history of Austrian nuclear research has been relatively unexplored. The focus of this work is the presentation of measures that have been put in Austria to participate in the 'Atoms for Peace' program. Moreover, the expectations and goals of the Austrian nuclear program are analyzed. For this purpose, foundation, structure and research activities of the “Austrian Atomic Energy Commission”, the “Austrian Society for the Study of Atomic Energy” and the “Nuclear Reactor Centre Seibersdorf“ in the period from 1954 until about 1970 are examined. To establish a relationship with the international historical research of the history of nuclear research, the Austrian situation is compared to the Swiss and the German. It turns out that the Austrian expectations and objectives in nuclear research at the beginning of the period of observation roughly corresponded with the international trends. It also follows that by the establishment of the SGAE and the “Nuclear Reactor Centre Seibersdorf“ the development course of Austrian nuclear research occupied a special position compared to foreign institutions.(author) [de

  17. Rapid detection of peptide markers for authentication purposes in raw and cooked meat using ambient liquid extraction surface analysis mass spectrometry.

    Science.gov (United States)

    Montowska, Magdalena; Alexander, Morgan R; Tucker, Gregory A; Barrett, David A

    2014-10-21

    In this Article, our previously developed ambient LESA-MS methodology is implemented to analyze five types of thermally treated meat species, namely, beef, pork, horse, chicken, and turkey meat, to select and identify heat-stable and species-specific peptide markers. In-solution tryptic digests of cooked meats were deposited onto a polymer surface, followed by LESA-MS analysis and evaluation using multivariate data analysis and tandem electrospray MS. The five types of cooked meat were clearly discriminated using principal component analysis and orthogonal partial least-squares discriminant analysis. 23 heat stable peptide markers unique to species and muscle protein were identified following data-dependent tandem LESA-MS analysis. Surface extraction and direct ambient MS analysis of mixtures of cooked meat species was performed for the first time and enabled detection of 10% (w/w) of pork, horse, and turkey meat and 5% (w/w) of chicken meat in beef, using the developed LESA-MS/MS analysis. The study shows, for the first time, that ambient LESA-MS methodology displays specificity sufficient to be implemented effectively for the analysis of processed and complex peptide digests. The proposed approach is much faster and simpler than other measurement tools for meat speciation; it has potential for application in other areas of meat science or food production.

  18. Attitudes of Austrian Psychotherapists Towards Process and Outcome Monitoring.

    Science.gov (United States)

    Kaiser, Tim; Schmutzhart, Lisa; Laireiter, Anton-Rupert

    2018-03-08

    While monitoring systems in psychotherapy have become more common, little is known about the attitudes that mental health practitioners have towards these systems. In an online survey among 111 Austrian psychotherapists and trainees, attitudes towards therapy monitoring were measured. A well-validated questionnaire measuring attitudes towards outcome monitoring, the Outcome Measurement Questionnaire, was used. Clinicians' theoretical orientations as well as previous knowledge and experience with monitoring systems were associated with positive attitudes towards monitoring. Possible factors that may have led to these findings, like the views of different theoretical orientations or obstacles in Austrian public health care, are discussed.

  19. Accredited training on radiation protection for the Austrian police

    International Nuclear Information System (INIS)

    Timal, G.

    2009-01-01

    In Austria, radiological emergencies are handled following the Intervention Regulation, in force since 2007. This regulation also defines duration and content for the training of radiation protection personnel, taking advantage of the standard OeNORM S 5207 published in 2005. Radiation protection personnel of the Austrian police are trained at the Federal Security Academy in Traiskirchen near Vienna. The Federal Security Academy is a training centre certified by the Austrian Standards Institute. The poster describes the modular organisation of the training and its duration and content as well as the further trainings available to the radiation protection personnel of the Police. (orig.)

  20. Authenticating the Leader

    DEFF Research Database (Denmark)

    Garmann Johnsen, Christian

    2018-01-01

    In the wake of a series of corporate scandals, there has been a growing call for authentic leadership in order to ensure ethical conduct in contemporary organizations. Authentic leadership, however, depends upon the ability to draw a distinction between the authentic and inauthentic leader......’s inverted Platonism, the paper challenges the practice by which authentic leaders are distinguished from inauthentic leaders. In conclusion, the paper suggests that an adequate concept of authentic leadership should consider how ethics can occur when the authentic leader is able to critically reflect his...

  1. The Forgotten Austrian Economics Language

    Directory of Open Access Journals (Sweden)

    Elena Bianca Vieru

    2013-02-01

    Full Text Available In light of the current events, namely the crisisthat economy has to face for quite someyears now, plenty of questions are raised, not only among specialists in the field but also amongordinary people as they prove to be most impoverished by these imbalances. Thus, this paper aims, asa first objective, to explain, froma general perspective and using an inductive-subjectivemethodology based on a brief survey as well as on observation, two of the most important causes that,according to the Austrian Business Cycle Theory, are the leading motives for triggering crises. Weare referring particularly to an excessivestate interventionismmanifested throughout itsexpansionary monetary policy.Secondly, we seek to establish the interconnections between theseelements and the case of the Great Depression as well as the current recession. The results we cameacross point out towards the same pattern designed by the Austrian economists, although thecircumstances are, each time, different. Hence, the contribution of this paper consists of handling thedetails that surround the subject by extracting only the essential aspects regarding the triggering ofcrises; we refer to the main ideas that need to be underlined for a better comprehension of the topic.

  2. System and method for authentication

    Science.gov (United States)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  3. Austrian emission inventory for dust

    International Nuclear Information System (INIS)

    Winiwarter, W.; Trenker, C.; Hoeflinger, W.

    2001-09-01

    For the first time, Austrian emissions of anthropogenic particulate matter emissions to the atmosphere have been estimated. Results have been reported as total suspended particles (TSP) as well as for the fractions of particles smaller than 10 μm or 2.5 μm aerodynamic diameter (PM 10 , PM 2.5 ), respectively. Base years for the inventory were 1990, 1995 and 1999. Excluded from this assessment is wind blown dust, which has been considered a natural source here. National statistics have been applied, specifically those also used previously in the Austrian air pollution inventory (OLI). Emission factors have been taken from literature compilations, only for exceptional cases specific Austrian assessments were performed or original literature on emission measurements was consulted. Resuspension of dust by road traffic emerged as the most important source. For the size fraction of PM 10 this source contributed about half of the emissions, when applying the calculation scheme by the U.S. EPA. While this scheme is widely used and well documented, its validity is currently subject of intense scientific debate. As these results do not seem to coincide with ambient air measurements, resuspension of road dust is considered separately and not now included in the national total. The sum of all other sources increases from 75,000 t of TSP in 1990 and 1995 to 77,000 t in 1999, while both PM 10 and PM 2.5 exhibit decreasing tendency (at 45,000 t and 26,000 t in 1999, respectively). The increase in TSP derives from increasing traffic and friction related emissions (tire wear, break wear), decrease of the finer particulate matter is due to reductions in firewood consumption for domestic heating. Most important source sectors are fugitive emissions from material transfer in industry as well as the building industry and the tilling of agricultural land. Common to these sources is the high uncertainty of available data. Wood combustion is the most important of the non

  4. The Austrian x red pine hybrid

    Science.gov (United States)

    W. B. Critchfield

    1963-01-01

    The genetic improvement of red pine (Pinus resinosa Ait.) presents tree breeders with one of their most difficult problems. Not only is this valuable species remarkably uniform, but until 1955 it resisted all attempts to cross it with other pines. In that year red pine and Austrian pine (P. nigra var. austriaca [...

  5. Post-Session Authentication

    OpenAIRE

    Ahmed , Naveed; Jensen , Christian ,

    2012-01-01

    Part 1: Full Papers; International audience; Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of a...

  6. Results of the Czech-Austrian calculations of BDBA radiological consequences

    International Nuclear Information System (INIS)

    Carny, P.; Hohenberg, J.-K.

    2003-01-01

    Full text: Common Czech - Austrian comparisons of codes and calculations of BDBA radiological consequences have been performed. Background of these comparisons is described in the paper presented at this symposium. Results of single steps are summarized and discussed in this poster presentation. From the Czech side calculations have been performed with computer codes PC Cosyma, este, RTARC, HAVAR, HERALD, PTM, RODOS/MATCH and long range code MEDIA used by the Czech meteorological institute (CHMI). Code PC Cosyma is taken as main comparable code in this inter-comparisons as it is used by the Czech and the Austrian side. For every accident scenario and for deterministic as well as probabilistic assessment of accident consequences results of both sides have been practically identical. Computer code 'este' is instrument for projection of release and evaluation of real release under real VVER 440 and WER 1000 emergency conditions. The code can be operated with real radiological, meteorological and technological data from the plant. The code calculates projection of avertable doses and simulates movement of radioactive clouds in the vicinity (up to 40-50 km) of the plant. The code participates in these comparisons as it serves as a support instrument for the staff at the emergency centre of the Czech nuclear regulatory body. Code RTARC (Real Time Accident Release Consequences) serves as an instrument for evaluation of radiation situation in the vicinity of the plant (up to 40 km) during the early phase of an accident. The code participates in these comparisons as it was used in the process of the Czech nuclear power plants protective action planning zone determination. Codes HERALD and HAVAR have been used by Skoda and Energoprojekt for analyses of consequences of design bases accidents in Temelin safety report. They were compared with PC Cosyma in one step of these common calculations by the Czech side. The code HAVAR enables to calculate ingestion doses, too, and

  7. Austrian Economics - The Ultimate Achievement of an Intellectual Journey

    Directory of Open Access Journals (Sweden)

    Pascal Salin

    2009-01-01

    Full Text Available In this lecture delivered November 2008 on the occasion of the presentation of the Mises Institute’s Gary G. Schlarbaum Prize for lifetime achievement in the cause of liberty, Professor Salin discusses his discovery of Austrian economics and his involvement in “the world of individual liberty,” and draws various lessons from his intellectual journey. The coherence of Austrian economics appealed to Salin—it is not a patchwork of partial theories, but a logical process of thought founded on realistic assumptions about individual action. Salin also discusses differences between the Chicago and Austrian approaches, and his views about monetary systems.The financial crisis beginning in late 2008 is not a crisis of capitalism, but of state intervention, caused by the expansionary monetary policy of the Fed. Capitalism is the solution, not the cause. There is no need to create money. There is never any balance of payments problem. What is required is tax systems more friendly to capital accumulation, a decrease in the role of the state, the end of monetary policy and, if possible, the disappearing of central banks and the IMF.

  8. Multi-factor authentication

    Science.gov (United States)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  9. Tibetan Interpretations of Authenticity

    DEFF Research Database (Denmark)

    Sobisch, Jan-Ulrich

    2015-01-01

    The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions.......The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions....

  10. Authentication of beef, carabeef, chevon, mutton and pork by a PCR-RFLP assay of mitochondrial cytb gene.

    Science.gov (United States)

    Kumar, Deepak; Singh, S P; Karabasanavar, Nagappa S; Singh, Rashmi; Umapathi, V

    2014-11-01

    Authentication of meat assumes significance in view of religious, quality assurance, food safety, public health, conservation and legal concerns. Here, we describe a PCR-RFLP (Polymerase Chain Reaction- Restriction Fragment Length Polymorphism) assay targeting mitochondrial cytochrome-b gene for the identification of meats of five most common food animals namely cattle, buffalo, goat, sheep and pig. A pair of forward and reverse primers (VPH-F & VPH-R) amplifying a conserved region (168-776 bp) of mitochondrial cytochrome-b (cytb) gene for targeted species was designed which yielded a 609 bp PCR amplicon. Further, restriction enzyme digestion of the amplicons with Alu1 and Taq1 restriction enzymes resulted in a distinctive digestion pattern that was able to discriminate each species. The repeatability of the PCR-RFLP assay was validated ten times with consistent results observed. The developed assay can be used in routine diagnostic laboratories to differentiate the meats of closely related domestic livestock species namely cattle from buffalo and sheep from goat.

  11. The Austrian Approach: Entering the World of Children.

    Science.gov (United States)

    Feistritzer, Patricia; Balcerack, Carl

    1979-01-01

    This photo-essay describes a Waldorf School. Developed by Austrian Rudolf Steiner, the Waldorf plan is dedicated to allowing the child a childlike environment. It emphasizes storytelling, creative dramatics, flexibility, improvisation, crafts, and movement. (SJL)

  12. Information systems for administration, clinical documentation and quality assurance in an Austrian disease management programme.

    Science.gov (United States)

    Beck, Peter; Truskaller, Thomas; Rakovac, Ivo; Bruner, Fritz; Zanettin, Dominik; Pieber, Thomas R

    2009-01-01

    5.9% of the Austrian population is affected by diabetes mellitus. Disease Management is a structured treatment approach that is suitable for application to the diabetes mellitus area and often is supported by information technology. This article describes the information systems developed and implemented in the Austrian disease management programme for type 2 diabetes. Several workflows for administration as well as for clinical documentation have been implemented utilizing the Austrian e-Health infrastructure. De-identified clinical data is available for creating feedback reports for providers and programme evaluation.

  13. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations in the...

  14. Authentication Using Mobile Phones

    OpenAIRE

    Fusek, Z.

    2015-01-01

    This project deals with authentication by a mobile device. The mobile device with the operating system Android 5.0 was chosen as authentication device. The user can perform authentication with emulation of contactless chip cards by using Host-based Card Emulation, which runs via Near Field Communication, where cryptographic keys are stored in a secure environment KeyStore. The project continues with implementation of authentication via Bluetooth LE and describes application for authentization...

  15. Meat quality assessment by electronic nose (machine olfaction technology).

    Science.gov (United States)

    Ghasemi-Varnamkhasti, Mahdi; Mohtasebi, Seyed Saeid; Siadat, Maryam; Balasubramanian, Sundar

    2009-01-01

    Over the last twenty years, newly developed chemical sensor systems (so called "electronic noses") have made odor analyses possible. These systems involve various types of electronic chemical gas sensors with partial specificity, as well as suitable statistical methods enabling the recognition of complex odors. As commercial instruments have become available, a substantial increase in research into the application of electronic noses in the evaluation of volatile compounds in food, cosmetic and other items of everyday life is observed. At present, the commercial gas sensor technologies comprise metal oxide semiconductors, metal oxide semiconductor field effect transistors, organic conducting polymers, and piezoelectric crystal sensors. Further sensors based on fibreoptic, electrochemical and bi-metal principles are still in the developmental stage. Statistical analysis techniques range from simple graphical evaluation to multivariate analysis such as artificial neural network and radial basis function. The introduction of electronic noses into the area of food is envisaged for quality control, process monitoring, freshness evaluation, shelf-life investigation and authenticity assessment. Considerable work has already been carried out on meat, grains, coffee, mushrooms, cheese, sugar, fish, beer and other beverages, as well as on the odor quality evaluation of food packaging material. This paper describes the applications of these systems for meat quality assessment, where fast detection methods are essential for appropriate product management. The results suggest the possibility of using this new technology in meat handling.

  16. Guido von Pirquet: Austrian pioneer of astronautics

    Science.gov (United States)

    Sykora, F.

    1977-01-01

    The works of Guido von Pirquet, Austrian pioneer of rocketry, were assessed. Major emphasis was given to Pirquet's calculation of the route to Venus which in fact was followed by the first Russian rocket to Venus. Of interest also is Pirquet's valuable construction of a space station and his analysis of interstellar space flight.

  17. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  18. Social, psychological and demographic reflections on the Austrian nuclear power question

    International Nuclear Information System (INIS)

    Bretschneider, R.

    1980-01-01

    The political history of an Austrian referendum in 1978, which led to abandonment of a nuclear power station, is reviewed, and an attempt is made to analyse the reasons for the 'No' vote. Surveys are presented which attempt to classify the yes, no and undecided voters in terms of political views. The effects of the Harrisburg accident on Austrian public opinion is examined and the possibility of accentuated differences between 'for' and 'against' groups is stated. It is noted that success in energy saving may reduce the significance of the atomic energy question. (G.M.E.)

  19. Prevalence and antibiotic resistance of Salmonella spp. in meat products, meat preparations and minced meat

    Science.gov (United States)

    Rašeta, M.; Mrdović, B.; Janković, V.; Bečkei, Z.; Lakićević, B.; Vidanović, D.; Polaček, V.

    2017-09-01

    This study aimed to determine Salmonella spp. prevalence in meat products, meat preparations and minced meat. Over a period of three years, a total of 300 samples were taken (100 RTE meat products, 100 meat preparations and 100 minced meat) and examined for the presence of Salmonella spp. Sampling was carried out at the warehouses of the food manufacturers. Salmonella spp. were not detected in RTE meat products, while 7% of semi-finished meat products (fresh sausages, grill meat formed and unformed) contained Salmonella, as did 18% of minced meats (minced pork II category, minced beef II category, mixed minced meat). The 25 Salmonella isolates obtained were examined for antibiotic resistance by the disk diffusion test, according to the NCCLS and CLSI guidelines. Isolates showed resistance to ampicillin and nalidixic acid (80%), tetracycline (72%), cefotaxime/clavulanic acid (48%), but not to gentamicin (8%) or trimethoprim/sulfamethoxazole (0%).

  20. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  1. A lab-on-a-chip-based multiplex platform to detect potential fraud of introducing pig, dog, cat, rat and monkey meat into the food chain.

    Science.gov (United States)

    Razzak, Md Abdur; Hamid, Sharifah Bee Abd; Ali, Md Eaqub

    2015-01-01

    Food forgery has posed considerable risk to public health, religious rituals, personal budget and wildlife. Pig, dog, cat, rat and monkey meat are restricted in most religions, but their sporadic adulteration are rampant. Market controllers need a low-cost but reliable technique to track and trace suspected species in the food chain. Considering the need, here we documented a lab-on-a-chip-based multiplex polymerase chain reaction (PCR) assay for the authentication of five non-halal meat species in foods. Using species-specific primers, 172, 163, 141, 129 and 108-bp sites of mitochondrial ND5, ATPase 6 and cytochrome b genes were amplified to detect cat, dog, pig, monkey and rat species under complex matrices. Species-specificity was authenticated against 20 different species with the potential to be used in food. The targets were stable under extreme sterilisation (121°C at 45 psi for 2.5 h) which severely degrades DNA. The assay was optimised under the backgrounds of various commercial meat products and validated for the analysis of meatballs, burgers and frankfurters, which are popular fast food items across the globe. The assay was tested to detect 0.1% suspected meats under commercial backgrounds of marketed foods. Instead of simplex PCR which detects only one species at a time, such a multiplex platform can reduce cost by at least fivefolds by detecting five different species in a single assay platform.

  2. PCR-RFLP Using BseDI Enzyme for Pork Authentication in Sausage and Nugget Products

    Directory of Open Access Journals (Sweden)

    Y. Erwanto

    2011-04-01

    Full Text Available A polymerase chain reaction–restriction fragment length polymorphism (PCR–RFLP using BseDI restriction enzyme had been applied for identifying the presence of pork in processed meat (beef sausage and chicken nugget including before and after frying. Pork sample in various levels (1%, 3%, 5%, 10%, and 25 % was prepared in a mixture with beef and chicken meats and processed for sausage and nugget. The primers CYTb1 and CYTb2 were designed in the mitochondrial cytochrome b (cyt b gene and PCR successfully amplified fragments of 359 bp. To distinguish existence of porcine species, the amplified PCR products of mitochondrial DNA were cut by BseDI restriction enzyme. The result showed pig mitochondrial DNA was cut into 131 and 228 bp fragments. The PCR-RFLP species identification assay yielded excellent results for identification of porcine species. It is a potentially reliable technique for pork detection in animal food processed products for Halal authentication.

  3. Authentication Assurance Levels

    International Nuclear Information System (INIS)

    Kouzes, Richard T.; Cash, James R.; Devaney, David M.; Geelhood, Bruce D.; Hansen, Randy R.; Melton, Ronald B.; Pitts, W. Karl

    2002-01-01

    This Common Criteria approach has been applied to create a definition of Authentication Assurance Levels that can quantify the level of assurance reached for a system subject to a set of authentication procedures. The arms-control authentication application of the Common Criteria expands on more typical information security evaluations in that it must contend with information barriers and preclude sophisticated intentional subversion attempts.

  4. Austrian Transition to Open Access“ 2017–2020

    Directory of Open Access Journals (Sweden)

    Bauer, Bruno

    2017-12-01

    Full Text Available In December the higher education structural funds project (Hochschulraumstrukturmittelprojekt “Austrian Transition to Open Access (AT2OA“ was authorised by the Austrian Federal Ministry of Science, Research and Economy. The 21 public universities cooperate on this project running from 2017 to 2020 in order to promote open access through concerted measures. Constitutive on OANA’s “suggestions for the implementation of Open Access in Austria” published in 2015 four subprojects have been developed. These subprojects’ main focuses are drafting an expert’s report about the financial impact of a total adjustment to open access on a national and institutional basis, the extension of existing consortium licences with an open access component, establishment of an open access publishing fund as well as the promotion of open access monographs and suitable open access infrastructures.

  5. Authentic leadership to the future

    Directory of Open Access Journals (Sweden)

    Dimovski Vlado

    2012-01-01

    Full Text Available Authentic leadership is the latest evolutionary stage in leadership development and emphasizes the leader's authenticity. The construct of authenticity was researched by ancient Greek philosophers as 'know thy-self ', and 'thy true self '. Authentic leadership began to develop after 2004. The main reason why the researchers place so much attention to authentic leadership is fact that authentic leadership reaches all of the employees in organizations. Authentic leaders must identify the strengths of their followers and help them with their development and integration towards a common goal, purpose, vision and identity of the organization. Authentic leadership is seen as the final stage in the development of leadership styles, properties of this leadership style, and the consequences of this style have not been fully explored. In our paper we will explore this new style of leadership and its implications.

  6. Speaker Authentication

    CERN Document Server

    Li, Qi (Peter)

    2012-01-01

    This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker’s identity based on his/her voice characteristics while the VIV approach validates a speaker’s identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speake...

  7. 45. Annual Convention of the Austrian Physical Society

    International Nuclear Information System (INIS)

    1995-01-01

    This volume contains lectures of the 45 th symposium of the Austrian Physical Society which had been held in Leoben, Austria in 1995. The following topics are included: Atomic physics, molecular physics, plasma physics, solid state physics, nuclear and particle physics, biophysics, environmental physics, quantum electronics and quantum optics. (Suda)

  8. 50. Annual symposium of the Austrian Physical Society

    International Nuclear Information System (INIS)

    Lippitsch, M.E.

    2000-01-01

    The conference held from 25. - 29. 9. 2000 at the University of Graz was elaborated by the Austrian society of physics in the fields of solid state physics, polymers physics, quantum electronics, electrodynamics, optics, nuclear and particle physics, atomic, molecules and plasma physics, acoustics, physics - industry - energy and physics teaching. (botek)

  9. Authentic leadership: becoming and remaining an authentic nurse leader.

    Science.gov (United States)

    Murphy, Lin G

    2012-11-01

    This article explores how chief nurse executives became and remained authentic leaders. Using narrative inquiry, this qualitative study focused on the life stories of participants. Results demonstrate the importance of reframing, reflection in alignment with values, and the courage needed as nurse leaders progress to authenticity.

  10. Converse PUF-based authentication

    NARCIS (Netherlands)

    Kocabas, U.; Peter, Andreas; Katzenbeisser, S.; Sadeghi, A.

    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich

  11. Multi-Factor Authentication: A Survey

    Directory of Open Access Journals (Sweden)

    Aleksandr Ometov

    2018-01-01

    Full Text Available Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA starting from Single-Factor Authentication (SFA and through Two-Factor Authentication (2FA. Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.

  12. Czech Foreign Trade with Meat and Meat Products

    Directory of Open Access Journals (Sweden)

    Karina Pohlová

    2016-04-01

    Full Text Available The meat production and meat processing industry are the most important parts of the agribusiness in the Czech Republic. The problem of the industry is its low competitiveness towards foreign producers and processors which results in negative balance of foreign trade. The aim of the article is to evaluate long-term development of value and structure of Czech foreign trade flows of meat and meat products. The analysis covers the period of 2001–2014. The problems of the negative trade balance are revealed through description of the trade flows of meat and meat products, the RCA index and relations between import and export prices. The analysis points out the problems of low competitiveness of the intermediate and finalized meat. Alternatively, Czech Republic has comparative advantage in live animals, sausages and homogenized meat products.

  13. AUTHENTICITY IN THE BLOGOSPHERE

    Directory of Open Access Journals (Sweden)

    Waclaw Branicki

    2010-01-01

    Full Text Available The primary purpose of this article is to answer the question of whether writing a blog defined as a personal diary can help to better understand himself. Self-awareness is a prerequisite for authentic existence. In the first part analyzed the concept of authenticity. Pointed out the relationship of authenticity to the categories of freedom, truth and responsibility. The second part presents the relationship between authentic existence and the process of self-disclosure, which may take place in the blogosphere. In the third part presents the question whether a writing blog affects the level authenticity of existence. It was recognized that a key element of this phenomenon is the sense of responsibility.

  14. Meat Quality Assessment by Electronic Nose (Machine Olfaction Technology

    Directory of Open Access Journals (Sweden)

    Sundar Balasubramanian

    2009-07-01

    Full Text Available Over the last twenty years, newly developed chemical sensor systems (so called “electronic noses” have made odor analyses possible. These systems involve various types of electronic chemical gas sensors with partial specificity, as well as suitable statistical methods enabling the recognition of complex odors. As commercial instruments have become available, a substantial increase in research into the application of electronic noses in the evaluation of volatile compounds in food, cosmetic and other items of everyday life is observed. At present, the commercial gas sensor technologies comprise metal oxide semiconductors, metal oxide semiconductor field effect transistors, organic conducting polymers, and piezoelectric crystal sensors. Further sensors based on fibreoptic, electrochemical and bi-metal principles are still in the developmental stage. Statistical analysis techniques range from simple graphical evaluation to multivariate analysis such as artificial neural network and radial basis function. The introduction of electronic noses into the area of food is envisaged for quality control, process monitoring, freshness evaluation, shelf-life investigation and authenticity assessment. Considerable work has already been carried out on meat, grains, coffee, mushrooms, cheese, sugar, fish, beer and other beverages, as well as on the odor quality evaluation of food packaging material. This paper describes the applications of these systems for meat quality assessment, where fast detection methods are essential for appropriate product management. The results suggest the possibility of using this new technology in meat handling.

  15. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    Science.gov (United States)

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  16. 47. annual symposium of the Austrian Physical Society

    International Nuclear Information System (INIS)

    Kutschera, W.

    1997-01-01

    This volume contains lectures (short communications) of the 47. symposium of the Austrian Physical Society which had been held at the University of Vienna (Austria) in 1997. The following topics are included: atomic physics, molecular physics, plasma physics, solid state physics, nuclear and particle physics, biophysics, environmental physics, quantum electronics and quantum optics. (Suda)

  17. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  18. Discovering your authentic leadership.

    Science.gov (United States)

    George, Bill; Sims, Peter; McLean, Andrew N; Mayer, Diana

    2007-02-01

    The ongoing problems in business leadership over the past five years have underscored the need for a new kind of leader in the twenty-first century: the authentic leader. Author Bill George, a Harvard Business School professor and the former chairman and CEO of Medtronic, and his colleagues, conducted the largest leadership development study ever undertaken. They interviewed 125 business leaders from different racial, religious, national, and socioeconomic backgrounds to understand how leaders become and remain authentic. Their interviews showed that you do not have to be born with any particular characteristics or traits to lead. You also do not have to be at the top of your organization. Anyone can learn to be an authentic leader. The journey begins with leaders understanding their life stories. Authentic leaders frame their stories in ways that allow them to see themselves not as passive observers but as individuals who learn from their experiences. These leaders make time to examine their experiences and to reflect on them, and in doing so they grow as individuals and as leaders. Authentic leaders also work hard at developing self-awareness through persistent and often courageous self-exploration. Denial can be the greatest hurdle that leaders face in becoming self-aware, but authentic leaders ask for, and listen to, honest feedback. They also use formal and informal support networks to help them stay grounded and lead integrated lives. The authors argue that achieving business results over a sustained period of time is the ultimate mark of authentic leadership. It may be possible to drive short-term outcomes without being authentic, but authentic leadership is the only way to create long-term results.

  19. A Review Of Authentication Methods

    OpenAIRE

    Nilesh A. Lal; Salendra Prasad; Mohammed Farik

    2015-01-01

    Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms password entry smart card and biometric. Each authentication mechanism functions differently and has their strengths and weakness. In this paper we review different types of authentication mechanisms their vulnerabilities and recommend novel solutions.

  20. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  1. STUDENTS’ POTENTIAL FOR AUTHENTIC LEADERSHIP

    OpenAIRE

    Djurdja Solesa-Grijak; Dragan Solesa; Nedjo Kojic

    2015-01-01

    To know yourself and to act accordingly has been seen as a moral imperative throughout history. The aim of this research was to determine potential of students for authentic leadership and relation between their authentic personality and potential for authentic leadership. The sample consisted of students (N=133) from Serbia (male – 59% and female – 41%). The average age of students was M=21.9. Instruments used were Authenticity Scale (Wood et al., 2008) and Authentic Leadership Self-Assessme...

  2. [Comparison between the Austrian and German DRG systems in hand surgery].

    Science.gov (United States)

    Lotter, O; Jaminet, P; Schwarzach, S; Schaller, H E

    2013-02-01

    Diagnosis-Related Groups (DRG) are a patient classification system grouping related types of patients treated to the resources they consumed. In this analysis, we compared the Austrian and the German DRG systems. The 15 most common hand surgical diagnoses and their corresponding operative treatment were transferred into the Austrian system. Thus, the length of stay and the reimbursement of both countries could be obtained and compared. The mean values and the median values of the upper and lower thresholds of length of stay as well as the average length of stay were all lower in Austria compared to Germany. Reimbursement in Germany was higher in 13 of 19 cases. Total proceeds amounted to 1.67 million in the German and 1.70 million in the Austrian health care system. Considering the purchasing power applying consumer prize parities, the difference of reimbursement between the countries rose to 130,000 which equals a difference of almost 8%. Reimbursement of the top 15 diagnoses in hand surgery in Austria is 8% higher than in Germany. Except for one case, mean values as well as upper and lower thresholds of length of stay are considerably shorter in Austria. Comparison of international data to refine a national compensation system is advocated.

  3. [CGM-Continuous Glucose Monitoring--Statement of the Austrian Diabetes Association].

    Science.gov (United States)

    Schütz-Fuhrmann, Ingrid; Rami-Merhar, Birgit; Hofer, Sabine; Stadler, Marietta; Bischof, Martin; Zlamal-Fortunat, Sandra; Laimer, Markus; Weitgasser, Raimund; Prager, Rudolf

    2016-04-01

    This position statement represents the recommendations of the Austrian Diabetes Association regarding the clinical diagnostic and therapeutic application, safety and benefits of continuous subcutaneous glucose monitoring systems in patients with diabetes mellitus, based on current evidence.

  4. [CGM-continuous glucose monitoring - statement of the Austrian Diabetes Association].

    Science.gov (United States)

    Schütz-Fuhrmann, Ingrid; Schober, Edith; Rami, Birgit; Stadler, Marietta; Bischof, Martin; Fortunat, Sandra; Laimer, Markus; Weitgasser, Raimund; Prager, Rudolf

    2012-12-01

    This position statement represents the recommendations of the Austrian Diabetes Association regarding the clinical diagnostic and therapeutic application, safety and benefits of continuous subcutaneous glucose monitoring systems in patients with diabetes mellitus, based on current evidence.

  5. A Review Of Authentication Methods

    Directory of Open Access Journals (Sweden)

    Nilesh A. Lal

    2015-08-01

    Full Text Available Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms password entry smart card and biometric. Each authentication mechanism functions differently and has their strengths and weakness. In this paper we review different types of authentication mechanisms their vulnerabilities and recommend novel solutions.

  6. Annual convention 1986 of the Austrian Physical Society

    International Nuclear Information System (INIS)

    1986-01-01

    There are 152 contributions, 58 thereof of INIS interest. The subject matters are indicated by the grouping of contributions into topical sessions on 1) nuclear and particle physics 2) physics of high polymers 3) atomic and plasma physics. There is additionally a session for teachers contimation training and one page informations on the Austrian Physical Society. (G.Q.)

  7. Holocaust Studies in Austrian Elementary and Secondary Schools

    Science.gov (United States)

    Mittnik, Philipp

    2016-01-01

    This article presents arguments in support of teaching about the Holocaust and Nazism in Austria at an early age. To accomplish this, Austrian and German elementary school textbooks were analyzed for the amount of content dealing with the Holocaust and Jews; the results showed that since 1980 the amount of content on the Holocaust increased in…

  8. LC-QTOF-MS identification of porcine-specific peptide in heat treated pork identifies candidate markers for meat species determination.

    Science.gov (United States)

    Sarah, S A; Faradalila, W N; Salwani, M S; Amin, I; Karsani, S A; Sazili, A Q

    2016-05-15

    The purpose of this study was to identify porcine-specific peptide markers from thermally processed meat that could differentiate pork from beef, chevon and chicken meat. In the initial stage, markers from tryptic digested protein of chilled, boiled and autoclaved pork were identified using LC-QTOF-MS. An MRM method was then established for verification. A thorough investigation of LC-QTOF-MS data showed that only seven porcine-specific peptides were consistently detected. Among these peptides, two were derived from lactate dehydrogenase, one from creatine kinase, and four from serum albumin protein. However, MRM could only detect four peptides (EVTEFAK, LVVITAGAR, FVIER and TVLGNFAAFVQK) that were consistently present in pork samples. In conclusion, meat species determination through a tandem mass spectrometry platform shows high potential in providing scientifically valid and reliable results even at peptide level. Besides, the specificity and selectivity offered by the proteomics approach also provide a robust platform for Halal authentication. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Meat and meat product preservation by ionizing radiation

    International Nuclear Information System (INIS)

    Egginger, R.

    A brief summary is given of experience with the preservation of meat and meat products by ionizing radiation, or by combined methods. The results of the research have proved that hygienically significant microorganisms (mainly salmonellas) are reliably destroyed and that the consumption of thus irradiated meat and meat products presents no danger to human health. (B.S.)

  10. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2015-06-01

    Full Text Available This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The research included the use of an ALQ questionnaire for the estimation of leadership behavior. The components of authentic leadership are defined using factor analysis and other statistics techniques. The findings developed in this research indicated the fact that directors in educational institutions have a specific authentic leadership style. We suggest the concept of authentic leadership based on the four following factors: Communication-conformist, self-consciousness, self-discovery, and self-concept. Supporting these factors provides the directors with the possibility of obtaining a high level of authentic leadership.

  11. Why Credit Deflation Is More Likely than Mass Inflation: An Austrian Overview of the Inflation Versus Deflation Debate

    Directory of Open Access Journals (Sweden)

    Vijay Boyapati

    2010-12-01

    Full Text Available This article provides an Austrian overview of the inflation versus deflation debate which has captured the attention of the economics profession in the years following the US housing bust. Much of the Austrian analysis of this debate has focused on the massive expansion of the Federal Reserve’s balance sheet and attendant creation of new reserves. Several Austrian economists have predicted that the creation of new reserves will cause a massive increase in inflation. The money multiplier theory, on which these predictions are based, is criticized and an overview of the Austrian business cycle theory is provided to explain why banks are reluctant to issue new credit. Finally, an analysis of the politics of deflation is provided and a class theory is presented to explain why a policy of controlled credit deflation is more likely than a policy that would result in mass inflation or hyperinflation.

  12. Lipid stability in meat and meat products.

    Science.gov (United States)

    Morrissey, P A; Sheehy, P J; Galvin, K; Kerry, J P; Buckley, D J

    1998-01-01

    Lipid oxidation is one of the main factors limiting the quality and acceptability of meats and meat products. Oxidative damage to lipids occurs in the living animal because of an imbalance between the production of reactive oxygen species and the animal's defence mechanisms. This may be brought about by a high intake of oxidized lipids or poly-unsaturated fatty acids, or a low intake of nutrients involved in the antioxidant defence system. Damage to lipids may be accentuated in the immediate post-slaughter period and, in particular, during handling, processing, storage and cooking. In recent years, pressure to reduce artificial additive use in foods has led to attempts to increase meat stability by dietary strategies. These include supplementation of animal diets with vitamin E, ascorbic acid, or carotenoids, or withdrawal of trace mineral supplements. Dietary vitamin E supplementation reduces lipid and myoglobin oxidation, and, in certain situations, drip losses in meats. However, vitamin C supplementation appears to have little, if any, beneficial effects on meat stability. The effect of feeding higher levels of carotenoids on meat stability requires further study. Some studies have demonstrated that reducing the iron and copper content of feeds improves meat stability. Post-slaughter carnosine addition may be an effective means of improving lipid stability in processed meats, perhaps in combination with dietary vitamin E supplementation.

  13. Security Gaps In Authentication Factor Credentials

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Authentication factors refer to user login credentials that a user supplies to an authentication process for it to decide whether to grant or deny access. While two-factor and three-factor authentication generally provides better security than one-factor authentication the aim of this paper is to review security in individual authentication factor credentials that are in use nowadays. These credentials will be discussed in factor categories knowledge factor possession factor and inherence factor. The paper details current security gaps and some novel approaches to diminish the gaps in these authentication factors. We believe that our recommendations will inspire development of better authentication credentials and systems.

  14. Multifactor Authentication: Its Time Has Come

    Directory of Open Access Journals (Sweden)

    Jim Reno

    2013-08-01

    Full Text Available Transactions of any value must be authenticated to help prevent online crime. Even seemingly innocent interactions, such as social media postings, can have serious consequences if used fraudulently. A key problem in modern online interactions is establishing the identity of the user without alienating the user. Historically, almost all online authentications have been implemented using simple passwords, but increasingly these methods are under attack. Multifactor authentication requires the presentation of two or more of the three authentication factor types: “What you know”, “What you have”, and “What you are”. After presentation, each factor must be validated by the other party for authentication to occur. Multifactor authentication is a potential solution to the authentication problem, and it is beginning to be implemented at websites operated by well-known companies. This article surveys the different mechanisms used to implement multifactor authentication. How a site chooses to implement multifactor authentication affects security as well as the overall user experience.

  15. 48. annual symposium of the Austrian Physical Society

    International Nuclear Information System (INIS)

    Netzer, F.P.

    1998-01-01

    This volume contains short communications of lectures and posters of the 48 th Symposium of the Austrian Physical Society which had been held at the University of Graz (Austria) in 1998. The following topics are included: atomic physics, molecular physics, plasma physics, solid state physics, nuclear and particle physics, polymer physics, biophysics, environmental physics, quantum electronics and quantum optics. (Suda)

  16. 49. annual symposium of the Austrian Physical Society

    International Nuclear Information System (INIS)

    Blatt, R.; Maerk, T.

    1999-01-01

    This volume contains short communications of lectures and poster sessions of the 49th symposium of the Austrian Physical Society which has been held at the University of Innsbruck (Austria) in 1999. The following topics are included: atomic physics, molecular physics, plasma physics, solid state physics, nuclear and particle physics, polymer physics, biophysics, environmental physics, quantum electronics and quantum optics. (Suda)

  17. Meat Processing.

    Science.gov (United States)

    Legacy, Jim; And Others

    This publication provides an introduction to meat processing for adult students in vocational and technical education programs. Organized in four chapters, the booklet provides a brief overview of the meat processing industry and the techniques of meat processing and butchering. The first chapter introduces the meat processing industry and…

  18. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    This paper examines the problem of providing a robust non-invasive authentication service for mobile users in a smart environment. We base our work on the persistent authentication model (PAISE), which relies on available sensors to track principals from the location where they authenticate, e.......g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users...... in the environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score...

  19. Replacement of Pork Meat with Pork Head Meat for Frankfurters

    Science.gov (United States)

    Choi, Yun-Sang; Hwang, Ko-Eun; Kim, Hyun-Wook; Song, Dong-Heon; Jeon, Ki-Hong; Park, Jong-Dae; Sung, Jung-Min; Kim, Young-Boong; Kim, Cheon-Jei

    2016-01-01

    The effect of reducing pork meat concentrations from 50% to 30% and replacing it with up to 20% pork head meat on chemical composition, cooking characteristics, physicochemical and textural properties, apparent viscosity, and sensory characteristics of frankfurters was determined. The highest moisture content in frankfurters was found in the control and T1 (frankfurter with 45% pork meat + 5% pork head). Protein and fat contents in frankfurters with pork head meat added were significantly (ppork head meat was increased from 0% to 20%, cooking loss, total expressible fluid separation, fat separation, and pH of frankfurters were increased, while the lightness, redness, yellowness, and apparent viscosity of frankfurters were decreased. Ash contents, cohesiveness, color, and tenderness of sensory characteristics of frankfurters added with different amounts of pork meat or pork head meat were not significantly (p>0.05) different from those of the control or there treatments. Frankfurters in T4 (frankfurter with 30% pork meat + 20% pork head) had the lowest (p0.05) from that in the control. Frankfurters with higher pork head meat concentrations had lower flavor, juiciness, and overall acceptability scores. Therefore, replacing pork meat with pork head meat in the formulation could successfully produce results similar to those of control frankfurters. The best results were obtained when 10% pork head meat was used to replace pork meat. PMID:27621683

  20. UNDERSTANDING CONSUMERS' ATTITUDE TOWARD MEAT LABELS AND MEAT CONSUMPTION PATTERN

    OpenAIRE

    Rimal, Arbindra; Fletcher, Stanley M.

    2003-01-01

    This paper addressed consumers' attitude toward meat labels and the influence of different aspects of meat labels on beef, poultry and seafood consumption using a national survey data. Nutrition and ingredient information on meat labels were positively related with attitude toward meat labels as well as meat consumption frequency.

  1. Authentic leadership, authentic followership, basic need satisfaction, and work role performance: A cross-level study

    OpenAIRE

    Leroy, Hannes; Anseel, F.; Gardner, W.; Sels, Luc

    2015-01-01

    Authentic leadership occurs when individuals enact their true selves in their role as a leader. This article examines the role of authentic followership in the previously established relationship between authentic leadership and follower in-role and extrarole performance behaviors. Consideration of followers who enact their true selves is important to understand how authentic leadership fosters follower self-determined work motivation and thus work role performance. Using self-determination t...

  2. Geospatial Authentication

    Science.gov (United States)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server.

  3. Healthier meat and meat products: Their role as functional foods

    OpenAIRE

    Jiménez Colmenero, Francisco; Carballo, José; Cofrades, Susana

    2001-01-01

    This review deals with the implications of meat and meat products for human health. It analyses the effect of the presence or absence of various factors: fat, fatty acid composition, cholesterol, calorific value, salt, nitrite or lipid oxidation products that can cause health problems. Bearing in mind these considerations, it then describes the strategies used in animal production, treatment of meat raw material and reformulation of meat products to obtain healthier meat and meat products. Fu...

  4. Deaustrification? : the policy-area-specific evolution of Austrian social partnership.

    NARCIS (Netherlands)

    Kittel, B.E.A.

    2000-01-01

    Recently, the functioning of Austrian Social Partnership has been increasingly questioned. If this interpretation of current strains on the relations between the state and the main economic interest organizations would be correct, Austria would become a significant case in favor of disorganization

  5. 22 CFR 92.36 - Authentication defined.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication defined. 92.36 Section 92.36... Notarial Acts § 92.36 Authentication defined. An authentication is a certification of the genuineness of... recognized in another jurisdiction. Documents which may require authentication include legal instruments...

  6. Authentication over Noisy Channels

    OpenAIRE

    Lai, Lifeng; Gamal, Hesham El; Poor, H. Vincent

    2008-01-01

    In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution attacks, are investigated for both single message and multiple message authentication scenarios. For each scenario, information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably, in both scenarios,...

  7. The authentic worker's well-being and performance: the relationship between authenticity at work, well-being, and work outcomes.

    Science.gov (United States)

    van den Bosch, Ralph; Taris, Toon W

    2014-01-01

    Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.

  8. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori

    2015-01-01

    propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  9. Authentication: Hot and cool

    OpenAIRE

    Cohen, E; Cohen, SA

    2012-01-01

    Seeking to shift the discussion of the concept of authenticity in tourism scholarship from the dominant concern with tourist experiences to the more sociological problem of the processes of authentication of tourist attractions, we conceptualize two analytically distinct, but practically often intersecting, modes of authentication of attractions, “cool” and “hot”. Through a range of examples, we demonstrate the implications of the two modes for the dynamics of the constitution of tourist attr...

  10. Meat and meat products as a source of bioactive peptides

    Directory of Open Access Journals (Sweden)

    Alfonso Totosaus

    2016-12-01

    Full Text Available Meat is a high protein content food, with great nutritional and biological value. Meat protein hydrolysis begins with the muscle to meat conversion, during meat ageing. After slaughter, endogen enzymes are responsible of meat softening since myofibrillar anchorage proteins are degraded. Protein hydrolysis continues during food preparation. When meat reaches the stomach, pepsin is the first enzyme to interact. As the food travel trough out gastrointestinal tract, pancreatic enzymes degraded the remained protein and the peptidases made the final proteolysis process. The small proteins or peptides are the absorbed to the circulatory system and distributed to the rest of the body. Bioactive peptides activity of meat and meat products is anti-hypertensive mainly, where histidine, carnosine and anserine are the main peptides identified. Another peptide with anti-oxidant activity is glutathione. The content depends on animal species.

  11. Comparison between Mt-DNA D-Loop and Cyt B primers for porcine DNA detection in meat products

    Science.gov (United States)

    Hamzah, Azhana; Mutalib, Sahilah Abd.; Babji, Abdul Salam

    2013-11-01

    This study was conducted to detect the presence of porcine DNA in meat products in the market using conventional polymerase chain reaction (PCR) and commercial PCR-southern hybridization analysis. Porcine DNA detection in meat products was tested due to some issues associated with the adulteration of food products in Malaysia. This is an important issue especially for Halal authentication which is required for some religious practices such as in Islam and Hinduisms. Many techniques have been developed for determining the Halal status of food products. In this paper, mt-DNA D-loop primer and cytochrome (cyt) b were used to detect the presence of porcine DNA in meat products. Positive and negative controls were always present for each batch of extraction. DNA of raw pork meat was used as a positive control while nucleus free water is used as negative control. A pair of oligonucleotide primer was used namely Pork1 and Pork2 which produced amplicon of 531 base pair (bp) in size. While, PCR-southern hybridization was conducted using primers readily supplied by commercial PCR-Southern hybridization and produced amplicon with 276 bp in size. In the present study, demonstrated that none of the samples were contaminated with porcine residuals but selected samples with pork meat were positive. The species-specific PCR amplification yielded excellent results for identification of pork derivatives in food products and it is a potentially reliable and suitable technique in routine food analysis for Halal certification.

  12. Authenticity at work

    NARCIS (Netherlands)

    van den Bosch, Ralph

    2016-01-01

    Authenticity at work, loosely defined as the degree to which an individual stays true to their core self, has impact on workers in the workplace. This thesis shows that authenticity at work can be measured with a reliable and valid instrument: the IAM Work. Furthermore, results of this thesis show

  13. 7 CFR 1.22 - Authentication.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to make...

  14. Privacy-Preserving Biometric Authentication: Challenges and Directions

    Directory of Open Access Journals (Sweden)

    Elena Pagnin

    2017-01-01

    Full Text Available An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication. The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In this article, we present the most challenging issues that need to be taken into consideration when designing secure and privacy-preserving biometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric authentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric authentication protocols.

  15. HERMA-Heartbeat Microwave Authentication

    Science.gov (United States)

    Lux, James Paul (Inventor); Chow, Edward (Inventor); McKee, Michael Ray (Inventor); Haque, Salman-ul Mohammed (Inventor); Tkacenko, Andre (Inventor)

    2018-01-01

    Systems and methods for identifying and/or authenticating individuals utilizing microwave sensing modules are disclosed. A HEaRtbeat Microwave Authentication (HERMA) system can enable the active identification and/or authentication of a user by analyzing reflected RF signals that contain a person's unique characteristics related to their heartbeats. An illumination signal is transmitted towards a person where a reflected signal captures the motion of the skin and tissue (i.e. displacement) due to the person's heartbeats. The HERMA system can utilize existing transmitters in a mobile device (e.g. Wi-Fi, Bluetooth, Cellphone signals) as the illumination source with at least one external receive antenna. The received reflected signals can be pre-processed and analyzed to identify and/or authenticate a user.

  16. Authentic leadership: application to women leaders.

    Science.gov (United States)

    Hopkins, Margaret M; O'Neil, Deborah A

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.

  17. Authentic leadership: application to women leaders

    OpenAIRE

    Hopkins, Margaret M.; O?Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.

  18. 40. annual convention 1990 of the Austrian physical society

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    Titles and abstracts of the 1990 Convention of the Austrian Physical Society, 17-21 September 1990 at Salzburg, Austria, are given. The topical sections are: 1. Atomic, Molecular- and Plasma Physics; 2. Solid State Physics; 3. Polymer Physics; 4. Nuclear- and Particle Physics; 5. Medical Physics and Biophysics. There are alltogether 193 contributions, 61 thereof of INIS interest

  19. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Petersen, Franziska Bork

    2013-01-01

    ' was understood in the Enlightenment and what techniques were used to stage the body when the concept gained currency, for instance in the writings of Rousseau. My analysis makes clear that 'bodily authenticity' on the two TV shows is achieved by strictly following gender-normative codes of beauty...... the 'authentic' ideal in a total of seven pieces. These strategies are hyperbole which exaggerates the beauty code implicit in 'authentic appearance'; multiplicity which undermines 'authenticity's' essentialism and estrangement which denies the notion of individual authorship. In conclusion, I place the staging...

  20. Image authentication using distributed source coding.

    Science.gov (United States)

    Lin, Yao-Chung; Varodayan, David; Girod, Bernd

    2012-01-01

    We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.

  1. Prediction of meat spectral patterns based on optical properties and concentrations of the major constituents.

    Science.gov (United States)

    ElMasry, Gamal; Nakauchi, Shigeki

    2016-03-01

    A simulation method for approximating spectral signatures of minced meat samples was developed depending on concentrations and optical properties of the major chemical constituents. Minced beef samples of different compositions scanned on a near-infrared spectroscopy and on a hyperspectral imaging system were examined. Chemical composition determined heuristically and optical properties collected from authenticated references were simulated to approximate samples' spectral signatures. In short-wave infrared range, the resulting spectrum equals the sum of the absorption of three individual absorbers, that is, water, protein, and fat. By assuming homogeneous distributions of the main chromophores in the mince samples, the obtained absorption spectra are found to be a linear combination of the absorption spectra of the major chromophores present in the sample. Results revealed that developed models were good enough to derive spectral signatures of minced meat samples with a reasonable level of robustness of a high agreement index value more than 0.90 and ratio of performance to deviation more than 1.4.

  2. Heterocyclic amines in meat and meat products

    Directory of Open Access Journals (Sweden)

    Aliye BULGAN

    2013-06-01

    Full Text Available Heterocyclic amines (HA are the mutagenic/carcinogenic compounds which generate as a result of cooking of red meat, poultry meat and fish fillets at high temperatures. Up to 20 different HAs were detected and classified in the researches that conducted on these types of meats cooked at high temperatures. HAs are the products of Maillard reactions and the Strecker degredation of main precursors such as creatine/creatinine, aminoacid and the polysaccharides. Many physical and chemical factors effect the formation of HAs. Thus, it was reported by many researchers that utilizing coating and marination processes in addition to using natural and synthetic antioxidants and seasonings-plant extracts were effective on inhibiting/decreasing the formation of HAs. Additionally, boiling/steaming and microwave cooking methodologies were recommended instead of barbecuing, grilling or frying to inhibit/decrease the formation of HAs. The HAs formed in meat and meat products and the factors which have effects on the formation of HAs are presented in this review.

  3. Report 1985 of the Austrian Research Centre Seibersdorf. Abridged version

    International Nuclear Information System (INIS)

    Schwach, G.W.

    1987-01-01

    The report gives a short survey of the work carried out by the Austrian Research Centre Seibersdorf in 1985. The working programme comprises five main areas: Energy and safety; Materials research, isotope and radiation techniques; Measuring techniques and information processing; Environmental protection, health and food; Industrial consulting. (Author)

  4. English, French, Spanish, Italian, Portuguese? Code Choice and Austrian Export

    Science.gov (United States)

    Lavric, Eva; Back, Bernhard

    2009-01-01

    This article deals with how "export oriented Austrian companies effect code choice in their business relationships with customers from Romance language speaking countries". The focus lies on the most widespread Romance languages, therefore on French, Spanish, Italian and Portuguese speaking customers.The question of code choice in export…

  5. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  6. In the elderly, meat protein assimilation from rare meat is lower than that from meat that is well done.

    Science.gov (United States)

    Buffière, Caroline; Gaudichon, Claire; Hafnaoui, Noureddine; Migné, Carole; Scislowsky, Valérie; Khodorova, Nadezda; Mosoni, Laurent; Blot, Adeline; Boirie, Yves; Dardevet, Dominique; Santé-Lhoutellier, Véronique; Rémond, Didier

    2017-11-01

    Background: Meat cooking conditions in in vitro and in vivo models have been shown to influence the rate of protein digestion, which is known to affect postprandial protein metabolism in the elderly. Objective: The present study was conducted to demonstrate the effect of cooking conditions on meat protein assimilation in the elderly. We used a single-meal protocol to assess the meat protein absorption rate and estimate postprandial meat protein utilization in elderly subjects. Design: The study recruited 10 elderly volunteers aged 70-82 y. Each received, on 2 separate occasions, a test meal exclusively composed of intrinsically 15 N-labeled bovine meat (30 g protein), cooked at 55°C for 5 min [rare meat (RM)] or at 90°C for 30 min [fully cooked meat (FCM)], and minced. Whole-body fluxes of leucine, before and after the meal, were determined with the use of a [1- 13 C]leucine intravenous infusion. Meat protein absorption was recorded with the use of 15 N enrichment of amino acids. Results: Postprandial time course observations showed a lower concentration in the plasma of indispensable amino acids ( P meat leucine in the plasma ( P meat nitrogen to plasma amino acid nitrogen ( P meat amino acids with RM than with FCM. This was associated with decreased postprandial whole-body protein synthesis with RM than with FCM (40% compared with 56% of leucine intake, respectively; P meat cooking conditions have little effect on postprandial protein utilization in young adults, the present work showed that the bioavailability and assimilation of meat amino acids in the elderly is lower when meat is poorly cooked. In view to preventing sarcopenia, elderly subjects should be advised to favor the consumption of well-cooked meat. This trial was registered at clinicaltrials.gov as NCT02157805. © 2017 American Society for Nutrition.

  7. Topic Map for Authentic Travel

    OpenAIRE

    Wandsvik, Atle; Zare, Mehdi

    2007-01-01

    E-business is a new trend in Internet use. Authentic travel is an approach to travel and travel business which helps the traveler experience what is authentic in the travel destination. But how can the traveler find those small authentic spots and organize them together to compose a vacation? E-business techniques, combined withTopic Maps, can help.

  8. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    Science.gov (United States)

    Kent, Alexander Dale [Los Alamos, NM

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  9. Physiology and taxonomy of lactobacilli surviving radurization of meat

    International Nuclear Information System (INIS)

    Hastings, J.W.

    1986-02-01

    The aim of this study was to isolate radiation-resistant lacto-bacilli from radurized (5 kGy) vacuum-packaged meat and subject them to biochemical, metabolic and physiological testing in order to gain a clearer understanding of the taxonomy of this group as well as determine characteristics which may be of technological significance. All 113 of the lactobacilli isolated were homofermentative, aciduric and were allocated to the sub-genus Streptobacterium. Numerical taxonomy by unweighted pair-group average linkage analysis revealed the existence of 5 clusters of the isolates. The same 113 isolates were classified using a purely classical taxonomic approach where the isolates were divided into 4 groups according to species designation. The basis upon which they were identified as a particular species was mainly their carbohydrate fermentation pattern. Several of the 113 isolates were selected for tests to determine characteristics of technological importance. All L.sake isolates exhibited the phenomenon of being more resistant to irradiation in the logarithmic phase than in the stationary phase of their growth cycle. This phenomenon was not characteristic of all the bacteria and was not always related to high radiation-resistance. Four L. sake isolates and three authentic strains were subjected to radiation-sensitivity testing in a natural food system where the bacteria were irradiated in minced meat packaged under four different conditions. The organisms exhibited the highest death rates under CO 2 packaging but resistance seemed to increase under N 2 -packaging. The radiation-resistance of the isolates was greater than that of the reference strains and all strains were approximately twice as resistant in the meat microenvironment than in a synthetic medium

  10. Authenticity and commoditization at home

    DEFF Research Database (Denmark)

    Stender, Marie

    This paper investigates how interest and affect are entangled in the built environment of new Danish homes. The paper unfolds tensions and conflicts in the process from design through branding to occupancy of the house, and the relationship between authenticity and commoditization is explored....... In Denmark, the concept of authenticity is often associated with old houses. By way of design and branding, though, new neighbourhoods are made authentic, referring to their historical past, architectural uniqueness or sense of community. Based on a fieldwork in three new residential buildings in Copenhagen......, the paper explores the inherent paradox of the staging of authenticity. Rather than viewing the house solely from the perspective of the resident, the study ethnographically traces the entire process from design to occupancy in order to investigate how notions of value and authenticity are negotiated...

  11. Quantum Dialogue with Authentication Based on Bell States

    Science.gov (United States)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  12. Meat consumption, meat cooking and risk of lung cancer among Uruguayan men.

    Science.gov (United States)

    De Stefani, Eduardo; Ronco, Alvaro L; Boffetta, Paolo; Deneo-Pellegrini, Hugo; Acosta, Gisele; Mendilaharsu, María

    2010-01-01

    A case-control study was conducted in Uruguay, including 876 male cases of lung cancer and 876 male hospitalized controls, frequency matched for age (ten-year intervals), residence and hospital. The following explanatory variables were included in the study: fried red meat, barbecued red meat, boiled red meat, and salted red meat. These items were log transformed and energy-adjusted by the residuals method. The following potential confounders were included into the models: age, residence, hospital, education, family history of lung cancer, body mass index, smoking index, alcohol drinking, mate consumption, total energy intake, non-meat fatty foods and total fruits. The main objective was to estimate the odds ratios associated with lung cancer risk. Whereas fried meat, barbecued meat, and salted meat were positively associated with risk (OR of the highest quartile of salted meat versus the lowest, 2.90, 95 % CI 1.99-4.25, p-value for trend<0.0001), boiled red meat was mainly protective. We conclude that salted meat was the main risk factor. The mechanisms could be related to the content of N-nitroso compounds in salted meat.

  13. A suitable method for the detection of a potential fraud of bringing macaque monkey meat into the food chain.

    Science.gov (United States)

    Rashid, Nur Raifana Abdul; Ali, Md Eaqub; Hamid, Sharifah Bee Abd; Rahman, Md Mahfujur; Razzak, Md Abdur; Asing; Amin, Md Al

    2015-01-01

    Being the third-largest primate population has not made macaque (Macaca fascicularis sp.) monkeys less exposed to threats and dangers. Despite wildlife protection, they have been widely hunted and consumed in several countries because of their purported nutritional values. In addition to trading as pure bush meats in several places, monkey meat has been sold in meatball and soup products in Indonesia. Thus the possibility of macaque meat trafficking under the label of common meats is quite high. This paper reports the development of a polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) assay with the shortest amplicon length for the confirmed detection of monkey meat under compromised states which are known to degrade DNA. We amplified a 120-bp region of d-loop gene using a pair of macaque-specific primers and confirmed their specificity for the target species through cross-challenging against 17 different species using a 141-bp site of an 18 S rRNA gene as an endogenous control for eukaryotes. This eliminated the possibilities of any false-negative detection with complex matrices or degraded specimens. The detection limit was 0.00001 ng DNA in a pure state and 0.1% of meat in mixed matrices and commercial meatball products. RFLP analysis further authenticated the originality of the PCR product and distinctive restriction patterns were found upon AluI and CViKI-1 digestion. A micro-fluidic lab-on-a-chip automated electrophoretic system separated the fragments with high resolution. The assay was validated for screening commercial meatball products with sufficient internal control.

  14. User Authentication based on Continuous Touch Biometrics

    Directory of Open Access Journals (Sweden)

    Christina J Kroeze

    2016-12-01

    Full Text Available Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, leaving the device vulnerable if stolen. This paper investigates the possibility of unobtrusive, continuous authentication for smartphones based on biometric data collected using a touchscreen. The possibility of authenticating users on a smartphone was evaluated by conducting an experiment simulating real-world touch interaction. Touch data was collected from 30 participants during normal phone use. The touch features were analysed in terms of the information provided for authentication. It was found that features such as finger pressure, location of touch interaction and shape of the finger were important discriminators for authentication. The touch data was also analysed using two classification algorithms to measure the authentication accuracy. The results show that touch data is sufficiently distinct between users to be used in authentication without disrupting normal touch interaction. It is also shown that the raw touch data was more effective in authentication than the aggregated gesture data.

  15. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  16. Case studies in food safety and authenticity: Lessons from real-life situations

    DEFF Research Database (Denmark)

    . The contents are divided into six parts, covering outbreak investigations, source tracing, crisis management, farm-level interventions, safe food production and food adulteration and authenticity. Each chapter is organized as an independent story/case study that has evolved over a certain period of time...... the learning process. Some are supported by illustrations, graphs, photos or maps. The case studies examine among other food products: bakery products, fresh produce, sprouted seeds, drinking water, chicken products, cattle, milk and raw milk, fresh herbs, meat, street foods, dairy foods, animal feed, rice......The identification and control of food contaminants rely on careful investigation and implementation of appropriate management strategies. Using a wide range of worldwide examples, this book provides a vital insight into the practical application of strategies for control and prevention...

  17. Joint Annual Meeting of the Austrian Physical Society and the Swiss Physical Society together with the Austrian and Swiss Societies for Astronomy and Astrophysics

    International Nuclear Information System (INIS)

    2013-01-01

    The Joint Annual Meeting of the Austrian Physical Society and the Swiss Physical Society was organized together with both national societies of Astronomy and Astrophysics (SSAA and ÖGAA) at the Johannes Kepler University Linz, Altenberger Straße 69, 4040 Linz, Austria. The plenary sessions gave an overview of the present status of research in quantum mechanics, particle, atomic and molecular physics. The topical sessions were dedicated to: nuclear, particle- and astro particle physics; physics teachers; acoustics; atoms, molecules, quantum optics and plasmas; solid state physics and research with neutron and synchrotron radiation; history of physics; medical, bio and environmental physics; surfaces, interfaces and thin films; careers in physics. There were special sessions on thermoelectrics and photovoltaics. In addition to the regular program, an Energy Day (Energietag) with several parallel sessions on recent topics of energy generation, -transport and -storage was jointly organized by the Energy and Industry Subdivisions of the Austrian Physical Society and by the Johannes Kepler Universität Linz. Those contributions which are in the INIS subject scope are indexed individually

  18. Identification of new food alternatives: how do consumers categorize meat and meat substitutes?

    NARCIS (Netherlands)

    Hoek, A.C.; Boekel, van M.A.J.S.; Voordouw, J.; Luning, P.A.

    2011-01-01

    New meat substitutes need to be recognized as alternatives to meat. We therefore investigated which category representations consumers have of meat and meat substitutes. Thirty-four non-vegetarian participants performed a free sorting task with 17 meat products and 19 commercially available meat

  19. Ionizing energy treatment of meat and meat products

    International Nuclear Information System (INIS)

    Macfarlane, J.J.; Eustace, I.J.; Grau, F.H.

    1983-01-01

    The radiation treatments that have received most attention with respect to red meats are radappertization, i.e. radiation sterilization (25-70 kGy), to enable the long term storage of meat without refrigeration, and radurization (0.5-10 kGy) in which a sufficient proportion of spoilage organisms are inactivated to enable the storage life of chilled meat to be extended. Shelf-stable radappertized meats cannot be produced in the fresh-like condition; they need to be heated to about 70 deg. C to inactivate endogenous enzymes that would otherwise cause flavour and texture defects. The products should be vacuum sealed in oxgyen-impermeable packages and irradiated in the frozen state, otherwise pronounced off-flavours and off-odours are formed. The radiation dose required to give a useful degree of microbial inactivation and permit an increase of storage life depends upon treatment and storage conditions. The dose required is likely to be in the range 0.25 to 1.0 kGy if aerobic conditions apply, and 1 to 4 kGy if anaerobic conditions apply. An acceleration in the rate of development of rancidity in meat as a result of irradiation may be of concern when meat is treated under aerobic conditions. At the highest dose indicated above for meat irradiated under anaerobic conditions (4 kGy), effects on the organoleptic attributes of mutton have been detected

  20. Authenticity Lies in the Eye of the Beholder The Perception of Teachers' Authenticity by their Students

    NARCIS (Netherlands)

    De Bruyckere, Pedro

    2018-01-01

    Everything and everybody is urged to be authentic. Brands now need to create authentic experiences in music, artists survive if they are perceived as being real and nowadays, even in political elections, the perception of authenticity is an issue, certainly in the 2016 elections in the United

  1. Meat and Meat Product Consumption among Infants in Latvia

    Directory of Open Access Journals (Sweden)

    Širina Inga

    2017-12-01

    Full Text Available Meat consumption during the first year of life is especially important to provide necessary iron requirements. The aim of the study was to assess meat and meat product consumption of Latvian infants during their first year of life, in relation to different factors. Data were collected by interview method using two types of questionnaires: food frequency questionnaires and food diary. The study included a representative sample of infants and toddlers from all regions of Latvia with a target sample of 560 participants. The study included 266 infants: 127 girls, 139 boys, aged from 0 to 12 month. Data were summarised using the Excel software and analysed using the SPSS software. For data analysis two age groups were created: 0–5.9 months and 6–12 months. Consumption was analysed by two parameters: frequency and amount per feeding. Meat products were defined as offal products, sausages, and meat in baby food. Meat was mainly consumed after 6 months of age and by 73% of infants (n = 107. Meat from baby food was consumed only after 6 months and by 23% (n = 34. Sausages and offal products were consumed after 6 months of age. Sausages were consumed by 18% (n = 28 and offal products by 11% (n = 16 of infants. Meat consumption for the majority of infants was introduced after 6 months and was in accordance with recommendations.

  2. Make me authentic, but not here: Reflexive struggles with academic identity and authentic leadership

    OpenAIRE

    Tomkins, Leah; Nicholds, Alyson

    2017-01-01

    This article presents a reflexive auto-ethnography of the experience of teaching authentic leadership to MBA students. It traces parallels between the challenges of authentic leadership and the challenges of academic identity work, grounded specifically in the experience of having to teach something one does not fully endorse. Both authentic leadership and academic identity work emerge as struggle – riddled with false starts, best intentions and self-deception, and entwined in the politics of...

  3. Attitudes among the general Austrian population towards neonatal euthanasia: a survey.

    Science.gov (United States)

    Goldnagl, Lena; Freidl, Wolfgang; Stronegger, Willibald J

    2014-10-07

    The Groningen Protocol aims at providing guidance in end-of-life decision-making for severely impaired newborns. Since its publication in 2005 many bioethicists and health care professionals have written articles in response. However, only very little is known about the opinion among the general population on this subject. The aim of this study was to present the general attitude towards neonatal euthanasia (NE) among the Austrian population and the factors associated with the respondents' opinion. A cross-sectional study was conducted among the general Austrian population. Computer-assisted telephone interviews were performed with 1,000 interviewees aged 16 years and older. Binary logistic regression was performed in order to determine factors that are independently associated with the respondents' opinion about neonatal euthanasia. While 63.6% of the participants rejected the idea of neonatal euthanasia for severely impaired newborns, 36.4% opted either in favor or were undecided. Regression analysis has shown the respondents' educational level (p = 0.005) and experience in the care of terminally ill persons (p = 0.001) to be factors that are positively associated with the rejection of neonatal euthanasia, whereas a higher age was associated with a lower degree of rejection (p = 0.021). We found that the majority of the Austrian population rejects the idea of neonatal euthanasia for severely impaired newborns. However, given the increasing levels of rejection of NE among the younger generations and among people with a higher educational level, it cannot be precluded that the rejection rate might in future increase even further, rather than decrease.

  4. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  5. Production of crispy bread snacks containing chicken meat and chicken meat powder

    Directory of Open Access Journals (Sweden)

    HULYA CAKMAK

    Full Text Available ABSTRACT Chicken meat in two different forms (chicken meat and chicken meat powder were added into white flour and whole wheat blend baguette bread formulations for protein enrichment and finally developing new and healthy snacks. The chicken meat and powder levels were 10% for white flour baguette, and 15% for whole wheat blend. The dried baguette samples were packaged under 100% N2, and physical, chemical, microbiological and sensorial properties were evaluated during 3 months of storage. Protein content of chicken meat powder added samples were found statistically higher than chicken meat added samples. Hardness of the snacks was significantly affected from type of chicken meat, such as values were higher for chicken meat added samples than chicken meat powder added samples. Lipid oxidation of the snacks was determined by TBA analysis, and TBA value for whole wheat mixture snack with 15% of chicken meat was the highest among all during storage. The highest overall acceptance score was obtained from white flour snack with 10% chicken meat. There was no coliform bacteria detected during storage and the results of yeast-mold count and aerobic plate count of snacks remained between the quantitative ranges.

  6. Functional Characteristics of Spent Duck Meat for Use in Emulsion-Type Meat Products

    Directory of Open Access Journals (Sweden)

    Juni Sumarmono

    2010-01-01

    Full Text Available Spent ducks produce nutritive meat; however the meat possesses undesirable characteristics such as strong odor and tough. Hence, appropriate yet simple processing technologies need to be developed in order to maximize the use of duck meat. The experiment was conducted to evaluate functional characteristics of spent duck meat as raw material for the production of emulsion-type meat products, such as nugget and sausage. Chilled carcasses of 96 spent ducks were deboned manually, then mixed thoroughly and ground using a 5 mm diameter grinding plate. The ground meat was divided into 4 batches (group of treatments; one batch was treated with iced tap water (M1, one batch with 0.1% NaCl solution (M2, one batch with 0.5% NaHCO3 solution (M3, and one batch was left as is as control (M4. Variables measured were water holding capacity (WHC, pH, emulsion capacity and stability of the meat; and firmness and tenderness of the meat gel. Results showed that M1 meat has significantly higher WHC (less percentage of free water than control (M4, whereas M2 and M3 meat has similar WHC to control. Processing caused the ground duck meat to have significantly higher pH than control. The highest meat pH was observed in M3, followed by M2, M1 and control. Processing duck meat with iced tap water, NaCl or NaHCO3 produced significantly more tender meat gel compared to untreated meat (as is. Tenderness of meat gel of M3 was the most tender followed by M2 and M1. Similar results for meat gel firmness were observed. No significant differences were observed in term of emulsion capacity (expressed as ml oil/gr protein and ml oil/gr fresh meat, emulsion stability (expressed as ml oil and total liquid released per 100 gr emulsion, and cooking recovery (%. The study reported in this paper offers simple processing technologies to improve functional characteristics of spent duck meat to be use as raw material for the production of emulsion type meat products. (Animal Production 12

  7. Meet meat: An explorative study on meat and cultured meat as seen by Chinese, Ethiopians and Dutch.

    Science.gov (United States)

    Bekker, Gerben A; Tobi, Hilde; Fischer, Arnout R H

    2017-07-01

    In this cross-cultural study we investigated how study participants from China, Ethiopia and the Netherlands operationalize the concept of meat and to what extent cultured meat fits or does not fit into this operationalization. We argue that combining the conceptual approaches symbolic boundaries and theory of social practices helps to better understand the possibly culturally dependent operationalization of the concept meat. Ten visiting graduate students from China, 10 from Ethiopia and 10 native Dutch graduate students completed freelist tasks, a pile sort task, interview and essay task, during a single session. We found that butchered animals are at the center of the concept of meat, although depending on culture not all animals are a source of meat. Symbolic boundaries were restricted or stretched depending on social practices within countries. Ethiopian participants applied strictly defined symbolic boundaries, where Chinese and Dutch participants used more broadly defined symbolic boundaries. Cultured meat was seen as a technology for the future and was positioned across the symbolic boundaries of meat. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Anonymous Authentication Systems Based on Private Information Retrieval

    OpenAIRE

    Nakamura, Toru; Inenaga, Shunsuke; Ikeda, Daisuke; Baba, Kensuke; Yasuura, Hiroto

    2009-01-01

    This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authenticati...

  9. Analysis of the Genetic Diversity and Population Structure of Austrian and Belgian Wheat Germplasm within a Regional Context Based on DArT Markers

    Directory of Open Access Journals (Sweden)

    Mohamed A. El-Esawi

    2018-01-01

    Full Text Available Analysis of crop genetic diversity and structure provides valuable information needed to broaden the narrow genetic base as well as to enhance the breeding and conservation strategies of crops. In this study, 95 Austrian and Belgian wheat cultivars maintained at the Centre for Genetic Resources (CGN in the Netherlands were characterised using 1052 diversity array technology (DArT markers to evaluate their genetic diversity, relationships and population structure. The rarefacted allelic richness recorded in the Austrian and Belgian breeding pools (A25 = 1.396 and 1.341, respectively indicated that the Austrian germplasm contained a higher genetic diversity than the Belgian pool. The expected heterozygosity (HE values of the Austrian and Belgian pools were 0.411 and 0.375, respectively. Moreover, the values of the polymorphic information content (PIC of the Austrian and Belgian pools were 0.337 and 0.298, respectively. Neighbour-joining tree divided each of the Austrian and Belgian germplasm pools into two genetically distinct groups. The structure analyses of the Austrian and Belgian pools were in a complete concordance with their neighbour-joining trees. Furthermore, the 95 cultivars were compared to 618 wheat genotypes from nine European countries based on a total of 141 common DArT markers in order to place the Austrian and Belgian wheat germplasm in a wider European context. The rarefacted allelic richness (A10 varied from 1.224 (Denmark to 1.397 (Austria. Cluster and principal coordinates (PCoA analyses divided the wheat genotypes of the nine European countries into two main clusters. The first cluster comprised the Northern and Western European wheat genotypes, whereas the second included the Central European cultivars. The structure analysis of the 618 European wheat genotypes was in a complete concordance with the results of cluster and PCoA analyses. Interestingly, a highly significant difference was recorded between regions (26.53%. In

  10. 69 The Multicultural Education in Bucovina during the Austrian Domination

    Directory of Open Access Journals (Sweden)

    Vasile Baltag

    2014-12-01

    Full Text Available In 1775, the territory of Bucovina became part of the Habsburg monarchy and it stayed like that for 143 years. All throughout this period when the Romanians lived here next to Ukrainians, Germans, Jews and other nationalities, the Austrian government took into consideration their need for culture, which resulted in the development of a multicultural teaching system. This implied that the languages of teaching in the Bukovinian schools were: Latin, Greek, Romanian, Ukrainian and, more often than not, German. Although the weighty presence of the German language in the academic institutions limited the number of young Romanians in schools, the teaching in German enabled the access of the Bukovinian students to the great European universities from Vienna, Salzburg, Lemberg, Kraków or Prague, before the founding of the Chernivtsi University (1875. Thus, beyond the negative aspects of the separation of this territory from Romania, the Austrian occupation represented an effervescent period from a cultural viewpoint, which lent a specific identity to the teaching system in Bukovina.

  11. Perfumed historic buildings: Issues of authenticity

    Directory of Open Access Journals (Sweden)

    Tošić Jovana

    2016-01-01

    Full Text Available Contemporary historical preservation practice includes olfactory preservation as an experimental method of architectural preservation. The implementation of manufactured scents in historic buildings raises important issues of authenticity. This paper focuses on three important issues in the relation between olfactory preservation and authenticity: the importance of phenomenology in memory evocation; the relative character of the authenticity concept; and the significance of social values in historic preservation. This requires a critical examination of charters, documents and theoretical interpretations which reflect a broader concept of authenticity. The paper discusses certain articles of the Venice Charter, the Nara Document on Authenticity, as well as the sense of smell in architectural experience through critical analysis of the theories of John Ruskin, Viollet-le-Duc, Roger Scruton and Juhani Pallasmaa and their concepts of authenticity. Authenticity issues are illustrated by the examples of olfactory preservation: olfactory reconstruction of Philip Johnson’s Glass House; interior restoration and olfactory reconstruction of the Arts Club in Mayfair, London; and the creation process of the perfume brand Arquiste, a meaningful example which relocates the olfactory reconstruction context. These critical analyses raise the question of scent in historic buildings as a value in itself.

  12. Of Meat and Men: Sex Differences in Implicit and Explicit Attitudes Toward Meat

    Directory of Open Access Journals (Sweden)

    Hamish J. Love

    2018-04-01

    Full Text Available Modern attitudes to meat in both men and women reflect a strong meat-masculinity association. Sex differences in the relationship between meat and masculinity have not been previously explored. In the current study we used two IATs (implicit association tasks, a visual search task, and a questionnaire to measure implicit and explicit attitudes toward meat in men and women. Men exhibited stronger implicit associations between meat and healthiness than did women, but both sexes associated meat more strongly with ‘healthy’ than ‘unhealthy’ concepts. As ‘healthy’ was operationalized in the current study using terms such as “virile” and “powerful,” this suggests that a meat-strength/power association may mediate the meat-masculinity link readily observed across western cultures. The sex difference was not related to explicit attitudes to meat, nor was it attributable to a variety of other factors, such as a generally more positive disposition toward meat in men than women. Men also exhibited an attention bias toward meats, compared to non-meat foods, while females exhibited more caution when searching for non-meat foods, compared to meat. These biases were not related to implicit attitudes, but did tend to increase with increasing hunger levels. Potential ultimate explanations for these differences, including sex differences in bio-physiological needs and receptivity to social signals are discussed.

  13. Sensing pressure for authentication

    NARCIS (Netherlands)

    Henderson, N.J.; White, N.M.; Veldhuis, Raymond N.J.; Hartel, Pieter H.; Slump, Cornelis H.

    The use of signals resulting from tapping a rhythm on a pressure sensor is explored for authentication. The features used for authentication can be divided into rhythm and waveform features. This paper studies the use of waveform features. A verification scheme based on prototype waveforms is

  14. CLOSTRIDIUM PERFRINGENS IN MEAT AND MEAT PRODUCTS.

    Science.gov (United States)

    HALL, H E; ANGELOTTI, R

    1965-05-01

    A total of 262 specimens of meat and meat dishes were examined for the presence of Clostridium perfringens. Of this total, 161 were raw, unprocessed beef, veal, lamb, pork, or chicken; 101 were processed meats and meat dishes. C. perfringens was isolated from 113 (43.1%) of these specimens. The highest percentage of contamination (82%) was found in veal cuts, and the lowest (4.7%) in sliced sandwich meats and spreads. Only 2 of the 113 isolates were shown to produce heat-resistant spores, which indicates a very low incidence (0.8%) of contamination. These findings indicate that outbreaks of C. perfringens food-borne disease in the Cincinnati area are caused principally by the contamination of the food with vegetative cells or spores of the organism after cooking. Studies of the effects of various holding temperatures on the growth of C. perfringens indicated that, in the range of 5 to 15 C, no multiplication would occur, but that viable cells would still be present at the end of a 5-day holding period. Extremely rapid growth occurred at temperatures around 45 C, and complete inhibition of growth was accomplished between 49 and 52 C.

  15. Polymerase chain reaction assay targeting cytochrome b gene for the detection of dog meat adulteration in meatball formulation.

    Science.gov (United States)

    Rahman, Md Mahfujur; Ali, Md Eaqub; Hamid, Sharifah Bee Abd; Mustafa, Shuhaimi; Hashim, Uda; Hanapi, Ummi Kalthum

    2014-08-01

    A polymerase chain reaction (PCR) assay for the assessment of dog meat adulteration in meatballs was developed. The assay selectively amplified a 100-bp region of canine mitochondrial cytochrome b gene from pure, raw, processed and mixed backgrounds. The specificity of the assay was tested against 11 animals and 3 plants species, commonly available for meatball formulation. The stability of the assay was proven under extensively autoclaving conditions that breakdown target DNA. A blind test from ready to eat chicken and beef meatballs showed that the assay can repeatedly detect 0.2% canine meat tissues under complex matrices using 0.04 ng of dog DNA extracted from differentially treated meatballs. The simplicity, stability and sensitivity of the assay suggested that it could be used in halal food industry for the authentication of canine derivatives in processed foods. Copyright © 2014 Elsevier Ltd. All rights reserved.

  16. Strategic capacity withholding through failures in the German-Austrian electricity market

    International Nuclear Information System (INIS)

    Bergler, Julian; Heim, Sven; Hüschelrath, Kai

    2017-01-01

    In electricity day-ahead markets organized as uniform price auction, a small reduction in supply in times of high demand can cause substantial increases in price. We use a unique data set of failures of generation capacity in the German-Austrian electricity market to investigate the relationship between electricity spot prices and generation failures. Differentiating between strategic and non-strategic failures, we find a positive impact of prices on non-usable marginal generation capacity for strategic failures only. Our empirical analysis therefore provides evidence for the existence of strategic capacity withholding through failures suggesting further monitoring efforts by public authorities to effectively reduce the likelihood of such abuses of a dominant position. - Highlights: • We investigate the relationship between electricity spot prices and generation failures. • Announced (non-strategic) failures are found to decrease with increasing price. • Unannounced (strategic) failures of marginal technologies increase with increasing price. • Our evidence is consistent with the presence of capacity withholding strategies in the German-Austrian electricity market.

  17. Staging constructions of authenticity in organizational change

    DEFF Research Database (Denmark)

    Dupret, Katia

    2018-01-01

    Authenticity in organizations has gained increased focus in recent years. Authentic management and leadership are ways to motivate and make sustainable changes in the organization. But authenticity is also strategically worked with in order to serve social and political functions...... that are emotionally charged. Through a socio-material perspective this paper seeks to explore how change processes in organizations challenges the idea of authentic leadership as a merely individual ability or personality trait and suggest that the authentic leader is distributed into the practices of change...

  18. BIOMETRIC AUTHENTICATION USING NONPARAMETRIC METHODS

    OpenAIRE

    S V Sheela; K R Radhika

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determine...

  19. 22 CFR 92.37 - Authentication procedure.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication procedure. 92.37 Section 92.37... Notarial Acts § 92.37 Authentication procedure. (a) The consular officer must compare the foreign official...) Where the State law requires the consular officer's certificate of authentication to show that the...

  20. Robust image authentication in the presence of noise

    CERN Document Server

    2015-01-01

    This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.    Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:   Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the pre...

  1. [Brief introduction of geo-authentic herbs].

    Science.gov (United States)

    Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian

    2013-05-01

    The science of geo-authentic herbs is a characteristic discipline of traditional Chinese medicine established during thousands of years of clinical practices. It has a long history under the guidance of profound theories of traditional Chinese medicine. The words of "geo-authentic product" were derived from an administrative division unit in the ancient times, which layed stress on the good quality of products in particular regions. In ancient records of traditional Chinese medicine, the words of "geo-authentic product" were first found in Concise Herbal Foundation Compilation of the Ming dynasty, and the words of "geo-authentic herbs" were first discovered in Peony Pavilion of the late Ming dynasty. After all, clinical effect is the fundamental evaluation standard of geo-authentic herbs.

  2. User Authentication in Smartphones for Telehealth

    Directory of Open Access Journals (Sweden)

    Katherine A. Smith

    2017-11-01

    Full Text Available Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity.  When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.  Keywords: Authentication, Biometrics, HIPAA, Mobile security, Telehealth

  3. Software Authentication

    International Nuclear Information System (INIS)

    Wolford, J.K.; Geelhood, B.D.; Hamilton, V.A.; Ingraham, J.; MacArthur, D.W.; Mitchell, D.J.; Mullens, J.A.; Vanier, P. E.; White, G.K.; Whiteson, R.

    2001-01-01

    The effort to define guidance for authentication of software for arms control and nuclear material transparency measurements draws on a variety of disciplines and has involved synthesizing established criteria and practices with newer methods. Challenges include the need to protect classified information that the software manipulates as well as deal with the rapid pace of innovation in the technology of nuclear material monitoring. The resulting guidance will shape the design of future systems and inform the process of authentication of instruments now being developed. This paper explores the technical issues underlying the guidance and presents its major tenets

  4. Context-Aware Multimodal FIDO Authenticator for Sustainable IT Services

    Directory of Open Access Journals (Sweden)

    Seung-Hyun Kim

    2018-05-01

    Full Text Available Existing sustainable IT services have several problems related to user authentication such as the inefficiency of managing the system security, low security, and low usability. In this paper, we propose a Fast IDentity Online (FIDO authenticator that performs continuous authentication with implicit authentication based on user context and multimodal authentication. The proposed FIDO authenticator, a context-aware multimodal FIDO authentication (CAMFA method, combines information such as the user context, state of the mobile device, and user biometrics, then applies implicit and explicit authentication methods to meet the level of authentication required by the service provider. This reduces the user’s explicit authentication burden and continually authenticates users at risk during the session. Moreover, it is able to respond to attacks such as the theft of the authentication method or session hijacking. To study the effectiveness of CAMFA, we ran a user study by collecting data from 22 participants over 42 days of activity on a practical Android platform. The result of the user study demonstrates that the number of explicit authentication requests could be reduced by half. Based on the results of this study, an advanced user authentication that provides multimodal and continuous authentication could be applied to sustainable IT services.

  5. Authentic Leadership Kepala Sekolah dalam Menanamkan Sistem Nilai

    Directory of Open Access Journals (Sweden)

    Aan Komariah

    2013-07-01

    Full Text Available Abstract: The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. The study involved 62 superintendants who were formerly principals of secondary schools, high schools, and vocational schools in Bandung, West Java. The results show that authentic leadership was a suitable type of leadership model to effectively instill value system. It also demonstrated that authentic leadership was a unidimensional construct. Abstrak: Authentic Leadership Kepala Sekolah dalam Menanamkan Sistem Nilai. Penelitian ini bertujuan untuk menguji seberapa penting authentic leadership untuk dijadikan sebagai alternatif kepemimpinan di sekolah untuk menanamkan sistem nilai dan karakter warga sekolah serta menguji multidimensionalitas konstruk authentic leadership di sekolah. Metode Delphi Survey digunakan untuk pengujian tingkat pentingnya perilaku authentic leadership dengan partisipan 62 pengawas mantan kepala sekolah SMP, SMA dan SMK di Kota Bandung. Hasil penelitian menunjukan bahwa authentic leadership adalah tipe kepemimpinan yang tepat untuk menanamkan sistem nilai secara efektif. Penelitian juga membuktikan bahwa authentic leadership merupakan konstruk yang bersifat unidimensional.

  6. Advances in ingredient and processing systems for meat and meat products.

    Science.gov (United States)

    Weiss, Jochen; Gibis, Monika; Schuh, Valerie; Salminen, Hanna

    2010-09-01

    Changes in consumer demand of meat products as well as increased global competition are causing an unprecedented spur in processing and ingredient system developments within the meat manufacturing sector. Consumers demand healthier meat products that are low in salt, fat, cholesterol, nitrites and calories in general and contain in addition health-promoting bioactive components such as for example carotenoids, unsaturated fatty acids, sterols, and fibers. On the other hand, consumers expect these novel meat products with altered formulations to taste, look and smell the same way as their traditionally formulated and processed counterparts. At the same time, competition is forcing the meat processing industry to use the increasingly expensive raw material "meat" more efficiently and produce products at lower costs. With these changes in mind, this article presents a review of novel ingredient systems and processing approaches that are emerging to create high quality, affordable meat products not only in batch mode but also in large-scale continuous processes. Fat replacers, fat profile modification and cholesterol reduction techniques, new texture modifiers and alternative antioxidant and antimicrobial systems are being discussed. Modern processing equipment to establish continuously operating product manufacturing lines and that allow new meat product structures to be created and novel ingredients to be effectively utilized including vacuum fillers, grinders and fine dispersers, and slicers is reviewed in the context of structure creation in meat products. Finally, trends in future developments of ingredient and processing systems for meat products are highlighted.

  7. Feasibility and acceptance of biofeedback-assisted mental training in an Austrian elementary school: a pilot study.

    Science.gov (United States)

    Crevenna, Richard; Krammer, Christine; Keilani, Mohammad

    2016-04-01

    This pilot study aimed to investigate feasibility, acceptance, and effects of biofeedback-assisted mental training in a population of fifteen 10-year-old pupils in an Austrian elementary school. Participants were instructed in relaxation techniques by using biofeedback. Before intervention, after 6 weeks with active mental training and with regular instructions by the teacher, and after a further time period of 6 weeks without instructions, attention and concentration improved. The results indicate feasibility, good acceptance, and beneficial effects of biofeedback-assisted mental techniques in Austrian elementary school pupils.

  8. Replacement of Pork Meat with Pork Head Meat for Frankfurters

    OpenAIRE

    Choi, Yun-Sang; Hwang, Ko-Eun; Kim, Hyun-Wook; Song, Dong-Heon; Jeon, Ki-Hong; Park, Jong-Dae; Sung, Jung-Min; Kim, Young-Boong; Kim, Cheon-Jei

    2016-01-01

    The effect of reducing pork meat concentrations from 50% to 30% and replacing it with up to 20% pork head meat on chemical composition, cooking characteristics, physicochemical and textural properties, apparent viscosity, and sensory characteristics of frankfurters was determined. The highest moisture content in frankfurters was found in the control and T1 (frankfurter with 45% pork meat + 5% pork head). Protein and fat contents in frankfurters with pork head meat added were significantly (p0...

  9. ["Maintaining a Common Culture"--the German Research Foundation and the Austrian-German scientific aid in the interbellum].

    Science.gov (United States)

    Fengler, Silke; Luxbacher, Günther

    2011-12-01

    After the end of the Great War, private as well as public research funding in Austria was anaemic and slow to develop. Whereas the German state-funded Deutsche Forschungsgemeinschaft (DFG) was established as early as 1920, first steps in that direction were only taken in Austria in the late 1920s. In 1929, the Osterreichisch-deutsche Wissenschaftshilfe (ODW) was founded under the auspices of the Austrian Academy of Sciences and the DFG. Although prima facie on an equal footing, the new research funding organisation was in fact highly dependent on its German cooperation partner. The article explores for the first time ODW's position within the German and Austrian science and foreign policies, which aimed to promote the idea of unification of both states within the German Reich. A quantitative analysis of the subsidies policy in the first five years of existence shows that the ODW gave financial aid primarily to conservative research fields, affecting the intellectual balance of power in the First Austrian Republic. Policy continuities and discontinuities of the organisation in the course of the national-socialist rise to power in Germany after 1933 are examined in the second part of the article. The article thus both increases our knowledge about the most important German research funding organisation DFG, and identifies some of the fundamental structural features of Austrian science policy in the interwar years.

  10. Progress Report 1985 of the Austrian Research Centre Seibersdorf. Abridged version

    International Nuclear Information System (INIS)

    Schwach, G.W.

    1986-06-01

    The report gives a short survey of the work carried out by the Austrian Research Centre Seibersdorf in 1985. The working programme comprises five main areas: Energy and safety; Materials research, isotope and radiation techniques; Measuring techniques and information processing; Environmental protection, health and food; Industrial consulting. (Author)

  11. Progress Report 1984 of the Austrian Research Centre Seibersdorf. Abridged version

    International Nuclear Information System (INIS)

    Schwach, G.W.

    1986-06-01

    The report gives a short survey of the work carried out by the Austrian Research Centre Seibersdorf in 1984. The working programme comprises five main areas: Energy and safety; Materials research, isotope and radiation techniques; Measuring techniques and information processing; Environmental protection, health and food; Industrial consulting. (Author)

  12. PCDD/F and PCB levels in Austrian cow's milk

    Energy Technology Data Exchange (ETDEWEB)

    Thanner, G.; Moche, W. [Umweltbundesamt Wien (Austria)

    2004-09-15

    In 2003 the Federal Environment Agency carried out a first Austrian wide milk monitoring study with the objective to get an overview of average PCDD/F levels in cow's milk, additionally dioxinlike PCBs, according to WHO, and indicator PCBs, as listed by national regulations, were analysed.

  13. Österreichs Wirtschaftsbeziehungen in Südostasien [Austrian Economic Relations to South-East Asia

    Directory of Open Access Journals (Sweden)

    Reinhart Zimmermann

    2008-01-01

    Full Text Available Der süd- und südostasiatische Raum befindet sich im Aufholprozess. Der anhaltende Wachstumstrend geht einher mit der steigenden Nachfrage aus den Industriestaaten sowie dem Binnenmarkt und führt auch zu erhöhtem Bedarf an Infrastruktur. Auch die österreichische Wirtschaft profitiert vom Asien-Boom. Dies zeigt das stete Wachstum österreichischer Warenexporte in die Region, der Anstieg heimischer Direktinvestitionen sowie die wachsende Präsenz österreichischer Firmen. Ziel der österreichischen WirtschaftsvertreterInnen ist es, die Tigerstaaten Südostasiens mehr aus dem Schatten der aufstrebenden Wirtschaftssupermacht China zu holen und die österreichische Wirtschaftsverflechtung mit diesen Ländern zu intensivieren.The South and South East Asian Area has been catching up with the developed world. The sustained economic growth trend goes hand in hand with a higher demand from industrialized nations and a stronger internal demand, pushing for better infrastructure. The Austrian economy is also benefiting from booming Asia, underscored by the steady increase of Austrian exports to this region, the rise of foreign direct investment and companies doing business in these countries. The Austrian business community would like to see the South East Asian tiger states more out of the shadow of the new super power China. The overall objective is to intensify the economic integration with South and South East Asia.

  14. Consumers' motivational associations favoring free-range meat or less meat

    NARCIS (Netherlands)

    de Boer, J.; Boersema, J.J.; Aiking, H.

    2009-01-01

    The present paper analyzed the motivational orientations of consumers who choose to eat (1) small portions of meat or (2) ethically distinctive meat, such as free-range meat, in relation to the motivational orientations of their opposites. Going beyond the conventional approach to consumer behavior,

  15. Water demand for ski resort development in the Austrian Alps: an Overview

    Science.gov (United States)

    Breiling, M.; Sokratov, S.

    2012-04-01

    Austria has the highest national added value from winter tourism in Europe, as well as worldwide. 15.7 million arrivals were counted in Austrian accommodation establishments in the 2010/11 winter season. There were more than 62 million overnight stays and 51.2 million skier-days were consumed. 588 million transports were carried out by more than 3000 lifts (cable cars, chair lifts and T-bars). Including indirect and induced effects, this resulted in more than 10 billion euros in added value being generated. The lack of snow in many Austrian skiing areas during the 2006/2007 winter season demonstrated the extent to which meteorological conditions influence operations. Declines in the number of skiers transported and total skier days were the result. The cable-car operators also had to struggle with little snow in the 2010/2011 winter. The Austrian Cable Car Operators' Association stated that the opening of 70-80% of all skiing areas outside of the peak season could only be assured through the use of snowmaking equipment. The central criterion for winter sports enthusiasts to make a trip is the guarantee that they will find snow at their destination and Austria's cable-car operators invest more than 100 million euros in the erection and improvement of snowmaking complexes every year to satisfy this deand. In the 2010/2011 season, this provided for 17,800 jobs. Cable car operators set up snowmaking equipment to become independent from meteorological conditions and improve the capacity utilisation of their expensive investments in transport systems in the early winter. Austria has a skiing area of around 25,400 hectares - around 17,000 hectares at altitudes between 600m and 3200m are currently suitable for snowmaking. As much as 70% of the snow is produced immediately before the start of the season. This recent trend is responsible that the irrigation pattern of Austrian land use changed significantly in the last decade. Previously maize fields and low lands in summer

  16. Prospects and challenges of radiation processing of meats and meat products in India

    International Nuclear Information System (INIS)

    Chander, Ramesh

    2014-01-01

    In India goat, lamb and chicken meat are widely preferred, while, bovine meat and pork are consumed only by a small segment of the population. Meats in the country are mainly marketed fresh or in frozen state. Recently chilled poultry has been introduced in Indian market. In addition to fresh meats, several other ready to eat or ready to cook meat products like chicken chilly, chicken tikka, mutton shammi kababs, mutton seekh kababs etc are available in urban Indian market. These products are marketed only in the frozen state and have limited market due to expensive and inadequate freezing facilities. Major share of domestic fresh meat and poultry market is by unorganized sector and only a few corporate houses like Godrej and Venkey's are marketing poultry products. The time has come to benefit from radiation processing for safe, chilled meat and poultry in India. Shelf-stable, nutritious meat and meat products can also be produced by the process. Radiation processing of these foods will be of great economic and health significance and give boost to exports. This radiation processing can meet the needs of services of convenient and ready-to-eat meat and meat products

  17. Decarbonising meat : Exploring greenhouse gas emissions in the meat sector

    NARCIS (Netherlands)

    Aan Den Toorn, S. I.; Van Den Broek, M. A.; Worrell, E.

    Consumption of meat is an important source of global greenhouse gas (GHG) emission and deep decarbonisation of the whole meat production chain is required to be able to meet global climate change (CC) mitigation goals. Emissions happen in different stages of meat production ranging from agricultural

  18. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner\\'s signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  19. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin; Papadias, Dimitris; Papadopoulos, Stavros; Kalnis, Panos

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  20. Managing authenticity: the paradox of great leadership.

    Science.gov (United States)

    Goffee, Rob; Jones, Gareth

    2005-12-01

    Leaders and followers both associate authenticity with sincerity, honesty, and integrity. It's the real thing--the attribute that uniquely defines great managers. But while the expression of a genuine self is necessary for great leadership, the concept of authenticity is often misunderstood, not least by leaders themselves. They often assume that authenticity is an innate quality--that a person is either genuine or not. In fact, the authors say, authenticity is largely defined by what other people see in you and, as such, can to a great extent be controlled by you. In this article, the authors explore the qualities of authentic leadership. To illustrate their points, they recount the experiences of some of the authentic leaders they have known and studied, including the BBC's Greg Dyke, Nestlé's Peter Brabeck-Letmathe, and Marks & Spencer's Jean Tomlin. Establishing your authenticity as a leader is a two-part challenge. You have to consistently match your words and deeds; otherwise, followers will never accept you as authentic. But it is not enough just to practice what you preach. To get people to follow you, you also have to get them to relate to you. This means presenting different faces to different audiences--a requirement that many people find hard to square with authenticity. But authenticity is not the product of manipulation. It accurately reflects aspects of the leader's inner self, so it can't be an act. Authentic leaders seem to know which personality traits they should reveal to whom, and when. Highly attuned to their environments, authentic leaders rely on an intuition born of formative, sometimes harsh experiences to understand the expectations and concerns of the people they seek to influence. They retain their distinctiveness as individuals, yet they know how to win acceptance in strong corporate and social cultures and how to use elements of those cultures as a basis for radical change.

  1. Meat consumption, Cooking Practices, Meat Mutagens and Risk of Prostate Cancer

    Science.gov (United States)

    John, Esther M.; Stern, Mariana C.; Sinha, Rashmi; Koo, Jocelyn

    2012-01-01

    Consumption of red meat, particularly well done meat, has been associated with increased prostate cancer risk. High temperature cooking methods such as grilling and barbequeing may produce heterocyclic amines (HCAs) and polycyclic aromatic hydrocarbons (PAHs) which are known carcinogens. We assessed the association with meat consumption and estimated HCA and PAH exposure in a population-based case-control study of prostate cancer. Newly diagnosed cases aged 40–79 years (531 advanced cases, 195 localized cases) and 527 controls were asked about dietary intake, including usual meat cooking methods and doneness levels. Odds ratios (OR) and 95% confidence intervals (CI) were calculated using multivariate logistic regression. For advanced prostate cancer, but not localized disease, increased risks were associated with higher consumption of hamburgers (OR=1.79. CI=1.10–2.92), processed meat (OR=1.57, CI=1.04, 2.36), grilled red meat (OR=1.63, CI=0.99–2.68), and well done red meat (OR=1.52, CI=0.93–2.46), and intermediate intake of 2-amino-1-methyl1-6-phenylimidazo[4,5-b]pyridine (PhIP) (quartile 2 vs. 1: OR=1.41, CI=0.98–2.01; quartile 3 vs. 1: OR=1.42, CI=0.98–2.04), but not for higher intake. White meat consumption was not associated with prostate cancer. These findings provide further evidence that consumption of processed meat and red meat cooked at high temperature is associated with increased risk of advanced, but not localized prostate cancer. PMID:21526454

  2. Afforestation in Serbia in the period 1961-2007 with special reference to Austrian pine and Scots pine

    Directory of Open Access Journals (Sweden)

    Ranković Nenad

    2009-01-01

    Full Text Available The significance of afforestation in Serbia is high because only in this way the forest area can be increased and brought to the level which corresponds to the demands of the population. This is also indicated by the content of some documents, such as 'Professional base for the design of the National Forest Action Programme', which emphasises this problem from the very beginning. Special significance is assigned to afforestation with Austrian pine and Scots pine, which are most frequently applied in the afforestation of the most unfavourable terrains. This study analyses the scope of afforestation over the period 1961-2007, the percentage of Austrian pine and Scots pine and the relationship of the afforested areas, and generates the forecasts of the changes in the future period. In this way, the socialeconomic significance of afforestation can be assessed from the aspect of satisfying the objectives of forest policy, and particularly of afforestation with Austrian pine and Scots pine, as the specific tree species.

  3. Towards a Dynamic Resource-Based View: Insights from Austrian capital and Entrepreneurship Theory

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Ishikawa, Ibuki

    The dominant view in the strategic management field is the resource-based view ("RBV"). It has often been observed that the RBV is lacking in the dynamic dimension. For example, processes of building competitive advantages by means of combining existing complementary resources in novel ways...... are not inquired into. We argue that the RBV may profitably draw on Austrian (Misesian) and Knightian insights in entrepreneurship and capital theory, particularly in its Lachmannian manifestation, in order to strengthen its dynamic components. We link the RBV and Austrian ideas in the context of the theory...... of complex systems pioneered by Herbert Simon. We draw a number of implications for strategic management from this synthesis, notably into resource value and sustainability of competitive advantage.JEL Code: B53, D21, L23, M1...

  4. THE IMPORTANCE OF BACTERIOCINS IN MEAT AND MEAT PRODUCTS

    Directory of Open Access Journals (Sweden)

    Meltem SERDAROĞLU

    2000-03-01

    Full Text Available There is an increasing consumer demand for food products which are free of chemical additives, reduced in salt and processed as little as possible. These minimally processed foods require special application to assure their microbiological safety. The use of microorganisms and enzymes for food preservatives is called biopreservation. The most important group of microorganisms with antimicrobial effect used in the production of foods is the lactic acid bacteria. In meats although lactic acid bacteria constitue apart of the initial microflora, they become dominant during the processing of meats. In this research bacteriocins of lactic acid bacteria and their usage in meat and meat products for biopreservation are discussed.

  5. Authentic leadership: develop the leader within.

    Science.gov (United States)

    Yasinski, Lesia

    2014-03-01

    Great leadership usually starts with a willing heart, a positive attitude, and a desire to make a difference. Strong leadership is important, in today's health care climate, to ensure optimal patient outcomes and the fostering of future generations of knowledgeable, motivated and enthusiastic perioperative nurses. This article will explore key elements necessary for the development of authentic leadership. While highlighting the role that personal development plays in leadership skills, this article will also discuss ways to cultivate authenticity in leadership. The following questions will be addressed: What is authentic leadership? How does one become an authentic leader?

  6. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the con......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review...... of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop the criterion variable. From the literature review of concept and historical data in both traditions...... analysis should complement and support corporate social responsibility, management spirituality, authentic leadership / authentic follower, and other secular research by offering a research methods bridge between empirically grounded theology and secular studies, with the common goal of improving workplace...

  7. Perceived Authenticity of the Visitor Experience in Museums

    DEFF Research Database (Denmark)

    Hede, Anne-Marie; Garma, Romana; Josiassen, Alexander

    2014-01-01

    of perceived authenticity, resonating with Bal's (1996) research in this area. Findings also confirm that consumer scepticism and expectations are antecedents to perceived authenticity of the visitor experience in museums, and that perceived authenticity in turn affects visitor satisfaction and perceived...... corporate hypocrisy. Practical implications -This research provides a framework for museums to manage visitors' perceptions of authenticity, and to plan and design exhibits accordingly. Originality/value - Our research, set in the museum context, articulates the basis of perceived authenticity, its....... To investigate authenticity in a model with two antecedents and two outcomes, an additional data set was collected. Hypotheses were tested using structural equation modelling. Findings -The results show that perceived authenticity of the museum, the visitor and the materials in the museum are dimensions...

  8. Some remarks on the Austrian radiation protection legislation

    International Nuclear Information System (INIS)

    Vetter, H.

    1979-01-01

    Some of the provisions of the Austrian Radiation Protection Law and Radiation Protection Ordinance differ from those recommended by ICRP and IAEO. This is particularly true for the definition of working conditions, the categorization of radiation areas and the classification of radiation workers. It is suggested that the responsible authorities when considering a revision of the legislation in the light of ICRP 26 and the revised IAEA Basic Safety Standards, also study the desirability of adapting the currently applicable provisions to the universally accepted international norms. (Auth.)

  9. Tools for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-09

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  10. Tools for Authentication

    International Nuclear Information System (INIS)

    White, G.

    2008-01-01

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work

  11. Goat Meat Consumer Preferences: Implications for Goat Meat Marketing in Metropolitan Nashville, Tennessee Area

    OpenAIRE

    Ekanem, Enefiok; Mafuyai-Ekanem, Mary; Tagegne, Fisseha; Singh, Surendra; Favors, Delicia

    2013-01-01

    Goat meat has become an increasingly good source of protein for meat eaters in the global marketplace. Goat meat constitutes about 63% of all red meat consumed worldwide. It is the main source of animal protein in many North African, Middle Eastern nations, Southeast Asia, the Caribbean, and other tropical regions. This notwithstanding, goat meat is yet to take such prominence in the U.S. diet. Despite the acknowledgement of the meat as lean, tasty and less fatty than other meats (USDA 2001),...

  12. THE AUSTRIAN CONSTITUTIONAL CONVENTION: CONTINUING THE PATH TO REFORM THE FEDERAL STATE?

    Directory of Open Access Journals (Sweden)

    Anna Gamper

    2006-04-01

    Full Text Available This article discusses the different debates and attempts to reform the Austrianfederal system over the last fifteen years. The article is based on a historicalperspective that describes the most relevant developments of Austrianfederalism during the 20th century, highlighting the importance of thecentralisation process through the constant transfer of powers from the Länderto the Federal Government, as well as various debates in this regard.According to the author, since 1995, the year of Austrian adhesion to theEuropean Union, two opportunities have been missed to carry out a generalreform of the federal system which could contribute to compensating thecentralisation process.The first missed opportunity is directly related to the Austrian adhesion tothe European Union. The Länder agreed to the adhesion under the conditionthat the Federal Constitution would include their participation in Europeandecision-making processes. By focussing on this point, the Länder set aside the opportunity to take advantage of the debate and, as a consequence,press for structural reform of the federal system. The second missed opportunitywas related to the dispersion of proposals resulting from the work ofthe Austrian Constitutional Convention. The Convention, created in 2003,had the mission of discussing those aspects of the reform of the Constitutionthat regulated the federal structure of the country and, as a consequence,of making a first draft reform. The incapability of establishing and definingcommon ground for reform, together with the lack of flexibility and ofseeking political commitment, weakened the role of the Convention and,thus, any possibility to carry on with the reform.

  13. 9 CFR 355.42 - Marking of mule meat and animal food mule meat by-product.

    Science.gov (United States)

    2010-01-01

    ... mule meat by-product. 355.42 Section 355.42 Animals and Animal Products FOOD SAFETY AND INSPECTION... Meat and Animal Food, Mule Meat By-Product § 355.42 Marking of mule meat and animal food mule meat by-product. All mule meat and animal food mule meat by-product inspected under this part shall be marked and...

  14. Seasonality in the Austrian Economy: Common Seasonals and Forecasting

    OpenAIRE

    Kunst, Robert M.

    1992-01-01

    Abstract: Seasonal cointegration generalizes the idea of cointegration to processes with unit roots at frequencies different from 0. Here, also the dual notion of common trends, "common seasonals", is adopted for the seasonal case. Using a five-variable macroeconomic core system of the Austrian economy, it is demonstrated how common seasonals and seasonal cointegrating vectors look in practice. Statistical tests provide clear evidence on seasonal cointegration in the system. However, it is sh...

  15. 9 CFR 317.300 - Nutrition labeling of meat or meat food products.

    Science.gov (United States)

    2010-01-01

    ... Labeling § 317.300 Nutrition labeling of meat or meat food products. (a) Nutrition labeling shall be... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Nutrition labeling of meat or meat food products. 317.300 Section 317.300 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE...

  16. Phylogenetic analysis of Austrian canine distemper virus strains from clinical samples from dogs and wild carnivores.

    Science.gov (United States)

    Benetka, V; Leschnik, M; Affenzeller, N; Möstl, K

    2011-04-09

    Austrian field cases of canine distemper (14 dogs, one badger [Meles meles] and one stone marten [Martes foina]) from 2002 to 2007 were investigated and the case histories were summarised briefly. Phylogenetic analysis of fusion (F) and haemagglutinin (H) gene sequences revealed different canine distemper virus (CDV) lineages circulating in Austria. The majority of CDV strains detected from 2002 to 2004 were well embedded in the European lineage. One Austrian canine sample detected in 2003, with a high similarity to Hungarian sequences from 2005 to 2006, could be assigned to the Arctic group (phocine distemper virus type 2-like). The two canine sequences from 2007 formed a clearly distinct group flanked by sequences detected previously in China and the USA on an intermediate position between the European wildlife and the Asia-1 cluster. The Austrian wildlife strains (2006 and 2007) could be assigned to the European wildlife group and were most closely related to, yet clearly different from, the 2007 canine samples. To elucidate the epidemiological role of Austrian wildlife in the transmission of the disease to dogs and vice versa, H protein residues related to receptor and host specificity (residues 530 and 549) were analysed. All samples showed the amino acids expected for their host of origin, with the exception of a canine sequence from 2007, which had an intermediate position between wildlife and canine viral strains. In the period investigated, canine strains circulating in Austria could be assigned to four different lineages reflecting both a high diversity and probably different origins of virus introduction to Austria in different years.

  17. ARE AUTHENTIC LEADERS SATISFIED WITH THEIR JOB?

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2016-06-01

    Full Text Available A crisis in management has led to the appearance of Authentic leadership. The aim of this work is to determine the characteristics of Authentic leadership in educational institutions and to respond to the question as to whether authentic leaders are satisfied with their job. The third aim is to determine differences among the researched regions. The sample included 227 randomly selected directors from primary and secondary schools in Serbia, Montenegro and the Republika Srpska. The research used an ALQ questionnaire for the estimation of leadership behaviour. Descriptions for the results prediction and multiple linear regressions were used. A multivariance analysis of variance was used to compare the groups. The research results showed that every fourth director is an authentic leader. Authentic leadership has a significant influence on job satisfaction through two aspects: internalised perspective and balanced processing. There are no differences in Authentic leadership in the researched areas. The results could be useful for educational institutions in countries where the research was conducted. Further research could be carried out in other countries while cultural differences should be taken into account. One limiting factor consists of the fact that the analysed data are obtained only from school directors. Leaders of educational institutions should provide management through the development of their own authenticity and the authenticity of their followers. The characteristics of Authentic leadership were reviewed and tested practically in the West-Balkan environment.

  18. Meat analog: a review.

    Science.gov (United States)

    Malav, O P; Talukder, S; Gokulakrishnan, P; Chand, S

    2015-01-01

    The health-conscious consumers are in search of nutritious and convenient food item which can be best suited in their busy life. The vegetarianism is the key for the search of such food which resembles the meat in respect of nutrition and sensory characters, but not of animal origin and contains vegetable or its modified form, this is the point when meat analog evolved out and gets shape. The consumers gets full satisfaction by consumption of meat analog due to its typical meaty texture, appearance and the flavor which are being imparted during the skilled production of meat analog. The supplement of protein in vegetarian diet through meat alike food can be fulfilled by incorporating protein-rich vegetative food grade materials in meat analog and by adopting proper technological process which can promote the proper fabrication of meat analog with acceptable meat like texture, appearance, flavor, etc. The easily available vegetables, cereals, and pulses in India have great advantages and prospects to be used in food products and it can improve the nutritional and functional characters of the food items. The various form and functional characters of food items are available world over and attracts the meat technologists and the food processors to bring some innovativeness in meat analog and its presentation and marketability so that the acceptability of meat analog can be overgrown by the consumers.

  19. Metabolomics of meat exudate: Its potential to evaluate beef meat conservation and aging

    International Nuclear Information System (INIS)

    Castejón, David; García-Segura, Juan Manuel; Escudero, Rosa; Herrera, Antonio; Cambero, María Isabel

    2015-01-01

    In this study we analyzed the exudate of beef to evaluate its potential as non invasive sampling for nuclear magnetic resonance (NMR) based metabolomic analysis of meat samples. Exudate, as the natural juice from raw meat, is an easy to obtain matrix that it is usually collected in small amounts in commercial meat packages. Although meat exudate could provide complete and homogeneous metabolic information about the whole meat piece, this sample has been poorly studied. Exudates from 48 beef samples of different breeds, cattle and storage times have been studied by "1H NMR spectroscopy. The liquid exudate spectra were compared with those obtained by High Resolution Magic Angle Spinning (HRMAS) of the original meat pieces. The close correlation found between both spectra (>95% of coincident peaks in both registers; Spearman correlation coefficient = 0.945) lead us to propose the exudate as an excellent alternative analytical matrix with a view to apply meat metabolomics. 60 metabolites could be identified through the analysis of mono and bidimensional exudate spectra, 23 of them for the first time in NMR meat studies. The application of chemometric tools to analyze exudate dataset has revealed significant metabolite variations associated with meat aging. Hence, NMR based metabolomics have made it possible both to classify meat samples according to their storage time through Principal Component Analysis (PCA), and to predict that storage time through Partial Least Squares (PLS) regression. - Highlights: • NMR spectra from beef samples and their exudates are very strongly correlated. • 23 metabolites not reported in previous NMR meat studies have been identified. • Meat exudate NMR spectra allow monitoring of biochemical changes related to aging. • PCA of exudate NMR spectra classified meat samples by their storage time. • The aging of a meat sample can be predicted by PLS analysis of its exudate.

  20. Metabolomics of meat exudate: Its potential to evaluate beef meat conservation and aging

    Energy Technology Data Exchange (ETDEWEB)

    Castejón, David [Centro de Asistencia a la Investigación de Resonancia Magnética Nuclear y de Espín Electrónico, Universidad Complutense de Madrid, 28040 Madrid (Spain); García-Segura, Juan Manuel [Centro de Asistencia a la Investigación de Resonancia Magnética Nuclear y de Espín Electrónico, Universidad Complutense de Madrid, 28040 Madrid (Spain); Departamento de Bioquímica y Biología Molecular I, Facultad de Químicas, Universidad Complutense de Madrid, 28040 Madrid (Spain); Escudero, Rosa [Departamento de Nutrición, Bromatología y Tecnología de los Alimentos, Facultad de Veterinaria. Universidad Complutense de Madrid, 28040 Madrid (Spain); Herrera, Antonio [Departamento de Química Orgánica, Facultad de Químicas, Universidad Complutense de Madrid, 28040 Madrid (Spain); Cambero, María Isabel, E-mail: icambero@vet.ucm.es [Departamento de Nutrición, Bromatología y Tecnología de los Alimentos, Facultad de Veterinaria. Universidad Complutense de Madrid, 28040 Madrid (Spain)

    2015-12-11

    In this study we analyzed the exudate of beef to evaluate its potential as non invasive sampling for nuclear magnetic resonance (NMR) based metabolomic analysis of meat samples. Exudate, as the natural juice from raw meat, is an easy to obtain matrix that it is usually collected in small amounts in commercial meat packages. Although meat exudate could provide complete and homogeneous metabolic information about the whole meat piece, this sample has been poorly studied. Exudates from 48 beef samples of different breeds, cattle and storage times have been studied by {sup 1}H NMR spectroscopy. The liquid exudate spectra were compared with those obtained by High Resolution Magic Angle Spinning (HRMAS) of the original meat pieces. The close correlation found between both spectra (>95% of coincident peaks in both registers; Spearman correlation coefficient = 0.945) lead us to propose the exudate as an excellent alternative analytical matrix with a view to apply meat metabolomics. 60 metabolites could be identified through the analysis of mono and bidimensional exudate spectra, 23 of them for the first time in NMR meat studies. The application of chemometric tools to analyze exudate dataset has revealed significant metabolite variations associated with meat aging. Hence, NMR based metabolomics have made it possible both to classify meat samples according to their storage time through Principal Component Analysis (PCA), and to predict that storage time through Partial Least Squares (PLS) regression. - Highlights: • NMR spectra from beef samples and their exudates are very strongly correlated. • 23 metabolites not reported in previous NMR meat studies have been identified. • Meat exudate NMR spectra allow monitoring of biochemical changes related to aging. • PCA of exudate NMR spectra classified meat samples by their storage time. • The aging of a meat sample can be predicted by PLS analysis of its exudate.

  1. Meat authentication: a new HPLC-MS/MS based method for the fast and sensitive detection of horse and pork in highly processed food.

    Science.gov (United States)

    von Bargen, Christoph; Brockmeyer, Jens; Humpf, Hans-Ulrich

    2014-10-01

    Fraudulent blending of food products with meat from undeclared species is a problem on a global scale, as exemplified by the European horse meat scandal in 2013. Routinely used methods such as ELISA and PCR can suffer from limited sensitivity or specificity when processed food samples are analyzed. In this study, we have developed an optimized method for the detection of horse and pork in different processed food matrices using MRM and MRM(3) detection of species-specific tryptic marker peptides. Identified marker peptides were sufficiently stable to resist thermal processing of different meat products and thus allow the sensitive and specific detection of pork or horse in processed food down to 0.24% in a beef matrix system. In addition, we were able to establish a rapid 2-min extraction protocol for the efficient protein extraction from processed food using high molar urea and thiourea buffers. Together, we present here the specific and sensitive detection of horse and pork meat in different processed food matrices using MRM-based detection of marker peptides. Notably, prefractionation of proteins using 2D-PAGE or off-gel fractionation is not necessary. The presented method is therefore easily applicable in analytical routine laboratories without dedicated proteomics background.

  2. Facelock: familiarity-based graphical authentication.

    Science.gov (United States)

    Jenkins, Rob; McLachlan, Jane L; Renaud, Karen

    2014-01-01

    Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  3. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...... is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection....

  4. Examining the relationship between authenticity and self-handicapping.

    Science.gov (United States)

    Akin, Ahmet; Akin, Umran

    2014-12-01

    Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.

  5. Austrian Capital Theory and the Link Between Entrepreneurship and the Theory of the Firm

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul; Klein, Peter G.

    2005-01-01

    tangible and intangible,are heterogeneous; arranging these assets to minimize contractual hazards, toprovide efficient investment incentives, or to exploit competitive advantage isconceived as the prime task of economic organization. None of these approaches,however, is based on a systematic theory......Several writers link entrepreneurship to asset ownership, trying to incorporatethe theory of entrepreneurship into the theory of the firm. The critical link, weargue, is capital heterogeneity. Transaction cost, property rights, and resourcebasedapproaches to the firm assume that assets, both...... of capital heterogeneity. Inthis paper we outline the approach to capital developed by the Austrian schoolof economics and integrate it into an entrepreneurial theory of the firm. We refineAustrian capital theory by defining capital heterogeneity in terms of subjectivelyperceived attributes, that is...

  6. User Authentication in Smartphones for Telehealth.

    Science.gov (United States)

    Smith, Katherine A; Zhou, Leming; Watzlaf, Valerie J M

    2017-01-01

    Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.

  7. Obfuscated authentication systems, devices, and methods

    Science.gov (United States)

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  8. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  9. Civic Education under Pressure? A Case Study from an Austrian School

    Science.gov (United States)

    Schild, Isabella; Breitfuss, Judith

    2018-01-01

    When the politician Roman Haider of the party Freiheitliche Partei Österreichs (FPÖ--Freedom Party of Austria) caused the interruption of a lecture about political extremism in an Austrian school in spring 2017, a heated debate erupted over the place of politics in school education. While Haider accused the lecturer of political propaganda,…

  10. Foodborne gastroenteritis outbreak in an Austrian healthcare facility caused by asymptomatic, norovirus-excreting kitchen staff.

    Science.gov (United States)

    Schmid, D; Kuo, H-W; Hell, M; Kasper, S; Lederer, I; Mikula, C; Springer, B; Allerberger, F

    2011-03-01

    An outbreak of norovirus GGII.4 2006b affected an Austrian 600-bed healthcare facility from 15 to 27 March 2009. A total of 204 patients, residents and staff fitted the outbreak case definition; 17 (8.3%) were laboratory-confirmed. Foodborne origin was suspected in the 114 patient and resident cases with onset 15-18 March. A case-cohort study was performed to test the hypothesis that consumption of dishes offered on 14, 15 and 16 March (risk days) was associated with increased risk of infection. Data on food exposure of 62% (317/510) of the patient and resident cohort were available for a simultaneous retrospective cohort study. The case-cohort analysis revealed that consumption of sliced cold sausage offered on 15 March [odds ratio (OR): 3.98; 95% confidence interval (CI): 1.18-14.1], a meat dish with salad (adjusted OR: 2.2; 95% CI: 1.19-4.08) and a rolled spinach pancake (adjusted OR: 2.17; 95% CI: 1.27-3.71) on 16 March were independent risk factors. It is likely that one of the five asymptomatic excretors among the kitchen staff on duty on the risk days was the source of food contamination. The case-cohort study design was found to be a valid alternative to the retrospective cohort study design for the investigation of a suspected foodborne outbreak in a large cohort. Copyright © 2010 The Hospital Infection Society. Published by Elsevier Ltd. All rights reserved.

  11. Nutritional evaluation of lowering consumption of meat and meat products in the Nordic context

    DEFF Research Database (Denmark)

    Tetens, Inge; Hoppe, Camilla; Frost Andersen, Lene

    The World Cancer Research Fund (WCRF) recommended in 2007 that consumer intake of red meat is minimized and processed meat eliminated. The recommendation was based on a systematic review of the available literature on the association between meat consumption and cancer. The recommendation...... to individuals was to ingest less than 500 grams of red meat per weeks, and very little - if anything - processed meats. In a new study, National Food Institute has assessed the nutritional consequences from living the recommendations of the WCRF, in Norway, Sweden, Finland and Denmark. The current consumption...... of meat in the Nordic countries is not far from the level WCRF has proposed on an individual level. The study also shows that it will have no significant nutritional consequences to reduce the intake of meat to the recommended, neither when it comes to red meat nor processed meat....

  12. Two-factor authentication

    CERN Document Server

    Stanislav, Mark

    2015-01-01

    During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market.

  13. Authentication in the context of international safeguards

    International Nuclear Information System (INIS)

    Drayer, D.D.; Sonnier, C.S.; Augustson, R.

    1991-01-01

    The International atomic Energy Agency held its first Advisory Group meeting on the subject of authentication in 1981. This meeting concentrated on the application of authentication to in-plant Non-Destructive Assay equipment supplied by the Facility Operator/State. In the decade since this meeting, a considerable amount of interest has developed over the use of authentication technology as a vital element of effective International Safeguards. Attendant with this interest, confusion has developed over the meaning and the need for the application of the technology as it exists today, and it may exist in the future. This paper addresses the subject of authentication, with emphasis on its basic definition and the applications of authentication technology in International Safeguards

  14. Manmade radionuclide vector in Austrian soil and vegetation near Temelin nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Sinojmeri, M.; Ringer, V. [Oesterreichische Agentur fuer Gesundheit und Ernaehrungssicherheit - AGES (Austria)

    2014-07-01

    Since Chernobyl NPP accident an environmental monitoring program concerning the Upper Austrian region near Czech Republic Nuclear Power Plant, NPP Temelin, is in progress between AGES and BMLFUV, the Austrian Federal Ministry of Agriculture, Forestry, Environment, Water and Food, in Austria. This paper presents the results obtained during the sampling campaign over biennial period of 2010-2011. Soil samples, grass and different cereal species were collected. Beside Cs-134, Cs-137 and Sr-89, Sr-90 isotopes, at this phase the number of isotopes determined was extended with plutonium isotopes Pu-238, Pu-239, Pu-240, Pu-241 and Am-241. A comparison of these results with the existing data so far is presented. New knowledge was obtained related the bio-kinetic parameters of these elements in the environment. Document available in abstract form only. (authors)

  15. Detection of horse meat contamination in raw and heat-processed meat products.

    Science.gov (United States)

    Hsieh, Yun-Hwa P; Ofori, Jack A

    2014-12-31

    Europe's recent problems with the adulteration of beef products with horse meat highlight the need for a reliable method for detecting horse meat in food for human consumption. The objective of this study was therefore to develop a reliable monoclonal antibody (mAb) based enzyme-linked immunosorbent assay (ELISA) for horse meat detection. Two mAbs, H3E3 (IgG2b) and H4E7 (IgG2a), were characterized as horse-selective, and competitive ELISAs (cELISAs) employing these mAbs were developed. The cELISAs were found to be capable of detecting levels as low as 1% of horse meat in raw, cooked, and autoclaved ground beef or pork, being useful analytical tools for addressing the health, economic, and ethical concerns associated with adulterating meat products with horse meat. However, due to cross-reaction with raw poultry meat, it is recommended that samples be heated (100 °C for 15 min) prior to analysis to eliminate possible false-positive results.

  16. Comparison of amount of physical load in the Czech and Austrian footballers at the same level of performance

    OpenAIRE

    Bujnovský, David

    2011-01-01

    Title: Comparison of the size of the motor load in the Czech and Austrian soccer players at the same performance level Objectives: The aim is to determine the size of the physical load of players during a football match. At the same time the next aim is to determinate the differences of physical load between Czech and Austrian soccer players at the same performance level. Methods: The indirect (mediated) observations was used in this bachelor thesis, because the data were recorded by computer...

  17. Bacterial spoilage of meat and cured meat products

    NARCIS (Netherlands)

    Borch, E.; Kant-Muermans, M.L.T.; Blixt, Y.

    1996-01-01

    The influence of environmental factors (product composition and storage conditions) on the selection, growth rate and metabolic activity of the bacterial flora is presented for meat (pork and beef) and cooked, cured meat products. The predominant bacteria associated with spoilage of refrigerated

  18. Technological characteristics of meat - viscosity

    OpenAIRE

    DIBĎÁK, Tomáš

    2012-01-01

    This bachelor thesis is focused on the technological characteristics of meat, mainly viscosity of meat. At the beginning I dealt with construction of meat and various types of meat: beef, veal, pork, mutton, rabbit, poultry and venison. Then I described basic chemical composition of meat and it?s characteristic. In detail I dealt with viscosity of meat. Viscosity is the ability of meat to bind water both own and added. I mentioned influences, which effects viscosity and I presented the possib...

  19. 22 CFR 61.5 - Authentication procedures-Imports.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication procedures-Imports. 61.5 Section... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide foreign...

  20. Facelock: familiarity-based graphical authentication

    Directory of Open Access Journals (Sweden)

    Rob Jenkins

    2014-06-01

    Full Text Available Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate, even after a one-year delay (86.1% success rate. Zero-acquaintance attackers were reduced to guessing (<1% success rate. Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate. In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate. Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  1. Secure ADS-B authentication system and method

    Science.gov (United States)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  2. THE STUDENTS’ PERCEPTIONS OF AUTHENTIC TEXTS-BASED TRANSLATION

    Directory of Open Access Journals (Sweden)

    Rusiana .

    2017-12-01

    Full Text Available Translation requires lots of practice. As it is generally known, authentic texts provide fruitful experience for students to translate either Indonesian-English or vice versa. Authentic texts give many real uses of language in varied meaningful contexts The texts used were advertisement, abstract, local stories, tourist attraction, community service and project for money. This research is aimed at investigating whether the use of authentic texts benefits the students and describing the students’ perceptions toward the use of authentic texts in Translation class. It is a qualitative research. Questionnaires were used to obtain the students’ perceptions on the use of authentic texts in translation. The findings show that authentic texts-based translation benefits students in experiencing better translation. Advertisement was considered to be the most relevant text. On the contrary, they find it difficult to cope with authentic texts particularly dealing with words/terms/vocabulary, meanings, culture, and grammar. The recommendations are that the students have to be exposed to many authentic texts of varied topics in both English and Indonesian in order that they understand both the SL and TL well. For further researchers, it would be possible to research on the influence of authentic texts based translation on the students’ translation skill.

  3. Hardware device binding and mutual authentication

    Science.gov (United States)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  4. Functional Characteristics of Spent Duck Meat for Use in Emulsion-Type Meat Products

    OpenAIRE

    Juni Sumarmono; Samsu Wasito

    2010-01-01

    Spent ducks produce nutritive meat; however the meat possesses undesirable characteristics such as strong odor and tough. Hence, appropriate yet simple processing technologies need to be developed in order to maximize the use of duck meat. The experiment was conducted to evaluate functional characteristics of spent duck meat as raw material for the production of emulsion-type meat products, such as nugget and sausage. Chilled carcasses of 96 spent ducks were deboned manually, then mixed thor...

  5. Authentic Montessori: The Teacher Makes the Difference

    Science.gov (United States)

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  6. Quality of Austrian and Dutch Falls-Prevention Information: A Comparative Descriptive Study

    Science.gov (United States)

    Schoberer, Daniela; Mijnarends, Donja M.; Fliedner, Monica; Halfens, Ruud J. G.; Lohrmann, Christa

    2016-01-01

    Objectives: The aim of this study was to evaluate and compare the quality of written patient information material available in Austrian and Dutch hospitals and nursing homes pertaining to falls prevention. Design: Comparative descriptive study design Setting: Hospitals and nursing homes in Austria and the Netherlands. Method: Written patient…

  7. Ninth Grade Student Responses to Authentic Science Instruction

    Science.gov (United States)

    Ellison, Michael Steven

    This mixed methods case study documents an effort to implement authentic science and engineering instruction in one teacher's ninth grade science classrooms in a science-focused public school. The research framework and methodology is a derivative of work developed and reported by Newmann and others (Newmann & Associates, 1996). Based on a working definition of authenticity, data were collected for eight months on the authenticity in the experienced teacher's pedagogy and in student performance. Authenticity was defined as the degree to which a classroom lesson, an assessment task, or an example of student performance demonstrates construction of knowledge through use of the meaning-making processes of science and engineering, and has some value to students beyond demonstrating success in school (Wehlage et al., 1996). Instruments adapted for this study produced a rich description of the authenticity of the teacher's instruction and student performance. The pedagogical practices of the classroom teacher were measured as moderately authentic on average. However, the authenticity model revealed the teacher's strategy of interspersing relatively low authenticity instructional units focused on building science knowledge with much higher authenticity tasks requiring students to apply these concepts and skills. The authenticity of the construction of knowledge and science meaning-making processes components of authentic pedagogy were found to be greater, than the authenticity of affordances for students to find value in classroom activities beyond demonstrating success in school. Instruction frequently included one aspect of value beyond school, connections to the world outside the classroom, but students were infrequently afforded the opportunity to present their classwork to audiences beyond the teacher. When the science instruction in the case was measured to afford a greater level of authentic intellectual work, a higher level of authentic student performance on

  8. Characteristics and consumer acceptance of healthier meat and meat product formulations-a review.

    Science.gov (United States)

    Hathwar, Swapna C; Rai, Amit Kumar; Modi, Vinod Kumar; Narayan, Bhaskar

    2012-12-01

    Awareness of health and nutrition has led to the development of "functional foods" which is a new approach to achieve healthier status thus reducing the risk of diseases. Meat has been highly exploited as a functional ingredient/food in recent years wherein meat has either been modified or incorporated into non meat products. Changing consumer demand has influenced the market for all types of meat. The development and marketing the functional foods can be, however, very challenging compared to the foods that conventionally have a high health image. This review gives the overall perception about importance of using meat/meat products as a functional food.

  9. State Authenticity as Fit to Environment: The Implications of Social Identity for Fit, Authenticity, and Self-Segregation.

    Science.gov (United States)

    Schmader, Toni; Sedikides, Constantine

    2017-10-01

    People seek out situations that "fit," but the concept of fit is not well understood. We introduce State Authenticity as Fit to the Environment (SAFE), a conceptual framework for understanding how social identities motivate the situations that people approach or avoid. Drawing from but expanding the authenticity literature, we first outline three types of person-environment fit: self-concept fit, goal fit, and social fit. Each type of fit, we argue, facilitates cognitive fluency, motivational fluency, and social fluency that promote state authenticity and drive approach or avoidance behaviors. Using this model, we assert that contexts subtly signal social identities in ways that implicate each type of fit, eliciting state authenticity for advantaged groups but state inauthenticity for disadvantaged groups. Given that people strive to be authentic, these processes cascade down to self-segregation among social groups, reinforcing social inequalities. We conclude by mapping out directions for research on relevant mechanisms and boundary conditions.

  10. The Efficacy of the clay meat ball as a method of traditional meat ...

    African Journals Online (AJOL)

    Keywords: meat ball, protein, mineral content. This work was carried out to determine the effectiveness of the use of clay meat balls (an African traditional method of preserving meat) in extending the shelf life of meat over a period of months against microbial (bacterial and fungal) spoilage and contamination without ...

  11. Toward Developing Authentic Leadership: Team-Based Simulations

    Science.gov (United States)

    Shapira-Lishchinsky, Orly

    2014-01-01

    Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…

  12. The embodiment of authentic leadership.

    Science.gov (United States)

    Waite, Roberta; McKinney, Nicole; Smith-Glasgow, Mary Ellen; Meloy, Faye A

    2014-01-01

    Development of student leadership capacity and efficacy is critical to the nursing profession, and vital to this process is a strong foundation in critical thinking that includes a depth of understanding of self (i.e., authentic leadership development). This article will (a) present a theoretical overview of authentic leadership as compared with other popular leadership theories, (b) provide an overview of development/implementation of an authentic leadership course, the first in a series of six one-credit courses as an integral component of the Macy Undergraduate Leadership Fellows Program for upper-level nursing students, and (c) discuss related implications for nursing education. Findings from an investigator-developed quantitative pre-post survey and qualitative evaluation questions are provided. Student feedback regarding the comprehensive nature of the course was extremely positive and affirmed the value of introspection associated with authentic leadership in ongoing personal and professional development. Critical pedagogy and action-oriented learning strategies also proved beneficial to student engagement. Copyright © 2014 Elsevier Inc. All rights reserved.

  13. An Authentic Interpretation of Laws

    Directory of Open Access Journals (Sweden)

    Teodor Antić

    2015-01-01

    Full Text Available Authentic interpretation of laws is a legal institute whereby a legislator gives the authentic meaning to a specific legal norm in case of its incorrect or diversified interpretation in practice. It has the same legal force as the law. Retroactivity and influence on pending cases are its inherent characteristics. Due to these characteristics and their relation to the principles of the rule of law, legal certainty and separation of powers, it is subjected to severe criticism not only by legal theory but also legal practice. The author analyses the institute of authentic interpretation from historical and comparative point of view and through the Croatian normative regulation, practice of the Croatian Parliament and academic debate, including opinions in favour as well as against it. On these grounds the author concludes that higher quality of law making procedure could make the authentic interpretation dispensable. On the other hand, should this institute be kept in the legal order it is essential to receive more effective constitutional control.

  14. Austrian Security Strategy: Need For Reformulation Due To Security Developments

    Science.gov (United States)

    2016-02-14

    accession to the North Atlantic Treaty Organization (NATO) as an option. Under the Austrian Constitution , the federal government wanted to maintain the...the Middle East and Africa completely overwhelmed the police at the border crossing between Austria and Hungary and Slovenia . On 14 September 2015...Hungary, Croatia, and Slovenia .33, 34, 35 At the end of October 2015 refugees broke through the barriers several times at the border crossing point

  15. Effects of electrical stimulation on meat quality of lamb and goat meat.

    Science.gov (United States)

    Cetin, Omer; Bingol, Enver Baris; Colak, Hilal; Hampikyan, Hamparsun

    2012-01-01

    Effect of various voltage of electrical stimulation (ES) on meat quality of lamb and goat was investigated by using a total of 36 animals at 3-5 years old. Constant 50 Hz frequency and 50, 100, and 250 V, 90 sec of ES were administered to 1/2 carcasses and were examined according their textural, physicochemical, and sensorial characteristics. ES decreased the pH values of lamb and goat meat, and accelerated the rigor mortis (P goat meat, and tenderness was improved depending on voltage range used (P goat meat compared with the control groups (P meat quality of lamb and goat, in contrast to undesirable consumer preferences.

  16. Introduction to Methods Demonstrations for Authentication

    International Nuclear Information System (INIS)

    Kouzes, Richard T.; Hansen, Randy R.; Pitts, W. K.

    2002-01-01

    During the Trilateral Initiative Technical Workshop on Authentication and Certification, PNNL will demonstrate some authentication technologies. This paper briefly describes the motivation for these demonstrations and provide background on them

  17. Authentic Leadership: Application to Women Leaders

    Directory of Open Access Journals (Sweden)

    Margaret M. Hopkins

    2015-07-01

    Full Text Available This article provides an overview and critique of authentic leadership, with particular arguments given to support the premise that authentic leadership is a gendered representation of leadership.

  18. Authentication of animal fats using direct analysis in real time (DART) ionization-mass spectrometry and chemometric tools.

    Science.gov (United States)

    Vaclavik, Lukas; Hrbek, Vojtech; Cajka, Tomas; Rohlik, Bo-Anne; Pipek, Petr; Hajslova, Jana

    2011-06-08

    A combination of direct analysis in real time (DART) ionization coupled to time-of-flight mass spectrometry (TOFMS) and chemometrics was used for animal fat (lard and beef tallow) authentication. This novel instrumentation was employed for rapid profiling of triacylglycerols (TAGs) and polar compounds present in fat samples and their mixtures. Additionally, fat isolated from pork, beef, and pork/beef admixtures was analyzed. Mass spectral records were processed by principal component analysis (PCA) and stepwise linear discriminant analysis (LDA). DART-TOFMS profiles of TAGs were found to be more suitable for the purpose of discrimination among the examined fat types as compared to profiles of polar compounds. The LDA model developed using TAG data enabled not only reliable classification of samples representing neat fats but also detection of admixed lard and tallow at adulteration levels of 5 and 10% (w/w), respectively. The presented approach was also successfully applied to minced meat prepared from pork and beef with comparable fat content. Using the DART-TOFMS TAG profiles of fat isolated from meat mixtures, detection of 10% pork added to beef and vice versa was possible.

  19. Multi-modal Behavioural Biometric Authentication for Mobile Devices

    OpenAIRE

    Saevanee , Hataichanok; Clarke , Nathan ,; Furnell , Steven ,

    2012-01-01

    Part 12: Authentication and Delegation; International audience; The potential advantages of behavioural biometrics are that they can be utilised in a transparent (non-intrusive) and continuous authentication system. However, individual biometric techniques are not suited to all users and scenarios. One way to increase the reliability of transparent and continuous authentication systems is create a multi-modal behavioural biometric authentication system. This research investigated three behavi...

  20. Authentic leadership: What's in the construct?

    OpenAIRE

    Endrissat, Nada; Müller, Werner R.

    2006-01-01

    In a qualitative leadership study conducted in the German-speaking part of Switzerland the quest to be oneself i.e., to be authentic was found to be central for leadership. We will present the results in detail and highlight the difficulties leaders experience when trying to be authentic in their daily interaction. By providing a contextually rich description of authentic leadership from practitioners' point of views, our study contributes to the current endeavor to understand and define auth...

  1. Activity report for feasibility study on PKI authentication method with IC card in authentication system sub group of J-PARC information system group

    International Nuclear Information System (INIS)

    Teshima, Naoya; Aoyagi, Tetsuo; Nakajima, Norihiro; Hashimoto, Kiyoharu; Manabe, Atsushi; Yuasa, Fukuko

    2009-06-01

    The Authentication System Sub Group of J-PARC Information System Group completed the mapping of the several authentication methods in terms of the level of security. Of the methods, the PKI authentication method with IC card provides the Super High Security Level and will be adopted as the authentication method of several J-PARC Information Systems. We study the feasibility of this method with following four examples; (1) 'The EAP-TLS wireless LAN authentication method'. (2) 'The Web-SSL client authentication method in SSL-VPN connection'. (3) 'The PKI authentication method with a certificate issued by NAREGI-CA software stored in IC card.' (4) 'The PKI authentication method with Dual interface FeliCa card'. In each example, we confirmed the feasibility of the method in a practical way. In this report we present the details of the study. (author)

  2. Antimicrobial Edible Films and Coatings for Meat and Meat Products Preservation

    Directory of Open Access Journals (Sweden)

    Irais Sánchez-Ortega

    2014-01-01

    Full Text Available Animal origin foods are widely distributed and consumed around the world due to their high nutrients availability but may also provide a suitable environment for growth of pathogenic and spoilage microorganisms. Nowadays consumers demand high quality food with an extended shelf life without chemical additives. Edible films and coatings (EFC added with natural antimicrobials are a promising preservation technology for raw and processed meats because they provide good barrier against spoilage and pathogenic microorganisms. This review gathers updated research reported over the last ten years related to antimicrobial EFC applied to meat and meat products. In addition, the films gas barrier properties contribute to extended shelf life because physicochemical changes, such as color, texture, and moisture, may be significantly minimized. The effectiveness showed by different types of antimicrobial EFC depends on meat source, polymer used, film barrier properties, target microorganism, antimicrobial substance properties, and storage conditions. The perspective of this technology includes tailoring of coating procedures to meet industry requirements and shelf life increase of meat and meat products to ensure quality and safety without changes in sensory characteristics.

  3. [Update on microbiological quality assurance meat and meat products in Morocco].

    Science.gov (United States)

    Rachidi, H; Latrache, H

    2018-03-01

    Food safety has become an absolute necessity in all countries. As a result, Morocco has taken several measures and actions to develop food safety and food-borne disease control. This study aimed to highlight the level of improvement in the quality assurance of meat and meat products in Morocco. It is based on a non-exhaustive review of the regulatory texts governing food safety in the country, as well as a statistical study on establishments of meat and meat products adopting a self-checking system and approved by the National Office of Sanitary Safety of Food. Morocco has introduced several laws and regulations requiring sanitary control of food products. Also, the number of establishments of meat and meat products adopting a system of self-control and approved by the National Office of Sanitary Safety of Food has improved significantly. It has increased from 58 in 2007 to 273 in 2016. The adoption of self-monitoring systems allows better access to international markets, improved quality of food products and a considerable reduction in microbial contamination. Copyright © 2018 Elsevier Masson SAS. All rights reserved.

  4. Developmental Changes in Judgments of Authentic Objects

    Science.gov (United States)

    Frazier, Brandy N.; Gelman, Susan A.

    2009-01-01

    This study examined the development of an understanding of authenticity among 112 children (preschoolers, kindergarten, 1st graders, and 4th graders) and 119 college students. Participants were presented with pairs of photographs depicting authentic and non-authentic objects and asked to pick which one belongs in a museum and which one they would…

  5. A Novel Multifactor Authentication System Ensuring Usability and Security

    OpenAIRE

    Mathew, Gloriya; Thomas, Shiney

    2013-01-01

    User authentication is one of the most important part of information security. Computer security most commonly depends on passwords to authenticate human users. Password authentication systems will be either been usable but not secure, or secure but not usable. While there are different types of authentication systems available alphanumeric password is the most commonly used authentication mechanism. But this method has significant drawbacks. An alternative solution to the text based authenti...

  6. Breast meat yield, muscle linear measurements and meat ...

    African Journals Online (AJOL)

    Breast meat yield, chemical composition, mineral profile and linear measurement of the resultant breast meat Supracoracoides and Pectoralis thoracicus of one hundred and eighty (28 days old BUT) male turkeys fed diet containing wheat or sorghum as sole cereal source were studied. One hundred and eighty 28-days old ...

  7. The future of meat: a qualitative analysis of cultured meat media coverage.

    Science.gov (United States)

    Goodwin, J N; Shoulders, C W

    2013-11-01

    This study sought to explore the informational themes and information sources cited by the media to cover stories of cultured meat in both the United States and the European Union. The results indicated that cultured meat news articles in both the United States and the European Union commonly discuss cultured meat in terms of benefits, history, process, time, livestock production problems, and skepticism. Additionally, the information sources commonly cited in the articles included cultured meat researchers, sources from academia, People for the Ethical Treatment of Animals (PETA), New Harvest, Winston Churchill, restaurant owners/chefs, and sources from the opposing countries (e.g. US use some EU sources and vice versa). The implications of this study will allow meat scientists to understand how the media is influencing consumers' perceptions about the topic, and also allow them to strategize how to shape future communication about cultured meat. Published by Elsevier Ltd.

  8. The Use of Cytochrome b Gene as a Specific Marker of the Rat Meat (Rattus norvegicus on Meat and Meat Products

    Directory of Open Access Journals (Sweden)

    C. Sumantri

    2012-04-01

    Full Text Available Falsification of the origin of livestock meat and its processed with rat meat is a problem that must be overcome to ensure food safety. One way that is often used to detect forgeries by using cytochrome b gene as a marker. The purpose of this study was to create a specific primer derived from cytochrome b sequences in rat (Rattus norvegicus as the DNA marker to detect any contamination of rat meat on fresh livestock meat and its processed meat products. Meatballs were made from beef meat with the addition of rat 1%-25%, and the meatballs were obtained from traditional markets. DNA extraction was conducted from seven species (goat, chicken, cattle, sheep, pig, horse, and rat by using phenol-chloroform. The highest success rate in detecting the presence of rat meat in a mixture of beef meatballs at concentration of 15% was 100%. The specific fragment of cytochrome b gene in R. norvegicus has no similarity with the cytochrome b gene from six other species, so it can be used as molecular markers to detect the presence of rat meat contamination in the processed of meat products. Amplified fragment length for goats, chickens, cattle, sheep, pigs, horses, and rats 157, 227, 274, 331, 398, 439 and 603 bp respectively. The amplification of cytochrome b gene in seven species of animals with different fragment length indicated the specificity of cytochrome b gene sequences among species.

  9. Meat flavour

    International Nuclear Information System (INIS)

    Rosset, R.; Liger, P.; Roussel-Ciquard, N.

    1978-01-01

    For the consumer, meat is characterized by a certain number of organoleptic qualities; among them, flavour -that is to say the association of both odour and taste- plays a leading part. This property is based upon a great number of chemical components: some volatile components are responsible for the aroma and some non-volatile ones for the taste. These substances are either made or released during the heating of the meat on account of components called precursors which are produced during the aging of the meat. The two main reactions which preside over the elaboration of flavour are: the Maillard's reaction and the autooxidation reactions. Meat flavour is associated with the animal characteristics; it is influenced by the ante- and post mortem treatments as well as by the technological treatments for storing it. The use of synthetical flavours is to be considered as possible in the future [fr

  10. Benevolent technotopias and hitherto unimaginable meats: Tracing the promises of in vitro meat.

    Science.gov (United States)

    Jönsson, Erik

    2016-10-01

    Today, in vitro (Latin: in glass) meat researchers strive to overhaul meat production technologies by producing meat outside animal bodies, primarily by culturing cells. In the process, meat should become healthier, more environmentally friendly and kinder to animals. In this article, I scrutinize (and problematize) this promissory discourse by examining the world that proponents envision alongside the world from which promises emerge. First, I trace the increasing number of publications striving to pinpoint the nature of in vitro meat to unveil the creation of an in vitro meat canon wherein perceived possibilities become taken for granted. Second, I investigate how the promissory discourse is often relatively silent on key aspects of how this technology could remake the world. Wet laboratories, animals and end products become foregrounded at the expense of political economy and the biophysical properties of cultured cells. Thus, questions concerning how funding requirements shape representations of this new technology, together with in vitro meat's particular socio-spatial and socio-ecological implications, become problematically de-emphasized.

  11. Supercritical fluid extraction of meat lipids: an alternative approach to the identification of irradiated meats

    International Nuclear Information System (INIS)

    Hampson, J.W.; Jones, K.C.; Foglia, T.A.; Kohout, K.M.

    1996-01-01

    Ionizing radiation is currently under study as an alternative method for extending the shelf life of meats and meat products. Accordingly, methods are needed to determine if a meat or meat product has been exposed to ionizing radiation. In this study, a method is described for the isolation and analysis of volatile hydrocarbons formed in meat lipids after exposure to ionizing radiation. The method is based on supercritical fluid extraction of the hydrocarbons from meat lipids and subsequent identification and quantitation of individual hydrocarbons by gas chromatography (GC) with a mass selection detector (MSD). Supercritical carbon dioxide at 175 bar and 40°C extracted the hydrocarbon fraction from total meat lipids within 20 min. The presence of radiolytic hydrocarbons, as determined by GC/MSD, was then correlated to the degree of irradiation of the meat from 0 to 10 kGy. Besides being faster, this method has the advantage of reduced solvent consumption when compared to current methods for determining if a meat or meat product has been irradiated

  12. Influence of turkey meat on residual nitrite in cured meat products.

    Science.gov (United States)

    Kilic, B; Cassens, R G; Borchert, L L

    2001-02-01

    A response surface experimental design was employed to estimate residual nitrite level at various initial nitrite concentrations, percent turkey meat in the formula, and heat quantity (F) values using a typical wiener as the test system. Pork and mechanically separated turkey were used as the meat ingredients. Residual nitrite and pH were measured at day 1, 7 days, 14 days, and 49 days after processing. Protein, fat, salt, moisture, and CIE (L*a*b*) color values were also determined. Results showed that the effect of turkey meat on residual nitrite level was significant (P meat in the formula resulted in lower residual nitrite levels at a fixed pH. The residual nitrite level was initially proportional to initial nitrite concentration, but it became a nonsignificant factor during longer storage time. Differences in heat quantity had a significant effect (P nitrite level initially. Greater heat quantity decreased residual nitrite level in finished cured meat products at a fixed pH. However, this effect became nonsignificant during longer storage. Reduction of residual nitrite in wieners because of turkey meat addition at a fixed pH was due to characteristics of the turkey tissue, but the mechanism of action remains unknown. It was also established that commercial wieners had a higher pH if poultry meat was included in the formulation.

  13. Picturing the authenticity of emotions

    NARCIS (Netherlands)

    Kraemer, U.A.F.; Salmela, M.; Mayer, V.

    2009-01-01

    In our everyday lives, we talk about authentic and inauthentic emotions. Is this just a façon de parler that does not have any reference in the "real world?" I will support the thesis that it makes sense to talk about the authenticity of emotions in our everyday practice, disregarding the question

  14. Report on the Austrian Mining Conference 1981

    Energy Technology Data Exchange (ETDEWEB)

    Steinmetz, R

    1982-02-01

    The conference took place in Leoben from 19 to 22 May, 1981, under the auspices of the Montanuniversitaet Leoben and the Bergmaennischer Verband of Austria. A total of 14 talks were held, which are summarized in brief. Main topics of the talks concerned prospects of the international coal industry, concepts of Austria' energy supply, coal exploration in Austria, uranium reserves of Austria, development of international coal trade, brown coal deposits of Hungary, aspects of overburden removal in surface mines and of roadway drivage in underground mines, prediction of rock behavior in deep mines, hydraulic salt mining, and protection of an iron ore preparation plant in India by the Austrian VOEST-ALPINE AG. (In German)

  15. Meet meat

    NARCIS (Netherlands)

    Bekker, Gerben A.; Tobi, Hilde; Fischer, Arnout R.H.

    2017-01-01

    In this cross-cultural study we investigated how study participants from China, Ethiopia and the Netherlands operationalize the concept of meat and to what extent cultured meat fits or does not fit into this operationalization. We argue that combining the conceptual approaches symbolic boundaries

  16. Managing Authentic Experience in the Hypermodern Knowledge Economy

    DEFF Research Database (Denmark)

    Rendtorff, Jacob Dahl

    2017-01-01

    Modern experience economy is about buying and selling experiences, to make intimate experiences and search for customer satisfaction the driving motor of capitalist economies. The concept of experience and more recently the notion of authentic experience (e.g. Pine and Gilmore: Authenticity: What...... Customers Really Want) has thereby become central to management theory and management philosophy. In this paper, I want to discuss some fundamental and foundational aspects of the concept of authentic experience in the framework of the experience economy as a social reality of late modernity. 1. I...... will start with a phenomenological perspective on the concept of experience and relate this concept to the idea of authenticity. This will be based on comparison between different concepts of authenticity. 2. After this I will analyze this concept of authenticity in the framework of the kind of society...

  17. Image content authentication based on channel coding

    Science.gov (United States)

    Zhang, Fan; Xu, Lei

    2008-03-01

    The content authentication determines whether an image has been tampered or not, and if necessary, locate malicious alterations made on the image. Authentication on a still image or a video are motivated by recipient's interest, and its principle is that a receiver must be able to identify the source of this document reliably. Several techniques and concepts based on data hiding or steganography designed as a means for the image authentication. This paper presents a color image authentication algorithm based on convolution coding. The high bits of color digital image are coded by the convolution codes for the tamper detection and localization. The authentication messages are hidden in the low bits of image in order to keep the invisibility of authentication. All communications channels are subject to errors introduced because of additive Gaussian noise in their environment. Data perturbations cannot be eliminated but their effect can be minimized by the use of Forward Error Correction (FEC) techniques in the transmitted data stream and decoders in the receiving system that detect and correct bits in error. This paper presents a color image authentication algorithm based on convolution coding. The message of each pixel is convolution encoded with the encoder. After the process of parity check and block interleaving, the redundant bits are embedded in the image offset. The tamper can be detected and restored need not accessing the original image.

  18. 22 CFR 92.38 - Forms of certificate of authentication.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Forms of certificate of authentication. 92.38... SERVICES Specific Notarial Acts § 92.38 Forms of certificate of authentication. The form of a certificate of authentication depends on the statutory requirements of the jurisdiction where the authenticated...

  19. Authentic Leadership Kepala Sekolah dalam Menanamkan Sistem Nilai

    OpenAIRE

    Aan Komariah

    2013-01-01

    Abstract: The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. ...

  20. Authentic Leadership Kepala Sekolah Dalam Menanamkan Sistem Nilai

    OpenAIRE

    Komariah, Aan

    2012-01-01

    : The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. The stud...

  1. Concentrations of environmental organic contaminants in meat and meat products and human dietary exposure: A review.

    Science.gov (United States)

    Domingo, José L

    2017-09-01

    Meat and meat products is one of the most relevant food groups in an important number of human diets. Recently, the IARC, based on results of a number of epidemiological studies, classified the consumptions of red meat and processed meat as "probably carcinogenic to humans" and as "carcinogenic to humans", respectively. It was suggested that the substances responsible of the potential carcinogenicity would be mainly generated during meat processing, such as curing and smoking, or when meat is heated at high temperatures. However, the exposure to environmental pollutants through meat consumption was not discussed. The purpose of the present paper was to review recent studies reporting the concentrations of PCDD/Fs, DL-PCBs and PAHs in meat and meat products, as well as the human exposure to these pollutants through the diet. It is concluded that the health risks derived from exposure to carcinogenic environmental contaminants must be considered in the context of each specific diet, which besides meat and meat products, includes other foodstuffs containing also chemical pollutants, some of them with carcinogenic potential. Anyhow, meat and meat products are not the main food group responsible of the dietary exposure to carcinogenic (or probably carcinogenic) environmental organic pollutants. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. THE EFFECT OF DIFFERENT MEAT SHOP ON MEAT PHYSICAL CHARACTERISTICS AND BACTERIA POPULATION

    Directory of Open Access Journals (Sweden)

    S.H.C. Dewi

    2014-10-01

    Full Text Available An experiment was conducted to study the effect of different meat shops on meat physicalcharacteristics and bacteria population. Sixteen PO carcasses were used in the experiment which wasarranged in a completely randomized design with 4 treatments of different meat shops (traditionalmarket, meat shop, supermarket and slaughter house. Parameters measured were meat pH, waterholding capacity, cooking loss and bacterial total count. The result showed that the average of pH was5.25- 6.03; water holding capacity was 17.07-38.87%; cooking loss was 33.15-48.20 and bacterial totalcount was 1.48x106-10.75x106 CFU/g. It was concluded that bacterial total count in slaughter house andspecial market (meat shop and supermarket were less than those in traditional market.

  3. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  4. 46th annual symposium of the Austrian Physical Society. Programme and abstracts

    International Nuclear Information System (INIS)

    Schindler, H.G.

    1996-01-01

    This volume contains lectures (short communications) of the 46 th symposium of the Austrian Physical Society which had been held at the University of Linz (Austria) in 1996. The following topics are included: atomic physics, molecular physics, plasma physics, solid state physics, nuclear and particle physics, biophysics, environmental physics, quantum electronics and quantum optics. (Suda)

  5. GAME MEAT MARKET IN EASTERN CROATIA

    Directory of Open Access Journals (Sweden)

    Z. Tolušić

    2006-12-01

    Full Text Available In the Republic of Croatia, game meat is consumed far less than meat of domestic animals. Yearly game meat consumption amounts to only 0.55 kg per household member. Consumers prefer meat of domestic animals, because it is cheaper, not paying attention to specific nutritive advantages of game meat. A research on the game meat market and consumers’ preferences was carried out on 101 examinees, chosen among inhabitants of Slavonia and Baranja. The majority of questioned inhabitants did consume game meat (92%, of whom 66% consider game meat to be of better quality than meat of domestic animals. Significant number of examinees considers game meat as healthy food, being also convinced that game was healthier to consume if hunted in their natural environment, than if reared on specialized farms (90%. Irrespective of quality, only 22% of examinees buy game meat, and 51% think such meat is too expensive. This is the main reason why consumers have game meat only once a month (51%. Taking into consideration monthly income of their respective household, 58% of examinees can afford game meat only once a month, and, if having an opportunity, they would opt for meat of roe deer (55% and rabbit (25%. When asked what would stimulate the game meat market in Croatia, 56% of examinees believe this could be achieved by lowering of prices, 27% think the issue could be addressed by opening of specialty stores, and only 17% opted for more aggressive marketing activities.

  6. Benevolent technotopias and hitherto unimaginable meats: Tracing the promises of in vitro meat

    OpenAIRE

    Jönsson, Erik

    2016-01-01

    Today, in vitro (Latin: in glass) meat researchers strive to overhaul meat production technologies by producing meat outside animal bodies, primarily by culturing cells. In the process, meat should become healthier, more environmentally friendly and kinder to animals. In this article, I scrutinize (and problematize) this promissory discourse by examining the world that proponents envision alongside the world from which promises emerge. First, I trace the increasing number of publications stri...

  7. Brand new authentic places

    DEFF Research Database (Denmark)

    Stender, Marie

    the relation and interplay between the two. This study strives to fill this gap by ethnographically tracing the process from design to occupancy including the role of branding as a means to create authenticity. The concept of authenticity is often associated with old houses and neighbourhoods, but also in new......How are places and material surroundings ascribed with meaning when new residential neighbourhoods are designed, branded and taken into use? Existing research on housing, neighbourhoods and urban design tends to take the perspective of either the architect or the user rather than to explore...... neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense...

  8. Augmenting Austrian flood management practices through geospatial predictive analytics: a study in Carinthia

    Science.gov (United States)

    Ward, S. M.; Paulus, G.

    2013-06-01

    The Danube River basin has long been the location of significant flooding problems across central Europe. The last decade has seen a sharp increase in the frequency, duration and intensity of these flood events, unveiling a dire need for enhanced flood management policy and tools in the region. Located in the southern portion of Austria, the state of Carinthia has experienced a significant volume of intense flood impacts over the last decade. Although the Austrian government has acknowledged these issues, their remedial actions have been primarily structural to date. Continued focus on controlling the natural environment through infrastructure while disregarding the need to consider alternative forms of assessing flood exposure will only act as a provisional solution to this inescapable risk. In an attempt to remedy this flaw, this paper highlights the application of geospatial predictive analytics and spatial recovery index as a proxy for community resilience, as well as the cultural challenges associated with the application of foreign models within an Austrian environment.

  9. Augmenting Austrian flood management practices through geospatial predictive analytics: a study in Carinthia

    Directory of Open Access Journals (Sweden)

    S. M. Ward

    2013-06-01

    Full Text Available The Danube River basin has long been the location of significant flooding problems across central Europe. The last decade has seen a sharp increase in the frequency, duration and intensity of these flood events, unveiling a dire need for enhanced flood management policy and tools in the region. Located in the southern portion of Austria, the state of Carinthia has experienced a significant volume of intense flood impacts over the last decade. Although the Austrian government has acknowledged these issues, their remedial actions have been primarily structural to date. Continued focus on controlling the natural environment through infrastructure while disregarding the need to consider alternative forms of assessing flood exposure will only act as a provisional solution to this inescapable risk. In an attempt to remedy this flaw, this paper highlights the application of geospatial predictive analytics and spatial recovery index as a proxy for community resilience, as well as the cultural challenges associated with the application of foreign models within an Austrian environment.

  10. Authentic texts in teaching French as a foreign language

    Directory of Open Access Journals (Sweden)

    Meta Lah

    2010-12-01

    Full Text Available The present paper is aimed at providing a ref lection on the use of authentic texts in French as a foreign language classroom. The author bases herself on an analysis of texts taken from four textbook sets (Le nouveau sans fronti`eres, Panorama, Campus and Rond point, which were or are still used in teaching French as a foreign language. Initially, a definition of authenticity and a survey of authentic material usage through history are provided. In the overview of the texts forming the corpus the texts are divided into authentic, adapted, apparently authentic and those for which no assumption can be made as to their authenticity. The authenticity analysis is also carried out by taking into account the analysis of/categorisation into text types (according to Adam. The author proceeds from two premises, i.e. firstly she foresees that authentic texts will be present in all text books analysed and secondly, considering the greater accessibility of materials, that their presence will be more pronounced in recent textbooks. However, none of the two hypo theses is confirmed, as authentic texts are found in the first three textbook sets, but not in the most recent one, while their presence is most pronounced in the oldest textbook set, i.e. in Le nouveau sans fronti`eres. The result of the analysis is thus somehow surprising given the overall accessibility of all kinds of authentic materials. In the author's opinion more authentic texts should be included into textbooks to thus enhance the purposeful ness of the foreign language classroom.

  11. Authenticity and Empathy in Education

    Science.gov (United States)

    Bialystok, Lauren; Kukar, Polina

    2018-01-01

    The educational enthusiasm for both authenticity and empathy makes a number of assumptions about universal virtues, self-hood, the role of emotion in education, and the role of the teacher. In this article, we argue that authenticity and empathy are both nebulous virtues that teachers and students are called to embody with little reflection on how…

  12. The impact of seeds provenance and nursery production method on Austrian pine (Pinus nigra Arn. seedlings quality

    Directory of Open Access Journals (Sweden)

    Vladan Ivetić

    2013-11-01

    Full Text Available The influence of seed provenances and seedling production methodson quality of one and two years old seedlings of Austrian pine wereinvestigated. Seeds from three provenances of Austrian pine (Goč, Studenica and Šargan were used for seedlings production, combined with three production methods: (i the modified seedbeds (bare-root, (ii the container type Plantagrah II and (iii the container type Gočko. Provenance, as well as the combined influence of provenance and production method had minimal influence on the variability of one and two years old Austrian pine seedlings. Nevertheless, the production method had the highest influence. The production system, besides its importance in nursery, will have a high influence on seedlings growth during the first year after planting. Considering the results of this study (e.g. the highest values of the diameter, number of lateral roots, shoot and root dry weight, and quality index and the lowest value of SQ and satisfactory value of S:R, we can conclude that the seedlings produced in container type Gočko led to the highestseedlings quality, recommended especially for afforestation on hard sites.

  13. Identity-Based Authentication for Cloud Computing

    Science.gov (United States)

    Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao

    Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.

  14. Volatile compounds in meat and meat products

    Directory of Open Access Journals (Sweden)

    Monika KOSOWSKA

    Full Text Available Abstract Meaty flavor is composed of a few hundreds of volatile compounds, only minor part of which are responsible for the characteristic odor. It is developed as a result of multi-directional reactions proceeding between non-volatile precursors contained in raw meat under the influence of temperature. The volatile compounds are generated upon: Maillard reactions, lipid oxidation, interactions between Maillard reaction products and lipid oxidation products as well as upon thiamine degradation. The developed flavor is determined by many factors associated with: raw material (breed, sex, diet and age of animal, conditions and process of slaughter, duration and conditions of meat storage, type of muscle, additives applied and the course of the technological process. The objective of this review article is to draw attention to the issue of volatile compounds characteristic for meat products and factors that affect their synthesis.

  15. Instant Java password and authentication security

    CERN Document Server

    Mayoral, Fernando

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication and password security, and who are looking to get a good grounding in how to implement it in a reliable way.It's assumed that the reader will have some experience in Java already, as well as being familiar with the basic idea behind user authentication.

  16. 9 CFR 311.38 - Meat and meat byproducts from livestock which have been exposed to radiation.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Meat and meat byproducts from... MEAT AND POULTRY PRODUCTS INSPECTION AND VOLUNTARY INSPECTION AND CERTIFICATION DISPOSAL OF DISEASED OR OTHERWISE ADULTERATED CARCASSES AND PARTS § 311.38 Meat and meat byproducts from livestock which have been...

  17. A video authentication technique

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1987-01-01

    Unattended video surveillance systems are particularly vulnerable to the substitution of false video images into the cable that connects the camera to the video recorder. New technology has made it practical to insert a solid state video memory into the video cable, freeze a video image from the camera, and hold this image as long as desired. Various techniques, such as line supervision and sync detection, have been used to detect video cable tampering. The video authentication technique described in this paper uses the actual video image from the camera as the basis for detecting any image substitution made during the transmission of the video image to the recorder. The technique, designed for unattended video systems, can be used for any video transmission system where a two-way digital data link can be established. The technique uses similar microprocessor circuitry at the video camera and at the video recorder to select sample points in the video image for comparison. The gray scale value of these points is compared at the recorder controller and if the values agree within limits, the image is authenticated. If a significantly different image was substituted, the comparison would fail at a number of points and the video image would not be authenticated. The video authentication system can run as a stand-alone system or at the request of another system

  18. Secure authentication of classical messages with single photons

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen; Fu-Chen, Zhu

    2009-01-01

    This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical. (general)

  19. Post-irradiation examination of HTR-fuel at the Austrian Research Centre Seibersdorf Ltd

    International Nuclear Information System (INIS)

    Reitsamer, G.; Proksch, E.; Stolba, G.; Strigl, A.; Falta, G.; Zeger, J.

    1984-02-01

    This paper describes methods and measurements developed at the Austrian Research Centre Seibersdorf for the evaluation of the irradiation performance of HTR fuel. Main interest is concentrated on particle failure rates, fission product release, burn-up and inventory measurements (solid and gaseous fission products, uranium inventory). (Author) [de

  20. Networking for Education for Sustainable Development in Austria: The Austrian ECOLOG-Schools Programme

    Science.gov (United States)

    Rauch, Franz

    2016-01-01

    This case describes networking for education for sustainable development within the Austrian ECOLOG-schools network. The article presents theoretical concepts of networks in education in general, and the organization of the ECOLOG-network in particular. Based upon these foundations, the concept and results of a participatory evaluation study are…

  1. Myoglobin chemistry and meat color.

    Science.gov (United States)

    Suman, Surendranath P; Joseph, Poulson

    2013-01-01

    Consumers rely heavily on fresh meat color as an indicator of wholesomeness at the point of sale, whereas cooked color is exploited as an indicator of doneness at the point of consumption. Deviations from the bright cherry-red color of fresh meat lead to product rejection and revenue loss. Myoglobin is the sarcoplasmic heme protein primarily responsible for the meat color, and the chemistry of myoglobin is species specific. The mechanistic interactions between myoglobin and multiple extrinsic and intrinsic factors govern the color of raw as well as cooked meats. The objective of this review is to provide an overview of the current research in meat color and how the findings are applied in the meat industry. Characterizing the fundamental basis of myoglobin's interactions with biomolecules in postmortem skeletal muscles is necessary to interpret the chemistry of meat color phenomena and to engineer innovative processing strategies to minimize meat discoloration-induced revenue loss to the agricultural economy.

  2. Impact of Austrian hydropower plants on the flood control safety of the Hungarian Danube reach

    International Nuclear Information System (INIS)

    Zsuffa, I.

    1999-01-01

    Statistical analysis of daily water level data from four gauging stations along the Hungarian Danube reach has been carried out with the purpose of analysing the impact of the Austrian hydropower plants on the floods of the river. Conditional probability distribution functions of annual flood load maxima and annual number of floods were generated for the periods 1957-1976 and 1977-1996. By comparing these distribution functions, it could be shown that the flood load maxima have decreased, while the number of small and medium floods have increased during the past forty years. These changes indicate a decreased rate of flood superposition resulting from the barrages constructed in this period. The significantly decreased flood load maxima indicate that the Austrian barrage system has positive impact on the flood control safety of the Hungarian Danube reach

  3. Authenticity, life satisfaction, and distress: a longitudinal analysis.

    Science.gov (United States)

    Boyraz, Güler; Waits, J Brandon; Felix, Victoria A

    2014-07-01

    The purpose of the present study was to examine the reciprocal relationships between authenticity and measures of life satisfaction and distress using a 2-wave panel study design. Data were collected from 232 college students attending 2 public universities. Structural equation modeling was used to analyze the data. The results of the cross-lagged panel analysis indicated that after controlling for temporal stability, initial authenticity (Time 1) predicted later distress and life satisfaction (Time 2). Specifically, higher levels of authenticity at Time 1 were associated with increased life satisfaction and decreased distress at Time 2. Neither distress nor life satisfaction at Time 1 significantly predicted authenticity at Time 2. However, the relationship between Time 1 distress and Time 2 authenticity was not significantly different from the relationship between Time 1 authenticity and Time 2 distress. Results are discussed in light of humanistic-existential theories and the empirical research on well-being. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  4. Location-assured, multifactor authentication on smartphones via LTE communication

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  5. Hash-chain-based authentication for IoT

    Directory of Open Access Journals (Sweden)

    Antonio PINTO

    2016-12-01

    Full Text Available The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT. Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices perform data collection. The collected data is stored on-line using web-services that, sometimes, operate without any special considerations regarding security and privacy. The current work proposes a modified hash-chain authentication mechanism that, with the help of a smartphone, can authenticate each interaction of the devices with a REST web-service using One Time Passwords (OTP while using open wireless networks. Moreover, the proposed authentication mechanism adheres to the stateless, HTTP-like behavior expected of REST web-services, even allowing the caching of server authentication replies within a predefined time window. No other known web-service authentication mechanism operates in such manner.

  6. Disambiguating authenticity: Interpretations of value and appeal.

    Directory of Open Access Journals (Sweden)

    Kieran O'Connor

    Full Text Available While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity-type, moral, craft, and idiosyncratic-we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed to it through: (1 consumer value ratings, (2 willingness to pay, and (3 behavioral choice. We report empirical analyses from a research program of three multi-method studies using (1 archival data from voluntary consumer evaluations of restaurants in an online review system, (2 a university-based behavioral lab experiment, and (3 an online survey-based experiment. Evidence is consistent across the studies and suggests that perceptions of four distinct subtypes of socially constructed authenticity generate increased appeal and value even after controlling for option quality. Findings suggest additional directions for research on authenticity.

  7. Information barriers and authentication

    International Nuclear Information System (INIS)

    MacArthur, D.W.; Wolford, J.K.

    2001-01-01

    Acceptance of nuclear materials into a monitoring regime is complicated if the materials are in classified shapes or have classified composition. An attribute measurement system with an information barrier can be emplo,yed to generate an unclassified display from classified measurements. This information barrier must meet two criteria: (1) classified information cannot be released to the monitoring party, and (2) the monitoring party must be convinced that the unclassified output accurately represents the classified input. Criterion 1 is critical to the host country to protect the classified information. Criterion 2 is critical to the monitoring party and is often termed the 'authentication problem.' Thus, the necessity for authentication of a measurement system with an information barrier stems directly from the description of a useful information barrier. Authentication issues must be continually addressed during the entire development lifecycle of the measurement system as opposed to being applied only after the system is built.

  8. Designing assignment using authentic assessment

    Science.gov (United States)

    Arlianty, Widinda Normalia; Febriana, Beta Wulan; Diniaty, Artina; Fauzi'ah, Lina

    2017-12-01

    This research is conducted to get an overview of the use of authentic assessment in the department of chemistry education, Islamic University of Indonesia. This research was conducted on the students of semester five, odd semester of academic year 2016/2017. Authentic assessment is an assessment process that is capable of measuring the knowledge, attitudes and skills of learners. Chemistry teacher candidates are required to be equipped with teaching and judging skills. Teachers were required can design and carry out assessment of the process and learning outcomes of students in an objective, accountable, and informative. Teacher creativity is required in the assessment. Therefore, authentic assessment is very appropriate used to improve the competence of students in education department as teachers candidates in the preparation of learning assessments.

  9. Advancements in meat packaging.

    Science.gov (United States)

    McMillin, Kenneth W

    2017-10-01

    Packaging of meat provides the same or similar benefits for raw chilled and processed meats as other types of food packaging. Although air-permeable packaging is most prevalent for raw chilled red meat, vacuum and modified atmosphere packaging offer longer shelf life. The major advancements in meat packaging have been in the widely used plastic polymers while biobased materials and their integration into composite packaging are receiving much attention for functionality and sustainability. At this time, active and intelligent packaging are not widely used for antioxidant, antimicrobial, and other functions to stabilize and enhance meat properties although many options are being developed and investigated. The advances being made in nanotechnology will be incorporated into food packaging and presumably into meat packaging when appropriate and useful. Intelligent packaging using sensors for transmission of desired information and prompting of subsequent changes in packaging materials, environments or the products to maintain safety and quality are still in developmental stages. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Development of anti-counterfeit consumer product authentication system

    Directory of Open Access Journals (Sweden)

    Olena V. Narimanova

    2015-06-01

    Full Text Available Aim of the research is to develop an anti-counterfeit consumer product authentication system. The main requirements for this system are formulated, the choice of method of consumer product authentication is substantiated. The scheme of anti-counterfeit consumer product authentication system is developed basing on previously proposed method of checking the QR-code integrity and authenticity. The proposed within the system consumer product authentication technology is simple, economical for implementation, does not require the external changes of product packaging, does not affect existing production process. The technology can be recommended for the use to private businesses and government institutions that are interested in the security of their products from counterfeiting, as well as tracking and removing from circulation the counterfeit consumer products.

  11. ECG authentication in post-exercise situation.

    Science.gov (United States)

    Dongsuk Sung; Jeehoon Kim; Myungjun Koh; Kwangsuk Park

    2017-07-01

    Human authentication based on electrocardiogram (ECG) has been a remarkable issue for recent ten years. This paper proposed an authentication technology with the ECG data recorded after the harsh exercise. 55 subjects voluntarily attended to this experiment. A stepper was used as an exercise equipment. The subjects are asked to do stepper for 5 minutes and their ECG signals are acquired before and after the exercise in rest, sitting posture. Linear discriminant analysis (LDA) was used for both feature extraction and classification. Even though, within the first 1 minute recording, the subject recognition accuracy was 59.64%, which is too low to utilize, after one minute the accuracy was higher than 90% and it increased up to 96.22% within 5 minutes, which is plausible to use in authentication circumstances. Therefore, we have concluded that ECG authentication techniques will be able to be used after 1 minute of catching breath.

  12. Final report for the network authentication investigation and pilot.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  13. Evaluation and monitoring of the satisfaction of meat and meat products consumers

    Directory of Open Access Journals (Sweden)

    Corina Constanta Rușeț

    2014-05-01

    Full Text Available The managers have to be focused on clients and satisfy their needs, so that the products meet their expectations. The evaluation and monitoring the consumers satisfaction is very important because it is a managerial instrument which offers the possibility to understand and satisfy the needs of the existing consumers. In this study we used the questionnaire as research method and after analyzing and processing the data we noticed the consumers preferences related to the meat and meat products consumption, the frequency of consumption and the places from where the consumers procure their meat and meat products.

  14. Replacement of meat by meat substitutes. A survey on person- and product-related factors in consumer acceptance.

    Science.gov (United States)

    Hoek, Annet C; Luning, Pieternel A; Weijzen, Pascalle; Engels, Wim; Kok, Frans J; de Graaf, Cees

    2011-06-01

    What does it take to increase the consumption of meat substitutes and attract new consumers? We identified main barriers and drivers by a consumer survey (n=553) in the U.K. and the Netherlands. Person-related factors (food neophobia and food choice motives) and product-related attitudes and beliefs towards meat and meat substitutes were compared between non-users (n=324), light/medium-users (n=133) and heavy-users of meat substitutes (n=96). Consumer acceptance was largely determined by the attitudes and beliefs towards meat substitutes and food neophobia. Key barriers for non-users and light/medium-users were the unfamiliarity with meat substitutes and the lower sensory attractiveness compared to meat. In addition, non-users had a higher tendency to avoid new foods. Hence, the less consumers were using meat substitutes, the more they wanted these products to be similar to meat. Although non-users and light/medium-users did recognize the ethical and weight-control aspects of meat substitutes, this was obviously less relevant to them. Actually, only heavy-users had high motivations to choose ethical foods, which explains their choice for meat substitutes. In order to make meat substitutes more attractive to meat consumers, we would not recommend to focus on communication of ethical arguments, but to significantly improve the sensory quality and resemblance to meat. Copyright © 2011 Elsevier Ltd. All rights reserved.

  15. Consumer preference, behavior and perception about meat and meat products: an overview.

    Science.gov (United States)

    Font-I-Furnols, Maria; Guerrero, Luis

    2014-11-01

    Meat and meat products currently represent an important source of protein in the human diet, and their quality varies according to intrinsic and extrinsic parameters that can sometimes be shaped to make a product more desirable. Because consumers are the final step in the production chain, it is useful to identify which factors affect their behavioral patterns. This would allow the meat sector to better satisfy consumer expectations, demands and needs. This paper focuses on features that might influence consumer behavior, preferences and their perception of meat and meat products with respect to psychological, sensory and marketing aspects. This multidisciplinary approach includes evaluating psychological issues such as attitudes, beliefs, and expectations; sensory properties such as appearance, texture, flavor and odor; and marketing-related aspects such as price and brand. Copyright © 2014 Elsevier Ltd. All rights reserved.

  16. Will novel protein foods beat meat? : consumer acceptance of meat substitutes - a multidisciplinary research approach

    NARCIS (Netherlands)

    Hoek, A.C.

    2010-01-01

    Meat production places a heavy burden on the environment and therefore options are sought to reduce meat consumption. One option is to let new meat substitutes take the place of meat on the plate. This can only succeed when these products are acceptable to consumers. The thesis investigated which

  17. Characteristics and consumer acceptance of healthier meat and meat product formulations—a review

    OpenAIRE

    Hathwar, Swapna C.; Rai, Amit Kumar; Modi, Vinod Kumar; Narayan, Bhaskar

    2011-01-01

    Awareness of health and nutrition has led to the development of “functional foods” which is a new approach to achieve healthier status thus reducing the risk of diseases. Meat has been highly exploited as a functional ingredient/food in recent years wherein meat has either been modified or incorporated into non meat products. Changing consumer demand has influenced the market for all types of meat. The development and marketing the functional foods can be, however, very challenging compared t...

  18. 51. Annual symposium of the Austrian Physical Society

    International Nuclear Information System (INIS)

    Oberhummer, H.

    2001-01-01

    The 51th Symposium of the Austrian Physical Society was held from 17-21 September 2001 at the Technical University of Vienna (Austria). The topics covered deal with: energy (greenhouse effect, climatic change, environment protection, energy system transformation, innovative energy technologies), neutrons and synchrotron radiation, quantum mechanics, microscopy, accelerator-driven systems, physics aspects of radiotherapy, nano world, micro cosmos, modern physics, life in the universe, x-ray fluorescence, heavy-ion accelerator mass spectrometry, acoustics, atomic-, molecular- and plasma physics, solid-state physics, nuclear and particle physics, medical-, bio-and environmental physics, quantum electronics, electrodynamics and optics. Those contributions which are in the INIS subject scope are indexed separately. (nevyjel)

  19. Consumer attitudes to meat eating.

    Science.gov (United States)

    Richardson, N J; Macfie, H J; Shepherd, R

    1994-01-01

    This study reports on current meat consumption in the UK and the factors that are percieved by the subjects to be influential in their choice of diet. A random sample of individuals from the population (n-1018) were questioned on their consumption and attitudes towards meat by a postal survey. The study revealed that 28·3% of the population considered themselves to be reducing meat consumption; attitudes found to be determinant in changes in the consumption of meat were healthiness, taste and concerns over additives. Hypothetical future events were found to affect people's estimated meat-eating. Knowledge of meat-related information was investigated with specific reference to the respondents' trust in the various sources used; food package labels were found to be an influential source of meat-related information. Copyright © 1993. Published by Elsevier Ltd.

  20. South African managers in public service: On being authentic

    Directory of Open Access Journals (Sweden)

    Antoni Barnard

    2014-01-01

    Full Text Available South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.

  1. South African managers in public service: on being authentic.

    Science.gov (United States)

    Barnard, Antoni; Simbhoo, Nirvana

    2014-01-01

    South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work-life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.

  2. 9 CFR 319.761 - Potted meat food product and deviled meat food product.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Potted meat food product and deviled meat food product. 319.761 Section 319.761 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY...

  3. Improving functional value of meat products.

    Science.gov (United States)

    Zhang, Wangang; Xiao, Shan; Samaraweera, Himali; Lee, Eun Joo; Ahn, Dong U

    2010-09-01

    In recent years, much attention has been paid to develop meat and meat products with physiological functions to promote health conditions and prevent the risk of diseases. This review focuses on strategies to improve the functional value of meat and meat products. Value improvement can be realized by adding functional compounds including conjugated linoneleic acid, vitamin E, n3 fatty acids and selenium in animal diets to improve animal production, carcass composition and fresh meat quality. In addition, functional ingredients such as vegetable proteins, dietary fibers, herbs and spices, and lactic acid bacteria can be directly incorporated into meat products during processing to improve their functional value for consumers. Functional compounds, especially peptides, can also be generated from meat and meat products during processing such as fermentation, curing and aging, and enzymatic hydrolysis. This review further discusses the current status, consumer acceptance, and market for functional foods from the global viewpoints. Future prospects for functional meat and meat products are also discussed.

  4. Towards distortion-free robust image authentication

    International Nuclear Information System (INIS)

    Coltuc, D

    2007-01-01

    This paper investigates a general framework for distortion-free robust image authentication by multiple marking. First, by robust watermarking a subsampled version of image edges is embedded. Then, by reversible watermarking the information needed to recover the original image is inserted, too. The hiding capacity of the reversible watermarking is the essential requirement for this approach. Thus in case of no attacks not only image is authenticated but also the original is exactly recovered. In case of attacks, reversibility is lost, but image can still be authenticated. Preliminary results providing very good robustness against JPEG compression are presented

  5. Heidegger's Concept of Authenticity and Sport Experience

    OpenAIRE

    Higuchi, Satoshi

    1991-01-01

    Carolyne Thomas regarded the aesthetic experience in sport as authentic in the meaning from Martin Heidegger's Being and Time. To examine the adequacy of the interpretation, the comparison between Thomas' concept of authenticity and the Heidegger's was attempted in this paper. Thomas' concept of authenticity is opposite to accidentality. It is also positive realization of a self, positive movement toward a capable being, a unique self, a unique experience, and honesty in a sport situation...

  6. The influence of trait-emotional intelligence on authentic leadership

    Directory of Open Access Journals (Sweden)

    Martina Kotzé

    2015-11-01

    Full Text Available Orientation: Authentic leadership is a relatively new construct that has recently gained increasing attention resulting from challenges faced by organisations relating to ethical meltdowns, corruption and fraud. Research purpose: This study seeks to explore the relationship between components of emotional intelligence and authentic leadership. Motivation for the study: Several authors called for more empirical investigations into the antecedents of authentic leadership. Despite the important role that emotions play in leadership, empirical studies were lacking about the influence of different components of emotional intelligence to authentic leadership. Research design, approach and method: Data were collected, using questionnaires obtained from 341 full-time employed applicants to MBA and leadership programmes in a South African Business School. Relationships between variables were analysed, using Pearson product-moment correlations and stepwise multiple regression. Main findings: The results indicated that emotional intelligence has positive statistically significant associations with authentic leadership. Specifically, those who scored high on all the emotional intelligence components also scored high on authentic leadership. In addition, the emotional intelligence component of empathy was a statistically significant predictor of authentic leadership. Practical/managerial implications: Initial findings suggest the potential value of recognising and developing the emotional intelligence of leaders to enable them to lead their organisations authentically to desired, successful outcomes. As empathy has been shown to be the most important emotional intelligence predictor of authentic leadership, leaders need to understand when subordinates perceive a leader as displaying empathic emotion. Contribution: This study contributes to the literature and empirical research on the antecedents of authentic leadership.

  7. HORA - an Austrian platform for natural hazards

    Science.gov (United States)

    Hlatky, T.

    2009-04-01

    HORA - an Austrian platform for natural hazards as a new way in risk communication One initiatives launched in Austria demonstrate that public participation not only bears the risk of a partial transfer of responsibility by the authorities; it may above all prepare the ground for entirely new approaches and create new links. The recent installation of the first internet risk zoning system in Austria underscores the importance of involving private parties in natural disaster protection. This public-private partnership (PPP) between the Federal Ministry of Agriculture, Forestry, Environment and Water Management (BMLFUW) and the Austrian Insurance Association (VVO) was launched in the wake of the 2002 flood disaster. The first project phase, the Austrian flood risk zoning system called HORA (screenshot see fig. 1), has now been accessible on the Web since 1st June 2006. In accordance with a risk partnership concluded between federal government, insurance companies and private parties, the project initiators seek to offer the public a preliminary risk assessment tool for evaluation of their home, industrial enterprise, of infrastructure. Digital risk maps shall provide information on 30-year, 100-year and 200-year flood events as they occur alongside the 26.000-km-long domestic river network. The probability with which a certain block of land is immersed in water during a flood event can be calculated by means of hydraulic engineering methods. These have traditionally relied on statistical figures, which are known to be very inaccurate, especially when major events such as flooding are concerned. The Vienna University of Technology (TU) (Institute of Hydraulic and Water Resources Engineering) has dedicated many years to developing more accurate, process oriented risk assessment techniques. The starting points was to identify different flood-triggering processes and to divide them into specific categories as long-duration rainfalls, short-duration rainfalls, storms

  8. Meet meat: An explorative study on meat and cultured meat as seen by Chinese, Ethiopians and Dutch

    NARCIS (Netherlands)

    Bekker, G.A.; Tobi, H.; Fischer, A.R.

    2017-01-01

    In this cross-cultural study we investigated how study participants from China, Ethiopia and the Netherlands operationalize the concept of meat and to what extent cultured meat fits or does not fit into this operationalization. We argue that combining the conceptual approaches symbolic boundaries

  9. [Inheritance and innovation of traditional Chinese medicinal authentication].

    Science.gov (United States)

    Zhao, Zhong-zhen; Chen, Hu-biao; Xiao, Pei-gen; Guo, Ping; Liang, Zhi-tao; Hung, Fanny; Wong, Lai-lai; Brand, Eric; Liu, Jing

    2015-09-01

    Chinese medicinal authentication is fundamental for the standardization and globalization of Chinese medicine. The discipline of authentication addresses difficult issues that have remained unresolved for thousands of years, and is essential for preserving safety. Chinese medicinal authentication has both scientific and traditional cultural connotations; the use of scientific methods to elucidate traditional experience-based differentiation carries the legacy of Chinese medicine forward, and offers immediate practical significance and long-term scientific value. In this paper, a path of inheritance and innovation is explored through the scientific exposition of Chinese medicinal authentication, featuring a review of specialized publications, the establishment of a Chinese medicine specimen center and Chinese medicinal image databases, the expansion of authentication technologies, and the formation of a cultural project dedicated to the Compedium of Materia Medica.

  10. Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

    International Nuclear Information System (INIS)

    Yang Jing; Wang Chuan; Zhang Ru

    2010-01-01

    In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.

  11. Multi-factor authentication using quantum communication

    Science.gov (United States)

    Hughes, Richard John; Peterson, Charles Glen; Thrasher, James T.; Nordholt, Jane E.; Yard, Jon T.; Newell, Raymond Thorson; Somma, Rolando D.

    2018-02-06

    Multi-factor authentication using quantum communication ("QC") includes stages for enrollment and identification. For example, a user enrolls for multi-factor authentication that uses QC with a trusted authority. The trusted authority transmits device factor information associated with a user device (such as a hash function) and user factor information associated with the user (such as an encrypted version of a user password). The user device receives and stores the device factor information and user factor information. For multi-factor authentication that uses QC, the user device retrieves its stored device factor information and user factor information, then transmits the user factor information to the trusted authority, which also retrieves its stored device factor information. The user device and trusted authority use the device factor information and user factor information (more specifically, information such as a user password that is the basis of the user factor information) in multi-factor authentication that uses QC.

  12. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  13. ESnet authentication services and trust federations

    Energy Technology Data Exchange (ETDEWEB)

    Muruganantham, Dhivakaran; Helm, Mike; Genovese, Tony [ESnet, Energy Sciences Network, 1 Cyclotron Road, MS 50A-3111 Berkeley, California 94720 (United States)

    2005-01-01

    ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the 'roaming scientist' (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens)

  14. ESnet authentication services and trust federations

    International Nuclear Information System (INIS)

    Muruganantham, Dhivakaran; Helm, Mike; Genovese, Tony

    2005-01-01

    ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the 'roaming scientist' (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens)

  15. Designing Pu600 for Authentication

    International Nuclear Information System (INIS)

    White, G.

    2008-01-01

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work

  16. Authentic And Concurrent Evaluation-refining

    DEFF Research Database (Denmark)

    Eriksson, Carina Ihlström; Åkesson, Maria; Kautz, Karlheinz

    2011-01-01

    This paper addresses the need for more detailed accounts for evaluation in design science research literature. By revisiting a design project regarding the future e-newspaper we give detailed descriptions of its authentic and concurrent evaluation approach by illustrating the what, why and how...... of all evaluation activities throughout the whole project. The project produced seven different design artifacts that were evaluated. The utility and theoretical outcomes of the evaluation activities clearly influenced design decisions regarding newspaper design, user value and business model design...... as well as decisions on strategic levels. We emphasize a holistic and concurrent approach to evaluation compared to the general design science research thinking and argue that reflecting on how to seek authenticity is important. By authenticity we refer to the notion of how closely an evaluation captures...

  17. Quantum Secure Direct Communication Based on Authentication

    International Nuclear Information System (INIS)

    Min-Jie, Wang; Wei, Pan

    2008-01-01

    We propose two schemes of quantum secure direct communication (QSDC) combined ideas of user authentication [Phys. Rev. A 73 (2006) 042305] and direct communication with dense coding [Phys. Rev. A. 68 (2003) 042317]. In these protocols, the privacy of authentication keys and the properties of the EPR pairs not only ensure the realization of identity authentication but also further improve the security of communication, and no secret messages are leaked even if the messages were broken. (general)

  18. Study on Influence of Different Types of Meat on the Quality of Meat Products

    Directory of Open Access Journals (Sweden)

    Melinda Nagy

    2015-11-01

    Full Text Available Meat species in processed food products have been gaining an increasing interest mainly due to public health, economic and legal concerns, but also due to religious reasons. In the recent years there was an increasing demand for healthier meat products. Formulation of healthier meat products based on processing strategies is one of the most important current approaches to the development of potential meat-based functional foods. The main objective of the study was to characterize different type of meat and to use that to obtain a meat product-smoked sausage. The physico-chemical analyses highlighted the moisture content (drying-oven at 105 ºC, protein (Kjeldahl method and fat (Soxhlet method content and sodium chloride content (Mohr method of the meat and the final product. Sensory analyses of the samples as well as control sample were evaluated by 17 untrained panellists using a 9 point hedonic scale. Following this study, it was noted an improvement of organoleptic characteristics (texture and appearance as well as physico-chemical and sensorial properties of the new product compared with the limits stipulated.

  19. Recent Developments Concerning Pellet Combustion Technologies - A Review of Austrian Developments

    International Nuclear Information System (INIS)

    Obernberger, I.; Thek, G.

    2006-01-01

    This paper gives an overview of recent developments concerning pellet combustion technologies in Austria. It covers basic information about the Austrian pellet market and market developments in recent years as well as about national framework conditions in Austria with regard to standards for Pellets, pellet furnaces and emission limits. A detailed overview is given of the state-of-the-art of Austrian pellet boiler technology, which is - from a technological point of view - probably the best developed market world-wide. Innovations, which have recently been developed and introduced into the market, are described. The most important innovations are new furnace developments based on CFD (Computational Fluid Dynamics) simulations, flue gas condensation systems for small-scale pellet boilers and multi-fuel concepts, where e.g. firewood and Pellets can be utilised in one boiler. Moreover, emissions from pellet furnaces are discussed and evaluated based on test stand and field measurements. In this respect, a focus is put on fine particulate emissions from pellet boilers. Finally, future developments based on ongoing research projects are described and discussed. The ongoing R and D activities focus on the further reduction of fine particulate emissions by primary and secondary measures, the utilisation of herbaceous biomass fuels and small or micro-scale CHP systems

  20. Speaking up behaviors and safety climate in an Austrian university hospital.

    Science.gov (United States)

    Schwappach, David; Sendlhofer, Gerald; Häsler, Lynn; Gombotz, Veronika; Leitgeb, Karina; Hoffmann, Magdalena; Jantscher, Lydia; Brunner, Gernot

    2018-04-26

    To analyze speaking up behavior and safety climate with a validated questionnaire for the first time in an Austrian university hospital. Survey amongst healthcare workers (HCW). Data were analyzed using descriptive statistics, Cronbach's alpha was calculated as a measure of internal consistencies of scales. Analysis of variance and t-tests were used. The survey was conducted in 2017. About 2.149 HCW from three departments were asked to participate. To measure speaking up behavior and safety climate. To explore psychological safety, encouraging environment and resignation towards speaking up. About 859 evaluable questionnaires were returned (response rate: 40%). More than 50% of responders perceived specific concerns about patient safety within the last 4 weeks and observed a potential error or noticed rule violations. For the different items, between 16% and 42% of HCW reported that they remained silent though concerns for safety. In contrast, between 96% and 98% answered that they did speak up in certain situations. The psychological safety for speaking up was lower for HCW with a managerial function (P speak up (P speaking up behaviors for the first time in an Austrian university hospital. Only moderately frequent concerns were in conflict with frequent speaking up behaviors. These results clearly show that a paradigm shift is needed to increase speaking up culture.

  1. Revenue impact on the demand of Slovak households for meat and meat products

    Directory of Open Access Journals (Sweden)

    Ľubica Kubicová

    2012-01-01

    Full Text Available Global economical crisis was felt in the differences in the incomes of the households and their food consumption. In the paper are analyzed the changing patterns in the structure of demand for meat and the impact on total expenditure on meat and meat products in the households of employees, households of self-employed persons and households of pensioners. When examining the sensitivity of demand to changes in consumer meat prices in different social groups of households was estimated own-price elasticity of demand, as well as cross-price elasticity.

  2. Enhancing Authentication Models Characteristic Metrics via ...

    African Journals Online (AJOL)

    In this work, we derive the universal characteristic metrics set for authentication models based on security, usability and design issues. We then compute the probability of the occurrence of each characteristic metrics in some single factor and multifactor authentication models in order to determine the effectiveness of these ...

  3. Entity Authentication:Analysis using Structured Intuition

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    In this paper, we propose a new method for the analysis that uses intuition of the analyst in a structured way. First we define entity authentication in terms of fine level authentication goals (FLAGs). Then we use some relevant structures in protocol narrations and use them to justify FLAGs...

  4. 9 CFR 317.308 - Labeling of meat or meat food products with number of servings.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Labeling of meat or meat food products with number of servings. 317.308 Section 317.308 Animals and Animal Products FOOD SAFETY AND INSPECTION... Nutrition Labeling § 317.308 Labeling of meat or meat food products with number of servings. The label of...

  5. A Research on the Consequences of Authentic Leadership

    OpenAIRE

    Akif Tabak; Mustafa Polat; Serkan Cosar; Tolga Turkoz

    2013-01-01

    The present study examined the relationship between employees' authentic leadership perceptions and three relevant authentic leadership consequences, organizational trust, organizational commitment and organizational cynicism. With 371 employees in a Turkish firm, correlation analysis results showed that authentic leadership perceptions of employees were positively related to organizational trust and organizational commitment, but was negatively related with organizational cynicism. Moreover,...

  6. The impact of seeds provenance and nursery provenance method on Austrian pine (Pinus nigra Arn. seedlings quality

    Directory of Open Access Journals (Sweden)

    Vladan Ivetić

    2013-12-01

    Full Text Available The influence of seed provenances and seedling production methods on quality of one and two years old seedlings of Austrian pine were investigated. Seeds from three provenances of Austrian pine (Goc, Studenica and Sargan were used for seedlings production, combined with three production methods: (i the modified seedbeds (bare-root, (ii the container type Plantagrah II and (iii the container type Gocko. Provenance, as well as the combined influence of provenance and production method had minimal influence on the variability of one and two years old Austrian pine seedlings. Nevertheless, the production method had the highest influence. The production system, besides its importance in nursery, will have a high influence on seedlings growth during the first year after planting. Considering the results of this study (e.g. the highest values of the diameter, number of lateral roots, shoot and root dry weight, and quality index and the lowest value of SQ and satisfactory value of S:R, we can conclude that the seedlings produced in container type Gocko led to the highest seedlings quality, recommended especially for afforestation on hard sites.     

  7. 18 CFR 375.102 - Custody and authentication of Commission records.

    Science.gov (United States)

    2010-04-01

    ... authentication of Commission records. 375.102 Section 375.102 Conservation of Power and Water Resources FEDERAL... Provisions § 375.102 Custody and authentication of Commission records. (a) Custody of official records. (1...) Authentication of Commission action. All orders and other actions of the Commission shall be authenticated or...

  8. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  9. Meat spoilage during distribution.

    Science.gov (United States)

    Nychas, George-John E; Skandamis, Panos N; Tassou, Chrysoula C; Koutsoumanis, Konstantinos P

    2008-01-01

    Meat spoilage during distribution can be considered as an ecological phenomenon that encompasses the changes of the available substrata (e.g., low molecular compounds), during the prevailing of a particular microbial association, the so-called specific spoilage organisms (SSO). In fact, spoilage of meat depends on an even smaller fraction of SSO, called ephemeral spoilage organisms (ESO). These ESO are the consequence of factors that dynamically persist or imposed during, e.g., processing, transportation and storage in the market. Meanwhile spoilage is a subjective judgment by the consumer, which may be influenced by cultural and economic considerations and background as well as by the sensory acuity of the individual and the intensity of the change. Indeed, when spoilage progresses, most consumers would agree that gross discoloration, strong off-odors, and the development of slime would constitute the main qualitative criteria for meat rejection. On the other hand, meat industry needs rapid analytical methods or tools for quantification of these indicators to determine the type of processing needed for their raw material and to predict remaining shelf life of their products. The need of an objective evaluation of meat spoilage is of great importance. The use of metabolomics as a potential tool for the evaluation of meat spoilage can be of great importance. The microbial association of meat should be monitored in parallel with the estimation of changes occurring in the production and/or assimilation of certain compounds would allow us to evaluate spoilage found or produced during the storage of meat under different temperatures as well as packaging conditions.

  10. Modern Methods of Voice Authentication in Mobile Devices

    Directory of Open Access Journals (Sweden)

    Vladimir Leonovich Evseev

    2016-03-01

    Full Text Available Modern methods of voice authentication in mobile devices.The proposed evaluation of the probability errors of the first and second kind for multi-modal methods of voice authentication. The advantages of multimodal multivariate methods before, when authentication takes place in several stages – this is the one-stage, which means convenience for customers. Further development of multimodal methods of authentication will be based on the significantly increased computing power of mobile devices, the growing number and improved accuracy built-in mobile device sensors, as well as to improve the algorithms of signal processing.

  11. Sun Exposure Prevalence and Associated Skin Health Habits: Results from the Austrian Population-Based UVSkinRisk Survey

    Directory of Open Access Journals (Sweden)

    Daniela Haluza

    2016-01-01

    Full Text Available Recreational sun exposure accounts for a large number of acute and chronic dermatological diseases, including skin cancer. This study aimed at estimating the one-year prevalence of sun exposure and skin health-associated knowledge and attitudes among Austrian citizens. The population-based UVSkinRisk survey investigated a representative sample of Austrian adults using a structured questionnaire. In total, 1500 study subjects (median age 33.0 years, 50.5% females participated in this questionnaire survey. Among study participants, prevalence of sun exposure was 47%, with slightly higher rates in males (48% compared to females (46%. Younger age, lower professional category, darker skin type, motives to tan, sunbed use, sunburn, and outdoor sport activity increased the odds for prevalent sun exposure. This is the first population-based study evaluating the prevailing sun exposure and recreational habits influencing skin health among Austrian citizens. Despite public media campaigns educating on the harmful effects of sunlight exposure, we found a high prevalence of self-reported sunlight exposure. The results suggest that multifaceted socio-cultural characteristics stimulate recreational sun exposure and tanning habits. Communicating individualized Public (Skin Health messages might be the key to prevent photo-induced skin health hazards in light-skinned populations. The practical and theoretical implications of these findings are discussed.

  12. An Insight of Meat Industry in Pakistan with Special Reference to Halal Meat: A Comprehensive Review.

    Science.gov (United States)

    Sohaib, Muhammad; Jamil, Faraz

    2017-01-01

    Livestock is considered central component in agricultural sector of Pakistan, provides employment to more than 8 million families. Meat and meat products holds pivotal significance in meeting dietary requirements serving as major protein source and provide essential vitamins and minerals. Globally, consumer demand is increasing for healthy, hygienic and safe meat and meat products due to growing population, income level and food choices. As, food choices are mainly influenced by region, religion and economic level. However, religion is one of the major factor to influence the food choices. In this context, halal foods a growing trend, trade estimated to cross USD $ 3 trillion and among this, meat sector contribute about US$ 600 billion. Halal meat and allied products is requirement from Muslims but it is also accepted by non-Muslims due to safe and hygienic nature, nutritious value and superior quality. Pakistan meat industry is vibrant and has seen rigorous developments during last decade as government also showed interest to boost livestock production and processing facilities to meet increasing local and global demand. The industry has potential to grow owing to its natural animal rearing capability, muslim majority country (96% of total population), improvisation of market and consumer preference towards halal meat. Current review debates Pakistan meat industry scenario, production trend, global trade as well as future potential with respect to modernization, processing, distribution and trade. The data presented here is useful for meat producers, processors and people involved in export of Pakistani meat and meat based products.

  13. Radiation dosimetry and standards at the austrian dosimetry laboratory

    International Nuclear Information System (INIS)

    Leitner, A.

    1984-10-01

    The Austrian Dosimetry Laboratory, established and operated in cooperation between the Austrian Research Center Seibersdorf and the Federal Office of Metrology and Surveying (Bundesamt and Eich- und Vermessungswesen) maintains the national primary standards for radiation dosimetry. Furthermore its tasks include routine calibration of dosemeters and dosimetric research. The irradiation facilities of the laboratory comprise three X-ray machines covering the voltage range from 5 kV to 420 kV constant potential, a 60 Co teletherapy unit, a circular exposure system for routine batch calibration of personnel dosemeters with four gamma ray sources ( 60 Co and 137 Cs) and a reference source system with six gamma ray sources ( 60 Co and 137 Cs). In addition a set of calibrated beta ray sources are provided ( 147 Pm, 204 Tl and 90 Sr). The dosimetric equipment consists of three free-air parallelplate ionization chambers serving as primary standards of exposure for the X-ray energy region, graphite cavity chambers with measured volume as primary standards for the gamma radiation of 137 Cs and 60 Co as well as different secondary standard ionization chambers covering the dose rate range from the natural background level up to the level of modern therapy accelerators. In addition for high energy photon and electron radiation a graphite calorimeter is provided as primary standard of absorbed dose. The principle experimental set-ups for the practical use of the standards are presented and the procedures for the calibration of the different types of dosemeters are described. (Author)

  14. GAME MEAT MARKET IN EASTERN CROATIA

    OpenAIRE

    Z. Tolušić; T. Florijančić; I. Kralik; M. Sesar; M. Tolušić

    2006-01-01

    In the Republic of Croatia, game meat is consumed far less than meat of domestic animals. Yearly game meat consumption amounts to only 0.55 kg per household member. Consumers prefer meat of domestic animals, because it is cheaper, not paying attention to specific nutritive advantages of game meat. A research on the game meat market and consumers’ preferences was carried out on 101 examinees, chosen among inhabitants of Slavonia and Baranja. The majority of questioned inhabitants did consume g...

  15. Can we cut out the meat of the dish? Constructing consumer-oriented pathways toward meat substitution

    NARCIS (Netherlands)

    Schösler, H.; de Boer, J.; Boersema, J.J.

    2012-01-01

    The shift towards a more sustainable diet necessitates less reliance on foods of animal origin. This study presents data from a representative survey of Dutch consumers on their practices related to meat, meat substitution and meat reduction. The practices reflected a cultural gradient of meat

  16. Radiation preservation of meat and meat products: A review.

    Science.gov (United States)

    Dempster, J F

    1985-01-01

    The World Health Organisation (WHO) in 1980 clarified the position regarding the medical acceptability of irradiated foods when it said'…no health hazard results from consuming any food irradiated up to a dose of one megarad (1 Mrad)'. This resulted in renewed interest in irradiation as a cost-effective alternative to traditional preservation methods such as canning and freezing. Thus, radurisation (the application of ionising radiation at a dose level which substantially reduces the microbial population) increases the shelf life of poultry, comminuted meat and meat dishes significantly. Low dose irradiation, or radicidation, eliminates parasites such as Trichinae and cysticerci in pork and, very importantly, salmonella organisms in poultry and red meat. Therefore, irradiation has an important rôle to play in public health protection. High dose irradiation, or radappertisation ('cold sterilisation'), uses doses in excess of 1 Mrad and is analogous to retorting as understood in the canning industry. However, it can adversely affect quality in producing 'free radicals' in high protein foods such as meat. To prevent this, special precautions are necessary, e.g. irradiation is conducted at very low temperatures and the product is usually vacuum packed. A further potential use of irradiation is its ability to reduce the quantity of nitrite necessary in cured meats. This may become of practical significance if legislation further reduces the amount of nitrite permitted in these products. Copyright © 1985. Published by Elsevier Ltd.

  17. Meat science research tendencies

    Directory of Open Access Journals (Sweden)

    José Arturo García Macías

    2010-12-01

    Full Text Available Meat is a high quality food due its higher protein content, besides to provide energy, vitamins particularly B complex, water and minerals, resulting in an appreciated food for humans. Even in same country, consumers search for different stuffs, since north consumers looks for meat cuts with fat and bone, whereas center-south consumers prefers fatless debones meat cuts. Modern consumers demand excellent appearance, color, taste and flavor in foods, microbiologically safe, minimal processed and curing salts, very nutritive and cheap. All these together in one single product are a hard challenge in the meat products area.

  18. Sustainability and meat consumption: is reduction realistic?

    NARCIS (Netherlands)

    Dagevos, H.; Voordouw, J.

    2013-01-01

    Meat is critical with respect to sustainability because meat products are among the most energy-intensive and ecologically burdensome foods. Empirical studies of the meat-consumption frequency of Dutch consumers show that, apart from meat-avoiders and meat-eaters, many people are meat-reducers that

  19. Environmental impacts of cultured meat production.

    Science.gov (United States)

    Tuomisto, Hanna L; de Mattos, M Joost Teixeira

    2011-07-15

    Cultured meat (i.e., meat produced in vitro using tissue engineering techniques) is being developed as a potentially healthier and more efficient alternative to conventional meat. Life cycle assessment (LCA) research method was used for assessing environmental impacts of large-scale cultured meat production. Cyanobacteria hydrolysate was assumed to be used as the nutrient and energy source for muscle cell growth. The results showed that production of 1000 kg cultured meat requires 26-33 GJ energy, 367-521 m(3) water, 190-230 m(2) land, and emits 1900-2240 kg CO(2)-eq GHG emissions. In comparison to conventionally produced European meat, cultured meat involves approximately 7-45% lower energy use (only poultry has lower energy use), 78-96% lower GHG emissions, 99% lower land use, and 82-96% lower water use depending on the product compared. Despite high uncertainty, it is concluded that the overall environmental impacts of cultured meat production are substantially lower than those of conventionally produced meat.

  20. Geogenic lead isotope signatures from meat products in Great Britain: Potential for use in food authentication and supply chain traceability

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Jane A.; Pashley, Vanessa [NIGL, BGS, Keyworth, NG12 5GG (United Kingdom); Richards, Gemma J. [School of Veterinary Science, University of Bristol, Bristol BS40 5DU (United Kingdom); Brereton, Nicola [The Food and Environment Research Agency, Sand Hutton, York YO41 1LZ (United Kingdom); Knowles, Toby G. [School of Veterinary Science, University of Bristol, Bristol BS40 5DU (United Kingdom)

    2015-12-15

    This paper presents lead (Pb) isotope data from samples of farm livestock raised in three areas of Britain that have elevated natural Pb levels: Central Wales, the Mendips and the Derbyshire Peak District. This study highlights three important observations; that the Pb found in modern British meat from these three areas is geogenic and shows no clear evidence of modern tetraethyl anthropogenic Pb contribution; that the generally excellent match between the biological samples and the ore field data, particularly for the Mendip and Welsh data, suggests that this technique might be used to provenance biological products to specific ore sites, under favourable conditions; and that modern systems reflect the same process of biosphere averaging that is analogous to cultural focusing in human archaeological studies that is the process of biological averaging leading to an homogenised isotope signature with increasing Pb concentration. - Highlights: • Lead (Pb) isotopes measured in modern British meat were geogenic in origin. • The match indicates that this technique may be used to provenance biological products. • There was no evidence for a contribution from modern anthropogenic Pb sources.

  1. Geogenic lead isotope signatures from meat products in Great Britain: Potential for use in food authentication and supply chain traceability

    International Nuclear Information System (INIS)

    Evans, Jane A.; Pashley, Vanessa; Richards, Gemma J.; Brereton, Nicola; Knowles, Toby G.

    2015-01-01

    This paper presents lead (Pb) isotope data from samples of farm livestock raised in three areas of Britain that have elevated natural Pb levels: Central Wales, the Mendips and the Derbyshire Peak District. This study highlights three important observations; that the Pb found in modern British meat from these three areas is geogenic and shows no clear evidence of modern tetraethyl anthropogenic Pb contribution; that the generally excellent match between the biological samples and the ore field data, particularly for the Mendip and Welsh data, suggests that this technique might be used to provenance biological products to specific ore sites, under favourable conditions; and that modern systems reflect the same process of biosphere averaging that is analogous to cultural focusing in human archaeological studies that is the process of biological averaging leading to an homogenised isotope signature with increasing Pb concentration. - Highlights: • Lead (Pb) isotopes measured in modern British meat were geogenic in origin. • The match indicates that this technique may be used to provenance biological products. • There was no evidence for a contribution from modern anthropogenic Pb sources.

  2. Combining IPPC and emission trading: An assessment of energy efficiency and CO2 reduction potentials in the Austrian paper industry

    International Nuclear Information System (INIS)

    Starzer, Otto; Dworak, Oliver

    2005-01-01

    In the frame of an innovative project partnership E.V.A. - the Austrian Energy Agency accompanied the Austrian paper industry for the last 2.5 years in developing a branch specific climate change strategy. Within the scope of this project an assessment of the energy efficiency status of the branch was carried out as well as an evaluation of still realisable energy savings and CO 2 reduction potentials. The paper presents the methodology applied, which combines a top down approach (benchmarking and best practice) with a bottom up approach (on-site interviews and energy audits), supported by a huge data collection process. Within the benchmarking process all Austrian paper industry installations affected by the EU emission trading directive were benchmarked against their respective IPPC/BAT values. Furthermore an extensive list of best practice examples derived from existing or ongoing studies was compared with the energy efficiency measures already carried out by the companies ('early actions'). These theory-oriented findings were complemented by several on-site interviews with the respective energy managers as well as by detailed energy audits carried out by a consulting company, covering in total more than 80% of the Austrian paper industry's CO 2 emissions. The paper concludes with the main results of the project, presenting the pros and cons of working with IPPC documents and BAT values in terms of energy efficiency assessments. Recommendations are presented on how to improve the allocation exercise for the next emission trading period from 2008 to 2012

  3. Integrated environmental protection obligations under European law, survey analysis of Austrian legislation

    International Nuclear Information System (INIS)

    Berthaler, W.

    2001-05-01

    This work focuses on legal instruments serving integrated environmental protection, especially with respect to administrative procedures concerning plant permits, and their inhorent limits. Initially, the legal and scientific approach pursued under the notion of 'integrated environmental protection' and 'environmental impact assessment' is examined and clarified in chapter A. Based thereon, chapter B deals with the obligations resulting from the EIA-Directive and - compared therewith - from the IPPC-Directive with regard to procedures for plant permits. Further, Austria's delay in fully transposing these directives is examined. When dealing with the constitutional basis for transposing the EIA- and IPPC-D into Austrian administrative law (chapter C), the inherent limits of some competence of legislation are discovered to be too narrow to ensure full compliance with EC law; only with regard to EIA, legistation is based on sound constitutional ground. The second part of the work is devoted to three areas of discussion on EIA- and IPPC-procedures under Austrian law: the scope of their applicability (chapter D), the problems of integrated evaluation and the limits of ecological expertise (chapter E) and aspects of public participation (chapter F). The study is concluded by a summary of the main results (chapter G). (author)

  4. The Meat City

    DEFF Research Database (Denmark)

    Thelle, Mikkel

    2017-01-01

    This article investigates the emergence of the Copenhagen slaughterhouse, called the Meat City, during the late nineteenth century. This slaughterhouse was a product of a number of heterogeneous components: industrialization and new infrastructures were important, but hygiene and the significance...... of Danish bacon exports also played a key role. In the Meat City, this created a distinction between rising production and consumption on the one hand, and the isolation and closure of the slaughtering facility on the other. This friction mirrored an ambivalent attitude towards meat in the urban space: one...... where consumers demanded more meat than ever before, while animals were being removed from the public eye. These contradictions, it is argued, illustrate and underline the change of the city towards a ‘post-domestic’ culture. The article employs a variety of sources, but primarily the Copenhagen...

  5. Detection of Salmonella in Meat

    DEFF Research Database (Denmark)

    Löfström, Charlotta; Hansen, Flemming; Mansdal, Susanne

    2012-01-01

    Cost-effective and rapid monitoring of Salmonella in the meat production chain can contribute to food safety. The objective of this study was to validate an easy-to-use pre-PCR sample preparation method based on a simple boiling protocol for screening of Salmonella in meat and carcass swab samples...... obtained (SP, SE, and AC were 100, 95, and 97%, respectively). This test is under implementation by the Danish meat industry, and can be useful for screening of large number of samples in the meat production, especially for fast release of minced meat with a short shelf life....

  6. Total-reflection X-ray fluorescence analysis of Austrian wine

    International Nuclear Information System (INIS)

    Gruber, X.; Kregsamer, P.; Wobrauschek, P.; Streli, C.

    2006-01-01

    The concentration of major, minor and trace elements in Austrian wine was determined by total-reflection X-ray fluorescence using gallium as internal standard. A multi-elemental analysis was possible by pipetting 6 μl of wine directly on the reflector and drying. Total-reflection X-ray fluorescence analysis was performed with Atomika EXTRA II A (Cameca) X-rays from a Mo tube with a high-energy cut-off at 20 keV in total-reflection geometry. The results showed that it was possible to identify only by the elemental analysis as fingerprint the vineyards and year of vintage among 11 different wines

  7. Total-reflection X-ray fluorescence analysis of Austrian wine

    Energy Technology Data Exchange (ETDEWEB)

    Gruber, X. [Atominstitut der Osterreichischen Universitaeten, 1020 Vienna (Austria); Kregsamer, P. [Atominstitut der Osterreichischen Universitaeten, 1020 Vienna (Austria); Wobrauschek, P. [Atominstitut der Osterreichischen Universitaeten, 1020 Vienna (Austria); Streli, C. [Atominstitut der Osterreichischen Universitaeten, 1020 Vienna (Austria)]. E-mail: streli@ati.ac.at

    2006-11-15

    The concentration of major, minor and trace elements in Austrian wine was determined by total-reflection X-ray fluorescence using gallium as internal standard. A multi-elemental analysis was possible by pipetting 6 {mu}l of wine directly on the reflector and drying. Total-reflection X-ray fluorescence analysis was performed with Atomika EXTRA II A (Cameca) X-rays from a Mo tube with a high-energy cut-off at 20 keV in total-reflection geometry. The results showed that it was possible to identify only by the elemental analysis as fingerprint the vineyards and year of vintage among 11 different wines.

  8. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Yo-Hsuan Chuang

    2018-04-01

    Full Text Available Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs. Within this kind of Internet of Things (IoT environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  9. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Science.gov (United States)

    Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-01-01

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168

  10. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    Science.gov (United States)

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  11. Designing Pu600 for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-10

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work.

  12. Pathways to Authenticity in Operatic Interpretation

    DEFF Research Database (Denmark)

    Grund, Cynthia M.; Westney, WIlliam

    is authentic in the sense of being believable, honest and compelling. Mastering pronunciation and knowing the literal narrative of an opera is one thing, but how can an opera singer find ways to transcend the libretto in order to really grip an audience through authenticity of a deeper and more personal kind...

  13. Authenticity in the Context of Technologically Enriched ESP

    Directory of Open Access Journals (Sweden)

    Vilhelmina Vaičiūnienė

    2013-01-01

    Full Text Available Purpose—to determine student attitudes towards authenticity and the interrelation between authenticity and the use of ICT in the ESP learning context. Design/methodology/approach—the research conducted in autumn 2011 was aimed at comparative analysis of students of two study modes—full-time and part-time. It followed research focusing on Bachelor study programme student attitudes (Business Informatics and Finance Economics to authentic resources carried out in spring of 2010. The survey participants were Bachelor study cycle first year students from several faculties of MRU (Law, Politics and Management, Economics and Finance Management, Social Informatics, Social Policy. The paper discusses the ESP learning experience at Mykolas Romeris University and presents research findings obtained through the questionnaire survey. Findings—comparative analysis between full-time and part-time study mode student responses reveals similar learning patterns; however, certain differences can also be observed. The full-time students are motivated by more advanced authentic learning materials and they are more computer literate and able to access these materials, whereas the respondents from the part-time study mode appreciate more traditional Internet-based language learning tools. Research limitations/implications—the research sample was composed of first year Bachelor study programme students, therefore the results cannot be generalised and applied to Master level students. Practical implications—awareness of student needs and problems encountered in authentic learning environment may help improve ESP teaching methods. Originality/Value—gaining insight into student perception of authenticity in learning process and technological proficiency to access authentic resources Keywords: authenticity, student autonomy, ESP context, information communication technologies (ICT. Research type: research paper.

  14. Authenticity in the Context of Technologically Enriched ESP

    Directory of Open Access Journals (Sweden)

    Vilhelmina Vaičiūnienė

    2012-07-01

    Full Text Available Purpose—to determine student attitudes towards authenticity and the interrelation between authenticity and the use of ICT in the ESP learning context.Design/methodology/approach—the research conducted in autumn 2011 was aimed at comparative analysis of students of two study modes—full-time and part-time. It followed research focusing on Bachelor study programme student attitudes (Business Informatics and Finance Economics to authentic resources carried out in spring of 2010. The survey participants were Bachelor study cycle first year students from several faculties of MRU (Law, Politics and Management, Economics and Finance Management, Social Informatics, Social Policy. The paper discusses the ESP learning experience at Mykolas Romeris University and presents research findings obtained through the questionnaire survey.Findings—comparative analysis between full-time and part-time study mode student responses reveals similar learning patterns; however, certain differences can also be observed. The full-time students are motivated by more advanced authentic learning materials and they are more computer literate and able to access these materials, whereas the respondents from the part-time study mode appreciate more traditional Internet-based language learning tools.Research limitations/implications—the research sample was composed of first year Bachelor study programme students, therefore the results cannot be generalised and applied to Master level students.Practical implications—awareness of student needs and problems encountered in authentic learning environment may help improve ESP teaching methods.Originality/Value—gaining insight into student perception of authenticity in learning process and technological proficiency to access authentic resourcesKeywords: authenticity, student autonomy, ESP context, information communication technologies (ICT.Research type: research paper.

  15. Hardware authentication using transmission spectra modified optical fiber

    International Nuclear Information System (INIS)

    Grubbs, Robert K.; Romero, Juan A.

    2010-01-01

    The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

  16. 29 CFR 18.901 - Requirement of authentication or identification.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Requirement of authentication or identification. 18.901... HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES Rules of Evidence Authentication and Identification § 18.901 Requirement of authentication or identification. (a) General provision. The requirement of...

  17. Strategies for designing novel functional meat products.

    Science.gov (United States)

    Arihara, Keizo

    2006-09-01

    In recent years, much attention has been paid to physiological functions of foods due to increasing concerns for health. Although there has been limited information of physiological functions of meat until recently, several attractive meat-based bioactive compounds, such as carnosine, anserine, l-carnitine, conjugated linoleic acid, have been studied. Emphasizing these activities is one possible approach for improving the health image of meat and developing functional meat products. This article provides potential benefits of representative meat-based bioactive compounds on human health and an overview of meat-based functional products. Strategies for designing novel functional meat products utilizing bioactive peptides and/or probiotic bacteria, is also discussed. This article focuses particularly on the possibility of meat protein-derived bioactive peptides, such as antihypertensive peptides. There are still some hurdles in developing and marketing novel functional meat products since such products are unconventional and consumers in many countries recognize meat and meat products to be bad for health. Along with accumulation of scientific data, there is an urgent need to inform consumers of the exact functional value of meat and meat products including novel functional foods.

  18. Cultured Meat in Islamic Perspective.

    Science.gov (United States)

    Hamdan, Mohammad Naqib; Post, Mark J; Ramli, Mohd Anuar; Mustafa, Amin Rukaini

    2017-04-29

    Cultured meat is a promising product that is derived through biotechnology that partially circumvents animal physiology, thereby being potentially more sustainable, environmentally friendly and animal friendly than traditional livestock meat. Such a novel technology that can impact many consumers evokes ethical, philosophical and religious discussions. For the Islamic community, the crucial question is whether cultured meat is halal, meaning compliant with Islamic laws. Since the culturing of meat is a new discovery, invention and innovation by scientists that has never been discussed by classical jurists (fuqaha'), an ijtihad by contemporary jurists must look for and provide answers for every technology introduced, whether it comply the requirements of Islamic law or not. So, this article will discuss an Islamic perspective on cultured meat based on the original scripture in the Qur'an and interpretations by authoritative Islamic jurists. The halal status of cultured meat can be resolve through identifying the source cell and culture medium used in culturing the meat. The halal cultured meat can be obtained if the stem cell is extracted from a (Halal) slaughtered animal, and no blood or serum is used in the process. The impact of this innovation will give positive results in the environmental and sustain the livestock industry.

  19. Properties of raw meat and meat curry from spent goat in relation with post-mortem handling conditions.

    Science.gov (United States)

    Narayan, Raj; Mendiratta, S K; Mane, B G

    2013-04-01

    The properties of raw meat and meat curry from spent goat meat in relation with post-mortem handling conditions were evaluated. The conditions evaluated were: cooking of meat within 1-2 h post-slaughter (condition 1); deboning meat storage at 25 ± 2 °C for 5-6 h and cooking (condition 2); post-slaughter storage of carcass at room temperature for 5-6 h, then deboning followed by storage of meat at refrigeration temperature for 5-6 h and cooking (condition 3); deboning and storage of meat at 25 ± 2 °C for 10-12 h and cooking (condition 4). Significant difference was observed in pH values in condition 1 (p meat as compared to the conditions 2, 3 and 4. However, the moisture content of cooked meat was significantly higher (p meat chunks, that is, the mean value was significantly higher (p < 0.01) for condition 2 and significantly lower for condition 1. Sensory scores were significantly higher in condition 1 and significantly lower in condition 2. However, sensory scores for condition 4 were almost similar to the condition 1.

  20. Polymeric self-authenticating banknotes

    Science.gov (United States)

    Zientek, Paul

    1998-04-01

    This paper discusses a new concept in overt security called the self-authenticating banknote. The self-authenticating banknote concept is built around the transparent window feature of the polymer banknote. This feature allows the incorporation of transmission based optical devices on a banknote so that the user, by folding the note over on itself and looking through an optical device which is a part of the note itself, can visually inspect and verify certain security features on the banknote. This paper presents a number of examples of optical devices which are presently being developed for this purpose.

  1. Meat and colo-rectal cancer.

    Science.gov (United States)

    Hill, M J

    1999-05-01

    In early epidemiological studies of diet and cancer the stress was on the search for causal factors. Population (ecological) studies tended to show a strong correlation between meat intake, particularly red meat, and the risk of colo-rectal cancer. They also tended to show meat to be strongly inversely correlated with cancers of the stomach and oesophagus and liver. Early case-control studies tended to support the postulated role for red meat in colo-rectal carcinogenesis, although more recent case-control studies, particularly those from Europe, have tended to show no relationship. The cohort studies in general failed to detect any relationship between meat intake and colo-rectal cancer risk. The available evidence points to the intake of protective factors such as vegetables and whole-grain cereals being the main determinants of colo-rectal cancer risk, with meat intake only coincidentally related.

  2. Using Rose and Compass for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2009-07-09

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  3. Using Rose and Compass for Authentication

    International Nuclear Information System (INIS)

    White, G.

    2009-01-01

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work

  4. Simulations in nursing practice: toward authentic leadership.

    Science.gov (United States)

    Shapira-Lishchinsky, Orly

    2014-01-01

    Aim  This study explores nurses' ethical decision-making in team simulations in order to identify the benefits of these simulations for authentic leadership. Background  While previous studies have indicated that team simulations may improve ethics in the workplace by reducing the number of errors, those studies focused mainly on clinical aspects and not on nurses' ethical experiences or on the benefits of authentic leadership. Methods  Fifty nurses from 10 health institutions in central Israel participated in the study. Data about nurses' ethical experiences were collected from 10 teams. Qualitative data analysis based on Grounded Theory was applied, using the atlas.ti 5.0 software package. Findings  Simulation findings suggest four main benefits that reflect the underlying components of authentic leadership: self-awareness, relational transparency, balanced information processing and internalized moral perspective. Conclusions  Team-based simulation as a training tool may lead to authentic leadership among nurses. Implications for nursing management  Nursing management should incorporate team simulations into nursing practice to help resolve power conflicts and to develop authentic leadership in nursing. Consequently, errors will decrease, patients' safety will increase and optimal treatment will be provided. © 2012 John Wiley & Sons Ltd.

  5. Authentication of data for monitoring a comprehensive test ban treaty

    International Nuclear Information System (INIS)

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations

  6. Effects of Electrical Stimulation on Meat Quality of Lamb and Goat Meat

    Directory of Open Access Journals (Sweden)

    Omer Cetin

    2012-01-01

    Full Text Available Effect of various voltage of electrical stimulation (ES on meat quality of lamb and goat was investigated by using a total of 36 animals at 3–5 years old. Constant 50 Hz frequency and 50, 100, and 250 V, 90 sec of ES were administered to 1/2 carcasses and were examined according their textural, physicochemical, and sensorial characteristics. ES decreased the pH values of lamb and goat meat, and accelerated the rigor mortis (<0.05. Additionally, ES enhanced the water activity, water-holding capacity, and drip loss of both animals. Shear force varied between lamb and goat meat, and tenderness was improved depending on voltage range used (<0.001. ES caused difference in instrumental colour (CIE ∗, ∗, ∗ values of lamb and goat meat compared with the control groups (<0.05 during aging period at 4°C. Sensorial characteristics were also improved with various levels of ES treatments. In conclusion, ES had positive effects on meat quality of lamb and goat, in contrast to undesirable consumer preferences.

  7. Measurement of the 226Ra-concentration in bottled Austrian mineral waters and table beverages

    International Nuclear Information System (INIS)

    Friedmann, H.; Hernegger, F.

    1978-01-01

    226 Ra being regarded nowadays as a toxic trace element, a systementic examination of bottled Austrian mineral waters and table beverages has been carried out. Only in one case was the maximum allowable concentration of 3.3 pCi/l, a value set up by the WHO, clearly exceeded. (orig.) [de

  8. 45. Annual Convention of the Austrian Physical Society; 45. Jahrestagung der Oesterreichischen Physikalischen Gesellschaft

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-12-31

    This volume contains lectures of the 45{sup th} symposium of the Austrian Physical Society which had been held in Leoben, Austria in 1995. The following topics are included: Atomic physics, molecular physics, plasma physics, solid state physics, nuclear and particle physics, biophysics, environmental physics, quantum electronics and quantum optics. (Suda).

  9. 50. Annual symposium of the Austrian Physical Society; 50. Jahrestagung der Oesterreichischen Physikalischen Gesellschaft

    Energy Technology Data Exchange (ETDEWEB)

    Lippitsch, M E [Institut fuer Experimentalphysik, Karl-Franzens-Universitaet Graz, Universitaetsplatz 5, A-8010 Graz (Austria)

    2000-07-01

    The conference held from 25. - 29. 9. 2000 at the University of Graz was elaborated by the Austrian society of physics in the fields of solid state physics, polymers physics, quantum electronics, electrodynamics, optics, nuclear and particle physics, atomic, molecules and plasma physics, acoustics, physics - industry - energy and physics teaching. (botek)

  10. Biometric authentication and authorisation infrastructures

    OpenAIRE

    Olden, Matthias

    2010-01-01

    Nowadays, replacing traditional authentication methods with authentication and authorization infrastructures (AAIs) comes down to trading several passwords for one master password, which allows users to access all services in a federation. Having only one password may be comfortable for the user, but it also raises the interest of potential impostors, who may try to overcome the weak security that a single password provides. A solution to this issue would be a more-factor AAI, combining the p...

  11. Bioactive Compounds in Functional Meat Products

    OpenAIRE

    Ewelina Pogorzelska-Nowicka; Atanas G. Atanasov; Jarosław Horbańczuk; Agnieszka Wierzbicka

    2018-01-01

    Meat and meat products are a good source of bioactive compounds with positive effect on human health such as vitamins, minerals, peptides or fatty acids. Growing food consumer awareness and intensified global meat producers competition puts pressure on creating new healthier meat products. In order to meet these expectations, producers use supplements with functional properties for animal diet and as direct additives for meat products. In the presented work seven groups of key functional cons...

  12. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    Directory of Open Access Journals (Sweden)

    Evangelos Bekiaris

    2008-03-01

    Full Text Available Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO (2007 is an EU Specific Targeted Research Project (STREP where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  13. Development of a Mobile EEG-based Biometric Authentication System

    DEFF Research Database (Denmark)

    Klonovs, Juris; Petersen, Christoffer Kjeldgaard; Olesen, Henning

    In recent years the need for greater security for storing personal and business data or accessing corporate networks on mobile devices is growing rapidly, and one of the potential solutions is to employ the innovative biometric authentication techniques. This paper presents the development...... and present a mobile prototype system capable of authenticating users based on the uniqueness of their brainwaves. Furthermore, we implement a novel authentication process, which leads the authentication system to be more secure. We also give suggestions for future improvements of the system....

  14. Effect of dietary plant extract on meat quality and sensory parameters of meat from Equidae.

    Science.gov (United States)

    Rossi, Raffaella; Ratti, Sabrina; Pastorelli, Grazia; Maghin, Federica; Martemucci, Giovanni; Casamassima, Donato; D'Alessandro, Angela Gabriella; Corino, Carlo

    2017-11-01

    Plant extracts as Lippia spp. have been proven antioxidant properties. Recent studies have been shown that dietary supplementation with plant extracts is able to enhance meat quality parameters. Studies regarding meat quality in Equidae are limited. The effect of dietary plant extract (PE), containing verbascoside, on meat quality, oxidative stability and sensory parameters of Longissimus Lumborum (LL) muscle in Equidae was studied. Dietary treatment did not affect (P > 0.05) pH, colour indices and chemical parameters of muscle in both donkey and horse. Dietary PE improved (P meat and to affect the sensory attributes of Equidae meat. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  15. Vein matching using artificial neural network in vein authentication systems

    Science.gov (United States)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  16. AUTHENTIC TEXTS FOR CRITICAL READING ACTIVITIES

    Directory of Open Access Journals (Sweden)

    Ila Amalia

    2016-03-01

    Full Text Available This research takes an action research aimed at promoting critical reading (“thinking” while reading skills using authentic materials among the students. This research also aims to reveal the students perception on using critical reading skills in reading activities. Nineteen English Education Department students who took Reading IV class, participated in this project. There were three cycles with three different critical reading strategies were applied. Meanwhile, the authentic materials were taken from newspaper and internet articles. The result revealed that the use of critical reading strategies along with the use of authentic materials has improved students’ critical reading skills as seen from the improvement of each cycle - the students critical reading skill was 54% (fair in the cycle 1 improved to 68% (average in cycle 2, and 82% (good in cycle 3.. In addition, based on the critical reading skill criteria, the students’ critical reading skill has improved from 40% (nearly meet to 80% (exceed. Meanwhile, from the students’ perception questionnaire, it was shown that 63% students agreed the critical reading activity using authentic text could improve critical thinking and 58% students agreed that doing critical reading activity could improve reading comprehension. The result had the implication that the use of authentic texts could improve students’ critical reading skills if it was taught by performing not lecturing them. Selectively choosing various strategies and materials can trigger students’ activeness in responding to a text, that eventually shape their critical reading skills.

  17. Progress report 1980/81 of the Austrian Academy of Sciences

    International Nuclear Information System (INIS)

    1982-01-01

    From the numerous institutes and divisions of the Austrian Academy of Sciences presented in this report the Commission for Arteriosclerosis and Thrombosis Research (application of radioimmunoassay) and the Institute for X-ray Microstructure Research (investigation of biological substances by X-ray and neutron small angle scattering) are partly within the scope of INIS. Fully in scope are short project discriptions of the Institute for Radium Research and Nulear Physics: the Commission for the SIN-project and the Institute for High Energy Physics, completed by publication lists. (G.Q.)

  18. [Application of rapid PCR to authenticate medicinal snakes].

    Science.gov (United States)

    Chen, Kang; Jiang, Chao; Yuan, Yuan; Huang, Lu-Qi; Li, Man

    2014-10-01

    To obtained an accurate, rapid and efficient method for authenticate medicinal snakes listed in Chinese Pharmacopoeia (Zaocysd humnades, Bungarus multicinctus, Agkistrodon acutus), a rapid PCR method for authenticate snakes and its adulterants was established based on the classic molecular authentication methods. DNA was extracted by alkaline lysis and the specific primers were amplified by two-steps PCR amplification method. The denatured and annealing temperature and cycle numbers were optimized. When 100 x SYBR Green I was added in the PCR product, strong green fluorescence was visualized under 365 nm UV whereas adulterants without. The whole process can complete in 30-45 minutes. The established method provides the technical support for authentication of the snakes on field.

  19. A Multifactor Secure Authentication System for Wireless Payment

    Science.gov (United States)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  20. Characterization of Streptococcus pneumoniae isolates from Austrian companion animals and horses.

    Science.gov (United States)

    Ginders, Maximilian; Leschnik, Michael; Künzel, Frank; Kampner, Doris; Mikula, Claudia; Steindl, Georg; Eichhorn, Inga; Feßler, Andrea T; Schwarz, Stefan; Spergser, Joachim; Loncaric, Igor

    2017-11-14

    The aim of the present study was to investigate the genetic relatedness and the antimicrobial resistance profiles of a collection of Austrian Streptococcus pneumoniae isolates from companion animals and horses. A total of 12 non-repetitive isolates presumptively identified as S. pneumoniae were obtained during routinely diagnostic activities between March 2009 and January 2017. Isolates were confirmed as S. pneumoniae by bile solubility and optochin susceptibility testing, matrix-assisted laser desorption-ionization-time of flight (MALDI-TOF) mass spectrometry and sequence analysis of a part recA and the 16S rRNA genes. Isolates were further characterized by pneumolysin polymerase chain reaction (PCR) and genotyped by multilocus sequence typing (MLST). Antimicrobial susceptibility testing was performed and resistance genes were detected by specific PCR assays. All isolates were serotyped. Four sequence types (ST) (ST36, ST3546, ST6934 and ST6937) and four serotypes (3, 19A, 19F and 23F) were detected. Two isolates from twelve displayed a multidrug-resistance pheno- and genotype. This study represents the first comprehensive investigation on characteristics of S. pneumoniae isolates recovered from Austrian companion animals and horses. The obtained results indicate that common human sero- (23F) and sequence type (ST36) implicated in causing invasive pneumococcal disease (IPD) may circulate in dogs. Isolates obtained from other examined animals seem to be host-adapted.

  1. Legal aspects of the crimes committed in insolvency proceedings – comparison of Czech and Austrian legislation

    Directory of Open Access Journals (Sweden)

    Marta Uhlířová

    2013-01-01

    Full Text Available The subject of this paper is to compare the Czech and Austrian legislation considering offenses which entrepreneurs and other entities (natural person may commit within the insolvency proceedings or which are related to the insolvency. Emphasis is placed on the comparison of Czech and Austrian legislation with regard cross-border relationships within the business environment and living between the Czech Republic and Austria.Czech entrepreneurs and natural person in Austria can get into a situation where their debtor is located in Austria and finds himself insolvent or vice versa. Also the Czech entrepreneurs and natural person may do their bussines or live in Austria and may get into such a situation when they are close to the situation which can lead to their decline. This paper would be for them a practical recommendation on how to avoid potential criminal liability.

  2. Policy plan for the early approval for irradiated meat products and the promotion of irradiated meats in market

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Ju Woon [Team for Radiation Food Science and Biotechnology, Advanced Radiation Technology Institute, Korea Atomic Energy Research Institute, Jeongeup (Korea, Republic of); Kim, Wang Geun [Ministry of Education, Science and Technology, Seoul (Korea, Republic of); Kim, Kyong Su [Dept. of Food and Nutrition, Chosun University, Gwangju (Korea, Republic of); Yook, Hong Sun [Dept. of Food and Nutrition, Chungnam National University, Daejeon (Korea, Republic of); Kim, Cheon Jei [Division of Animal Life Science, Konkuk University, Seoul (Korea, Republic of)

    2008-11-15

    The consumption of meat products is gradually being increased by the development of livestock raising technology, industrialized farm management and international trade. This increased consumption also created new market for ready-to-eat and ready-to-cook meat products. However, these convenience meat products can be easily contaminated during the processing and storage by pathogens, and there have been many reported cases of food borne illness by meats. One of the most effective methods for the decontamination of meat products is the radiation technology. Food irradiation was the established, well-recognized and safe sterilization method. Many other countries researched the effect of irradiation on the meat products and approved the irradiation. In this article, the effectiveness, the international acceptance, the economics and the research trend of irradiation on meat products have been reviewed. Also, the policy plans for the early approval of the irradiated meat products in Korea and the promotion policy of irradiated meats in market were discussed.

  3. Policy plan for the early approval for irradiated meat products and the promotion of irradiated meats in market

    International Nuclear Information System (INIS)

    Lee, Ju Woon; Kim, Wang Geun; Kim, Kyong Su; Yook, Hong Sun; Kim, Cheon Jei

    2008-01-01

    The consumption of meat products is gradually being increased by the development of livestock raising technology, industrialized farm management and international trade. This increased consumption also created new market for ready-to-eat and ready-to-cook meat products. However, these convenience meat products can be easily contaminated during the processing and storage by pathogens, and there have been many reported cases of food borne illness by meats. One of the most effective methods for the decontamination of meat products is the radiation technology. Food irradiation was the established, well-recognized and safe sterilization method. Many other countries researched the effect of irradiation on the meat products and approved the irradiation. In this article, the effectiveness, the international acceptance, the economics and the research trend of irradiation on meat products have been reviewed. Also, the policy plans for the early approval of the irradiated meat products in Korea and the promotion policy of irradiated meats in market were discussed

  4. Meat : a natural symbol.

    OpenAIRE

    Fiddes, Nick

    1989-01-01

    In Britain, and in cultures around the world, meat's significance extends beyond what might be anticipated from its nutritional utility. By looking at the academic and popular literature, and through a series of looselystructured interviews, this study investigates the range of ideas that people hold about meat in modern Britain for evidence as to what it is that makes animal flesh such an esteemed foodstuff. The principle conclusion is that meat's pre-eminence derives from ...

  5. Quantum direct communication with authentication

    International Nuclear Information System (INIS)

    Lee, Hwayean; Lim, Jongin; Yang, HyungJin

    2006-01-01

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states

  6. Tourist ships on the Danube as an opportunity for export of meat and meat products

    Directory of Open Access Journals (Sweden)

    Tešanović Dragan

    2015-01-01

    Full Text Available Tourism development launches growth of other complementary industries. River tourism, as a special selective tourism form, experiences intensive development, with an importance for all the regions through which the Danube, as an integral part of the Rhine - Main - Danube waterway, flows. During cruising, the largest consumption is achieved on the ship itself, where meat and meat products are an integral element of every meal and represent the most expensive component of the dish. The task of this paper is to analyse the consumption of meat and meat products on six tourist ships run by to 'Grand Circle Corporation' in 2013, in order to point out the possibility of supplying them with meat and meat products from sources in the territory where the ships sail. The paper presents the current suppliers and manufacturers of meat and meat products in Republic of Serbia that could supply the company 'Grand Circle Cruise Line' and other tourist ships that cruise on the Danube. Also, the research indicates that the export of meat products from the Republic Serbia could have a significant effect on improving the agricultural conditions and food production through increased competition, assuming the Serbian manufacturers supply most of tourist ships and not only the six ships analysed in this paper. Research results, specifically, point out the possibility of increasing export of poultry and beef if the potential demand of each of the eight companies with their 54 ships which operate tourist cruises on the Danube is taken into account. The data have been systematized, analysed and presented statistically in tables and graphs.

  7. Authentic Italian food as Mamma used to make it

    DEFF Research Database (Denmark)

    d'Ambrosio, Luigi; Madsen, Jan Halberg

    2014-01-01

    Research description and purpose: The purpose of this investigation is to explore how Italian restaurants define authentic Italian culinary experiences and how these experiences are designed and rendered to the restaurants’ guests. Design/Methodology: The purpose of this research is exploratory...... are unique to this case and cannot be expected replicated, nor generalized. Originality/value: This article investigates how the authentic Italian culinary experience is defined and designed by restaurant owners or managers in the specific context of the city of Aalborg, Denmark. The originality...... of this research resides in the contribution to a better understanding of how authentic experiences are defined and designed at the supply side in the restaurant industry. Moreover, this article takes on a critical perspective on Gilmore and Pine’s genres of authenticity. Keywords: Genres of authenticity, culinary...

  8. Athos: Efficient Authentication of Outsourced File Systems

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Goodrich, Michael T.; Papamanthou, Charalampos

    2008-01-01

    We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated...

  9. Authentication codes from ε-ASU hash functions with partially secret keys

    NARCIS (Netherlands)

    Liu, S.L.; Tilborg, van H.C.A.; Weng, J.; Chen, Kefei

    2014-01-01

    An authentication code can be constructed with a family of e-Almost strong universal (e-ASU) hash functions, with the index of hash functions as the authentication key. This paper considers the performance of authentication codes from e-ASU, when the authentication key is only partially secret. We

  10. Austrian WBC intercomparison by means of a BOMAB phantom

    Energy Technology Data Exchange (ETDEWEB)

    Castellani, C.M.; Battisti, P.; Tarroni [ENEA, Centro Ricerche Ezio Clementel, Bologna (Italy). Dipt. Ambiente; Edelmeier, R. [Bundesamt fuer Eich- und Vermessungswesen, Wien (Austria)

    1998-07-01

    The paper discusses the results obtained in the intercomparison between the Austrian Institute for Legal Metrology and the ENEA (National Agency for New Technology, Energy and the Environment) Institute for Radiation Protection, which gave a BOMAB phantom. Values related to potassium content and MBA (minimum detectable activity) for each identified nuclide are also discussed. [Italian] L'Istituto Austriaco di Metrologia Legale ha organizzato l'interconfronto usando un fantoccio gelificato di tipo BOMAB fornito dall'Istituto di Radioprotezione dell'ENEA nel periodo marzo-giugno 1996. Vengono riportati i risultati ottenuti relativi al contenuto di potassio e all'attivita' minima rilevabile (MDA) per ogni nuclide identificato.

  11. 9 CFR 319.80 - Barbecued meats.

    Science.gov (United States)

    2010-01-01

    ... CERTIFICATION DEFINITIONS AND STANDARDS OF IDENTITY OR COMPOSITION Cooked Meats § 319.80 Barbecued meats. Barbecued meats, such as product labeled “Beef Barbecue” or “Barbecued Pork,” shall be cooked by the direct... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Barbecued meats. 319.80 Section 319.80...

  12. Segregated integration : recent trends in the Austrian gender division of labor

    OpenAIRE

    Kreimer, Margareta; Mora, Ricardo

    2013-01-01

    Using micro data from the Austrian Labor Force Survey, this paper explores how decreases in the gender differential in participation rates together with increasing differentials in the incidence of part-time jobs and stable or rising levels of occupational segregation by gender affect the gender division of labor. To so so, we propose an index for the gender division of labor based on the Mutual Information index. Our main results show that the gender division of labor is very sta...

  13. Association of meat intake and meat-derived mutagen exposure with the risk of colorectal polyps by histologic type

    Science.gov (United States)

    Fu, Zhenming; Shrubsole, Martha J.; Smalley, Walter E.; Wu, Huiyun; Chen, Zhi; Shyr, Yu; Ness, Reid M.; Zheng, Wei

    2011-01-01

    Background The association of meat intake and meat-derived mutagens with colorectal tumor risk remains unclear. We evaluated this hypothesis in a large colonoscopy-based case-control study. Methods Included in the study were 2,543 polyp patients [(1,881 with adenomas, and 622 with hyperplastic polyp (HPP)] and 3,764 polyp-free controls. Surveys obtained information about meat intake by cooking methods and doneness levels plus other suspected or known risk factors for colorectal tumors. Unconditional logistic regression was used to derive odds ratios (ORs) after adjusting for potential confounders. Results High intake of red meat and processed meat (P-trend meat cooked using high-temperature cooking methods (P-trend ≤ 0.01), was associated with an elevated risk for colorectal polyps. A significant positive association between exposures to meat-derived heterocyclic amines and risk of polyps was found for both adenomas and hyperplastic polyps. Furthermore, the positive association with red-meat intake and heterocyclic amine exposure was stronger for multiple adenomas than single adenoma and serrated than non-serrated adenomas. Conclusion This study supports a role for red meat and meat-derived mutagen exposure in the development of colorectal tumor. PMID:21803984

  14. Advances in isotopic analysis for food authenticity testing

    DEFF Research Database (Denmark)

    Laursen, Kristian Holst; Bontempo, L.; Camin, Federica

    2016-01-01

    Abstract Stable isotope analysis has been used for food authenticity testing for more than 30 years and is today being utilized on a routine basis for a wide variety of food commodities. During the past decade, major analytical method developments have been made and the fundamental understanding...... authenticity testing is currently developing even further. In this chapter, we aim to provide an overview of the latest developments in stable isotope analysis for food authenticity testing. As several review articles and book chapters have recently addressed this topic, we will primarily focus on relevant...... literature from the past 5 years. We will focus on well-established methods for food authenticity testing using stable isotopes but will also include recent methodological developments, new applications, and current and future challenges....

  15. The influence of authentic leadership on safety climate in nursing.

    Science.gov (United States)

    Dirik, Hasan Fehmi; Seren Intepeler, Seyda

    2017-07-01

    This study analysed nurses' perceptions of authentic leadership and safety climate and examined the contribution of authentic leadership to the safety climate. It has been suggested and emphasised that authentic leadership should be used as a guidance to ensure quality care and the safety of patients and health-care personnel. This predictive study was conducted with 350 nurses in three Turkish hospitals. The data were collected using the Authentic Leadership Questionnaire and the Safety Climate Survey and analysed using hierarchical regression analysis. The mean authentic leadership perception and the safety climate scores of the nurses were 2.92 and 3.50, respectively. The percentage of problematic responses was found to be less than 10% for only four safety climate items. Hierarchical regression analysis revealed that authentic leadership significantly predicted the safety climate. Procedural and political improvements are required in terms of the safety climate in institutions, where the study was conducted, and authentic leadership increases positive perceptions of safety climate. Exhibiting the characteristics of authentic leadership, or improving them and reflecting them on to personnel can enhance the safety climate. Planning information sharing meetings to raise the personnel's awareness of safety climate and systemic improvements can contribute to creating safe care climates. © 2017 John Wiley & Sons Ltd.

  16. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  17. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  18. Why Context Matters: Social Inclusion and Multilingualism in an Austrian School Setting

    Directory of Open Access Journals (Sweden)

    Ulrike Jessner

    2017-12-01

    Full Text Available This article draws attention to language choice and language use of Austrian bi- and multilingual school children. We explore some implications of their linguistic practices with regard to social inclusion in an Austrian educational school setting. Pursuing a Dynamic Systems and Complexity Theory approach, we hypothesise that before language users actually use a language within a certain context, they have to evaluate the respective communicative situation by taking multiple contextual factors into consideration, meaning language users choose to use, or not to use, a language based on the socio-contextual information at hand. We consider these contextual factors to be most relevant as they provide the basis on which speakers can actually make use of a certain language within a given context. By drawing on examples of empirical data obtained through a language background survey, we examine some of the complex and dynamic interactions of contextual parameters influencing language choice and language use in the formal educational setting of classroom instruction. Based on the results of this study, we display a selection of the dynamic and complex interactions of pupils’ language use in one specific context as well as their language preferences and how these relate to social inclusion.

  19. Development and assessment of healthy properties of meat and meat products designed as functional foods.

    Science.gov (United States)

    Olmedilla-Alonso, Begoña; Jiménez-Colmenero, Francisco; Sánchez-Muniz, Francisco J

    2013-12-01

    This review deals with the two major aspects to be considered in the context of meat-based functional foods and human health. One involves the different strategies used to improve (increase or reduce) the presence of bioactive (healthy and unhealthy) compounds in meat and meat products in order to develop potential meat-based functional foods; these strategies are basically concerned with animal production practices, meat processing and storage, distribution and consumption conditions. Since the link between the consumption of those foods and their potentially beneficial effects (improving health and/or reducing the risk of several chronic diseases) needs to be demonstrated scientifically, the second aspect considered is related to intervention studies to examine the functional capacity of meat-based potentially functional foods in humans, discussing how the functionality of a food can be assessed in terms of its effects on health in relation to both target body functions and risk factors. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. Lay theories of suicide among Austrian psychology undergraduates.

    Science.gov (United States)

    Voracek, Martin; Loibl, Lisa Mariella; Lester, David

    2007-01-01

    Lester and Bean's (1992) Attribution of Causes to Suicide Scale gauges lay theories of suicide including intrapsychic problems, interpersonal conflicts, and societal forces as causes. Results obtained with its German form (n=165 Austrian psychology undergraduates) showed no sex differences and no social-desirability effects. Intriguingly, all three subscales were moderately intercorrelated, thereby indicating respondents' general agreement (or disagreement) with all three theories. Thus, the critical dimension of lay theories of suicide appears to be the belief that suicide has definite causes (regardless of type) versus that it is without causes (unpredictable). In addition, religiosity was positively associated (and overall knowledge about suicide negatively associated) with belief in intrapsychic causes, whereas liberal political views were negatively associated with belief in interpersonal causes.

  1. Authentic leaders creating healthy work environments for nursing practice.

    Science.gov (United States)

    Shirey, Maria R

    2006-05-01

    Implementation of authentic leadership can affect not only the nursing workforce and the profession but the healthcare delivery system and society as a whole. Creating a healthy work environment for nursing practice is crucial to maintain an adequate nursing workforce; the stressful nature of the profession often leads to burnout, disability, and high absenteeism and ultimately contributes to the escalating shortage of nurses. Leaders play a pivotal role in retention of nurses by shaping the healthcare practice environment to produce quality outcomes for staff nurses and patients. Few guidelines are available, however, for creating and sustaining the critical elements of a healthy work environment. In 2005, the American Association of Critical-Care Nurses released a landmark publication specifying 6 standards (skilled communication, true collaboration, effective decision making, appropriate staffing, meaningful recognition, and authentic leadership) necessary to establish and sustain healthy work environments in healthcare. Authentic leadership was described as the "glue" needed to hold together a healthy work environment. Now, the roles and relationships of authentic leaders in the healthy work environment are clarified as follows: An expanded definition of authentic leadership and its attributes (eg, genuineness, trustworthiness, reliability, compassion, and believability) is presented. Mechanisms by which authentic leaders can create healthy work environments for practice (eg, engaging employees in the work environment to promote positive behaviors) are described. A practical guide on how to become an authentic leader is advanced. A research agenda to advance the study of authentic leadership in nursing practice through collaboration between nursing and business is proposed.

  2. A study on user authentication methodology using numeric password and fingerprint biometric information.

    Science.gov (United States)

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  3. Authenticated communication from quantum readout of PUFs

    NARCIS (Netherlands)

    Skoric, Boris; Pinkse, Pepijn Willemszoon Harry; Mosk, Allard

    2016-01-01

    Quantum Readout of Physical Unclonable Functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: a verifier can check if received classical data was sent by the PUF holder. We call this

  4. AIS authentication

    CERN Multimedia

    2006-01-01

    Users are invited to use the NICE password for AIS authentication. As announced in CNL June-August 2006 (see http://www.cerncourier.com/articles/cnl/3/6/14/1) it is possible to use the NICE username and password to log on to AIS. The procedure is now fully operational and users can themselves reset the AIS password such that the NICE password will be used for authentication required by AIS applications. We strongly recommend CERN users who have a NICE account (this is the case of most users) to do this, with the objective to reduce the number of passwords they need to remember. This can be achieved very easily, directly from the Change Password option on the AIS login (https://aislogin.cern.ch/). Users should just select the '[Change Password]' option displayed at the bottom of the page, provide the 'Old Password' and then click on the button 'Use Nice password' followed by 'Submit'. Change Password option on the AIS login windowSetting the AIS password - Use Nice Password It should be noted that the proce...

  5. Pre-Authentication Schemes for UMTS-WLAN Interworking

    Directory of Open Access Journals (Sweden)

    Ali Al Shidhani

    2009-01-01

    Full Text Available Interworking Universal Mobile Telecommunication System (UMTS and IEEE 802.11 Wireless Local Area Networks (WLANs introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS of the applications running on the User Equipment (UE. There is a need to design fast and secured handover protocols to operate in UMTS-WLAN interworking architectures. This paper proposes two secured pre-authentication protocols in the UMTS-WLAN interworking architectures. Performance analysis of the proposed protocols show superior results in comparison to existing protocols in terms of authentication signaling cost, authentication delay and load on critical nodes involved in the authentication procedure. Additionally, the security of the proposed protocols was verified by the Automated Validation of Internet Security Protocols and Applications (AVISPA security analyzer.

  6. Effect of radiation processing on meat tenderisation

    International Nuclear Information System (INIS)

    Kanatt, Sweetie R.; Chawla, S.P.; Sharma, Arun

    2015-01-01

    The effect of radiation processing (0, 2.5, 5 and 10 kGy) on the tenderness of three types of popularly consumed meat in India namely chicken, lamb and buffalo was investigated. In irradiated meat samples dose dependant reduction in water holding capacity, cooking yield and shear force was observed. Reduction in shear force upon radiation processing was more pronounced in buffalo meat. Protein and collagen solubility as well as TCA soluble protein content increased on irradiation. Radiation processing of meat samples resulted in some change in colour of meat. Results suggested that irradiation leads to dose dependant tenderization of meat. Radiation processing of meat at a dose of 2.5 kGy improved its texture and had acceptable odour. - Highlights: • Effect of radiation processing on tenderness of three meat systems was evaluated. • Dose dependant reduction in shear force seen in buffalo meat. • Collagen solubility increased with irradiation

  7. 9 CFR 319.311 - Chow mein vegetables with meat, and chop suey vegetables with meat.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Chow mein vegetables with meat, and chop suey vegetables with meat. 319.311 Section 319.311 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY...

  8. Are meat substitutes liked better over time? A repeated in-home use test with meat substitutes or meat in meals

    NARCIS (Netherlands)

    Hoek, A.C.; Elzerman, J.E.; Hageman, R.; Kok, F.J.; Luning, P.A.; Graaf, de C.

    2013-01-01

    The overall aim of this study was to explore long-term consumer acceptance of new environmentally sustainable alternatives to meat. We investigated whether meat substitutes, which are relatively new food products, would be better appreciated after repeated consumption. Eighty-nine non-vegetarian

  9. FPGA Authentication Methods.

    Energy Technology Data Exchange (ETDEWEB)

    Brotz, Jay Kristoffer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hymel, Ross W [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Punnoose, Ratish J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mannos, Tom [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Grant, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom); Evans, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom)

    2017-05-01

    One of the greatest challenges facing designers of equipment to be used in a nuclear arms control treaty is how to convince the other party in the treaty to trust its results and functionality. Whether the host provides equipment meant to prove treaty obligations and the inspector needs to gain that trust (commonly referred to as authentication), or the inspector provides this equipment and the host needs to gain this trust (commonly considered to be included in certification), one party generally has higher confidence in the equipment at the start of a treaty regime and the other party needs to gain that confidence prior to use. While we focus on authentication in this document—that is, the inspector gaining confidence in host-provided equipment—our conclusions will likely apply to host certification of inspector-provided equipment.

  10. A Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication

    Directory of Open Access Journals (Sweden)

    Susan Gottschlich

    2017-12-01

    Full Text Available Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the user is authorized to access. While multiple authentication steps, known as multifactor authentication, are being used more widely throughout the military, government, businesses, and consumer sectors, the selection and implementation of which authentication factors to require is typically defined by security policy. Security policy is in turn typically established by a security organization that may have no formal metrics or means to guide its selection of authentication factors. This paper will present a taxonomy for describing authentication factors including important attributes that characterize authentication robustness to aid in the selection of factors that are consistent with the user’s mission. One particular authentication factor that I have developed will be discussed in the context of this taxonomy to motivate the need to broaden current definitions and security policies. The ultimate goal of this paper is to inspire the development of standards for authentication technologies to both support mission aware authentication innovation and to inform decision making about security policies concerning user authentication and authorization. Further, this paper aims to demonstrate that such an approach will fundamentally enhance both security and usability of increasingly networked, software-defined devices, equipment and software applications.

  11. Meat Consumption Culture in Ethiopia

    Science.gov (United States)

    Jo, Cheorun

    2014-01-01

    The consumption of animal flesh food in Ethiopia has associated with cultural practices. Meat plays pivotal and vital parts in special occasions and its cultural symbolic weight is markedly greater than that accorded to most other food. Processing and cooking of poultry is a gender based duty and has socio-cultural roles. Ethiopians are dependent on limited types of animals for meats due to the taboo associated culturally. Moreover, the consumption of meat and meat products has a very tidy association with religious beliefs, and are influenced by religions. The main religions of Ethiopia have their own peculiar doctrines of setting the feeding habits and customs of their followers. They influence meat products consumption through dictating the source animals that should be used or not be used for food, and scheduling the days of the years in periodical permeation and restriction of consumptions which in turn influences the pattern of meat consumption in the country. In Ethiopia, a cow or an ox is commonly butchered for the sole purpose of selling within the community. In special occasions, people have a cultural ceremony of slaughtering cow or ox and sharing among the group, called Kircha, which is a very common option of the people in rural area where access of meat is challenging frequently. PMID:26760739

  12. Polina Fedorova, About Camel Meat

    OpenAIRE

    Gedeeva, Darina; Babaev, Andrei

    2016-01-01

    In the past, the Kalmyks ate beef and horse meat. The poor ate camel meat. People who ate camel meat had pimples on their faces. The camel’s pelt and humps were used to make vessels. The intestines were cleaned, stretched and dried. It was used to make strings for dombra instruments. Arcadia

  13. RESEARCH ON CONSUMER BEHAVIOUR ON BUCHAREST MEAT MARKET

    Directory of Open Access Journals (Sweden)

    Agatha POPESCU

    2013-01-01

    Full Text Available The paper aimed to analyze consumer behavior for meat on Bucharest market, using a sample of 100 individuals, representatives as age, sex and profession, who were interviewed within a structured questionaire based survey on their preference to buy and consume meat. The answers were processed using the semantic differential and Likert Scale. The obtained results pointed out that white meat is the top preference, because it is healthier and its price is more acceptable compared to red meat. However, men prefer red meat, no matter its price. The most prefered meat sorts in order of their importance are chicken meat, pork and beef. Consumers prefer to buy 1-2 kg fresh meat from supermarket every 2-3 days. Income/family and meat pice are the major factors limiting the amount of consumed meat and buying frequence. The term of availability and meat origin have become more and more important criteria on which buying decision is based, besides meat quality. All consumers prefer to consume Romanian meat which is tasty and has a pleasant flavor. As a conclusion, consumers expectations from meat producers are related to a large variety of meat of a higher quality. Also, presentation form in packed portionated meat parts on the shelf as wellas hygiene come on the next positions from consumers side in order to satisfy their needs better.

  14. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    Directory of Open Access Journals (Sweden)

    Seung-hwan Ju

    2013-01-01

    Full Text Available The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  15. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    Science.gov (United States)

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  16. Strengthening Authentication

    Science.gov (United States)

    Gale, Doug

    2007-01-01

    The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…

  17. Technological aspects of horse meat products - A review.

    Science.gov (United States)

    Lorenzo, José M; Munekata, Paulo E S; Campagnol, Paulo Cezar Bastianello; Zhu, Zhenzhou; Alpas, Hami; Barba, Francisco J; Tomasevic, Igor

    2017-12-01

    Horse meat and its products can be considered as a food with a high nutritional value. However, due to cases of economically motivated food adulteration by the intentional addition of horse meat beef products in recent years, horse meat has become a controversial issue. Consumer confidence in meat products and the meat industry has diminished, although consumers consider the differences between the food content and the label as the major issue rather than the safety and nutritional characteristics of horse meat. The elaboration of meat products from horse meat (e.g. "cecina", dry-cured loin, salami, bressaola and pâté) is also an interesting alternative to other traditional meat products such as dry-cured pork hams, pork sausages and liver pâtés. In this review, the technological aspects, safety and storage stability of meat products elaborated from horse meat will be addressed by highlighting the nutritional and sensory aspects of these meat products. We aim to improve the existing knowledge about horse meat in the view of recent scandals. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Infusing Authentic Inquiry into Biotechnology

    Science.gov (United States)

    Hanegan, Nikki L.; Bigler, Amber

    2009-10-01

    Societal benefit depends on the general public's understandings of biotechnology (Betsch in World J Microbiol Biotechnol 12:439-443, 1996; Dawson and Cowan in Int J Sci Educ 25(1):57-69, 2003; Schiller in Business Review: Federal Reserve Bank of Philadelphia (Fourth Quarter), 2002; Smith and Emmeluth in Am Biol Teach 64(2):93-99, 2002). A National Science Foundation funded survey of high school biology teachers reported that hands-on biotechnology education exists in advanced high school biology in the United States, but is non-existent in mainstream biology coursework (Micklos et al. in Biotechnology labs in American high schools, 1998). The majority of pre-service teacher content preparation courses do not teach students appropriate content knowledge through the process of inquiry. A broad continuum exists when discussing inquiry-oriented student investigations (Hanegan et al. in School Sci Math J 109(2):110-134, 2009). Depending on the amount of structure in teacher lessons, inquiries can often be categorized as guided or open. The lesson can be further categorized as simple or authentic (Chinn and Malhotra in Sci Educ 86(2):175-218, 2002). Although authentic inquiries provide the best opportunities for cognitive development and scientific reasoning, guided and simple inquiries are more often employed in the classroom (Crawford in J Res Sci Teach 37(9):916-937, 2000; NRC in Inquiry and the national science education standards: a guide for teaching and learning, 2000). For the purposes of this study we defined inquiry as "authentic" if original research problems were resolved (Hanegan et al. in School Sci Math J 109(2):110-134, 2009; Chinn and Malhotra in Sci Educ 86(2):175-218, 2002; Roth in Authentic school science: knowing and learning in open-inquiry science laboratories, 1995). The research question to guide this study through naturalistic inquiry research methods was: How will participants express whether or not an authentic inquiry experience enhanced

  19. Towards a reduced meat diet: Mindset and motivation of young vegetarians, low, medium and high meat-eaters.

    Science.gov (United States)

    de Boer, Joop; Schösler, Hanna; Aiking, Harry

    2017-06-01

    This study provides insight into differences and similarities in the mindset and motivation of four dietary groups (young self-declared vegetarians, low, medium and high meat-eaters) to support the development of strategies for a general transition to a less meat-based diet. The paper highlights the value of the identity concept for our understanding of both vegetarians and meat eaters. The analysis involves a comparison of the four dietary groups focusing on the strength and the profile of their food-related motivation and their reasons for and against frequent meat eating. To check for the generalizability of the results, the analyses were performed in two samples of adults (aged 18-35) in the Netherlands (native Dutch, n = 357, and second generation Chinese Dutch, n = 350). In both samples, the vegetarians had the same level of food-related motivation as the other groups, but a different motivational profile and distinctive, taste- and animal-welfare related reasons to justify their abstinence from eating meat. The low and medium meat-eaters often considered health a reason to eat meat as well as to moderate meat eating, plus they liked to vary their meals. In these aspects they were different from both the vegetarians and the high meat-eaters. The findings are relevant for (non) governmental organizations that aim to influence dietary choices, as well as for businesses that operate in the market of meat substitutes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Design of a Super-Pixel-Based Quantum Secure Authentication Demonstrator

    NARCIS (Netherlands)

    Toebes, Chris; Tentrup, Tristan B.H.; Pinkse, Pepijn W.H.

    2017-01-01

    Quantum Secure Authentication (QSA) is a method recently developed to authenticate a multiple-scattering key [1]. Previous implementations only showed proof-of-principle setups. We present a design of a compact and robust demonstration device for Quantum Secure Authentication. The challenge and

  1. Authenticating a tamper-resistant module in a base station router

    NARCIS (Netherlands)

    Bosch, H.G.P.; Kraml, M.; Mullender, Sape J.; Polakos, P.; Samuel, L.G.

    2007-01-01

    The present invention provides a method involving a tamper-resistant module and an authentication server. The method includes receiving, at the tamper-resistant module, information encrypted using a first secret key stored in the authentication server. The method also includes authenticating the

  2. Authentic tasks in higher education: Studying design principles for assessment

    NARCIS (Netherlands)

    van Keulen, H.; van den Berg, I.; Ramaekers, S.

    2006-01-01

    Students may benefit significantly from learning through authentic tasks. But how do we assess their learning outcomes, taking into account the specific characteristics of authentic tasks? In the second presentation of this symposium on design principles for authentic tasks we present and discuss

  3. An Insight of Meat Industry in Pakistan with Special Reference to Halal Meat: A Comprehensive Review

    OpenAIRE

    Sohaib, Muhammad; Jamil, Faraz

    2017-01-01

    Livestock is considered central component in agricultural sector of Pakistan, provides employment to more than 8 million families. Meat and meat products holds pivotal significance in meeting dietary requirements serving as major protein source and provide essential vitamins and minerals. Globally, consumer demand is increasing for healthy, hygienic and safe meat and meat products due to growing population, income level and food choices. As, food choices are mainly influenced by region, relig...

  4. Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

    OpenAIRE

    Lee, Wei-Han; Lee, Ruby B.

    2017-01-01

    Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the...

  5. A process for supporting risk-aware web authentication mechanism choice

    International Nuclear Information System (INIS)

    Renaud, Karen

    2007-01-01

    Web authentication is often treated as a one-size-fits-all problem with ubiquitous use of the password. Indeed, authentication is seldom tailored to the needs of either the site or the target users. This paper does an in-depth analysis of all the vulnerabilities of authentication mechanisms, and proposes a structured and simple process which, if followed, will enable developers to choose a web authentication mechanism so that it matches the needs of their particular site

  6. Screen Fingerprints as a Novel Modality for Active Authentication

    Science.gov (United States)

    2014-03-01

    Screen fingerprint is the new cyber biometric modality that we have proposed to measure and analyze active authentication. The screen finger ...as a new biometric modality for active authentication. Such a fingerprint is acquired by taking a screen recording of the computer being used and...extracting discriminative visual feature from the recording. 15. SUBJECT TERMS Active authentication, screen fingerprints, biometrics 16. SECURITY

  7. Authentication systems for securing clinical documentation workflows. A systematic literature review.

    Science.gov (United States)

    Schwartze, J; Haarbrandt, B; Fortmeier, D; Haux, R; Seidel, C

    2014-01-01

    Integration of electronic signatures embedded in health care processes in Germany challenges health care service and supply facilities. The suitability of the signature level of an eligible authentication procedure is confirmed for a large part of documents in clinical practice. However, the concrete design of such a procedure remains unclear. To create a summary of usable user authentication systems suitable for clinical workflows. A Systematic literature review based on nine online bibliographic databases. Search keywords included authentication, access control, information systems, information security and biometrics with terms user authentication, user identification and login in title or abstract. Searches were run between 7 and 12 September 2011. Relevant conference proceedings were searched manually in February 2013. Backward reference search of selected results was done. Only publications fully describing authentication systems used or usable were included. Algorithms or purely theoretical concepts were excluded. Three authors did selection independently. DATA EXTRACTION AND ASSESSMENT: Semi-structured extraction of system characteristics was done by the main author. Identified procedures were assessed for security and fulfillment of relevant laws and guidelines as well as for applicability. Suitability for clinical workflows was derived from the assessments using a weighted sum proposed by Bonneau. Of 7575 citations retrieved, 55 publications meet our inclusion criteria. They describe 48 different authentication systems; 39 were biometric and nine graphical password systems. Assessment of authentication systems showed high error rates above European CENELEC standards and a lack of applicability of biometric systems. Graphical passwords did not add overall value compared to conventional passwords. Continuous authentication can add an additional layer of safety. Only few systems are suitable partially or entirely for use in clinical processes. Suitability

  8. Microbial analysis of meat and meat products sold in fast food ...

    African Journals Online (AJOL)

    The present study was carried out to investigate the rate of microbial contamination of ready-to-eat meat and meat products sold in different fast food restaurants in Aba. This study was carried out between June and August, 2015. Samples were collected aseptically from five fast food restaurants using sterile polythene bags.

  9. Coming together but staying apart: continuity and change in the Austrian and Swiss varieties of capitalism

    NARCIS (Netherlands)

    Afonso, A.; Mach, A.; Becker, U.

    2011-01-01

    This paper provides an overview of continuity and change in the Swiss and Austrian political economies over the last 20 years. After outlining the different institutional foundations of economic governance in both countries (fragmented state, constrained executive power and bourgeois dominance in

  10. Authentication Binding between SSL/TLS and HTTP

    Science.gov (United States)

    Saito, Takamichi; Sekiguchi, Kiyomi; Hatsugai, Ryosuke

    While the Secure Socket Layer or Transport Layer Security (SSL/TLS) is assumed to provide secure communications over the Internet, many web applications utilize basic or digest authentication of Hyper Text Transport Protocol (HTTP) over SSL/TLS. Namely, in the scheme, there are two different authentication schemes in a session. Since they are separated by a layer, these are not convenient for a web application. Moreover, the scheme may also cause problems in establishing secure communication. Then we provide a scheme of authentication binding between SSL/TLS and HTTP without modifying SSL/TLS protocols and its implementation, and we show the effectiveness of our proposed scheme.

  11. Physicochemical properties of meat of ducks of mulberries in modern technologies of meat products

    Directory of Open Access Journals (Sweden)

    R. F. Galin

    2017-01-01

    Full Text Available The article presents the results of studying the chemical composition of mullards duck meat in comparison with the ducks of the Beijingg white breed and musk ducks. The chemical analysis results allow us to note the high moisture content for mullard duck meat. The low fat content for white and red mullard duck meat opens up wide opportunities for the development of an assortment of meat products with a functional orientation. The limited amino acids are determined. The total number of essential amino acids in the mullard duck meat is higher than in musk (by 1.02 g / 100 g protein and Beijingg (by 0.86 g / 100 g protein, which indicates a higher biological value. The limiting amino acid is methionine and cysteine. The article presents the results of the raw material aroma assessment using the "MAG 8" - "electronic nose" analyzer. The content of easily volatile compounds in the equilibrium gas phase for samples of muscle and fat tissue from ducks of different breeding was compared and evaluated. The most informative in the matrix are sensors with films of polydiethylene glycol succinate, polyvinylpyrrolidone, polyethylene glycol PEG-2000, 18-crown-6, trioctylphosphine oxidase, which show maximum sensitivity to polar and nitrogen-containing compounds, aromatic hydrocarbons. This is explained by the fact that the easily volatile fraction of both meat and fat of the samples under study is represented by a variety of organic compounds of different concentrations. Such a variety of substances can be perceived by tasters as "a noticeable smell, difficult". In accordance with the results obtained, we concluded that the aroma of muscle and fat tissue of mulard ducks is more intense, more saturated than the Beijingg duck. The obtained data on the chemical composition indicate possible dietary properties of meat of ducks of mullards. The rich, pronounced aroma of muscle and fatty tissue causes high organoleptic parameters of the finished product, which is

  12. UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts

    Directory of Open Access Journals (Sweden)

    Yazhe Wang

    2015-10-01

    Full Text Available In this paper we present UAuth, a two-layer authentication framework that provides more security assurances than two-factor authentication while offering a simpler authentication experience. When authenticating, users first verified their static credentials (such as password, fingerprint, etc. on their devices to achieve the local-layer authentication, then submit the OTP-signed response generated by their device to the server to complete the server-layer authentication. We also propose the three-level account association mechanism, which establishes the association among devices, users and services, and then creates a mapping from user’s devices to user’s accounts. Users can gain access to different service via any device in the association easily. Our goal is to provide a quick and convenient SSO-like login process on the basis of security authentication. To meet the goal, we implement our UAuth, and evaluate our designs.

  13. Defining the questions: a research agenda for nontraditional authentication in arms control

    Energy Technology Data Exchange (ETDEWEB)

    Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  14. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Science.gov (United States)

    2010-04-01

    ... authentication. 1311.115 Section 1311.115 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE... Additional requirements for two-factor authentication. (a) To sign a controlled substance prescription, the... authentication protocol that uses two of the following three factors: (1) Something only the practitioner knows...

  15. 36 CFR 1275.66 - Reproduction and authentication of other materials.

    Science.gov (United States)

    2010-07-01

    ... authentication of other materials. 1275.66 Section 1275.66 Parks, Forests, and Public Property NATIONAL ARCHIVES... Reproduction and authentication of other materials. (a) Copying of materials, including tape recordings... materials when necessary for the purpose of the research. (c) The fees for reproduction and authentication...

  16. Authentic leadership: a new theory for nursing or back to basics?

    Science.gov (United States)

    Wong, Carol; Cummings, Greta

    2009-01-01

    Authentic leadership is an emerging theoretical model purported to focus on the root component of effective leadership. The purpose of this paper is to describe the relevance of authentic leadership to the advancement of nursing leadership practice and research and address the question of whether this is a new theory for leadership or an old one in new packaging. The paper outlines the origins and key elements of the model, assesses the theoretical, conceptual and measurement issues associated with authentic leadership and compares it with other leadership theories frequently reported in the nursing literature. The emerging authentic leadership theory holds promise for explaining the underlying processes by which authentic leaders and followers influence work outcomes and organizational performance. Construct validity of authentic leadership has preliminary documentation and a few studies have shown positive relationships between authenticity and trust. Furthermore, the clarity of the authenticity construct and comprehensiveness of the overall theoretical framework provide a fruitful base for future research examining the relationship between authentic leadership and the creation of healthier work environments. A clear focus on the relational aspects of leadership, the foundational moral/ethical component, a potential linkage of positive psychological capital to work engagement and the emphasis on leader and follower development in the authentic leadership framework are closely aligned to current and future nursing leadership practice and research priorities for the creation of sustainable changes in nursing work environments.

  17. Authenticity in the Teaching of ESP: An Evaluation Proposal

    Directory of Open Access Journals (Sweden)

    María Luisa Pérez Cañado

    2015-10-01

    Full Text Available Although authentic materials are a very rich source for the selection of teaching materials in the field of ESP (English for Specific Purposes in general and of Business English in particular, the ultimate purpose should be authentic communication between the text (oral or written and its recipient as a result of the interpretation brought to the text by the latter. To speak of authenticity implies therefore a dual focus: that of “authentic material” and that of “authenticity”. The literature in the field is vast and deserves an in-depth analysis, as in many cases the previous terms are treated as synonyms. Thus, an original proposal for the evaluation of authenticity is called for, an aspect rarely considered in the evaluation of teaching materials. This proposal will build upon a review of the literature on authenticity, as well as on the most important proposals for the evaluation of teaching materials. The proposal set forth in this paper is completed with a checklist which integrates the consideration of the inherent characteristics in the material being evaluated, together with the teacher’s view on this score.

  18. Longissimus muscle transcriptome profiles related to carcass and meat quality traits in fresh meat Pietrain carcasses

    NARCIS (Netherlands)

    Pas, te M.F.W.; Keuning, E.; Hulsegge, B.; Hoving-Bolink, A.H.; Evans, G.; Mulder, H.A.

    2010-01-01

    High quality pork is consumed as fresh meat while other carcasses are used in the processing industry. Meat quality is determined measuring technical muscle parameters. The objective of this research was to investigate the molecular regulatory mechanisms underlying meat quality differences of pork

  19. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  20. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.