WorldWideScience

Sample records for austrian meat authenticity

  1. Halal authenticity issues in meat and meat products.

    Science.gov (United States)

    Nakyinsige, Khadijah; Man, Yaakob Bin Che; Sazili, Awis Qurni

    2012-07-01

    In the recent years, Muslims have become increasingly concerned about the meat they eat. Proper product description is very crucial for consumers to make informed choices and to ensure fair trade, particularly in the ever growing halal food market. Globally, Muslim consumers are concerned about a number of issues concerning meat and meat products such as pork substitution, undeclared blood plasma, use of prohibited ingredients, pork intestine casings and non-halal methods of slaughter. Analytical techniques which are appropriate and specific have been developed to deal with particular issues. The most suitable technique for any particular sample is often determined by the nature of the sample itself. This paper sets out to identify what makes meat halal, highlight the halal authenticity issues that occur in meat and meat products and provide an overview of the possible analytical methods for halal authentication of meat and meat products. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Significance of authenticity in meat and meat products in Iran

    Directory of Open Access Journals (Sweden)

    Tahereh Rezazadeh

    2014-06-01

    Full Text Available The Authenticity of meat products is very important for religious and health reasons in Iran. According to legislation in Iran, the consumption and importation of pork, horse, donkey and cat products should be banned. Therefore, the identification of meat products cannot be judged solely by its appearance. This issue led to the authenticity of bovine, sheep, pig, horse, donkey, chicken and soya (Glycine max in raw and processed meat products.In this study, specific primers were designed for the identification of pig ( base pair, donkey (325 base pair, chicken (391 base pair, sheep (499 base pair, horse (607 base pair, soya (707 base pair and bovine (853 base pair by Polymerase chain reaction. Following PCR, expected,, , 499,,  and  base pair fragments were detectable in pig, donkey, chicken, sheep, horse, soya and bovine, respectively. This protocol can be used for identification of raw and processed meat products in various animal species for replication to regulatory obligations for meat species safety in Iran.

  3. Game meat authentication through rare earth elements fingerprinting

    International Nuclear Information System (INIS)

    Danezis, G.P.; Pappas, A.C.; Zoidis, E.; Papadomichelakis, G.; Hadjigeorgiou, I.; Zhang, P.; Brusic, V.; Georgiou, C.A.

    2017-01-01

    Accurate labelling of meat (e.g. wild versus farmed, geographical and genetic origin, organic versus conventional, processing treatment) is important to inform the consumers about the products they buy. Meat and meat products declared as game have higher commercial value making them target to fraudulent labelling practices and replacement with non-game meat. We have developed and validated a new method for authentication of wild rabbit meat using elemental metabolomics approach. Elemental analysis was performed using rapid ultra-trace multi-element measurement by inductively coupled plasma mass spectrometry (ICP-MS). Elemental signatures showed excellent ability to discriminate the wild rabbit from non-wild rabbit meat. Our results demonstrate the usefulness of metabolic markers -rare earth signatures, as well as other trace element signatures for game meat authentication. - Highlights: • Elemental metabolomics is a powerful new methodology for authentication of game rabbit meat. • New method for meat authentication utilizing rare earths elemental signatures. • Samples are compared to group signatures using angular and Euclidean distances. • Meat reference materials (>70 elements) can be used for cross-comparison between studies.

  4. Game meat authentication through rare earth elements fingerprinting.

    Science.gov (United States)

    Danezis, G P; Pappas, A C; Zoidis, E; Papadomichelakis, G; Hadjigeorgiou, I; Zhang, P; Brusic, V; Georgiou, C A

    2017-10-23

    Accurate labelling of meat (e.g. wild versus farmed, geographical and genetic origin, organic versus conventional, processing treatment) is important to inform the consumers about the products they buy. Meat and meat products declared as game have higher commercial value making them target to fraudulent labelling practices and replacement with non-game meat. We have developed and validated a new method for authentication of wild rabbit meat using elemental metabolomics approach. Elemental analysis was performed using rapid ultra-trace multi-element measurement by inductively coupled plasma mass spectrometry (ICP-MS). Elemental signatures showed excellent ability to discriminate the wild rabbit from non-wild rabbit meat. Our results demonstrate the usefulness of metabolic markers -rare earth signatures, as well as other trace element signatures for game meat authentication. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. In-gel and OFFGEL-based proteomic approach for authentication of meat species from minced meat and meat products.

    Science.gov (United States)

    Naveena, Basappa M; Jagadeesh, Deepak S; Kamuni, Veeranna; Muthukumar, Muthupalani; Kulkarni, Vinayak V; Kiran, Mohan; Rapole, Srikanth

    2018-02-01

    Fraudulent mislabelling of processed meat products on a global scale that cannot be detected using conventional techniques necessitates sensitive, robust and accurate methods of meat authentication to ensure food safety and public health. In the present study, we developed an in-gel (two-dimensional gel electrophoresis, 2DE) and OFFGEL-based proteomic method for authenticating raw and cooked water buffalo (Bubalus bubalis), sheep (Ovis aries) and goat (Caprus hircus) meat and their mixes. The matrix-assisted liquid desorption/ionization time-of-flight mass spectrometric analysis of proteins separated using 2DE or OFFGEL electrophoresis delineated species-specific peptide biomarkers derived from myosin light chain 1 and 2 (MLC1 and MLC2) of buffalo-sheep-goat meat mix in definite proportions at 98:1:1, 99:0.5:0.5 and 99.8:0.1:0.1 that were found stable to resist thermal processing. In-gel and OFFGEL-based proteomic approaches are efficient in authenticating meat mixes spiked at minimum 1.0% and 0.1% levels, respectively, in triple meat mix for both raw and cooked samples. The study demonstrated that authentication of meat from a complex mix of three closely related species requires identification of more than one species-specific peptide due to close similarity between their amino acid sequences. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  6. Authentic sheep meat in the European Union: Factors influencing and validating its unique meat quality.

    Science.gov (United States)

    Erasmus, Sara W; Muller, Magdalena; Hoffman, Louwrens C

    2017-05-01

    Authentic meat products are gaining attention through their unique quality characteristics linked to their origin. Various factors are known to influence the quality of fresh meat. This review describes the different Protected Designation of Origin (PDO) and Protected Geographical Indication (PGI) lamb types and discusses the factors which influences its unique sensory and chemical characteristics. Flavour, aroma, texture and colour play an integral part in the sensory quality of denomination of origin fresh meat products. For authentic fresh sheep meat the sensory (as well as chemical) quality is largely influenced by diet followed by breed, age and gender. However, diet forms the link with the geographical area of origin, which together with the traditional production system and sheep breeds used, lends the product its authentic nature. This review shows how diet linked to origin can affect the quality of the meat and furthermore how other factors such as breed can also have an effect. Research relating to the authentic lamb types were evaluated and the shortcomings highlighted in order to assist with the development of PDO and PGI specifications in the future. © 2016 Society of Chemical Industry. © 2016 Society of Chemical Industry.

  7. Meat species identification and Halal authentication analysis using mitochondrial DNA.

    Science.gov (United States)

    Murugaiah, Chandrika; Noor, Zainon Mohd; Mastakim, Maimunah; Bilung, Lesley Maurice; Selamat, Jinap; Radu, Son

    2009-09-01

    A method utilizing PCR-restriction fragment length polymorphism (RFLP) in the mitochondrial genes was developed for beef (Bos taurus), pork (Sus scrofa), buffalo (Bubalus bubali), quail (Coturnix coturnix), chicken (Gallus gallus), goat (Capra hircus), rabbit (Oryctolagus cuniculus) species identification and Halal authentication. PCR products of 359-bp were successfully obtained from the cyt b gene of these six meats. AluI, BsaJI, RsaI, MseI, and BstUI enzymes were identified as potential restriction endonucleases to differentiate the meats. The genetic differences within the cyt b gene among the meat were successfully confirmed by PCR-RFLP. A reliable typing scheme of species which revealed the genetic differences among the species was developed.

  8. Authentication of traditional game meat products by the use of species-specific PCR

    OpenAIRE

    Santos, Cristina; Melo, Vítor S.; Mafra, I.; Amaral, J.S.; Estevinho, Leticia M.; Oliveira, M.B.P.P.

    2011-01-01

    Authenticity evaluation in meat products encompasses many issues, including the fraudulent substitution of higher commercial valued meats by cheaper meats and the presence of undeclared species. Due to its characteristic and intensive flavour and its healthier composition, game meats are considered as delicacy products and command higher prices compared to other meats, thus being susceptible targets for frauds. The manufacture of traditional meat products is a long-established practice in ...

  9. Label Authentication of Minced Meat by Automated Near Infrared Spectroscopy

    Science.gov (United States)

    Inspections are needed for minced meat because physical characteristics cannot be used to identify its content in terms of meat species or part, i.e. pork, chicken, beef, bacon, shank or internal organs. In addition, a rapid technique to verify meat labels in the viewpoint of nutritional content and...

  10. Where is the game? Wild meat products authentication in South Africa: a case study

    OpenAIRE

    D?Amato, Maria Eugenia; Alechine, Evguenia; Cloete, Kevin Wesley; Davison, Sean; Corach, Daniel

    2013-01-01

    Background Wild animals? meat is extensively consumed in South Africa, being obtained either from ranching, farming or hunting. To test the authenticity of the commercial labels of meat products in the local market, we obtained DNA sequence information from 146 samples (14 beef and 132 game labels) for barcoding cytochrome c oxidase subunit I and partial cytochrome b and mitochondrial fragments. The reliability of species assignments were evaluated using BLAST searches in GenBank, maximum lik...

  11. Authentication of Meat Species in Sucuk by Multiplex PCR

    Directory of Open Access Journals (Sweden)

    Osman İrfan İLHAK

    2015-01-01

    Full Text Available The identification of meat species used in meat products is important by reason of economic considerations, religious factors, verification of label, and prevention of unfair-market competition. In this paper, multiplex PCR method was experienced for routine detection of equine (horse and donkey, poultry (chicken and turkey, pig and cattle meat in sucuk (sausage. The primers used for these animals generated specific fragments, and they did not show cross reactions with the DNA from the other genus of animal. After multiplex PCR was successfully optimized, a field study was carried out to investigate the presence of horse, donkey, chicken, turkey and pig meat in 50 sucuks (30 beef and 20 beef + poultry collected from markets. The result of the field study indicated that 23.3% of 30 beef sucuk samples were containing poultry meat. None of the 50 sucuk samples was containing pig meat, but one (2% of the samples generated equine fragment. The present study showed that the multiplex PCR method can be used for routine analysis of meat species identification, verification and control of label information of meat products.

  12. Authentication of meat and meat products vs. detection of animal species in feed - what is the difference?

    Science.gov (United States)

    Nešić, K.; Stojanović, D.; Baltić, Ž. M.

    2017-09-01

    Authenticity of food is an issue that is growing in awareness and concern. Although food adulteration has been present since antiquity, it has broadened to include entire global populations as modern food supply chains have expanded, enriched and become more complex. Different forms of adulteration influence not only the quality of food products, but also may cause harmful health effects. Meat and meat products are often subjected to counterfeiting, mislabelling and similar fraudulent activities, while substitutions of meat ingredients with other animal species is one among many forms of food fraud. Feed is also subject to testing for the presence of different animal species, but as part of the eradication process of transmissible spongiform encephalopathies (TSE). In both food and feed cases, the final goal is consumer protection, which should be provided by quick, precise and specific tools. Several analytical tests have been employed for such needs. This paper provides an overview of authentication of meat and meat products compared with species identification in feed control, highlighting the most prevalent laboratory methods.

  13. OFFGEL electrophoresis and tandem mass spectrometry approach compared with DNA-based PCR method for authentication of meat species from raw and cooked ground meat mixtures containing cattle meat, water buffalo meat and sheep meat.

    Science.gov (United States)

    Naveena, Basappa M; Jagadeesh, Deepak S; Jagadeesh Babu, A; Madhava Rao, T; Kamuni, Veeranna; Vaithiyanathan, S; Kulkarni, Vinayak V; Rapole, Srikanth

    2017-10-15

    The present study compared the accuracy of an OFFGEL electrophoresis and tandem mass spectrometry-based proteomic approach with a DNA-based method for meat species identification from raw and cooked ground meat mixes containing cattle, water buffalo and sheep meat. The proteomic approach involved the separation of myofibrillar proteins using OFFGEL electrophoresis, SDS-PAGE and protein identification by MALDI-TOF MS. Species-specific peptides derived from myosin light chain-1 and 2 were identified for authenticating buffalo meat spiked at a minimum 0.5% level in sheep meat with high confidence. Relative quantification of buffalo meat mixed with sheep meat was done by quantitative label-free mass spectrometry using UPLC-QTOF and PLGS search engine to substantiate the confidence level of the data. In the DNA-based method, PCR amplification of mitochondrial D loop gene using species specific primers found 226bp and 126bp product amplicons for buffalo and cattle meat, respectively. The method was efficient in detecting a minimum of 0.5% and 1.0% when buffalo meat was spiked with cattle meat in raw and cooked meat mixes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Control of Authenticity and Geographic Origin of Austrian, Slovenian, Romanian, Montenegrin and Argentinean wine

    Science.gov (United States)

    Horacek, Micha; Papesch, Wolfgang; Ogrinc, Nives; Magdas, Alina; Wunderlin, Daniel; Misurovic, Ana

    2014-05-01

    Consumers are willing to pay elevated prices for specific product qualities, e.g. for food from a certain region, thus there is the need to control the correct declaration of origin of these products. Conventionally this is done by estimating the flow of goods and by controlling the documentation accompanying the products. However, this means are often not sufficient to detect intentional deception. Since the 1990-ies the EU controls the authenticity of wine by isotope analyses of authentic wine samples from every wine-producing EU-country. Initially this was implemented to counteract adulteration of wine, but the produced data can also be used for the control geographic origin of wine samples. The measurement of the stable isotope composition of wine offers the possibility to investigate the product itself. The stable isotope ratios of the elements C and O are varying geographically due to diverse environmental conditions (e.g.: climate, soil, altitude, geography, cultivation…) thus creating individual patterns for different regions. Therefore analysis of the stable isotope pattern can be a potent tool for geographic differentiation. We investigated the stable isotope composition (C and O) of wine samples from Austria, Slovenia, Romania, Montenegro and Argentina from the years 2008 and 2009. Significant isotope variations are identified within samples from the same country as well as between samples from different countries, evidencing the potential of identifying wine from different regions in an individual country as well as discriminating wine from different countries. Also differences between the two investigated vintages exist, due to variations in the respective climate conditions.

  15. Meat species identification and Halal authentication using PCR analysis of raw and cooked traditional Turkish foods.

    Science.gov (United States)

    Ulca, Pelin; Balta, Handan; Çağın, Ilknur; Senyuva, Hamide Z

    2013-07-01

    The method performance characteristics of commercially available PCR kits for animal species identification were established. Comminuted meat products containing different levels of pork were prepared from authentic beef, chicken, and turkey. These meat products were analysed in the raw state and after cooking for 20 min at 200 °C. For both raw and cooked meats, the PCR kit could correctly identify the animal species and could reliably detect the addition of pork at a level below 0.1%. A survey of 42 Turkish processed meat products such as soudjouk, salami, sausage, meatball, cured spiced beef and doner kebap was conducted. Thirty-six samples were negative for the presence of pork (meatball sample labelled as 100% beef was found to contain chicken. Another turkey meatball sample was predominantly chicken. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. Authentication of beef versus horse meat using 60 MHz 1H NMR spectroscopy.

    Science.gov (United States)

    Jakes, W; Gerdova, A; Defernez, M; Watson, A D; McCallum, C; Limer, E; Colquhoun, I J; Williamson, D C; Kemsley, E K

    2015-05-15

    This work reports a candidate screening protocol to distinguish beef from horse meat based upon comparison of triglyceride signatures obtained by 60 MHz (1)H NMR spectroscopy. Using a simple chloroform-based extraction, we obtained classic low-field triglyceride spectra from typically a 10 min acquisition time. Peak integration was sufficient to differentiate samples of fresh beef (76 extractions) and horse (62 extractions) using Naïve Bayes classification. Principal component analysis gave a two-dimensional "authentic" beef region (p=0.001) against which further spectra could be compared. This model was challenged using a subset of 23 freeze-thawed training samples. The outcomes indicated that storing samples by freezing does not adversely affect the analysis. Of a further collection of extractions from previously unseen samples, 90/91 beef spectra were classified as authentic, and 16/16 horse spectra as non-authentic. We conclude that 60 MHz (1)H NMR represents a feasible high-throughput approach for screening raw meat. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  17. Stable isotope ratio analysis: A potential analytical tool for the authentication of South African lamb meat.

    Science.gov (United States)

    Erasmus, Sara Wilhelmina; Muller, Magdalena; van der Rijst, Marieta; Hoffman, Louwrens Christiaan

    2016-02-01

    Stable isotope ratios ((13)C/(12)C and (15)N/(14)N) of South African Dorper lambs from farms with different vegetation types were measured by isotope ratio mass spectrometry (IRMS), to evaluate it as a tool for the authentication of origin and feeding regime. Homogenised and defatted meat of the Longissimus lumborum (LL) muscle of lambs from seven different farms was assessed. The δ(13)C values were affected by the origin of the meat, mainly reflecting the diet. The Rûens and Free State farms had the lowest (p ⩽ 0.05) δ(15)N values, followed by the Northern Cape farms, with Hantam Karoo/Calvinia having the highest δ(15)N values. Discriminant analysis showed δ(13)C and δ(15)N differences as promising results for the use of IRMS as a reliable analytical tool for lamb meat authentication. The results suggest that diet, linked to origin, is an important factor to consider regarding region of origin classification for South African lamb. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Authentication of beef versus horse meat using 60 MHz 1H NMR spectroscopy

    Science.gov (United States)

    Jakes, W.; Gerdova, A.; Defernez, M.; Watson, A.D.; McCallum, C.; Limer, E.; Colquhoun, I.J.; Williamson, D.C.; Kemsley, E.K.

    2015-01-01

    This work reports a candidate screening protocol to distinguish beef from horse meat based upon comparison of triglyceride signatures obtained by 60 MHz 1H NMR spectroscopy. Using a simple chloroform-based extraction, we obtained classic low-field triglyceride spectra from typically a 10 min acquisition time. Peak integration was sufficient to differentiate samples of fresh beef (76 extractions) and horse (62 extractions) using Naïve Bayes classification. Principal component analysis gave a two-dimensional “authentic” beef region (p = 0.001) against which further spectra could be compared. This model was challenged using a subset of 23 freeze–thawed training samples. The outcomes indicated that storing samples by freezing does not adversely affect the analysis. Of a further collection of extractions from previously unseen samples, 90/91 beef spectra were classified as authentic, and 16/16 horse spectra as non-authentic. We conclude that 60 MHz 1H NMR represents a feasible high-throughput approach for screening raw meat. PMID:25577043

  19. Assessment of meat authenticity using bioinformatics, targeted peptide biomarkers and high-resolution mass spectrometry.

    Science.gov (United States)

    Ruiz Orduna, Alberto; Husby, Erik; Yang, Charles T; Ghosh, Dipankar; Beaudry, Francis

    2015-01-01

    In recent years a significant increase of food fraud has been observed, ranging from false label claims to the use of additives and fillers to increase profitability. Recently in 2013 horse and pig DNAs were detected in beef products sold from several retailers. Mass spectrometry (MS) has become the workhorse in protein research, and the detection of marker proteins could serve for both animal species and tissue authentication. Meat species authenticity is performed in this paper using a well-defined proteogenomic annotation, carefully chosen surrogate tryptic peptides and analysis using a hybrid quadrupole-Orbitrap MS. Selected mammalian meat samples were homogenised and proteins were extracted and digested with trypsin. The samples were analysed using a high-resolution MS. Chromatography was achieved using a 30-min linear gradient along with a BioBasic C8 100 × 1 mm column at a flow rate of 75 µl min(-1). The MS was operated in full-scan high resolution and accurate mass. MS/MS spectra were collected for selected proteotypic peptides. Muscular proteins were methodically analysed in silico in order to generate tryptic peptide mass lists and theoretical MS/MS spectra. Following a comprehensive bottom-up proteomic analysis, we detected and identified a proteotypic myoglobin tryptic peptide (120-134) for each species with observed m/z below 1.3 ppm compared with theoretical values. Moreover, proteotypic peptides from myosin-1, myosin-2 and β-haemoglobin were also identified. This targeted method allowed comprehensive meat speciation down to 1% (w/w) of undesired product.

  20. Species Authentication of Common Meat Based on PCR Analysis of the Mitochondrial COI Gene.

    Science.gov (United States)

    Dai, Zhenyu; Qiao, Jiao; Yang, Siran; Hu, Shen; Zuo, Jingjing; Zhu, Weifeng; Huang, Chunhong

    2015-07-01

    Adulteration of meat products and costly animal-derived commodities with their inferior/cheaper counterparts is a grievous global problem. Species authentication is still technical challenging, especially to those deep processed products. The present study described the design of seven sets of species-specific primer based on a high heterozygous region of mitochondrial cytochrome c oxidase subunit I (COI) gene. These primers were proven to have high species specificity and no cross-reactions and unexpected products to different DNA source. Multiplex PCR assay was achieved for rapid and economical identification of four commonly consumed meats (pork, beef, chicken, and mutton). The conventional PCR assay was sensitive down to 0.001 ng of DNA template in the reactant. The developed method was also powerful in detecting as low as 0.1-mg adulterated pork (0.05 % in wt/wt) in an artificial counterfeited mutton. Validation test showed that the assay is specific, reproducible, and robust in commercial deep processed meats, leatherware, and feather commodities. This proposed method will be greatly beneficial to the consumers, food industry, leather, and feather commodity manufacture.

  1. Where is the game? Wild meat products authentication in South Africa: a case study.

    Science.gov (United States)

    D'Amato, Maria Eugenia; Alechine, Evguenia; Cloete, Kevin Wesley; Davison, Sean; Corach, Daniel

    2013-03-01

    Wild animals' meat is extensively consumed in South Africa, being obtained either from ranching, farming or hunting. To test the authenticity of the commercial labels of meat products in the local market, we obtained DNA sequence information from 146 samples (14 beef and 132 game labels) for barcoding cytochrome c oxidase subunit I and partial cytochrome b and mitochondrial fragments. The reliability of species assignments were evaluated using BLAST searches in GenBank, maximum likelihood phylogenetic analysis and the character-based method implemented in BLOG. The Kimura-2-parameter intra- and interspecific variation was evaluated for all matched species. The combined application of similarity, phylogenetic and character-based methods proved successful in species identification. Game meat samples showed 76.5% substitution, no beef samples were substituted. The substitutions showed a variety of domestic species (cattle, horse, pig, lamb), common game species in the market (kudu, gemsbok, ostrich, impala, springbok), uncommon species in the market (giraffe, waterbuck, bushbuck, duiker, mountain zebra) and extra-continental species (kangaroo). The mountain zebra Equus zebra is an International Union for Conservation of Nature (IUCN) red listed species. We also detected Damaliscus pygargus, which is composed of two subspecies with one listed by IUCN as 'near threatened'; however, these mitochondrial fragments were insufficient to distinguish between the subspecies. The genetic distance between African ungulate species often overlaps with within-species distance in cases of recent speciation events, and strong phylogeographic structure determines within-species distances that are similar to the commonly accepted distances between species. The reliability of commercial labeling of game meat in South Africa is very poor. The extensive substitution of wild game has important implications for conservation and commerce, and for the consumers making decisions on the basis of

  2. CS-137 in Austrian domestic animals: determination of transfer parameters and meat contamination by live animal measurements

    International Nuclear Information System (INIS)

    Henrich, E.

    1987-01-01

    Soon after the Chernobyl accident several programs were initiated by provincial and federal authorities to check the validity of transfer factors and biological lifetimes as given in the literature; to test the possibility of reducing the cesium content in meat and milk by chemical agents; and to determine the cesium content of meat in live animals to assist of slaughtering decisions. Details and results of these programs are presented. 1 tab., 3 figs., 9 refs. (qui)

  3. Application of FTIR Spectroscopy and Chemometrics for Halal Authentication of Beef Meatball Adulterated with Dog Meat

    OpenAIRE

    Rahayu, Wiranti Sri; Rohman, Abdul; Martono, Sudibyo; Sudjadi, Sudjadi

    2018-01-01

    Beef meatball is one of the favorite meat-based food products among Indonesian community. Currently, beef is very expensive in Indonesian market compared to other common meat types such as chicken and lamb. This situation has intrigued some unethical meatball producers to replace or adulterate beef with lower priced-meat like dog meat. The objective of this study was to evaluate the capability of FTIR spectroscopy combined with chemometrics for identification and quantification of dog meat (D...

  4. Meat species identification by polymerase chain reaction technique to authenticate alheiras de caça

    OpenAIRE

    Santos, C.G.; Melo, V.S.; Amaral, J.S.; Oliveira, M.B.P.P.; Mafra, I.

    2012-01-01

    The manufacture of traditional meat products is a long-established practice in the Northeast of Portugal, being Alheiras one of the most appreciated products. Alheiras are traditional smoked fermented sausages, mainly produced with pork and poultry meat in a mixture with bread and spices. Currently, game meat Alheiras (Alheiras de caça) are also available as very attractive meat products and prone to adulterations. To allow accurate information for consumers and avoid unfair co...

  5. Austrian highlights

    International Nuclear Information System (INIS)

    Jones, Simon

    2001-01-01

    An overview of recent development in the Austrian hydroelectric industry is presented, and details of the installed capacity, the Austrian government's power market reform package, and the promotion of small-scale hydroelectric power plants are given. The operation of Verbund - Austria's largest power generator and distributor - and the restructuring of the Verbund's main Austrian Hydro Power (AHP) generating group are discussed. The export of power, the joint venture of Verbund with CIR Energia in Italy to market power to commercial and industrial users, and the controversy surrounding the Freudenau run-of-the river plant which successfully tested a matrix turbine are reported

  6. Application of FTIR Spectroscopy and Chemometrics for Halal Authentication of Beef Meatball Adulterated with Dog Meat

    Directory of Open Access Journals (Sweden)

    Wiranti Sri Rahayu

    2018-05-01

    Full Text Available Beef meatball is one of the favorite meat-based food products among Indonesian community. Currently, beef is very expensive in Indonesian market compared to other common meat types such as chicken and lamb. This situation has intrigued some unethical meatball producers to replace or adulterate beef with lower priced-meat like dog meat. The objective of this study was to evaluate the capability of FTIR spectroscopy combined with chemometrics for identification and quantification of dog meat (DM in beef meatball (BM. Meatball samples were prepared by adding DM into BM ingredients in the range of 0–100% wt/wt and were subjected to extraction using Folch method. Lipid extracts obtained from the samples were scanned using FTIR spectrophotometer at 4000–650 cm-1. Partial least square (PLS calibration was used to quantify DM in the meatball. The results showed that combined frequency regions of 1782–1623 cm-1 and 1485-659 cm-1 using detrending treatment gave optimum prediction of DM in BM. Coefficient of determination (R2 for correlation between the actual value of DM and FTIR predicted value was 0.993 in calibration model and 0.995 in validation model. The root mean square error of calibration (RMSEC and standard error of cross validation (SECV were 1.63% and 2.68%, respectively. FTIR spectroscopy combined with multivariate analysis can serve as an accurate and reliable method for analysis of DM in meatball.

  7. Authentication of meat from game and domestic species by SNaPshot minisequencing analysis.

    Science.gov (United States)

    La Neve, Fabio; Civera, Tiziana; Mucci, Nadia; Bottero, Maria Teresa

    2008-10-01

    The aim of the present study is to develop an assay for the specific identification of meat from Capreolus capreolus, Cervus elaphus, Capra ibex, Rupicapra rupicapra, targeting sequences of the cytochrome b (cyt b) gene of mitochondrial DNA. The assay is also intended to enable differentiation between meat from these wild species as well as Ovis aries, Capra hircus, Bubalus bubalis, Bos taurus and Sus scrofa domestic species. The primers used in the preliminary PCR were designed in well conserved regions upstream and downstream of the diagnosis sites. They successfully amplified a conserved 232bp region from the cyt b gene of all the species taken into consideration. The sites of diagnosis have been interrogated using a minisequencing reaction and capillary electrophoresis. All the results of the multiplex PER (primer extension reaction) test were confirmed by fragment sequencing. The assay offers the possibility of discriminating nine species at the same time.

  8. Identification of duck, partridge, pheasant, quail, chicken and turkey meats by species-specific PCR assays to assess the authenticity of traditional game meat Alheira sausages

    OpenAIRE

    Amaral, J.S.; Santos, Cristina G.; Melo, Vitor S.; Costa, Joana; Oliveira, M.B.P.P.; Mafra, I.

    2015-01-01

    Game meat Alheira (Alheira de caça) sausage is a traditional fermented product typical from the Northeast region of Portugal, having bread and meats (including game) as main ingredients. It is a particularly appreciated product by consumers that commands higher prices, especially in comparison with the common Alheira produced with pork and poultry meats. Following our previous work in which several mammalian game meat species were successfully identified in game meat Alheira sausages for auth...

  9. Novel TaqMan real-time polymerase chain reaction assay for verifying the authenticity of meat and commercial meat products from game birds.

    Science.gov (United States)

    Rojas, María; González, Isabel; Pavón, Miguel Angel; Pegels, Nicolette; Lago, Adriana; Hernández, Pablo E; García, Teresa; Martín, Rosario

    2010-06-01

    Species-specific real-time polymerase chain reaction (PCR) assays using TaqMan probes have been developed for verifying the labeling of meat and commercial meat products from game birds, including quail, pheasant, partridge, guinea fowl, pigeon, Eurasian woodcock and song thrush. The method combines the use of species-specific primers and TaqMan probes that amplify small fragments (amplicons meat products from the target species demonstrated the suitability of the assay for the detection of the target DNAs.

  10. Detection of partridge meat for the authentication of “alheiras de caça” using polymerase chain reaction

    OpenAIRE

    Santos, C.G.; Melo, V.S.; Mafra, I.; Amaral, J.S.; Costa, J.; Oliveira, M.B.P.P.

    2011-01-01

    The manufacture or traditional meat products is a long-eslablished lradition in Northeastern region of Portugal, in particular the case of "Alheiras" Besides the traditional "Alheiras" mainly produced with pork and poultry meat, others are currently available in lhe market. which are produced with diffcrcnt game meats, such as "Alhciras de caça" Since this kind of mcat products are prepared using more expensive meats, they are prone to adulterations due to the economic profit t...

  11. meat

    African Journals Online (AJOL)

    p2492989

    These nutrient values determined in meat from red hartebeest could ... percentage of a-linolenic acid (C18:3n-3) (Wiklund et al., 2001). .... system (1525 HPLC with a binary gradient delivery, 717 auto-sampler and Injector, 1500 ..... polyunsaturated fatty acids and conjugated linoleic acid in lamb, beef and pork: A review.

  12. On Austrian regional economics

    NARCIS (Netherlands)

    Heijman, W.J.M.; Leen, A.R.

    2004-01-01

    The aim of this research note is two-fold, firstly, to clarify the growing interaction between regional science and Austrian economics and their awareness of each other. We elucidate the Austrian methodology, called praxeology, which is especially misunderstood in regional science. Secondly, we

  13. Geogenic lead isotope signatures from meat products in Great Britain: Potential for use in food authentication and supply chain traceability

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Jane A.; Pashley, Vanessa [NIGL, BGS, Keyworth, NG12 5GG (United Kingdom); Richards, Gemma J. [School of Veterinary Science, University of Bristol, Bristol BS40 5DU (United Kingdom); Brereton, Nicola [The Food and Environment Research Agency, Sand Hutton, York YO41 1LZ (United Kingdom); Knowles, Toby G. [School of Veterinary Science, University of Bristol, Bristol BS40 5DU (United Kingdom)

    2015-12-15

    This paper presents lead (Pb) isotope data from samples of farm livestock raised in three areas of Britain that have elevated natural Pb levels: Central Wales, the Mendips and the Derbyshire Peak District. This study highlights three important observations; that the Pb found in modern British meat from these three areas is geogenic and shows no clear evidence of modern tetraethyl anthropogenic Pb contribution; that the generally excellent match between the biological samples and the ore field data, particularly for the Mendip and Welsh data, suggests that this technique might be used to provenance biological products to specific ore sites, under favourable conditions; and that modern systems reflect the same process of biosphere averaging that is analogous to cultural focusing in human archaeological studies that is the process of biological averaging leading to an homogenised isotope signature with increasing Pb concentration. - Highlights: • Lead (Pb) isotopes measured in modern British meat were geogenic in origin. • The match indicates that this technique may be used to provenance biological products. • There was no evidence for a contribution from modern anthropogenic Pb sources.

  14. Geogenic lead isotope signatures from meat products in Great Britain: Potential for use in food authentication and supply chain traceability

    International Nuclear Information System (INIS)

    Evans, Jane A.; Pashley, Vanessa; Richards, Gemma J.; Brereton, Nicola; Knowles, Toby G.

    2015-01-01

    This paper presents lead (Pb) isotope data from samples of farm livestock raised in three areas of Britain that have elevated natural Pb levels: Central Wales, the Mendips and the Derbyshire Peak District. This study highlights three important observations; that the Pb found in modern British meat from these three areas is geogenic and shows no clear evidence of modern tetraethyl anthropogenic Pb contribution; that the generally excellent match between the biological samples and the ore field data, particularly for the Mendip and Welsh data, suggests that this technique might be used to provenance biological products to specific ore sites, under favourable conditions; and that modern systems reflect the same process of biosphere averaging that is analogous to cultural focusing in human archaeological studies that is the process of biological averaging leading to an homogenised isotope signature with increasing Pb concentration. - Highlights: • Lead (Pb) isotopes measured in modern British meat were geogenic in origin. • The match indicates that this technique may be used to provenance biological products. • There was no evidence for a contribution from modern anthropogenic Pb sources.

  15. Geogenic lead isotope signatures from meat products in Great Britain: Potential for use in food authentication and supply chain traceability.

    Science.gov (United States)

    Evans, Jane A; Pashley, Vanessa; Richards, Gemma J; Brereton, Nicola; Knowles, Toby G

    2015-12-15

    This paper presents lead (Pb) isotope data from samples of farm livestock raised in three areas of Britain that have elevated natural Pb levels: Central Wales, the Mendips and the Derbyshire Peak District. This study highlights three important observations; that the Pb found in modern British meat from these three areas is geogenic and shows no clear evidence of modern tetraethyl anthropogenic Pb contribution; that the generally excellent match between the biological samples and the ore field data, particularly for the Mendip and Welsh data, suggests that this technique might be used to provenance biological products to specific ore sites, under favourable conditions; and that modern systems reflect the same process of biosphere averaging that is analogous to cultural focusing in human archaeological studies that is the process of biological averaging leading to an homogenised isotope signature with increasing Pb concentration. Copyright © 2015. Published by Elsevier B.V.

  16. THE EFFECTS OF HORSE MEAT SCANDAL ON ROMANIAN MEAT MARKET

    OpenAIRE

    Silvius STANCIU; Nicoleta STANCIUC; Loredana DUMITRASCU; Roxana ION; Costel NISTOR

    2013-01-01

    Sustainable business in the domestic production of meat must meet both the usual Requirements regarding quality, safety for customer and New Challenges in the European meat market. The Romanian food industry must meet the challenge of recent suspicions regarding the substitution of beef meat with horse meat. The modern applicable to meat traceability systems and authentication procedures can be considered as new ways to support fair trade and transparency, THUS, removing suspicions that appea...

  17. The Austrian Space Plan

    Science.gov (United States)

    Pseiner, K.; Balogh, W.

    2002-01-01

    After several years of preparation and discussion among the involved players, the Austrian Space Plan was approved for implementation in November 2001. Based on careful benchmarking and analysis of the capabilities of the Austrian space sector it aims to create excellent conditions for the sector's further development. The new space strategy embraces Austria's participation in the mandatory and optional programmes of the European Space Agency and establishes a National Space Programme supported by separate funding opportunities. A set of clearly-defined indicators ensures that the progress in implementing the Space Plan can be objectively judged through independent, annual reviews. The National Space Programme promotes international cooperation in space research and space activities with the aim to strengthen the role of space science and to better prepare Austrian space industry for the commercial space market. In the framework of the Space Plan the Austrian Space Agency has been tasked with integrating the industry's growing involvement in aeronautics activities to better utilize synergies with the space sector. This paper reviews the various steps leading to the approval of the new space strategy and discusses the hurdles mastered in this process. It reports on the Space Plan's first results, specifically taking into account projects involving international cooperation. For the first the Austria aerospace-sector can rely on an integrated strategy for aeronautics- and space activities which is firmly rooted in the efforts to enhance the country's R&D activities. It may also act as a useful example for other small space- using countries planning to enhance their involvement in space activities.

  18. Rapid detection of peptide markers for authentication purposes in raw and cooked meat using ambient liquid extraction surface analysis mass spectrometry.

    Science.gov (United States)

    Montowska, Magdalena; Alexander, Morgan R; Tucker, Gregory A; Barrett, David A

    2014-10-21

    In this Article, our previously developed ambient LESA-MS methodology is implemented to analyze five types of thermally treated meat species, namely, beef, pork, horse, chicken, and turkey meat, to select and identify heat-stable and species-specific peptide markers. In-solution tryptic digests of cooked meats were deposited onto a polymer surface, followed by LESA-MS analysis and evaluation using multivariate data analysis and tandem electrospray MS. The five types of cooked meat were clearly discriminated using principal component analysis and orthogonal partial least-squares discriminant analysis. 23 heat stable peptide markers unique to species and muscle protein were identified following data-dependent tandem LESA-MS analysis. Surface extraction and direct ambient MS analysis of mixtures of cooked meat species was performed for the first time and enabled detection of 10% (w/w) of pork, horse, and turkey meat and 5% (w/w) of chicken meat in beef, using the developed LESA-MS/MS analysis. The study shows, for the first time, that ambient LESA-MS methodology displays specificity sufficient to be implemented effectively for the analysis of processed and complex peptide digests. The proposed approach is much faster and simpler than other measurement tools for meat speciation; it has potential for application in other areas of meat science or food production.

  19. The implications across Europe of the ‘horse meat scandal’ on the monetary value of meat authenticity and food safety in ready to heat lasagne: evidence from six countries

    OpenAIRE

    Boeri, Marco; Brown, Hannah; Longo, Alberto

    2014-01-01

    The recent ‘horse meat scandal’ in Europe has sparked huge concerns among consumers, as horse meat was found in beef lasagne ready to be consumed. This study investigates consumers’ preferences towards characteristics of ready to heat lasagne, including origin of the meat, whether the meat is tested as beef, safety of the lasagne, and nutritional value, using Discrete Choice Experiments in six EU. Our sample of 4,598 consumers makes this the largest cross sectional study of this kind. The res...

  20. THE EFFECTS OF HORSE MEAT SCANDAL ON ROMANIAN MEAT MARKET

    Directory of Open Access Journals (Sweden)

    Silvius STANCIU

    2013-06-01

    Full Text Available Sustainable business in the domestic production of meat must meet both the usual Requirements regarding quality, safety for customer and New Challenges in the European meat market. The Romanian food industry must meet the challenge of recent suspicions regarding the substitution of beef meat with horse meat. The modern applicable to meat traceability systems and authentication procedures can be considered as new ways to support fair trade and transparency, THUS, removing suspicions that appeared lately. Lack of safety measures in the field can affect business continuity critically, creating significant losses.

  1. Meat authentication: a new HPLC-MS/MS based method for the fast and sensitive detection of horse and pork in highly processed food.

    Science.gov (United States)

    von Bargen, Christoph; Brockmeyer, Jens; Humpf, Hans-Ulrich

    2014-10-01

    Fraudulent blending of food products with meat from undeclared species is a problem on a global scale, as exemplified by the European horse meat scandal in 2013. Routinely used methods such as ELISA and PCR can suffer from limited sensitivity or specificity when processed food samples are analyzed. In this study, we have developed an optimized method for the detection of horse and pork in different processed food matrices using MRM and MRM(3) detection of species-specific tryptic marker peptides. Identified marker peptides were sufficiently stable to resist thermal processing of different meat products and thus allow the sensitive and specific detection of pork or horse in processed food down to 0.24% in a beef matrix system. In addition, we were able to establish a rapid 2-min extraction protocol for the efficient protein extraction from processed food using high molar urea and thiourea buffers. Together, we present here the specific and sensitive detection of horse and pork meat in different processed food matrices using MRM-based detection of marker peptides. Notably, prefractionation of proteins using 2D-PAGE or off-gel fractionation is not necessary. The presented method is therefore easily applicable in analytical routine laboratories without dedicated proteomics background.

  2. Qubit authentication

    International Nuclear Information System (INIS)

    Curty, Marcos; Santos, David J.; Perez, Esther; Garcia-Fernandez, Priscila

    2002-01-01

    Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties with the minimum amount of resources. Specifically, our objective is to determine whether one elementary quantum message (a qubit) can be authenticated with a key of minimum length. We show that, unlike the case of classical-message quantum authentication, this is not possible

  3. Austrian emission under international comparison

    International Nuclear Information System (INIS)

    Anderl, M.; Gager, M.; Gugele, B.; Huttunen, K.; Kurzweil, A.; Poupa, S.; Ritter, M.; Wappel, D.; Wieser, M.

    2004-01-01

    A comparison between anthropogenic emissions of CO 2 , CH 4 , N 2 O, SO 2 , NO x , volatile organic compounds (NMVOC), NH 3 and CO from the European Union, European Union candidate countries and Austria is presented. Data covers the years 1999-2001 and the emissions values per habitant are provided as well as a comparison against the Kyoto goals. In the middle of the European mean values are the austrian emissions values, austrian SO 2 emissions are the smallest, however CH 4 , CO and NMVOC emissions are over the European mean values. 8 figs., 6 tabs. (nevyjel)

  4. Visit of the Austrian Ambassador

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    The Austrian Ambassador Wolfgang Petritsch (light raincoat) learns about superconducting magnets at the LHC magnet test facility in building SM18 during a visit to CERN. The blue pipe-like structure in the left background is String 2: the 120-m long full-scale model of an LHC cell, which is used to test LHC systems.

  5. Austrian natural scientists in exile

    International Nuclear Information System (INIS)

    Broda, E.

    1978-01-01

    This text was written by E. Broda for the international symposium for exploration of the Austrian exile from 1934 to 1945 (“Internationales Symposiums zur Erforschung des österreichischen Exils von 1934 bis 1945”) in the year 1978. The article is about the specific problems of the Austrian scientific landscape, caused by the political events in the first half of the 20th century. The focus is primarily on the enormous ‘brain drain’, triggered by political repression in the period of Nazi rule (1938 - 1945), the Austro-fascism period (1934 - 1938) and the economic regression, anti-intellectual and anti-Semitic sentiment in the Country since 1918. The article emphasizes the importance of exile organizations, such as the ‘Free Austrian Movement’ or the ‘Association of Austrian Engineers, Chemists and Scientific Workers in Great Britain’ for the reconstruction of a scientific culture in Austria, after the Second World War. (rössner) [de

  6. Mr. Wolfgang Petritsch, Austrian Ambassador

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    Dr.Peter Schmid/CERN/EP, Dr.Wolfgang Petritsch, Austrian Ambassador, Permanent representative at UN, Mrs.Nora Petritsch, Dr.Kurt Hubner/CERN/AC, Mrs. Frederike Klaus-Salesin, Adviser, Mrs.Andrea Strohmeier, Secretary of the Ambassador, Mr.Heinz Klaus, Attaché, Dr.Theodor Tortschanoff/CERN/LHC, Mr.Peter Storer, Advisor. Dr.Peter Schmid/CERN/EP, Dr.Wolfgang Petritsch, Austrian Ambassador, Permanent representative at UN, Mrs.Nora Petritsch, Dr.Kurt Hubner/CERN/AC, Mrs. Frederike Klaus-Salesin, Adviser, Mrs.Andrea Strohmeier, Secretary of the Ambassador, Mr.Heinz Klaus, Attaché, Dr.Theodor Tortschanoff/CERN/LHC, Mr.Peter Storer, Advisor.

  7. The reception of Austrian economics in Italy

    Directory of Open Access Journals (Sweden)

    Antonio Magliulo

    2018-04-01

    Full Text Available Nowadays the Austrian School enjoys high reputation in Italy: books by Mises, Hayek and other Austrian economists are constantly republished and reviewed with great interest, both inside and outside academic circles. The situation was very different decades ago, when just a few Italian economists devoted attention to the Austrian School. This work studies the reception of Austrian Economics in Italy, from the beginning to our days, so as to bring out, by way of comparison, relevant features of Italian economic culture. We will try to offer just an overview of the entire story, in an attempt to provide useful elements for a deeper analysis of further topics and periods.

  8. Speaker Authentication

    CERN Document Server

    Li, Qi (Peter)

    2012-01-01

    This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker’s identity based on his/her voice characteristics while the VIV approach validates a speaker’s identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speake...

  9. Geospatial Authentication

    Science.gov (United States)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server.

  10. The Forgotten Austrian Economics Language

    Directory of Open Access Journals (Sweden)

    Elena Bianca Vieru

    2013-02-01

    Full Text Available In light of the current events, namely the crisisthat economy has to face for quite someyears now, plenty of questions are raised, not only among specialists in the field but also amongordinary people as they prove to be most impoverished by these imbalances. Thus, this paper aims, asa first objective, to explain, froma general perspective and using an inductive-subjectivemethodology based on a brief survey as well as on observation, two of the most important causes that,according to the Austrian Business Cycle Theory, are the leading motives for triggering crises. Weare referring particularly to an excessivestate interventionismmanifested throughout itsexpansionary monetary policy.Secondly, we seek to establish the interconnections between theseelements and the case of the Great Depression as well as the current recession. The results we cameacross point out towards the same pattern designed by the Austrian economists, although thecircumstances are, each time, different. Hence, the contribution of this paper consists of handling thedetails that surround the subject by extracting only the essential aspects regarding the triggering ofcrises; we refer to the main ideas that need to be underlined for a better comprehension of the topic.

  11. Software Authentication

    International Nuclear Information System (INIS)

    Wolford, J.K.; Geelhood, B.D.; Hamilton, V.A.; Ingraham, J.; MacArthur, D.W.; Mitchell, D.J.; Mullens, J.A.; Vanier, P. E.; White, G.K.; Whiteson, R.

    2001-01-01

    The effort to define guidance for authentication of software for arms control and nuclear material transparency measurements draws on a variety of disciplines and has involved synthesizing established criteria and practices with newer methods. Challenges include the need to protect classified information that the software manipulates as well as deal with the rapid pace of innovation in the technology of nuclear material monitoring. The resulting guidance will shape the design of future systems and inform the process of authentication of instruments now being developed. This paper explores the technical issues underlying the guidance and presents its major tenets

  12. Strengthening Authentication

    Science.gov (United States)

    Gale, Doug

    2007-01-01

    The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…

  13. Austrian emission inventory for dust

    International Nuclear Information System (INIS)

    Winiwarter, W.; Trenker, C.; Hoeflinger, W.

    2001-09-01

    For the first time, Austrian emissions of anthropogenic particulate matter emissions to the atmosphere have been estimated. Results have been reported as total suspended particles (TSP) as well as for the fractions of particles smaller than 10 μm or 2.5 μm aerodynamic diameter (PM 10 , PM 2.5 ), respectively. Base years for the inventory were 1990, 1995 and 1999. Excluded from this assessment is wind blown dust, which has been considered a natural source here. National statistics have been applied, specifically those also used previously in the Austrian air pollution inventory (OLI). Emission factors have been taken from literature compilations, only for exceptional cases specific Austrian assessments were performed or original literature on emission measurements was consulted. Resuspension of dust by road traffic emerged as the most important source. For the size fraction of PM 10 this source contributed about half of the emissions, when applying the calculation scheme by the U.S. EPA. While this scheme is widely used and well documented, its validity is currently subject of intense scientific debate. As these results do not seem to coincide with ambient air measurements, resuspension of road dust is considered separately and not now included in the national total. The sum of all other sources increases from 75,000 t of TSP in 1990 and 1995 to 77,000 t in 1999, while both PM 10 and PM 2.5 exhibit decreasing tendency (at 45,000 t and 26,000 t in 1999, respectively). The increase in TSP derives from increasing traffic and friction related emissions (tire wear, break wear), decrease of the finer particulate matter is due to reductions in firewood consumption for domestic heating. Most important source sectors are fugitive emissions from material transfer in industry as well as the building industry and the tilling of agricultural land. Common to these sources is the high uncertainty of available data. Wood combustion is the most important of the non

  14. System and method for authentication

    Science.gov (United States)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  15. Meat Processing.

    Science.gov (United States)

    Legacy, Jim; And Others

    This publication provides an introduction to meat processing for adult students in vocational and technical education programs. Organized in four chapters, the booklet provides a brief overview of the meat processing industry and the techniques of meat processing and butchering. The first chapter introduces the meat processing industry and…

  16. The consumer in Austrian economics and the Austrian perspective on consumer policy

    NARCIS (Netherlands)

    Leen, A.R.

    1999-01-01

    In this thesis I examined the place of the competitive-entrepreneurial consumer in Austrian economic thought. For a neoclassical economist, competition among consumers is hard to find. For an Austrian economist, however, it is a necessity. The introduction puts forward the problem that although an

  17. Authentic Teachers: Student Criteria Perceiving Authenticity of Teachers

    Science.gov (United States)

    De Bruyckere, Pedro; Kirschner, Paul A.

    2016-01-01

    Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…

  18. Tibetan Interpretations of Authenticity

    DEFF Research Database (Denmark)

    Sobisch, Jan-Ulrich

    2015-01-01

    The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions.......The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions....

  19. AIS authentication

    CERN Multimedia

    2006-01-01

    Users are invited to use the NICE password for AIS authentication. As announced in CNL June-August 2006 (see http://www.cerncourier.com/articles/cnl/3/6/14/1) it is possible to use the NICE username and password to log on to AIS. The procedure is now fully operational and users can themselves reset the AIS password such that the NICE password will be used for authentication required by AIS applications. We strongly recommend CERN users who have a NICE account (this is the case of most users) to do this, with the objective to reduce the number of passwords they need to remember. This can be achieved very easily, directly from the Change Password option on the AIS login (https://aislogin.cern.ch/). Users should just select the '[Change Password]' option displayed at the bottom of the page, provide the 'Old Password' and then click on the button 'Use Nice password' followed by 'Submit'. Change Password option on the AIS login windowSetting the AIS password - Use Nice Password It should be noted that the proce...

  20. Multiresistant Bacteria Isolated from Chicken Meat in Austria

    Directory of Open Access Journals (Sweden)

    Gernot Zarfel

    2014-12-01

    Full Text Available Multidrug resistant bacteria (MDR bacteria, such as extended spectrum beta-lactamase (ESBL Enterobacteriaceae, methicillin resistant Staphylococcus aureus (MRSA, and vancomycin-resistant Enterococci (VRE, pose a challenge to the human health care system. In recent years, these MDR bacteria have been detected increasingly outside the hospital environment. Also the contamination of food with MDR bacteria, particularly of meat and meat products, is a concern. The aim of the study was to evaluate the occurrence of MDR bacteria in chicken meat on the Austrian market. For this study, 50 chicken meat samples were analysed. All samples originated from chickens slaughtered in Austrian slaughterhouses and were marked as produced in Austria. Samples were analysed for the presence of ESBL Enterobacteriaceae, methicillin resistant Staphylococci and VRE. Resistance genes of the isolated bacteria were characterised by PCR and sequencing. In the present study 26 ESBL producing E. coli, five mecA gene harbouring Staphylococci (but no MRSA, and four VRE were detected in chicken meat samples of Austrian origin. In 24 (48% of the samples no ESBL Enterobacteriaceae, MRSA, methicillin resistant coagulase negative Staphylococcus (MRCNS or VRE could be detected. None of the samples contained all three types of investigated multiresistant bacteria. In concordance to previous studies, CTX-M-1 and SHV-12 were the dominant ESBL genes.

  1. "Thick" Authenticity: New Media and Authentic Learning.

    Science.gov (United States)

    Shaffer, David Williamson; Resnick, Mitchel

    1999-01-01

    Discusses authenticity as it is applied to educational interventions and argues that the concept should be analyzed more closely. Describes four kinds of authenticity; analyzes how computational media are well-suited to support different aspects of authentic learning; and discusses connectivity, modeling, and pluralism. Contains 75 references.…

  2. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session....... In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post......-session authentication, although a new term, is not a new concept; it is the basis of at least a few practical schemes. We, for the first time, systematically study it and present the underlying authentication model. Further, we show that an important class of problems is solvable using post-session authentication...

  3. The Austrian school in Bulgaria: A history

    Directory of Open Access Journals (Sweden)

    Nikolay Nenovsky

    2018-04-01

    Full Text Available The main goal of this study is to highlight the acceptance, dissemination, interpretation, criticism and make some attempts at contributing to Austrian economics made in Bulgaria during the last 120 years. We consider some of the main characteristics of the Austrian school, such as subjectivism and marginalism, as basic components of the economic thought in Bulgaria and as incentives for the development of some original theoretical contributions. Even during the first few years of Communist regime (1944–1989, with its Marxist monopoly over intellectual life, the Austrian school had some impact on the economic thought in the country. Subsequent to the collapse of Communism, there was a sort of a Renaissance and rediscovery of this school. Another contribution of our study is that it illustrates the adaptability and spontaneous evolution of ideas in a different and sometimes hostile environment.

  4. “What is so Austrian about Austrian Economics?”

    OpenAIRE

    David Colander

    2009-01-01

    Modern mainstream economics is a plurocracy in which there is no orthodoxy of ideas, only an orthodoxy of method. Given the training it provides its students, mainstream economic’s natural domain is science. With the mainstream’s acceptance of complexity views of the economy, Austrian economist’s views can now get a hearing within the mainstream. Thus, within the science of economics, there is no need for a separate Austrian economics. However, there is a need for Austrian economics in politi...

  5. The Continuing Relevance of Austrian Capital Theory

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul

    2012-01-01

    The article presents a speech by Professor Nicolai J. Foss of Copenhagen Business School, delivered at the Austrian Scholars Conference held on March 8, 2012 in Auburn, Alabama, in which he discussed the knowledge essays by economist Friedrich A. von Hayek, the concept of capital theory and the w......The article presents a speech by Professor Nicolai J. Foss of Copenhagen Business School, delivered at the Austrian Scholars Conference held on March 8, 2012 in Auburn, Alabama, in which he discussed the knowledge essays by economist Friedrich A. von Hayek, the concept of capital theory...... and the works of Hayek on political philosophy and cultural evolution....

  6. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations in the...

  7. Authenticating the Leader

    DEFF Research Database (Denmark)

    Johnsen, Christian Garmann

    As authentic leadership, with its dictum of being true to the self, has become increasingly influential among practitioners and mainstream leadership scholars, critical writers have drawn attention to the negative consequences of this development. Yet, few scholars have investigated the problem...... of authentication within discourse of authentic leadership. If authentic leadership is to make any sense, it is necessary to be able to distinguish the authentic from the inauthentic leader – in other words, it is necessary to authenticate the leader. This paper uses Gilles Deleuze’s reading of Plato as the point...... of departure for discussing the problem of authentication – separating the authentic leader form the inauthentic one – in the leadership guru Bill George’s model of authentic leadership. By doing so, the paper offers a way of conceptualizing the problem of authenticating leaders, as well as challenging...

  8. Authenticity control of game meat products--a single method to detect and quantify adulteration of fallow deer (Dama dama), red deer (Cervus elaphus) and sika deer (Cervus nippon) by real-time PCR.

    Science.gov (United States)

    Druml, Barbara; Grandits, Stephanie; Mayer, Walter; Hochegger, Rupert; Cichna-Markl, Margit

    2015-03-01

    This contribution presents a single real-time PCR assay allowing the determination of the deer content (the sum of fallow deer (Dama dama), red deer (Cervus elaphus) and sika deer (Cervus nippon)) in meat products to detect food adulteration. The PCR assay does not show cross-reactivity with 20 animal species and 43 botanical species potentially contained in game meat products. The limit of quantification is 0.5% for fallow deer and red deer and 0.1% for sika deer. The deer content in meat products is determined by relating the concentration obtained with the deer PCR assay to that obtained with a reference system which amplifies mammals and poultry DNA. The analysis of binary meat mixtures with pork, a meat mixture containing equal amounts of fallow deer, red deer and sika deer in pork and a model game sausage showed that the quantification approach is very accurate (systematic error generally <25%). Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Post-Session Authentication

    OpenAIRE

    Ahmed , Naveed; Jensen , Christian ,

    2012-01-01

    Part 1: Full Papers; International audience; Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of a...

  10. Authentication Using Mobile Phones

    OpenAIRE

    Fusek, Z.

    2015-01-01

    This project deals with authentication by a mobile device. The mobile device with the operating system Android 5.0 was chosen as authentication device. The user can perform authentication with emulation of contactless chip cards by using Host-based Card Emulation, which runs via Near Field Communication, where cryptographic keys are stored in a secure environment KeyStore. The project continues with implementation of authentication via Bluetooth LE and describes application for authentization...

  11. Guido von Pirquet: Austrian pioneer of astronautics

    Science.gov (United States)

    Sykora, F.

    1977-01-01

    The works of Guido von Pirquet, Austrian pioneer of rocketry, were assessed. Major emphasis was given to Pirquet's calculation of the route to Venus which in fact was followed by the first Russian rocket to Venus. Of interest also is Pirquet's valuable construction of a space station and his analysis of interstellar space flight.

  12. The Austrian x red pine hybrid

    Science.gov (United States)

    W. B. Critchfield

    1963-01-01

    The genetic improvement of red pine (Pinus resinosa Ait.) presents tree breeders with one of their most difficult problems. Not only is this valuable species remarkably uniform, but until 1955 it resisted all attempts to cross it with other pines. In that year red pine and Austrian pine (P. nigra var. austriaca [...

  13. The Austrian Toxoplasmosis Register, 1992-2008.

    Science.gov (United States)

    Prusa, Andrea-Romana; Kasper, David C; Pollak, Arnold; Gleiss, Andreas; Waldhoer, Thomas; Hayde, Michael

    2015-01-15

    We aimed to determine the incidence of primary gestational infections with Toxoplasma gondii and congenital toxoplasmosis in Austria, a country with a nationwide prenatal serological screening program since 1974. We analyzed retrospective data from the Austrian Toxoplasmosis Register of pregnant women with Toxoplasma infection and their offspring with births between 1992 and 2008, identified by the prenatal mandatory screening program. Treatment was administered to women from diagnosis of a Toxoplasma infection until delivery. Infected infants were treated up to 1 year of life routinely. Clinical manifestations in infected infants were monitored at least for 1 year and documented in the register. The Austrian Toxoplasmosis Register included 2147 pregnant women with suspected Toxoplasma infection. Annually, 8.5 per 10 000 women acquired Toxoplasma infection during pregnancy, and 1.0 per 10 000 infants had congenital toxoplasmosis (13% mean transmission rate). Our data showed that women treated according to the Austrian scheme had a 6-fold decrease in the maternofetal transmission rate compared to women without treatment. Results from the Austrian Toxoplasmosis Register show the efficiency of the prenatal screening program. Our results are of clinical relevance for infants, healthcare systems, and policy makers to consider preventive Toxoplasma screening as a potential tool to reduce the incidence of congenital toxoplasmosis. © The Author 2014. Published by Oxford University Press on behalf of the Infectious Diseases Society of America. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  14. Authenticating the Leader

    DEFF Research Database (Denmark)

    Garmann Johnsen, Christian

    2018-01-01

    In the wake of a series of corporate scandals, there has been a growing call for authentic leadership in order to ensure ethical conduct in contemporary organizations. Authentic leadership, however, depends upon the ability to draw a distinction between the authentic and inauthentic leader......’s inverted Platonism, the paper challenges the practice by which authentic leaders are distinguished from inauthentic leaders. In conclusion, the paper suggests that an adequate concept of authentic leadership should consider how ethics can occur when the authentic leader is able to critically reflect his...

  15. Meet meat

    NARCIS (Netherlands)

    Bekker, Gerben A.; Tobi, Hilde; Fischer, Arnout R.H.

    2017-01-01

    In this cross-cultural study we investigated how study participants from China, Ethiopia and the Netherlands operationalize the concept of meat and to what extent cultured meat fits or does not fit into this operationalization. We argue that combining the conceptual approaches symbolic boundaries

  16. Molecular assay to fraud identification of meat products.

    Science.gov (United States)

    Doosti, Abbas; Ghasemi Dehkordi, Payam; Rahimi, Ebrahim

    2014-01-01

    Detection of species fraud in meat products is important for consumer protection and food industries. A molecular technique such as PCR method for detection of beef, sheep, pork, chicken, donkey, and horse meats in food products was established. The purpose of this study was to identification of fraud and adulteration in industrial meat products by PCR-RFLP assay in Iran. In present study, 224 meat products include 68 sausages, 48 frankfurters, 55 hamburgers, 33 hams and 20 cold cut meats were collected from different companies and food markets in Iran. Genomic DNA was extracted and PCR was performed for gene amplification of meat species using specific oligonucleotid primers. Raw meat samples are served as the positive control. For differentiation between donkey's and horse's meat, the mitochondrial DNA segment (cytochrome-b gene) was amplified and products were digested with AluI restriction enzyme. Results showed that 6 of 68 fermented sausages (8.82%), 4 of 48 frankfurters (8.33%), 4 of 55 hamburgers (7.27%), 2 of 33 hams (6.6%), and 1 of 20 cold cut meat (5%) were found to contain Haram (unlawful or prohibited) meat. These results indicate that 7.58% of the total samples were not containing Halal (lawful or permitted) meat and have another meat. These findings showed that molecular methods such as PCR and PCR-RFLP are potentially reliable techniques for detection of meat type in meat products for Halal authentication.

  17. Quantitative Detection of Horse Contamination in Cooked Meat Products by ELISA.

    Science.gov (United States)

    Thienes, Cortlandt P; Masiri, Jongkit; Benoit, Lora A; Barrios-Lopez, Brianda; Samuel, Santosh A; Cox, David P; Dobritsa, Anatoly P; Nadala, Cesar; Samadpour, Mansour

    2018-05-01

    Concerns about the contamination of meat products with horse meat and new regulations for the declaration of meat adulterants have highlighted the need for a rapid test to detect horse meat adulteration. To address this need, Microbiologique, Inc., has developed a sandwich ELISA that can quantify the presence of horse meat down to 0.1% (w/w) in cooked pork, beef, chicken, goat, and lamb meats. This horse meat authentication ELISA has an analytical sensitivity of 0.000030 and 0.000046% (w/v) for cooked and autoclaved horse meat, respectively, and an analytical range of quantitation of 0.05-0.8% (w/v) in the absence of other meats. The assay is rapid and can be completed in 1 h and 10 min. Moreover, the assay is specific for cooked horse meat and does not demonstrate any cross-reactivity with xenogeneic cooked meat sources.

  18. Aeroradiometric conducted by the Austrian police

    International Nuclear Information System (INIS)

    Timal, G.

    2009-01-01

    The Austrian Police has specially trained and equipped radiation protection personnel which are intervention personnel for radiological emergencies, following the law of the Intervention Regulation, BGBl. II Nr. 145/2007. The training which consists of three consecutive courses follows the Intervention Regulation and the Austrian Standard S5207. It is held at the certified Security Academy of the Federal Ministry of the Interior in Traiskirchen near Vienna. As a follow-up training, there are special courses held for the conduction of aeroradiometric measures (radiation measurements by helicopters). All over Austria, the Police have ten aeroradiometric sets at their disposal which can be brought into action within almost no time. The contribution informs about the technics involved, the installation of the system in the helicopter and about the training for the aeroradiometric specialists. Furthermore, practical knowledge from flights conducted at trainings and exercises will be included. (orig.)

  19. Authentication Assurance Levels

    International Nuclear Information System (INIS)

    Kouzes, Richard T.; Cash, James R.; Devaney, David M.; Geelhood, Bruce D.; Hansen, Randy R.; Melton, Ronald B.; Pitts, W. Karl

    2002-01-01

    This Common Criteria approach has been applied to create a definition of Authentication Assurance Levels that can quantify the level of assurance reached for a system subject to a set of authentication procedures. The arms-control authentication application of the Common Criteria expands on more typical information security evaluations in that it must contend with information barriers and preclude sophisticated intentional subversion attempts.

  20. The voice of Austrians at CERN

    CERN Multimedia

    2009-01-01

    On 7 May the Austrian Minister for Science announced that, after over 50 years of membership, Austria would withdraw from CERN. By 18 May the Austrian Chancellor had reversed the decision. The Bulletin spoke to some of the Austrian community at CERN about the rollercoaster of events in between. var flash_video_player=get_video_player_path(); insert_player_for_external('Video/Public/Movies/2009/CERN-MOVIE-2009-056/CERN-MOVIE-2009-056-0753-kbps-640x360-25-fps-audio-64-kbps-44-kHz-stereo', 'mms://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2009/CERN-MOVIE-2009-056/CERN-MOVIE-2009-056-Multirate-200-to-753-kbps-640x360-25-fps.wmv', 'false', 533, 300, 'https://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2009/CERN-MOVIE-2009-056/CERN-MOVIE-2009-056-posterframe-640x360-at-10-percent.jpg', '1180837', true, 'Video/Public/Movies/2009/CERN-MOVIE-2009-056/CERN-MOVIE-2009-056-0600-kbps-maxH-360-25-fps-audio-128-kbps-48-kHz-stereo.mp4'); To watch this video in German click here. There was jubil...

  1. Detection of adulterations in tradictional portuguese game meat products by polymerase chain reaction technique

    OpenAIRE

    Santos, C.G.; Melo, V.S.; Amaral, J.S.; Oliveira, M.B.P.P.; Mafra, I.

    2013-01-01

    Authenticity assessment and fraud detection in processed meat products have becn attracting an increased attention driven by public health, economic and legal cancems, and also for religiolls reasons. Currcntly, ooe af the major issues conceming adulterations in the meat indust:ry regards the fraudulent substitution af higher commercial valued meat species by less expensive oDes [1]. The manufacture af traditional meat products is a long-established practice in the Northeast of Po...

  2. Multi-factor authentication

    Science.gov (United States)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  3. Meat flavour

    International Nuclear Information System (INIS)

    Rosset, R.; Liger, P.; Roussel-Ciquard, N.

    1978-01-01

    For the consumer, meat is characterized by a certain number of organoleptic qualities; among them, flavour -that is to say the association of both odour and taste- plays a leading part. This property is based upon a great number of chemical components: some volatile components are responsible for the aroma and some non-volatile ones for the taste. These substances are either made or released during the heating of the meat on account of components called precursors which are produced during the aging of the meat. The two main reactions which preside over the elaboration of flavour are: the Maillard's reaction and the autooxidation reactions. Meat flavour is associated with the animal characteristics; it is influenced by the ante- and post mortem treatments as well as by the technological treatments for storing it. The use of synthetical flavours is to be considered as possible in the future [fr

  4. Product Liability: A Neo-Austrian Based Perspective

    NARCIS (Netherlands)

    Folmer, H.; Heijman, W.J.M.; Leen, A.R.

    2002-01-01

    The paper is an exercise in a neo-Austrian based economic analysis of product liability. After a short historical introduction, we take two of the basic premises of Austrian economic thought and see which system of product liability results. If costs are subjective and entrepreneurship is the

  5. Authentication over Noisy Channels

    OpenAIRE

    Lai, Lifeng; Gamal, Hesham El; Poor, H. Vincent

    2008-01-01

    In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution attacks, are investigated for both single message and multiple message authentication scenarios. For each scenario, information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably, in both scenarios,...

  6. Authentication: Hot and cool

    OpenAIRE

    Cohen, E; Cohen, SA

    2012-01-01

    Seeking to shift the discussion of the concept of authenticity in tourism scholarship from the dominant concern with tourist experiences to the more sociological problem of the processes of authentication of tourist attractions, we conceptualize two analytically distinct, but practically often intersecting, modes of authentication of attractions, “cool” and “hot”. Through a range of examples, we demonstrate the implications of the two modes for the dynamics of the constitution of tourist attr...

  7. Review: Authentication and traceability of foods from animal origin by polymerase chain reaction-based capillary electrophoresis.

    Science.gov (United States)

    Rodríguez-Ramírez, Roberto; González-Córdova, Aarón F; Vallejo-Cordoba, Belinda

    2011-01-31

    This work presents an overview of the applicability of PCR-based capillary electrophoresis (CE) in food authentication and traceability of foods from animal origin. Analytical approaches for authenticating and tracing meat and meat products and fish and seafood products are discussed. Particular emphasis will be given to the usefulness of genotyping in food tracing by using CE-based genetic analyzers. Copyright © 2010 Elsevier B.V. All rights reserved.

  8. Sensing pressure for authentication

    NARCIS (Netherlands)

    Henderson, N.J.; White, N.M.; Veldhuis, Raymond N.J.; Hartel, Pieter H.; Slump, Cornelis H.

    The use of signals resulting from tapping a rhythm on a pressure sensor is explored for authentication. The features used for authentication can be divided into rhythm and waveform features. This paper studies the use of waveform features. A verification scheme based on prototype waveforms is

  9. Authenticity at work

    NARCIS (Netherlands)

    van den Bosch, Ralph

    2016-01-01

    Authenticity at work, loosely defined as the degree to which an individual stays true to their core self, has impact on workers in the workplace. This thesis shows that authenticity at work can be measured with a reliable and valid instrument: the IAM Work. Furthermore, results of this thesis show

  10. AUTHENTICITY IN THE BLOGOSPHERE

    Directory of Open Access Journals (Sweden)

    Waclaw Branicki

    2010-01-01

    Full Text Available The primary purpose of this article is to answer the question of whether writing a blog defined as a personal diary can help to better understand himself. Self-awareness is a prerequisite for authentic existence. In the first part analyzed the concept of authenticity. Pointed out the relationship of authenticity to the categories of freedom, truth and responsibility. The second part presents the relationship between authentic existence and the process of self-disclosure, which may take place in the blogosphere. In the third part presents the question whether a writing blog affects the level authenticity of existence. It was recognized that a key element of this phenomenon is the sense of responsibility.

  11. Proton-transfer reaction mass spectrometry (PTR-MS) for the authentication of regionally unique South African lamb

    NARCIS (Netherlands)

    Erasmus, Sara W.; Muller, Magdalena; Alewijn, Martin; Koot, Alex H.; Ruth, van Saskia M.; Hoffman, Louwrens C.

    2017-01-01

    The volatile fingerprints of South African lamb meat and fat were measured by proton-transfer mass spectrometry (PTR-MS) to evaluate it as an authentication tool. Meat and fat of the Longissimus lumborum (LL) of lambs from six different regions were assessed. Analysis showed that the volatile

  12. Communicating food safety, authenticity and consumer choice. Field experiences.

    Science.gov (United States)

    Syntesa, Heiner Lehr

    2013-04-01

    The paper reviews patented and non-patented technologies, methods and solutions in the area of food traceability. It pays special attention to the communication of food safety, authenticity and consumer choice. Twenty eight recent patents are reviewed in the areas of (secure) identification, product freshness indicators, meat traceability, (secure) transport of information along the supply chain, country/region/place of origin, automated authentication, supply chain management systems, consumer interaction systems. In addition, solutions and pilot projects are described in the areas of Halal traceability, traceability of bird's nests, cold chain management, general food traceability and other areas.

  13. Report on the Austrian Mining Conference 1981

    Energy Technology Data Exchange (ETDEWEB)

    Steinmetz, R

    1982-02-01

    The conference took place in Leoben from 19 to 22 May, 1981, under the auspices of the Montanuniversitaet Leoben and the Bergmaennischer Verband of Austria. A total of 14 talks were held, which are summarized in brief. Main topics of the talks concerned prospects of the international coal industry, concepts of Austria' energy supply, coal exploration in Austria, uranium reserves of Austria, development of international coal trade, brown coal deposits of Hungary, aspects of overburden removal in surface mines and of roadway drivage in underground mines, prediction of rock behavior in deep mines, hydraulic salt mining, and protection of an iron ore preparation plant in India by the Austrian VOEST-ALPINE AG. (In German)

  14. Discovering your authentic leadership.

    Science.gov (United States)

    George, Bill; Sims, Peter; McLean, Andrew N; Mayer, Diana

    2007-02-01

    The ongoing problems in business leadership over the past five years have underscored the need for a new kind of leader in the twenty-first century: the authentic leader. Author Bill George, a Harvard Business School professor and the former chairman and CEO of Medtronic, and his colleagues, conducted the largest leadership development study ever undertaken. They interviewed 125 business leaders from different racial, religious, national, and socioeconomic backgrounds to understand how leaders become and remain authentic. Their interviews showed that you do not have to be born with any particular characteristics or traits to lead. You also do not have to be at the top of your organization. Anyone can learn to be an authentic leader. The journey begins with leaders understanding their life stories. Authentic leaders frame their stories in ways that allow them to see themselves not as passive observers but as individuals who learn from their experiences. These leaders make time to examine their experiences and to reflect on them, and in doing so they grow as individuals and as leaders. Authentic leaders also work hard at developing self-awareness through persistent and often courageous self-exploration. Denial can be the greatest hurdle that leaders face in becoming self-aware, but authentic leaders ask for, and listen to, honest feedback. They also use formal and informal support networks to help them stay grounded and lead integrated lives. The authors argue that achieving business results over a sustained period of time is the ultimate mark of authentic leadership. It may be possible to drive short-term outcomes without being authentic, but authentic leadership is the only way to create long-term results.

  15. A Review Of Authentication Methods

    OpenAIRE

    Nilesh A. Lal; Salendra Prasad; Mohammed Farik

    2015-01-01

    Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms password entry smart card and biometric. Each authentication mechanism functions differently and has their strengths and weakness. In this paper we review different types of authentication mechanisms their vulnerabilities and recommend novel solutions.

  16. A Review Of Authentication Methods

    Directory of Open Access Journals (Sweden)

    Nilesh A. Lal

    2015-08-01

    Full Text Available Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms password entry smart card and biometric. Each authentication mechanism functions differently and has their strengths and weakness. In this paper we review different types of authentication mechanisms their vulnerabilities and recommend novel solutions.

  17. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  18. The Austrian Approach: Entering the World of Children.

    Science.gov (United States)

    Feistritzer, Patricia; Balcerack, Carl

    1979-01-01

    This photo-essay describes a Waldorf School. Developed by Austrian Rudolf Steiner, the Waldorf plan is dedicated to allowing the child a childlike environment. It emphasizes storytelling, creative dramatics, flexibility, improvisation, crafts, and movement. (SJL)

  19. Publications of the Austrian Research Centre Seibersdorf 1976-1985

    International Nuclear Information System (INIS)

    Ranz, F.; Nevyjel, A.

    1989-02-01

    About 3000 publications, written by staff members of the Austrian Research Centre Seibersdorf (OEFZS) within the period 1976-1985 are cited. The bibliography includes citations of journal articles, proceedings, books, technical reports as well as dissertations and diploma works, carried out in Seibersdorf by students of Austrian universities. It covers the subject areas of chemistry, physics, biology, radiation protection, reactor safety, isotope applications, materials technology, environmental research, mathematics and information, electronics and agriculture. 10 refs. (Author)

  20. Efforts to overcome vegetarian-induced dissonance among meat eaters.

    Science.gov (United States)

    Rothgerber, Hank

    2014-08-01

    Meat eaters face dissonance whether it results from inconsistency ("I eat meat; I don't like to hurt animals"), aversive consequences ("I eat meat; eating meat harms animals"), or threats to self image ("I eat meat; compassionate people don't hurt animals"). The present work proposes that there are a number of strategies that omnivores adopt to reduce this dissonance including avoidance, dissociation, perceived behavioral change, denial of animal pain, denial of animal mind, pro-meat justifications, reducing perceived choice, and actual behavioral change. The presence of vegetarians was speculated to cause meat eating to be a scrutinized behavior, remind meat eaters of their discomfort, and undermine the effectiveness of these strategies. It was therefore hypothesized that exposure to a description of a vegetarian would lead omnivores to embrace dissonance-reducing strategies. Supporting this hypothesis, participants who read a vignette about a vegetarian denied animal mind more than participants who read about a gluten-free individual. It was also hypothesized that omnivores would be sensitive to individual differences between vegetarians and would demonstrate using dissonance-reducing strategies more when the situation failed to provide cognitions consonant with eating meat or to reduce dissonant cognitions. Four experiments supported this prediction and found that authentic vegetarians, vegetarians freely making the decision to abandon meat, consistent vegetarians, and anticipating moral reproach from vegetarians produced greater endorsement of dissonance-reducing strategies than their counterpart conditions. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. STUDENTS’ POTENTIAL FOR AUTHENTIC LEADERSHIP

    OpenAIRE

    Djurdja Solesa-Grijak; Dragan Solesa; Nedjo Kojic

    2015-01-01

    To know yourself and to act accordingly has been seen as a moral imperative throughout history. The aim of this research was to determine potential of students for authentic leadership and relation between their authentic personality and potential for authentic leadership. The sample consisted of students (N=133) from Serbia (male – 59% and female – 41%). The average age of students was M=21.9. Instruments used were Authenticity Scale (Wood et al., 2008) and Authentic Leadership Self-Assessme...

  2. Identification and Authentication Policy

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1999-01-01

    .... We will accomplish the audit objective in two phases. In this phase, we reviewed current DoD Component policies on the use of identification and authentication controls to access information systems...

  3. Greetings from Austrian Radiation Protection Association

    International Nuclear Information System (INIS)

    Hajek, M.; Brandl, A.

    2015-01-01

    Austrian Radiation Protection Association (OVS) share with others a long-standing tradition of common endeavours and close collaboration. We have been and are able to influence the European radiation protection environment and IRPA initiatives and policies. We are intrigued by the breadth and comprehensive nature of the symposium programme, covering the most important sub-fields in our profession, and spanning topics from radiation dosimetry to radiobiology, from instrumentation and measurement to radioecology, and from radiation protection for workers and in medicine to our professional responsibilities towards the general public. These topics are timeless and current, providing testimony to the fact that the science of radiation protection is not exhausted. Novel applications of ionizing and non-ionizing radiation, including new modalities in the fields of medical therapy and diagnosis, a resurgence of nuclear energy generation in some parts of the globe, combined with increased efforts for decontamination and decommissioning of existing sites and facilities, they are all attest to the continued need for further research and our professional input and discussion. The national radiation protection associations will have a role to play in both, the advocacy of increased efforts to educate and train our future professionals and the retention of those professionals in our field.

  4. Natural radionuclides in Austrian bottled mineral waters

    International Nuclear Information System (INIS)

    Gabriele Wallner; Tania Jabbar

    2010-01-01

    All commercially available mineral waters of Austrian origin were investigated with regard to the natural radionuclides 228 Ra, 226 Ra, 210 Pb, 210 Po, 238 U and 234 U. From 1 to 1.5 L of sample the nuclides were extracted and measured sequentially: the radium isotopes as well as 210 Pb were measured by liquid scintillation counting after separation on a membrane loaded with element-selective particles (Empore Radium Disks), 210 Po was determined by α-particle spectroscopy after spontaneous deposition onto a copper planchette and uranium was determined also by α-particle spectroscopy after anion separation and microprecipitation with NdF 3 . The calculated committed effective doses for adults, teens and babies were compared to the total indicative dose of 0.1 mSv/year given in the EC Drinking Water Directive. The dominant portion of the committed effective dose was due to 228 Ra. Highly mineralised waters showed also higher 226 Ra and 228 Ra levels. (author)

  5. [Fight against epidemics: Austrian prisoners in Troyes].

    Science.gov (United States)

    Hetzel, Géraldine

    2014-01-01

    The victories near Ulm and Elchingen, where the Napoleonic army took 60000 prisoners between 15th and 20th of October 1805, lead to the arrival at Troyes (county "Aube") of nearly 2000 Austrian soldiers to be held inside former monasteries among whose, mainly the Jacobinians casern where more than half of them stayed. At the beginning of 1806, the government sent the epidemics medical practitioner Dr Desgenettes on an inspection tour to control the state of health of the populations of places where foreign prisoners were held, which lead him through several counties of the North-eastern part of France, where he surveyed several diseases ranging from all kinds offevers up to dysentery, scabies or gangrenes. With the means of acid fumigations invented by the chemist Guyton Morveau from Dijon, the authorities took care of combating and preventing the epidemics in the caserns. As soon as October 1805, the epidemics medical practitioner Dr Pigeotte from Troyes wrote to the county governor his observations recommending a better diet, airing of the rooms and also calls to take some exercise. All these precepts showed an astonishing modernity.

  6. HORA - an Austrian platform for natural hazards

    Science.gov (United States)

    Hlatky, T.

    2009-04-01

    HORA - an Austrian platform for natural hazards as a new way in risk communication One initiatives launched in Austria demonstrate that public participation not only bears the risk of a partial transfer of responsibility by the authorities; it may above all prepare the ground for entirely new approaches and create new links. The recent installation of the first internet risk zoning system in Austria underscores the importance of involving private parties in natural disaster protection. This public-private partnership (PPP) between the Federal Ministry of Agriculture, Forestry, Environment and Water Management (BMLFUW) and the Austrian Insurance Association (VVO) was launched in the wake of the 2002 flood disaster. The first project phase, the Austrian flood risk zoning system called HORA (screenshot see fig. 1), has now been accessible on the Web since 1st June 2006. In accordance with a risk partnership concluded between federal government, insurance companies and private parties, the project initiators seek to offer the public a preliminary risk assessment tool for evaluation of their home, industrial enterprise, of infrastructure. Digital risk maps shall provide information on 30-year, 100-year and 200-year flood events as they occur alongside the 26.000-km-long domestic river network. The probability with which a certain block of land is immersed in water during a flood event can be calculated by means of hydraulic engineering methods. These have traditionally relied on statistical figures, which are known to be very inaccurate, especially when major events such as flooding are concerned. The Vienna University of Technology (TU) (Institute of Hydraulic and Water Resources Engineering) has dedicated many years to developing more accurate, process oriented risk assessment techniques. The starting points was to identify different flood-triggering processes and to divide them into specific categories as long-duration rainfalls, short-duration rainfalls, storms

  7. Austrian Economics and the Transaction Cost Approach to the Firm

    Directory of Open Access Journals (Sweden)

    Nicolai J. Foss

    2009-10-01

    Full Text Available As the transaction cost theory of the firm was taking shape in the 1970s, another important movement in economics was emerging: a revival of the ‘Austrian’ tradition in economic theory associated with such economists as Ludwig von Mises and F. A. Hayek (1973; Dolan, 1976; Spadaro, 1978. As Oliver Williamson has pointed out, Austrian economics is among the diverse sources for transaction cost economics. In particular, Williamson frequently cites Hayek (e.g., Williamson, 1985, p. 8; 1991, p. 162, particularly Hayek’s emphasis on adaptation as a key problem of economic organisation (Hayek, 1945. Following Williamson’s lead, a reference to Hayek’s ‘The Use of Knowledge in Society’ (Hayek, 1945 has become almost mandatory in discussions of economic organisation (e.g., Ricketts, 1987, p. 59; Milgrom and Roberts, 1992, p. 56; Douma and Schreuder 1991, p. 9. However, there are many other potential links between Austrian and transaction cost economics that have not been explored closely and exploited.This article argues that characteristically Austrian ideas about property, entrepreneurship, economic calculation, tacit knowledge, and the temporal structure of capital have important implications for theories of economic organisation, transaction cost economics in particular. Austrian economists have not, however, devoted substantial attention to the theory of the firm, preferring to focus on business-cycle theory, welfare economics, political economy, comparative economic systems, and other areas. Until recently the theory of the firm was an almost completely neglected area in Austrian economics, but over the last decade, a small Austrian literature on the firm has emerged. While these works cover a wide variety of theoretical and applied topics, their authors share the view that Austrian insights have something to offer students of firm organisation.

  8. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  9. Information barriers and authentication

    International Nuclear Information System (INIS)

    MacArthur, D.W.; Wolford, J.K.

    2001-01-01

    Acceptance of nuclear materials into a monitoring regime is complicated if the materials are in classified shapes or have classified composition. An attribute measurement system with an information barrier can be emplo,yed to generate an unclassified display from classified measurements. This information barrier must meet two criteria: (1) classified information cannot be released to the monitoring party, and (2) the monitoring party must be convinced that the unclassified output accurately represents the classified input. Criterion 1 is critical to the host country to protect the classified information. Criterion 2 is critical to the monitoring party and is often termed the 'authentication problem.' Thus, the necessity for authentication of a measurement system with an information barrier stems directly from the description of a useful information barrier. Authentication issues must be continually addressed during the entire development lifecycle of the measurement system as opposed to being applied only after the system is built.

  10. Brand new authentic places

    DEFF Research Database (Denmark)

    Stender, Marie

    the relation and interplay between the two. This study strives to fill this gap by ethnographically tracing the process from design to occupancy including the role of branding as a means to create authenticity. The concept of authenticity is often associated with old houses and neighbourhoods, but also in new......How are places and material surroundings ascribed with meaning when new residential neighbourhoods are designed, branded and taken into use? Existing research on housing, neighbourhoods and urban design tends to take the perspective of either the architect or the user rather than to explore...... neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense...

  11. Authentic leadership to the future

    Directory of Open Access Journals (Sweden)

    Dimovski Vlado

    2012-01-01

    Full Text Available Authentic leadership is the latest evolutionary stage in leadership development and emphasizes the leader's authenticity. The construct of authenticity was researched by ancient Greek philosophers as 'know thy-self ', and 'thy true self '. Authentic leadership began to develop after 2004. The main reason why the researchers place so much attention to authentic leadership is fact that authentic leadership reaches all of the employees in organizations. Authentic leaders must identify the strengths of their followers and help them with their development and integration towards a common goal, purpose, vision and identity of the organization. Authentic leadership is seen as the final stage in the development of leadership styles, properties of this leadership style, and the consequences of this style have not been fully explored. In our paper we will explore this new style of leadership and its implications.

  12. Two-factor authentication

    CERN Document Server

    Stanislav, Mark

    2015-01-01

    During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market.

  13. Converse PUF-based authentication

    NARCIS (Netherlands)

    Kocabas, U.; Peter, Andreas; Katzenbeisser, S.; Sadeghi, A.

    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich

  14. Topic Map for Authentic Travel

    OpenAIRE

    Wandsvik, Atle; Zare, Mehdi

    2007-01-01

    E-business is a new trend in Internet use. Authentic travel is an approach to travel and travel business which helps the traveler experience what is authentic in the travel destination. But how can the traveler find those small authentic spots and organize them together to compose a vacation? E-business techniques, combined withTopic Maps, can help.

  15. Attitudes of Austrian Psychotherapists Towards Process and Outcome Monitoring.

    Science.gov (United States)

    Kaiser, Tim; Schmutzhart, Lisa; Laireiter, Anton-Rupert

    2018-03-08

    While monitoring systems in psychotherapy have become more common, little is known about the attitudes that mental health practitioners have towards these systems. In an online survey among 111 Austrian psychotherapists and trainees, attitudes towards therapy monitoring were measured. A well-validated questionnaire measuring attitudes towards outcome monitoring, the Outcome Measurement Questionnaire, was used. Clinicians' theoretical orientations as well as previous knowledge and experience with monitoring systems were associated with positive attitudes towards monitoring. Possible factors that may have led to these findings, like the views of different theoretical orientations or obstacles in Austrian public health care, are discussed.

  16. Accredited training on radiation protection for the Austrian police

    International Nuclear Information System (INIS)

    Timal, G.

    2009-01-01

    In Austria, radiological emergencies are handled following the Intervention Regulation, in force since 2007. This regulation also defines duration and content for the training of radiation protection personnel, taking advantage of the standard OeNORM S 5207 published in 2005. Radiation protection personnel of the Austrian police are trained at the Federal Security Academy in Traiskirchen near Vienna. The Federal Security Academy is a training centre certified by the Austrian Standards Institute. The poster describes the modular organisation of the training and its duration and content as well as the further trainings available to the radiation protection personnel of the Police. (orig.)

  17. A video authentication technique

    International Nuclear Information System (INIS)

    Johnson, C.S.

    1987-01-01

    Unattended video surveillance systems are particularly vulnerable to the substitution of false video images into the cable that connects the camera to the video recorder. New technology has made it practical to insert a solid state video memory into the video cable, freeze a video image from the camera, and hold this image as long as desired. Various techniques, such as line supervision and sync detection, have been used to detect video cable tampering. The video authentication technique described in this paper uses the actual video image from the camera as the basis for detecting any image substitution made during the transmission of the video image to the recorder. The technique, designed for unattended video systems, can be used for any video transmission system where a two-way digital data link can be established. The technique uses similar microprocessor circuitry at the video camera and at the video recorder to select sample points in the video image for comparison. The gray scale value of these points is compared at the recorder controller and if the values agree within limits, the image is authenticated. If a significantly different image was substituted, the comparison would fail at a number of points and the video image would not be authenticated. The video authentication system can run as a stand-alone system or at the request of another system

  18. Tools for Authentication

    International Nuclear Information System (INIS)

    White, G.

    2008-01-01

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work

  19. Learners' Perspectives on Authenticity.

    Science.gov (United States)

    Chavez, Monika M. Th.

    A survey investigated the attitudes of second language learners about authentic texts, written and oral, used for language instruction. Respondents were 186 randomly-selected university students of German. The students were administered a 212-item questionnaire (the items are appended) that requested information concerning student demographic…

  20. Tools for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-09

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  1. Facilitating Authentic Becoming

    Science.gov (United States)

    Eriksen, Matthew

    2012-01-01

    A "Model of Authentic Becoming" that conceptualizes learning as a continuous and ongoing embodied and relational process, and uses social constructionism assumptions as well as Kolb's experiential learning model as its point of departure, is presented. Through a focus on the subjective, embodied, and relational nature of organizational life, the…

  2. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the con......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review...... of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop the criterion variable. From the literature review of concept and historical data in both traditions...... analysis should complement and support corporate social responsibility, management spirituality, authentic leadership / authentic follower, and other secular research by offering a research methods bridge between empirically grounded theology and secular studies, with the common goal of improving workplace...

  3. An Austrian framework for PET quality control

    International Nuclear Information System (INIS)

    Nicoletti, R.; Dobrozemsky, G.; Minear, G.; Bergmann, H.

    2002-01-01

    Full text: The European patient protection directive (97/43 EURATOM) requires regular routine quality control (QC) of PET imaging devices. Since no standards were available covering this area and in order to comply with the directive a joint working party of the Austrian societies of nuclear medicine and of medical physics have developed a set of procedures suitable for both dedicated PET scanners and gamma cameras operating in coincidence mode (GCPET). The routine procedures proposed include both manufacturer recommended procedures and tests for specific parameters and calibration procedures. Wherever possible, procedures adapted or derived from NEMA standards publication NU 2-2001 were used to permit direct comparison with specified parameters of image quality. For dedicated PET scanners the most important procedures are the checking of detector sensitivities and the attenuation calibration scan. With full ring scanners the attenuation calibration scan is a blank scan, with partial ring devices a special attenuation calibration phantom has to be used. Test protocols are specific to manufacturer and scanner type. They are usually performed automatically overnight. In addition, some instruments require special calibrations, e.g. gain adjustments or coincidence timing calibration. GCPET procedures include the frequent assessment in coincidence mode of detector uniformity, energy resolution and system sensitivity. Common to both dedicated PET and GCPET are the regular quarterly assessment of tomographic spatial resolution and the calibration of the system for quantitative measurements. As a total performance test for both systems assessment of image quality following NU 2-2001 was included, to be carried out after major system changes or repairs. The suite of QC procedures was tested on several dedicated PET and GCPET systems including all major manufacturers' systems. Due to missing hardware or software not all tests could be performed on all systems. Some of the

  4. Avian Plasmodium in Eastern Austrian mosquitoes.

    Science.gov (United States)

    Schoener, Ellen; Uebleis, Sarah Susanne; Butter, Julia; Nawratil, Michaela; Cuk, Claudia; Flechl, Eva; Kothmayer, Michael; Obwaller, Adelheid G; Zechmeister, Thomas; Rubel, Franz; Lebl, Karin; Zittra, Carina; Fuehrer, Hans-Peter

    2017-09-29

    Insect vectors, namely mosquitoes (Diptera: Culicidae), are compulsory for malaria parasites (Plasmodium spp.) to complete their life cycle. Despite this, little is known about vector competence of different mosquito species for the transmission of avian malaria parasites. In this study, nested PCR was used to determine Plasmodium spp. occurrence in pools of whole individuals, as well as the diversity of mitochondrial cytochrome b gene sequences in wild-caught mosquitoes sampled across Eastern Austria in 2013-2015. A total of 45,749 mosquitoes in 2628 pools were collected, of which 169 pools (6.43%) comprising 9 mosquito species were positive for avian Plasmodium, with the majority of positives in mosquitoes of Culex pipiens s.l./Culex torrentium. Six different avian Plasmodium lineages were found, the most common were Plasmodium vaughani SYAT05, Plasmodium sp. Linn1 and Plasmodium relictum SGS1. In 2014, mosquitoes of the Culex pipiens complex were genetically identified and Culex pipiens f. pipiens presented with the highest number of avian Plasmodium positives (n = 37; 16.74%). Despite this, the minimum infection rate (MIR) was highest in Culex torrentium (5.36%) and Culex pipiens f. pipiens/f. molestus hybrids (5.26%). During 2014 and 2015, seasonal and annual changes in Plasmodium lineage distribution were also observed. In both years P. vaughani SYAT05 dominated at the beginning of the sampling period to be replaced later in the year by P. relictum SGS1 (2014) and Plasmodium sp. Linn1 (2015). This is the first large-scale study of avian Plasmodium parasites in Austrian mosquitoes. These results are of special interest, because molecular identification of the taxa of the Cx. pipiens complex and Cx. torrentium enabled the determination of Plasmodium prevalence in the different mosquito taxa and hybrids of this complex. Since pools of whole insects were used, it is not possible to assert any vector competence in any of the examined mosquitoes, but the results

  5. THE HUNGARIAN CRISIS: AN AUSTRIAN SCHOOL EXPLANATION

    Directory of Open Access Journals (Sweden)

    Andras Toth

    2013-07-01

    Full Text Available The Hungarian model was heralded as one of the most successful post-socialist way of integration into the globalised world economy and European economic area in the nineties. Currently, Hungary is suffering from a full-blown crisis 1996 onwards. Increasingly large number of Hungarians is losing their faith in political parties, institutions, democracy and in market economy. The government, elected in 2010 by supermajority and still enjoying a broad support despite the deepening recession, condemns the development path taken after 1989 and openly rejects the wrong model of the last 20 years. The government intends to build a new economic model following a model, which one can call a model of economic nationalism as the only way out of the crisis. The paper intends to portray, through the case of Hungary, how economy and politics is interconnected, and why political elites are choosing a credit fuelled development path. The paper intends to portray how a credit fuelled growth was induced by politics and ended up in tears. Moreover, the paper describes the consequences of pro-etatist shift in the public sentiment due to the alleged “market-failure”, which was in reality a crisis, at first place, created for political purposes by political means. This article, based on the Austrian business cycle theory, argues that the tragedy of Hungary was that it went through a government inspired spending binge in the first half of the 2000s. The deficit spending of the government was accompanied by the expansion of credit by the commercial banks, mostly denominated in Swiss francs. The combined effect of deficit spending and credit expansion was the build-up of debt and loss of cost competitiveness. The 2008 crisis ended the credit fuelled development path and has started the long and painful period of deleveraging crisis. On the other hand, the Hungarian crisis is a post-Keynesian crisis. It had broken out when the state was already heavily indebted and

  6. Authentic feminist? Authenticity and feminist identity in teenage feminists' talk.

    Science.gov (United States)

    Calder-Dawe, Octavia; Gavey, Nicola

    2017-12-01

    This article explores how young people's feminist identities take shape in conjunction with a contemporary ideal of personal authenticity: to know and to express the 'real me'. Drawing from interviews with 18 teenagers living in Auckland, New Zealand, we examine a novel convergence of authenticity and feminism in participants' identity talk. For social psychologists interested in identity and politics, this convergence is intriguing: individualizing values such as authenticity are generally associated with disengagement with structural critique and with a repudiation of politicized and activist identities. Rather than seeking to categorize authentic feminism as an instance of either 'good/collective' or 'bad/individualized' feminist politics, we use discourse analysis to examine how the identity position of authentic feminist was constructed and to explore implications for feminist politics. On one hand, interviewees mobilized authentic feminism to affirm their commitment to normative liberal values of authenticity and self-expression. At the same time, the position of authentic feminist appeared to authorize risky feminist identifications and to justify counter-normative feelings, desires, and actions. To conclude, we explore how encountering others' intolerance of authentic feminism exposed interviewees to the limits of authenticity discourse, propelling some towards new understandings of the social world and their space for action within it. © 2017 The British Psychological Society.

  7. 47. annual symposium of the Austrian Physical Society

    International Nuclear Information System (INIS)

    Kutschera, W.

    1997-01-01

    This volume contains lectures (short communications) of the 47. symposium of the Austrian Physical Society which had been held at the University of Vienna (Austria) in 1997. The following topics are included: atomic physics, molecular physics, plasma physics, solid state physics, nuclear and particle physics, biophysics, environmental physics, quantum electronics and quantum optics. (Suda)

  8. 45. Annual Convention of the Austrian Physical Society

    International Nuclear Information System (INIS)

    1995-01-01

    This volume contains lectures of the 45 th symposium of the Austrian Physical Society which had been held in Leoben, Austria in 1995. The following topics are included: Atomic physics, molecular physics, plasma physics, solid state physics, nuclear and particle physics, biophysics, environmental physics, quantum electronics and quantum optics. (Suda)

  9. 50. Annual symposium of the Austrian Physical Society

    International Nuclear Information System (INIS)

    Lippitsch, M.E.

    2000-01-01

    The conference held from 25. - 29. 9. 2000 at the University of Graz was elaborated by the Austrian society of physics in the fields of solid state physics, polymers physics, quantum electronics, electrodynamics, optics, nuclear and particle physics, atomic, molecules and plasma physics, acoustics, physics - industry - energy and physics teaching. (botek)

  10. 49. annual symposium of the Austrian Physical Society

    International Nuclear Information System (INIS)

    Blatt, R.; Maerk, T.

    1999-01-01

    This volume contains short communications of lectures and poster sessions of the 49th symposium of the Austrian Physical Society which has been held at the University of Innsbruck (Austria) in 1999. The following topics are included: atomic physics, molecular physics, plasma physics, solid state physics, nuclear and particle physics, polymer physics, biophysics, environmental physics, quantum electronics and quantum optics. (Suda)

  11. 40. annual convention 1990 of the Austrian physical society

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    Titles and abstracts of the 1990 Convention of the Austrian Physical Society, 17-21 September 1990 at Salzburg, Austria, are given. The topical sections are: 1. Atomic, Molecular- and Plasma Physics; 2. Solid State Physics; 3. Polymer Physics; 4. Nuclear- and Particle Physics; 5. Medical Physics and Biophysics. There are alltogether 193 contributions, 61 thereof of INIS interest

  12. Annual convention 1986 of the Austrian Physical Society

    International Nuclear Information System (INIS)

    1986-01-01

    There are 152 contributions, 58 thereof of INIS interest. The subject matters are indicated by the grouping of contributions into topical sessions on 1) nuclear and particle physics 2) physics of high polymers 3) atomic and plasma physics. There is additionally a session for teachers contimation training and one page informations on the Austrian Physical Society. (G.Q.)

  13. Acidification and Nitrogen Eutrophication of Austrian Forest Soils

    Directory of Open Access Journals (Sweden)

    Robert Jandl

    2012-01-01

    Full Text Available We evaluated the effect of acidic deposition and nitrogen on Austrian forests soils. Until thirty years ago air pollution had led to soil acidification, and concerns on the future productivity of forests were raised. Elevated rates of nitrogen deposition were believed to cause nitrate leaching and imbalanced forest nutrition. We used data from a soil monitoring network to evaluate the trends and current status of the pH and the C : N ratio of Austrian forest soils. Deposition measurements and nitrogen contents of Norway spruce needles and mosses were used to assess the nitrogen supply. The pH values of soils have increased because of decreasing proton depositions caused by reduction of emissions. The C : N ratio of Austrian forest soils is widening. Despite high nitrogen deposition rates the increase in forest stand density and productivity has increased the nitrogen demand. The Austrian Bioindicator Grid shows that forest ecosystems are still deficient in nitrogen. Soils retain nitrogen efficiently, and nitrate leaching into the groundwater is presently not a large-scale problem. The decline of soil acidity and the deposition of nitrogen together with climate change effects will further increase the productivity of the forests until a limiting factor such as water scarcity becomes effective.

  14. 48. annual symposium of the Austrian Physical Society

    International Nuclear Information System (INIS)

    Netzer, F.P.

    1998-01-01

    This volume contains short communications of lectures and posters of the 48 th Symposium of the Austrian Physical Society which had been held at the University of Graz (Austria) in 1998. The following topics are included: atomic physics, molecular physics, plasma physics, solid state physics, nuclear and particle physics, polymer physics, biophysics, environmental physics, quantum electronics and quantum optics. (Suda)

  15. Holocaust Studies in Austrian Elementary and Secondary Schools

    Science.gov (United States)

    Mittnik, Philipp

    2016-01-01

    This article presents arguments in support of teaching about the Holocaust and Nazism in Austria at an early age. To accomplish this, Austrian and German elementary school textbooks were analyzed for the amount of content dealing with the Holocaust and Jews; the results showed that since 1980 the amount of content on the Holocaust increased in…

  16. Report 1985 of the Austrian Research Centre Seibersdorf. Abridged version

    International Nuclear Information System (INIS)

    Schwach, G.W.

    1987-01-01

    The report gives a short survey of the work carried out by the Austrian Research Centre Seibersdorf in 1985. The working programme comprises five main areas: Energy and safety; Materials research, isotope and radiation techniques; Measuring techniques and information processing; Environmental protection, health and food; Industrial consulting. (Author)

  17. English, French, Spanish, Italian, Portuguese? Code Choice and Austrian Export

    Science.gov (United States)

    Lavric, Eva; Back, Bernhard

    2009-01-01

    This article deals with how "export oriented Austrian companies effect code choice in their business relationships with customers from Romance language speaking countries". The focus lies on the most widespread Romance languages, therefore on French, Spanish, Italian and Portuguese speaking customers.The question of code choice in export…

  18. Hospital admissions for traumatic brain injury of Austrian residents vs. of visitors to Austria.

    Science.gov (United States)

    Mauritz, Walter; Brazinova, Alexandra; Majdan, Marek; Leitgeb, Johannes

    2014-01-01

    The goal was to compare epidemiology of hospital admissions for traumatic brain injury (TBI) in Austrian residents vs. visitors to Austria. Data on all hospital admissions due to TBI (ICD-10 codes S06.0-S06.9; years 2009-2011) was provided by the Austrian Statistical Office. Data on Austrian population and on tourism (visitor numbers, nights spent) was retrieved from www.statistik.at . Age, sex, mechanism of injury, season and mortality was analysed for Austrian residents vs. visitors. Visitors contributed 3.9% to the total population and 9.2% of all TBI cases. Incidence of hospital admissions was 292/100,000/year in Austrian residents and was 727/100,000/year in visitors. Male:female ratio was 1.39:1 in Austrian residents and 1.55:1 in visitors. Austrian cases were older than visitors' cases (mean age 41 vs. 28 years). Austrian cases were distributed evenly over the seasons, while 75% of the visitors' cases happened during winter and spring. The most frequently observed causes of TBI in Austrian residents were private accidents, while sports caused almost half of the visitors' cases. Hospital mortality was lower in visitors than in Austrian residents (0.8 vs. 2.1%). Sports-related TBI of visitors causes a significant workload for Austrian hospitals. Better prevention is warranted.

  19. Haunted by the authentic

    DEFF Research Database (Denmark)

    d'Ambrosio, Luigi

    2013-01-01

    and individual interviews with relevant guests at the Italian restaurant Sticchi’s in Aalborg, Denmark. Guests have been selected for qualitative interviews on the basis of the quantitative questionnaire that random guests have filled out in February 2013. Moreover, netnographic observation of the restaurant......Research description and purpose: The purpose of this investigation is to explore Danish guests’ experience when consuming ‘authentic’ Italian food in Italian restaurants in Denmark. In this context, the aim of the research is to engage in a discussion of the concept of authenticity in ethnic food...... consumption, and the guests’ experience with and reaction to the authentic culinary experience in ethnic restaurants in the consumers’ home country. Design/Methodology: The paper methodology is based on the use of mixed methods. A collection of primary quantitative and qualitative data through a questionnaire...

  20. Challenge Measurements For Authentication

    International Nuclear Information System (INIS)

    Pitts, W. Karl

    2009-01-01

    Authentication of systems with an information barrier that protects sensitive information is difficult; in particular, the information barrier can allow a hidden switch to be implemented by the system fabricator and operator. The hidden switch is the operator's ability to subvert the measurement system and force it to produce a desired and false result. It is usually discussed in the context of an attribute measurement in which a faked item is presented in place of a real item regulated by an agreement, with the driving motivation being the ability to preserve a stock of valuable items. In simple terms, the hidden switch enables a shell game with assets, and the information barrier protects the switch. This presentation outlines challenge measurements that could be used to detect the implementation of a hidden switch and assist the authentication process.

  1. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  2. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    2018-01-01

    Authenticity is developed and deployed as a criterion variable for a theology of the workplace inquiry that combines theory and methodological development with data analysis. The goal is to show that social science method can offer an empirically valid, prophetic dimension to the study of employm......Authenticity is developed and deployed as a criterion variable for a theology of the workplace inquiry that combines theory and methodological development with data analysis. The goal is to show that social science method can offer an empirically valid, prophetic dimension to the study...... of employment and work parameters in light of religious teachings on the social question at national, organizational, or firm-specific levels. The function of a criterion variable is described, noting that the switch from a dependent variable approach introduces an open-system dynamism to social science...

  3. FPGA Authentication Methods.

    Energy Technology Data Exchange (ETDEWEB)

    Brotz, Jay Kristoffer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hymel, Ross W [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Punnoose, Ratish J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mannos, Tom [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Grant, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom); Evans, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom)

    2017-05-01

    One of the greatest challenges facing designers of equipment to be used in a nuclear arms control treaty is how to convince the other party in the treaty to trust its results and functionality. Whether the host provides equipment meant to prove treaty obligations and the inspector needs to gain that trust (commonly referred to as authentication), or the inspector provides this equipment and the host needs to gain this trust (commonly considered to be included in certification), one party generally has higher confidence in the equipment at the start of a treaty regime and the other party needs to gain that confidence prior to use. While we focus on authentication in this document—that is, the inspector gaining confidence in host-provided equipment—our conclusions will likely apply to host certification of inspector-provided equipment.

  4. Authenticity in Employment Relations

    OpenAIRE

    Tackney, Charles T.

    2014-01-01

    This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop ...

  5. Gazing behavior reactions of Vietnamese and Austrian consumers to Austrian wafers and their relations to wanting, expected and tasted liking.

    Science.gov (United States)

    Vu, Thi Minh Hang; Tu, Viet Phu; Duerrschmid, Klaus

    2018-05-01

    Predictability of consumers' food choice based on their gazing behavior using eye-tracking has been shown and discussed in recent research. By applying this observational technique and conventional methods on a specific food product, this study aims at investigating consumers' reactions associated with gazing behavior, wanting, building up expectations, and the experience of tasting. The tested food products were wafers from Austria with hazelnut, whole wheat, lemon and vanilla flavors, which are very well known in Austria and not known in Vietnam. 114 Vietnamese and 128 Austrian participants took part in three sections: The results indicate that: i) the gazing behavior parameters are highly correlated in a positive way with the wanting-to-try choice; ii) wanting to try is in compliance with the expected liking for the Austrian consumer panel only, which is very familiar with the products; iii) the expected and tasted liking of the products are highly country and product dependent. The expected liking is strongly correlated with the tasted liking for the Austrian panel only. Differences between the reactions of the Vietnamese and Austrian consumers are discussed in detail. The results, which reflect the complex process from gazing for "wanting to try" to the expected and tasted liking, are discussed in the context of the cognitive theory and food choice habits of the consumers. Copyright © 2018. Published by Elsevier Ltd.

  6. Lipid stability in meat and meat products.

    Science.gov (United States)

    Morrissey, P A; Sheehy, P J; Galvin, K; Kerry, J P; Buckley, D J

    1998-01-01

    Lipid oxidation is one of the main factors limiting the quality and acceptability of meats and meat products. Oxidative damage to lipids occurs in the living animal because of an imbalance between the production of reactive oxygen species and the animal's defence mechanisms. This may be brought about by a high intake of oxidized lipids or poly-unsaturated fatty acids, or a low intake of nutrients involved in the antioxidant defence system. Damage to lipids may be accentuated in the immediate post-slaughter period and, in particular, during handling, processing, storage and cooking. In recent years, pressure to reduce artificial additive use in foods has led to attempts to increase meat stability by dietary strategies. These include supplementation of animal diets with vitamin E, ascorbic acid, or carotenoids, or withdrawal of trace mineral supplements. Dietary vitamin E supplementation reduces lipid and myoglobin oxidation, and, in certain situations, drip losses in meats. However, vitamin C supplementation appears to have little, if any, beneficial effects on meat stability. The effect of feeding higher levels of carotenoids on meat stability requires further study. Some studies have demonstrated that reducing the iron and copper content of feeds improves meat stability. Post-slaughter carnosine addition may be an effective means of improving lipid stability in processed meats, perhaps in combination with dietary vitamin E supplementation.

  7. [Pain care in Austrian health care centers: Questionnaire study on the current status of Austrian pain clinics].

    Science.gov (United States)

    Szilagyi, I-S; Bornemann-Cimenti, H; Messerer, B; Vittinghoff, M; Sandner-Kiesling, A

    2015-12-01

    Pain clinics provide interdisciplinary therapy to treat chronic pain patients and to increase the return-to-work rate. In recent years and due to increased economic pressure in health care, a change in the management of pain in Austrian health care centers has been observed. For the analysis of the current situation, two surveys addressing all Austrian pain clinics were performed. In total, 133 heads of Austrian Anesthesia Departments were interviewed online and personally. The data from the first interview were confirmed by an additional telephone survey that was performed by one anesthetist per Austrian state (n = 9). Currently, 44 Austrian pain clinics are active. During the last 5 years, 9 pain clinics closed. Adding the current active pain clinics together, they represent a total of 17.5 full-time-operated clinics. The most common reasons for closing the pain clinics were lack of personnel (47%), lack of time resources (26%), lack of space resources (11%), and financial difficulties (11%). A reduction of >50% of operating hours during the last 3 years was reported by 9 hospitals. The reasons for not running a pain clinic were lack of personnel (36%), lack of time (25%) and department too small (16%). Estimates between actual and required clinics indicate that 49.5 full-time-operating pain clinics are lacking in Austria, resulting in 74% of the Austrian chronic pain patients not receiving interdisciplinary pain management. Our survey confirmed the closure of 9 pain clinics during the last 5 years due to lack of personnel and time. Pain clinics appear to provide the simplest economic saving potential. This development is a major concern. Although running a pain clinic seems to be expensive at the first sight, it reduces pain, sick leave, complications, and potential legal issues against health care centers, while simultaneously increasing the hospital's competitiveness. Our results show that 74% of Austrian chronic pain patients do not have access to an

  8. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  9. BIOMETRIC AUTHENTICATION USING NONPARAMETRIC METHODS

    OpenAIRE

    S V Sheela; K R Radhika

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determine...

  10. Authentication method for authenticating a first party to a second party

    NARCIS (Netherlands)

    2014-01-01

    An authentication system and method is presented for authenticating a first party to a second party, where an operation is performed on condition that the authentication succeeds. The authentication method verifies whether the first party is authenticated. If the first party is not authenticated,

  11. Foodborne gastroenteritis outbreak in an Austrian healthcare facility caused by asymptomatic, norovirus-excreting kitchen staff.

    Science.gov (United States)

    Schmid, D; Kuo, H-W; Hell, M; Kasper, S; Lederer, I; Mikula, C; Springer, B; Allerberger, F

    2011-03-01

    An outbreak of norovirus GGII.4 2006b affected an Austrian 600-bed healthcare facility from 15 to 27 March 2009. A total of 204 patients, residents and staff fitted the outbreak case definition; 17 (8.3%) were laboratory-confirmed. Foodborne origin was suspected in the 114 patient and resident cases with onset 15-18 March. A case-cohort study was performed to test the hypothesis that consumption of dishes offered on 14, 15 and 16 March (risk days) was associated with increased risk of infection. Data on food exposure of 62% (317/510) of the patient and resident cohort were available for a simultaneous retrospective cohort study. The case-cohort analysis revealed that consumption of sliced cold sausage offered on 15 March [odds ratio (OR): 3.98; 95% confidence interval (CI): 1.18-14.1], a meat dish with salad (adjusted OR: 2.2; 95% CI: 1.19-4.08) and a rolled spinach pancake (adjusted OR: 2.17; 95% CI: 1.27-3.71) on 16 March were independent risk factors. It is likely that one of the five asymptomatic excretors among the kitchen staff on duty on the risk days was the source of food contamination. The case-cohort study design was found to be a valid alternative to the retrospective cohort study design for the investigation of a suspected foodborne outbreak in a large cohort. Copyright © 2010 The Hospital Infection Society. Published by Elsevier Ltd. All rights reserved.

  12. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Petersen, Franziska Bork

    2013-01-01

    ' was understood in the Enlightenment and what techniques were used to stage the body when the concept gained currency, for instance in the writings of Rousseau. My analysis makes clear that 'bodily authenticity' on the two TV shows is achieved by strictly following gender-normative codes of beauty...... the 'authentic' ideal in a total of seven pieces. These strategies are hyperbole which exaggerates the beauty code implicit in 'authentic appearance'; multiplicity which undermines 'authenticity's' essentialism and estrangement which denies the notion of individual authorship. In conclusion, I place the staging...

  13. Authentication of beef, carabeef, chevon, mutton and pork by a PCR-RFLP assay of mitochondrial cytb gene

    OpenAIRE

    Kumar, Deepak; Singh, S. P.; Karabasanavar, Nagappa S.; Singh, Rashmi; Umapathi, V.

    2012-01-01

    Authentication of meat assumes significance in view of religious, quality assurance, food safety, public health, conservation and legal concerns. Here, we describe a PCR-RFLP (Polymerase Chain Reaction- Restriction Fragment Length Polymorphism) assay targeting mitochondrial cytochrome-b gene for the identification of meats of five most common food animals namely cattle, buffalo, goat, sheep and pig. A pair of forward and reverse primers (VPH-F & VPH-R) amplifying a conserved region (168–776 b...

  14. Multiplex-PCR As a Rapid and Sensitive Method for Identification of Meat Species in Halal-Meat Products.

    Science.gov (United States)

    Alikord, Mahsa; Keramat, Javad; Kadivar, Mahdi; Momtaz, Hassan; Eshtiaghi, Mohammad N; Homayouni-Rad, Aziz

    2017-01-01

    Species identification and authentication in meat products are important subjects for ensuring the health of consumers. The multiplex-PCR amplification and species- specific primer set were used for the identification of horse, donkey, pig and other ruminants in raw and processed meat products. Oligonucleotid primers were designed and patented for amplification of species-specific mitochondrial DNA sequences of each species and samples were prepared from binary meat mixtures. The results showed that meat species were accurately determined in all combinations by multiplex-PCR, and the sensitivity of this method was 0.001 ng, rendering this technique open to and suitable for use in industrial meat products. It is concluded that more fraud is seen in lower percentage industrial meat products than in higher percentage ones. There was also more fraud found in processed products than in raw ones. This rapid and useful test is recommended for quality control firms for applying more rigorous controls over industrial meat products, for the benefit of target consumers. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  15. Meat analog: a review.

    Science.gov (United States)

    Malav, O P; Talukder, S; Gokulakrishnan, P; Chand, S

    2015-01-01

    The health-conscious consumers are in search of nutritious and convenient food item which can be best suited in their busy life. The vegetarianism is the key for the search of such food which resembles the meat in respect of nutrition and sensory characters, but not of animal origin and contains vegetable or its modified form, this is the point when meat analog evolved out and gets shape. The consumers gets full satisfaction by consumption of meat analog due to its typical meaty texture, appearance and the flavor which are being imparted during the skilled production of meat analog. The supplement of protein in vegetarian diet through meat alike food can be fulfilled by incorporating protein-rich vegetative food grade materials in meat analog and by adopting proper technological process which can promote the proper fabrication of meat analog with acceptable meat like texture, appearance, flavor, etc. The easily available vegetables, cereals, and pulses in India have great advantages and prospects to be used in food products and it can improve the nutritional and functional characters of the food items. The various form and functional characters of food items are available world over and attracts the meat technologists and the food processors to bring some innovativeness in meat analog and its presentation and marketability so that the acceptability of meat analog can be overgrown by the consumers.

  16. Authentic leadership: becoming and remaining an authentic nurse leader.

    Science.gov (United States)

    Murphy, Lin G

    2012-11-01

    This article explores how chief nurse executives became and remained authentic leaders. Using narrative inquiry, this qualitative study focused on the life stories of participants. Results demonstrate the importance of reframing, reflection in alignment with values, and the courage needed as nurse leaders progress to authenticity.

  17. Reading Authentic Texts

    DEFF Research Database (Denmark)

    Balling, Laura Winther

    2013-01-01

    Most research on cognates has focused on words presented in isolation that are easily defined as cognate between L1 and L2. In contrast, this study investigates what counts as cognate in authentic texts and how such cognates are read. Participants with L1 Danish read news articles in their highly...... proficient L2, English, while their eye-movements were monitored. The experiment shows a cognate advantage for morphologically simple words, but only when cognateness is defined relative to translation equivalents that are appropriate in the context. For morphologically complex words, a cognate disadvantage...... word predictability indexed by the conditional probability of each word....

  18. Authentic, Original, and Valuable

    DEFF Research Database (Denmark)

    Tupasela, Aaro Mikael; Tamminen, Sakari

    2015-01-01

    The idea of genetic authenticity and origin has been an important issue within genetics for decades for scientific, political, and economic reasons. The question of where species and populations come from, as well as the linking of genetic traits to particular geographical locations, has resurfaced....... Using the case of human and non-human genetics to compare and contrast the various facets associated with genetic identity, we seek to develop a broader picture of the ways in which genetics plays an important role in stabilizing categories of origin....

  19. Technological characteristics of meat - viscosity

    OpenAIRE

    DIBĎÁK, Tomáš

    2012-01-01

    This bachelor thesis is focused on the technological characteristics of meat, mainly viscosity of meat. At the beginning I dealt with construction of meat and various types of meat: beef, veal, pork, mutton, rabbit, poultry and venison. Then I described basic chemical composition of meat and it?s characteristic. In detail I dealt with viscosity of meat. Viscosity is the ability of meat to bind water both own and added. I mentioned influences, which effects viscosity and I presented the possib...

  20. Asymmetric Mutual Social Perception of Austrians and Germans: A Social Identity Approach Assessing Implicit and Explicit Attitudes

    Directory of Open Access Journals (Sweden)

    Walter Renner

    2014-07-01

    Full Text Available Whereas Austrians tend to perceive Germans as "competent but cold", Germans tend to see Austrians as "incompetent but nice" in the sense of Fiske's Stereotype Content Model. With respect to the unequal distribution of power between Austria and Germany, which outnumbers Austria by approximately the tenfold population, Social Identity Theory (SIT predicts that Austrians will tend to devalue Germans, attempting to preserve their self-esteem and cultural identity, whereas Germans will perceive Austrians more positively. We tested this expectation with N = 31 Austrian and N = 49 German students at an Austrian university. Our hypotheses of asymmetrical mutual attitudes and massive devaluation of Germans by Austrians were confirmed by the Implicit Association Test, whereas on adjective lists as an explicit measure, Austrians described Germans more favourably, obviously out of a desire not to appear prejudiced. The results support SIT and have important implications for the development of Austrian academic education.

  1. Austrian Transition to Open Access“ 2017–2020

    Directory of Open Access Journals (Sweden)

    Bauer, Bruno

    2017-12-01

    Full Text Available In December the higher education structural funds project (Hochschulraumstrukturmittelprojekt “Austrian Transition to Open Access (AT2OA“ was authorised by the Austrian Federal Ministry of Science, Research and Economy. The 21 public universities cooperate on this project running from 2017 to 2020 in order to promote open access through concerted measures. Constitutive on OANA’s “suggestions for the implementation of Open Access in Austria” published in 2015 four subprojects have been developed. These subprojects’ main focuses are drafting an expert’s report about the financial impact of a total adjustment to open access on a national and institutional basis, the extension of existing consortium licences with an open access component, establishment of an open access publishing fund as well as the promotion of open access monographs and suitable open access infrastructures.

  2. Austrian Security Strategy: Need For Reformulation Due To Security Developments

    Science.gov (United States)

    2016-02-14

    accession to the North Atlantic Treaty Organization (NATO) as an option. Under the Austrian Constitution , the federal government wanted to maintain the...the Middle East and Africa completely overwhelmed the police at the border crossing between Austria and Hungary and Slovenia . On 14 September 2015...Hungary, Croatia, and Slovenia .33, 34, 35 At the end of October 2015 refugees broke through the barriers several times at the border crossing point

  3. Seasonality in the Austrian Economy: Common Seasonals and Forecasting

    OpenAIRE

    Kunst, Robert M.

    1992-01-01

    Abstract: Seasonal cointegration generalizes the idea of cointegration to processes with unit roots at frequencies different from 0. Here, also the dual notion of common trends, "common seasonals", is adopted for the seasonal case. Using a five-variable macroeconomic core system of the Austrian economy, it is demonstrated how common seasonals and seasonal cointegrating vectors look in practice. Statistical tests provide clear evidence on seasonal cointegration in the system. However, it is sh...

  4. UNDERSTANDING CONSUMERS' ATTITUDE TOWARD MEAT LABELS AND MEAT CONSUMPTION PATTERN

    OpenAIRE

    Rimal, Arbindra; Fletcher, Stanley M.

    2003-01-01

    This paper addressed consumers' attitude toward meat labels and the influence of different aspects of meat labels on beef, poultry and seafood consumption using a national survey data. Nutrition and ingredient information on meat labels were positively related with attitude toward meat labels as well as meat consumption frequency.

  5. Picturing the authenticity of emotions

    NARCIS (Netherlands)

    Kraemer, U.A.F.; Salmela, M.; Mayer, V.

    2009-01-01

    In our everyday lives, we talk about authentic and inauthentic emotions. Is this just a façon de parler that does not have any reference in the "real world?" I will support the thesis that it makes sense to talk about the authenticity of emotions in our everyday practice, disregarding the question

  6. Authenticity and Empathy in Education

    Science.gov (United States)

    Bialystok, Lauren; Kukar, Polina

    2018-01-01

    The educational enthusiasm for both authenticity and empathy makes a number of assumptions about universal virtues, self-hood, the role of emotion in education, and the role of the teacher. In this article, we argue that authenticity and empathy are both nebulous virtues that teachers and students are called to embody with little reflection on how…

  7. AVNG authentication features

    Energy Technology Data Exchange (ETDEWEB)

    Thron, Jonathan Louis [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; White, Greg [LLNL; Razinkov, Sergey [VNIIEF; Livke, Alexander [VNIIEF

    2010-01-01

    Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement (called authentication). An information barrier (IB) is included in the measurement system to protect the potentially classified information. To achieve both goals, the IB allows only very limited, previously agreed-on information to be displayed to the monitoring party. In addition to this limited information from the potentially classified measurement, other measurements are performed and procedures are put in place for the monitoring party to gain confidence that the material being measured is consistent with the host's declarations concerning that material. In this presentation, we will discuss the techniques used in the AVNG attribute measuring system to facilitate authentication of the verification measurements by the monitors. These techniques include measuring unclassified items while allowing more information to be displayed; having the monitor understand the system function, design, and implementation; and randomly selecting the order of measurements.

  8. Austrian Economics - The Ultimate Achievement of an Intellectual Journey

    Directory of Open Access Journals (Sweden)

    Pascal Salin

    2009-01-01

    Full Text Available In this lecture delivered November 2008 on the occasion of the presentation of the Mises Institute’s Gary G. Schlarbaum Prize for lifetime achievement in the cause of liberty, Professor Salin discusses his discovery of Austrian economics and his involvement in “the world of individual liberty,” and draws various lessons from his intellectual journey. The coherence of Austrian economics appealed to Salin—it is not a patchwork of partial theories, but a logical process of thought founded on realistic assumptions about individual action. Salin also discusses differences between the Chicago and Austrian approaches, and his views about monetary systems.The financial crisis beginning in late 2008 is not a crisis of capitalism, but of state intervention, caused by the expansionary monetary policy of the Fed. Capitalism is the solution, not the cause. There is no need to create money. There is never any balance of payments problem. What is required is tax systems more friendly to capital accumulation, a decrease in the role of the state, the end of monetary policy and, if possible, the disappearing of central banks and the IMF.

  9. The Austrian Research Centers activities in energy risks

    International Nuclear Information System (INIS)

    Sdouz, Gert

    1998-01-01

    Among the institutions involved in energy analyses in Austria the risk context is being treated by three different entities: the Energy Consumption Agency, internationally known as EVA, the Federal Environmental Protection Agency, or Urnweltbundesarnt assessing mainly the environmental risks involved and the Austrian Research Centers, working on safety and risk evaluation. The Austrian Research Center Seibersdorf draws form its proficiency in Reactor Safety and Fusion Research, two fields of experience it has been involved in since its foundation, for some 40 years now. Nuclear energy is not well accepted by the Austrian population. Therefore in our country only energy systems with advanced safety level might be accepted in the far future. This means that the development of methods to compare risks is an important task. The characteristics of energy systems featuring advanced safety levels are: A very low hazard potential and a focus on deterministic safety instead of probabilistic safety, meaning to rely on inherently safe physics concepts, confirmed by probabilistic safety evaluation results. This can be achieved by adequate design of fusion reactors, advanced fission reactors and all different renewable sources of energy

  10. Authenticity and commoditization at home

    DEFF Research Database (Denmark)

    Stender, Marie

    This paper investigates how interest and affect are entangled in the built environment of new Danish homes. The paper unfolds tensions and conflicts in the process from design through branding to occupancy of the house, and the relationship between authenticity and commoditization is explored....... In Denmark, the concept of authenticity is often associated with old houses. By way of design and branding, though, new neighbourhoods are made authentic, referring to their historical past, architectural uniqueness or sense of community. Based on a fieldwork in three new residential buildings in Copenhagen......, the paper explores the inherent paradox of the staging of authenticity. Rather than viewing the house solely from the perspective of the resident, the study ethnographically traces the entire process from design to occupancy in order to investigate how notions of value and authenticity are negotiated...

  11. State aid in the Austrian electricity industry law

    International Nuclear Information System (INIS)

    Rehulka, J.

    2009-01-01

    The present work deals with the existence of State aid in the Austrian electricity industry and focuses on three selected areas of the Austrian legal system, which are examined for their compatibility with Community law. Subject of the first part of this work is a representation of the article 87 ff Treaty of Rome and its impact on Austrian provisions on the promotion of electricity from renewable energies or on the promotion of cogeneration energy. In this context, the first principles of the European state aid law and in particular the European Court are presented regarding the existence of State aid. Here, the Rsp of the Court in connection with the use of State resources in the Rs PreussenElektra Stardust Marine and Pearle is paid in connection with para-fiscal levies special attention. The evaluation of the Austrian support model is based on PreussenElektra, Stardust Marine and Pearle. Then the system of green electricity production in Austria represented. In addition to the Community law principles (green power directive, frameworks and guidelines for environmental aid) is here in particular the 'Oekostromgesetz' and treated it's novellas. It is an intensive discussion with the Commission's decisions on the compatibility of the green power and CHP funding and the funding of the countries with state aid rules. As part of this analysis is to attempt a classification of the Commission's practice in the Community legal system. The second part of the work deals with the determination of absorbed. System utilization rates and their distribution to the network operator. After a presentation of the Community legislation (EC regulations, the internal electricity market directives) and Rsp of the European Court of Justice (Case ADBHu, Ferring, Altmark Trans) to services of general economic interest is first attempted to determine the presence of these services in the 216 Austrian legislation. Here, the question will be, entrusted with services of general economic

  12. Meat : a natural symbol.

    OpenAIRE

    Fiddes, Nick

    1989-01-01

    In Britain, and in cultures around the world, meat's significance extends beyond what might be anticipated from its nutritional utility. By looking at the academic and popular literature, and through a series of looselystructured interviews, this study investigates the range of ideas that people hold about meat in modern Britain for evidence as to what it is that makes animal flesh such an esteemed foodstuff. The principle conclusion is that meat's pre-eminence derives from ...

  13. Healthier meat and meat products: Their role as functional foods

    OpenAIRE

    Jiménez Colmenero, Francisco; Carballo, José; Cofrades, Susana

    2001-01-01

    This review deals with the implications of meat and meat products for human health. It analyses the effect of the presence or absence of various factors: fat, fatty acid composition, cholesterol, calorific value, salt, nitrite or lipid oxidation products that can cause health problems. Bearing in mind these considerations, it then describes the strategies used in animal production, treatment of meat raw material and reformulation of meat products to obtain healthier meat and meat products. Fu...

  14. Meat science research tendencies

    Directory of Open Access Journals (Sweden)

    José Arturo García Macías

    2010-12-01

    Full Text Available Meat is a high quality food due its higher protein content, besides to provide energy, vitamins particularly B complex, water and minerals, resulting in an appreciated food for humans. Even in same country, consumers search for different stuffs, since north consumers looks for meat cuts with fat and bone, whereas center-south consumers prefers fatless debones meat cuts. Modern consumers demand excellent appearance, color, taste and flavor in foods, microbiologically safe, minimal processed and curing salts, very nutritive and cheap. All these together in one single product are a hard challenge in the meat products area.

  15. [Problems of food authenticity].

    Science.gov (United States)

    Czerwiecki, Ludwik

    2004-01-01

    In this review the several data concerning food authenticity were presented. Typical examples of food adulteration were described. The most known are adulteration of vegetable and fruit products, adulteration of wine, honeys, olive oil etc. The modern analytical techniques for detection of food adulteration were discussed. Among physicochemical methods isotopic techniques (SCIRA, IRMS, SNIF-NMR) were cited. The main spectral methods are: IACPAES, PyMs, FTIR, NIR. The chromatographic techniques (GC, HPLC, HPAEC, HPTLC) with several kinds of detectors were described and the ELISA and PCR techniques are mentioned, too. The role of chemometrics as a way of several analytical data processing was highlighted. It was pointed out at the necessity of more rigorous control of food to support of all activity in area of fight with fraud in food industry.

  16. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2015-06-01

    Full Text Available This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The research included the use of an ALQ questionnaire for the estimation of leadership behavior. The components of authentic leadership are defined using factor analysis and other statistics techniques. The findings developed in this research indicated the fact that directors in educational institutions have a specific authentic leadership style. We suggest the concept of authentic leadership based on the four following factors: Communication-conformist, self-consciousness, self-discovery, and self-concept. Supporting these factors provides the directors with the possibility of obtaining a high level of authentic leadership.

  17. Application of Raman Spectroscopy for Quality Monitoring in the Meat Processing Industry

    DEFF Research Database (Denmark)

    Berhe, Daniel Tsegay

    parameters related to the final product quality. The work further shows that Raman spectroscopy has great potential for authentication of ‘ready to eat’ cooked meat products in the retail market to be used by the quality control authority. Finally, it should be stressed that the results in this thesis were...

  18. 22 CFR 92.36 - Authentication defined.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication defined. 92.36 Section 92.36... Notarial Acts § 92.36 Authentication defined. An authentication is a certification of the genuineness of... recognized in another jurisdiction. Documents which may require authentication include legal instruments...

  19. Authentic leadership: application to women leaders.

    Science.gov (United States)

    Hopkins, Margaret M; O'Neil, Deborah A

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.

  20. Authentic leadership: application to women leaders

    OpenAIRE

    Hopkins, Margaret M.; O?Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.

  1. CLOSTRIDIUM PERFRINGENS IN MEAT AND MEAT PRODUCTS.

    Science.gov (United States)

    HALL, H E; ANGELOTTI, R

    1965-05-01

    A total of 262 specimens of meat and meat dishes were examined for the presence of Clostridium perfringens. Of this total, 161 were raw, unprocessed beef, veal, lamb, pork, or chicken; 101 were processed meats and meat dishes. C. perfringens was isolated from 113 (43.1%) of these specimens. The highest percentage of contamination (82%) was found in veal cuts, and the lowest (4.7%) in sliced sandwich meats and spreads. Only 2 of the 113 isolates were shown to produce heat-resistant spores, which indicates a very low incidence (0.8%) of contamination. These findings indicate that outbreaks of C. perfringens food-borne disease in the Cincinnati area are caused principally by the contamination of the food with vegetative cells or spores of the organism after cooking. Studies of the effects of various holding temperatures on the growth of C. perfringens indicated that, in the range of 5 to 15 C, no multiplication would occur, but that viable cells would still be present at the end of a 5-day holding period. Extremely rapid growth occurred at temperatures around 45 C, and complete inhibition of growth was accomplished between 49 and 52 C.

  2. Heterocyclic amines in meat and meat products

    Directory of Open Access Journals (Sweden)

    Aliye BULGAN

    2013-06-01

    Full Text Available Heterocyclic amines (HA are the mutagenic/carcinogenic compounds which generate as a result of cooking of red meat, poultry meat and fish fillets at high temperatures. Up to 20 different HAs were detected and classified in the researches that conducted on these types of meats cooked at high temperatures. HAs are the products of Maillard reactions and the Strecker degredation of main precursors such as creatine/creatinine, aminoacid and the polysaccharides. Many physical and chemical factors effect the formation of HAs. Thus, it was reported by many researchers that utilizing coating and marination processes in addition to using natural and synthetic antioxidants and seasonings-plant extracts were effective on inhibiting/decreasing the formation of HAs. Additionally, boiling/steaming and microwave cooking methodologies were recommended instead of barbecuing, grilling or frying to inhibit/decrease the formation of HAs. The HAs formed in meat and meat products and the factors which have effects on the formation of HAs are presented in this review.

  3. Security Gaps In Authentication Factor Credentials

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Authentication factors refer to user login credentials that a user supplies to an authentication process for it to decide whether to grant or deny access. While two-factor and three-factor authentication generally provides better security than one-factor authentication the aim of this paper is to review security in individual authentication factor credentials that are in use nowadays. These credentials will be discussed in factor categories knowledge factor possession factor and inherence factor. The paper details current security gaps and some novel approaches to diminish the gaps in these authentication factors. We believe that our recommendations will inspire development of better authentication credentials and systems.

  4. Volatile compounds in meat and meat products

    Directory of Open Access Journals (Sweden)

    Monika KOSOWSKA

    Full Text Available Abstract Meaty flavor is composed of a few hundreds of volatile compounds, only minor part of which are responsible for the characteristic odor. It is developed as a result of multi-directional reactions proceeding between non-volatile precursors contained in raw meat under the influence of temperature. The volatile compounds are generated upon: Maillard reactions, lipid oxidation, interactions between Maillard reaction products and lipid oxidation products as well as upon thiamine degradation. The developed flavor is determined by many factors associated with: raw material (breed, sex, diet and age of animal, conditions and process of slaughter, duration and conditions of meat storage, type of muscle, additives applied and the course of the technological process. The objective of this review article is to draw attention to the issue of volatile compounds characteristic for meat products and factors that affect their synthesis.

  5. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...... is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection....

  6. HERMA-Heartbeat Microwave Authentication

    Science.gov (United States)

    Lux, James Paul (Inventor); Chow, Edward (Inventor); McKee, Michael Ray (Inventor); Haque, Salman-ul Mohammed (Inventor); Tkacenko, Andre (Inventor)

    2018-01-01

    Systems and methods for identifying and/or authenticating individuals utilizing microwave sensing modules are disclosed. A HEaRtbeat Microwave Authentication (HERMA) system can enable the active identification and/or authentication of a user by analyzing reflected RF signals that contain a person's unique characteristics related to their heartbeats. An illumination signal is transmitted towards a person where a reflected signal captures the motion of the skin and tissue (i.e. displacement) due to the person's heartbeats. The HERMA system can utilize existing transmitters in a mobile device (e.g. Wi-Fi, Bluetooth, Cellphone signals) as the illumination source with at least one external receive antenna. The received reflected signals can be pre-processed and analyzed to identify and/or authenticate a user.

  7. Quantum direct communication with authentication

    International Nuclear Information System (INIS)

    Lee, Hwayean; Lim, Jongin; Yang, HyungJin

    2006-01-01

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states

  8. Biometric authentication and authorisation infrastructures

    OpenAIRE

    Olden, Matthias

    2010-01-01

    Nowadays, replacing traditional authentication methods with authentication and authorization infrastructures (AAIs) comes down to trading several passwords for one master password, which allows users to access all services in a federation. Having only one password may be comfortable for the user, but it also raises the interest of potential impostors, who may try to overcome the weak security that a single password provides. A solution to this issue would be a more-factor AAI, combining the p...

  9. Some remarks on the Austrian radiation protection legislation

    International Nuclear Information System (INIS)

    Vetter, H.

    1979-01-01

    Some of the provisions of the Austrian Radiation Protection Law and Radiation Protection Ordinance differ from those recommended by ICRP and IAEO. This is particularly true for the definition of working conditions, the categorization of radiation areas and the classification of radiation workers. It is suggested that the responsible authorities when considering a revision of the legislation in the light of ICRP 26 and the revised IAEA Basic Safety Standards, also study the desirability of adapting the currently applicable provisions to the universally accepted international norms. (Auth.)

  10. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  11. Emission factors of Austrian industry production and international comparison. Final report

    International Nuclear Information System (INIS)

    Turi, K.

    1997-05-01

    During the last few years a number of measures have been implemented in the Austrian industries to reduce air pollution and energy use. Therefore specific emissions in the various sectors were changed considerably during this period. The aim of this research project was to better characterize air pollutant emissions of the Austrian industry. Emission data as measured by the Austrian industry was compared with published emission factors from international literature. The results show that the emission factors of the Austrian industry are generally lower than literature emission factors. This is because on the one hand many older data from the literature do not reflect current state of the knowledge, and on the other hand because emission reduction measures and new technologies were introduced in the Austrian industry. (author)

  12. Meat and meat product preservation by ionizing radiation

    International Nuclear Information System (INIS)

    Egginger, R.

    A brief summary is given of experience with the preservation of meat and meat products by ionizing radiation, or by combined methods. The results of the research have proved that hygienically significant microorganisms (mainly salmonellas) are reliably destroyed and that the consumption of thus irradiated meat and meat products presents no danger to human health. (B.S.)

  13. Authenticity in art

    International Nuclear Information System (INIS)

    Fleming, S.J.

    1975-01-01

    After a general introductory chapter, the subject is treated under three headings: paintings, ceramics and metals. The scientific tests for authenticity are described in their application to one or more of these branches of art. The traditional method of visual stylistic judgement is compared with and supplemented by scientific methods which (as well as 'wet' chemical analysis, optical microscopy, ultraviolet, infrared, electron and X-ray microscopy, X-ray crystallography and X-ray fluorescence, and direct age determination) include the following or more direct 'nuclear' interest: neutron (or proton, deuteron and high-energy photon) activation analysis for determining impurity and trace element content, gamma radiography for bronzes, neutron autoradiography or examining paintings, radiocarbon dating, other isotope dating (e.g. with lead isotopes and the radium-lead ratio), high temperature thermoluminescence for ceramics, and mass spectroscopy to determine isotope ratios indicative of particular sources of materials. As well as the reference in each chapter there is an additional bibliography. (U.K.)

  14. 4th February 2011 - Austrian Academy of Sciences President H. Denk visiting CMS underground area with Collaboration Spokesperson G. Tonelli, Austrian Academy of Sciences Secretary General A. Suppan, CERN Head of International Relations F. Pauss and Director, High Energy Physics Laboratory, Austrian Academy of Sciences C Fabjan.

    CERN Multimedia

    Maximilien Brice

    2011-01-01

    4th February 2011 - Austrian Academy of Sciences President H. Denk visiting CMS underground area with Collaboration Spokesperson G. Tonelli, Austrian Academy of Sciences Secretary General A. Suppan, CERN Head of International Relations F. Pauss and Director, High Energy Physics Laboratory, Austrian Academy of Sciences C Fabjan.

  15. Prevalence and antibiotic resistance of Salmonella spp. in meat products, meat preparations and minced meat

    Science.gov (United States)

    Rašeta, M.; Mrdović, B.; Janković, V.; Bečkei, Z.; Lakićević, B.; Vidanović, D.; Polaček, V.

    2017-09-01

    This study aimed to determine Salmonella spp. prevalence in meat products, meat preparations and minced meat. Over a period of three years, a total of 300 samples were taken (100 RTE meat products, 100 meat preparations and 100 minced meat) and examined for the presence of Salmonella spp. Sampling was carried out at the warehouses of the food manufacturers. Salmonella spp. were not detected in RTE meat products, while 7% of semi-finished meat products (fresh sausages, grill meat formed and unformed) contained Salmonella, as did 18% of minced meats (minced pork II category, minced beef II category, mixed minced meat). The 25 Salmonella isolates obtained were examined for antibiotic resistance by the disk diffusion test, according to the NCCLS and CLSI guidelines. Isolates showed resistance to ampicillin and nalidixic acid (80%), tetracycline (72%), cefotaxime/clavulanic acid (48%), but not to gentamicin (8%) or trimethoprim/sulfamethoxazole (0%).

  16. Analytical methods used for the authentication of food of animal origin.

    Science.gov (United States)

    Abbas, Ouissam; Zadravec, Manuela; Baeten, Vincent; Mikuš, Tomislav; Lešić, Tina; Vulić, Ana; Prpić, Jelena; Jemeršić, Lorena; Pleadin, Jelka

    2018-04-25

    Since adulteration can have serious consequences on human health, it affects market growth by destroying consumer confidence. Therefore, authentication of food is important for food processors, retailers and consumers, but also for regulatory authorities. However, a complex nature of food and an increase in types of adulterants make their detection difficult, so that food authentication often poses a challenge. This review focuses on analytical approaches to authentication of food of animal origin, with an emphasis put on determination of specific ingredients, geographical origin and adulteration by virtue of substitution. This review highlights a current overview of the application of target approaches in cases when the compound of interest is known and non-target approaches for screening issues. Papers cited herein mainly concern milk, cheese, meat and honey. Moreover, advantages, disadvantages as well as challenges regarding the use of both approaches in official food control but also in food industry are investigated. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. 69 The Multicultural Education in Bucovina during the Austrian Domination

    Directory of Open Access Journals (Sweden)

    Vasile Baltag

    2014-12-01

    Full Text Available In 1775, the territory of Bucovina became part of the Habsburg monarchy and it stayed like that for 143 years. All throughout this period when the Romanians lived here next to Ukrainians, Germans, Jews and other nationalities, the Austrian government took into consideration their need for culture, which resulted in the development of a multicultural teaching system. This implied that the languages of teaching in the Bukovinian schools were: Latin, Greek, Romanian, Ukrainian and, more often than not, German. Although the weighty presence of the German language in the academic institutions limited the number of young Romanians in schools, the teaching in German enabled the access of the Bukovinian students to the great European universities from Vienna, Salzburg, Lemberg, Kraków or Prague, before the founding of the Chernivtsi University (1875. Thus, beyond the negative aspects of the separation of this territory from Romania, the Austrian occupation represented an effervescent period from a cultural viewpoint, which lent a specific identity to the teaching system in Bukovina.

  18. Radiation dosimetry and standards at the austrian dosimetry laboratory

    International Nuclear Information System (INIS)

    Leitner, A.

    1984-10-01

    The Austrian Dosimetry Laboratory, established and operated in cooperation between the Austrian Research Center Seibersdorf and the Federal Office of Metrology and Surveying (Bundesamt and Eich- und Vermessungswesen) maintains the national primary standards for radiation dosimetry. Furthermore its tasks include routine calibration of dosemeters and dosimetric research. The irradiation facilities of the laboratory comprise three X-ray machines covering the voltage range from 5 kV to 420 kV constant potential, a 60 Co teletherapy unit, a circular exposure system for routine batch calibration of personnel dosemeters with four gamma ray sources ( 60 Co and 137 Cs) and a reference source system with six gamma ray sources ( 60 Co and 137 Cs). In addition a set of calibrated beta ray sources are provided ( 147 Pm, 204 Tl and 90 Sr). The dosimetric equipment consists of three free-air parallelplate ionization chambers serving as primary standards of exposure for the X-ray energy region, graphite cavity chambers with measured volume as primary standards for the gamma radiation of 137 Cs and 60 Co as well as different secondary standard ionization chambers covering the dose rate range from the natural background level up to the level of modern therapy accelerators. In addition for high energy photon and electron radiation a graphite calorimeter is provided as primary standard of absorbed dose. The principle experimental set-ups for the practical use of the standards are presented and the procedures for the calibration of the different types of dosemeters are described. (Author)

  19. Sika deer (Cervus nippon)-specific real-time PCR method to detect fraudulent labelling of meat and meat products.

    Science.gov (United States)

    Kaltenbrunner, Maria; Hochegger, Rupert; Cichna-Markl, Margit

    2018-05-08

    Since game meat is more valuable and expensive than meat from domesticated animal species it is a potential target for adulteration. Analytical methods must allow the identification and quantification of meat species to be applicable for the detection of fraudulent labelling. We developed a real-time PCR assay for the authentication of sika deer (Cervus nippon) and products thereof. The primer/probe system amplifies a 71 bp fragment of the kappa-casein precursor gene. Since the target sequence contained only one sika deer-specific base, we introduced a deliberate base mismatch in the forward primer. The real-time PCR assay did not show cross-reactivity with 19 animal and 49 plant species tested. Low cross-reactivity was observed with red deer, fallow deer, reindeer and moose. However, with a ΔCt value of ≥11.79 between sika deer and the cross-reacting species, cross-reactivity will not affect the accuracy of the method. LOD and LOQ, determined by analysing serial dilutions of a DNA extract containing 1% (w/w) sika deer DNA in pig DNA, were 0.3% and 0.5%, respectively. The accuracy was evaluated by analysing DNA mixtures and DNA isolates from meat extract mixtures and meat mixtures. In general, recoveries were in the range from 70 to 130%.

  20. The Meat City

    DEFF Research Database (Denmark)

    Thelle, Mikkel

    2017-01-01

    This article investigates the emergence of the Copenhagen slaughterhouse, called the Meat City, during the late nineteenth century. This slaughterhouse was a product of a number of heterogeneous components: industrialization and new infrastructures were important, but hygiene and the significance...... of Danish bacon exports also played a key role. In the Meat City, this created a distinction between rising production and consumption on the one hand, and the isolation and closure of the slaughtering facility on the other. This friction mirrored an ambivalent attitude towards meat in the urban space: one...... where consumers demanded more meat than ever before, while animals were being removed from the public eye. These contradictions, it is argued, illustrate and underline the change of the city towards a ‘post-domestic’ culture. The article employs a variety of sources, but primarily the Copenhagen...

  1. Meat for keeps

    International Nuclear Information System (INIS)

    Niemand, J.G.

    1981-01-01

    The advantages of gamma irradiation as a food preservation technique for meat are such that the author envisages its wide acceptance and application during this decade both locally and internationally

  2. Finding horse meat in beef products--a global problem.

    LENUS (Irish Health Repository)

    O'Mahony, P J

    2013-06-01

    The Food Safety Authority of Ireland (FSAI) oversees the implementation of food safety controls in Ireland which are set out in EU and Irish law. The FSAI, a science-based consumer protection organization, has nurtured a close relationship with the scientific community allowing it to utilize the best scientific advice available to underpin risk assessments. In early 2013, a 2-month long investigation in to the authenticity of beef products culminated in the publication of results that demonstrated the presence of horse meat in a frozen burger produced in Ireland. The events that followed revealed a pan-European food fraud which will likely result in significant changes in the way this small section of the meat industry will be regulated in the future in the EU. Although revelations of implicated products and food businesses have relented, the EU-wide investigation is continuing in an effort to determine how a food fraud of this scale could have occurred in such a highly regulated industry and who was involved. The FSAI initially received some criticism after publication of the results, but was also commended for its scientific approach as well as its openness and transparency. The end result of this incident is likely to be that the complexity of the food chain will be addressed again and DNA-based or similar methods will become a regular feature in verifying the authenticity of meat-based foods.

  3. Meat spoilage during distribution.

    Science.gov (United States)

    Nychas, George-John E; Skandamis, Panos N; Tassou, Chrysoula C; Koutsoumanis, Konstantinos P

    2008-01-01

    Meat spoilage during distribution can be considered as an ecological phenomenon that encompasses the changes of the available substrata (e.g., low molecular compounds), during the prevailing of a particular microbial association, the so-called specific spoilage organisms (SSO). In fact, spoilage of meat depends on an even smaller fraction of SSO, called ephemeral spoilage organisms (ESO). These ESO are the consequence of factors that dynamically persist or imposed during, e.g., processing, transportation and storage in the market. Meanwhile spoilage is a subjective judgment by the consumer, which may be influenced by cultural and economic considerations and background as well as by the sensory acuity of the individual and the intensity of the change. Indeed, when spoilage progresses, most consumers would agree that gross discoloration, strong off-odors, and the development of slime would constitute the main qualitative criteria for meat rejection. On the other hand, meat industry needs rapid analytical methods or tools for quantification of these indicators to determine the type of processing needed for their raw material and to predict remaining shelf life of their products. The need of an objective evaluation of meat spoilage is of great importance. The use of metabolomics as a potential tool for the evaluation of meat spoilage can be of great importance. The microbial association of meat should be monitored in parallel with the estimation of changes occurring in the production and/or assimilation of certain compounds would allow us to evaluate spoilage found or produced during the storage of meat under different temperatures as well as packaging conditions.

  4. Advancements in meat packaging.

    Science.gov (United States)

    McMillin, Kenneth W

    2017-10-01

    Packaging of meat provides the same or similar benefits for raw chilled and processed meats as other types of food packaging. Although air-permeable packaging is most prevalent for raw chilled red meat, vacuum and modified atmosphere packaging offer longer shelf life. The major advancements in meat packaging have been in the widely used plastic polymers while biobased materials and their integration into composite packaging are receiving much attention for functionality and sustainability. At this time, active and intelligent packaging are not widely used for antioxidant, antimicrobial, and other functions to stabilize and enhance meat properties although many options are being developed and investigated. The advances being made in nanotechnology will be incorporated into food packaging and presumably into meat packaging when appropriate and useful. Intelligent packaging using sensors for transmission of desired information and prompting of subsequent changes in packaging materials, environments or the products to maintain safety and quality are still in developmental stages. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Designing Pu600 for Authentication

    International Nuclear Information System (INIS)

    White, G.

    2008-01-01

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work

  6. Designing Pu600 for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-10

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work.

  7. Designing assignment using authentic assessment

    Science.gov (United States)

    Arlianty, Widinda Normalia; Febriana, Beta Wulan; Diniaty, Artina; Fauzi'ah, Lina

    2017-12-01

    This research is conducted to get an overview of the use of authentic assessment in the department of chemistry education, Islamic University of Indonesia. This research was conducted on the students of semester five, odd semester of academic year 2016/2017. Authentic assessment is an assessment process that is capable of measuring the knowledge, attitudes and skills of learners. Chemistry teacher candidates are required to be equipped with teaching and judging skills. Teachers were required can design and carry out assessment of the process and learning outcomes of students in an objective, accountable, and informative. Teacher creativity is required in the assessment. Therefore, authentic assessment is very appropriate used to improve the competence of students in education department as teachers candidates in the preparation of learning assessments.

  8. Information systems for administration, clinical documentation and quality assurance in an Austrian disease management programme.

    Science.gov (United States)

    Beck, Peter; Truskaller, Thomas; Rakovac, Ivo; Bruner, Fritz; Zanettin, Dominik; Pieber, Thomas R

    2009-01-01

    5.9% of the Austrian population is affected by diabetes mellitus. Disease Management is a structured treatment approach that is suitable for application to the diabetes mellitus area and often is supported by information technology. This article describes the information systems developed and implemented in the Austrian disease management programme for type 2 diabetes. Several workflows for administration as well as for clinical documentation have been implemented utilizing the Austrian e-Health infrastructure. De-identified clinical data is available for creating feedback reports for providers and programme evaluation.

  9. Introduction to Methods Demonstrations for Authentication

    International Nuclear Information System (INIS)

    Kouzes, Richard T.; Hansen, Randy R.; Pitts, W. K.

    2002-01-01

    During the Trilateral Initiative Technical Workshop on Authentication and Certification, PNNL will demonstrate some authentication technologies. This paper briefly describes the motivation for these demonstrations and provide background on them

  10. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    This paper examines the problem of providing a robust non-invasive authentication service for mobile users in a smart environment. We base our work on the persistent authentication model (PAISE), which relies on available sensors to track principals from the location where they authenticate, e.......g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users...... in the environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score...

  11. Authentic Leadership: Application to Women Leaders

    Directory of Open Access Journals (Sweden)

    Margaret M. Hopkins

    2015-07-01

    Full Text Available This article provides an overview and critique of authentic leadership, with particular arguments given to support the premise that authentic leadership is a gendered representation of leadership.

  12. Polymeric self-authenticating banknotes

    Science.gov (United States)

    Zientek, Paul

    1998-04-01

    This paper discusses a new concept in overt security called the self-authenticating banknote. The self-authenticating banknote concept is built around the transparent window feature of the polymer banknote. This feature allows the incorporation of transmission based optical devices on a banknote so that the user, by folding the note over on itself and looking through an optical device which is a part of the note itself, can visually inspect and verify certain security features on the banknote. This paper presents a number of examples of optical devices which are presently being developed for this purpose.

  13. Development and validation of a rapid test system for detection of pork meat and collagen residues.

    Science.gov (United States)

    Masiri, J; Benoit, L; Barrios-Lopez, B; Thienes, C; Meshgi, M; Agapov, A; Dobritsa, A; Nadala, C; Samadpour, M

    2016-11-01

    Mislabeling, contamination, and economic adulteration of meat products with undeclared pork tissues are illegal under regulations promulgated by numerous regulatory agencies. Nonetheless, analysis of the European meat industry has revealed pervasive meat adulteration, necessitating more extensive application of meat authentication testing. As existing methods for meat speciation require specialized equipment and/or training, we developed a detection system based on a lateral flow device (LFD) assay format capable of rapidly (~35min) identifying porcine residues derived from raw meat, cooked meat, and gelatin down to 0.01%, 1.0%, and 2.5% contamination, respectively. Specificity analysis revealed no cross-reactivity with meat derived from chicken, turkey, horse, beef, lamb, or goat. Comparison with a commercial ELISA kit and PCR method revealed similar if not improved sensitivity, with the added feature that the LFD-based system required considerably less time to perform. Accordingly, this test system should aid the food industry and food control authorities in monitoring for adulteration with pork. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    Science.gov (United States)

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  15. Actualization and enlargement of the Upper Austrian emission inventory

    International Nuclear Information System (INIS)

    Winiwarter, W.; Schimak, G.; Raup, N.

    2001-06-01

    The functionality of the Upper Austrian emission inventory has been increased by simplifying the evaluation routines. Thus access to existing data will be simplified. This version 2.0 not only improves evaluation procedures already in place, but also allows to retrieve annual information on point sources, as routinely reported by the individual industrial facilities on an annual basis. In the same way as for such point source information, also statistical information is used to derive annual emission changes. This is currently limited to the sector of domestic heating, where emissions are directly influenced by climate parameters that can be easily obtained. Trend analysis currently is not possible due to the limited number of sectors included. First conclusions on the temporal behavior of emissions are still possible and are discussed here. Likewise, additional plausibility checks are facilitated by using temporal emission changes, which will help improve data quality. (author)

  16. A Thought Experiment Comparing Austrian and Keynesian Stimulus Packages

    Directory of Open Access Journals (Sweden)

    Wladimir Kraus

    Full Text Available Essentially, there are two competing views of how to overcome an economy-wide recession/depression. The Austrian view understands the free-play of competition as the most potent means to overcome the short-run mismatch between an excessive boom-level of nominal wages/prices and depressed crisis-level volume of aggregate spending. In the Keynesian view, the disastrous mismatch between desired saving and planned investment inherent in capitalist economies requires the government to step in and take up the burden of spending to infuse the lacking demand for products and labor.The thought experiment presented in the paper is designed to provide the reader with a direct comparison of major analytical claims of the two competing approaches to assess the ability of each of the two to affect, positively or negatively, employment, capital accumulation, and the general standard of living/real wages.

  17. Lay theories of suicide among Austrian psychology undergraduates.

    Science.gov (United States)

    Voracek, Martin; Loibl, Lisa Mariella; Lester, David

    2007-01-01

    Lester and Bean's (1992) Attribution of Causes to Suicide Scale gauges lay theories of suicide including intrapsychic problems, interpersonal conflicts, and societal forces as causes. Results obtained with its German form (n=165 Austrian psychology undergraduates) showed no sex differences and no social-desirability effects. Intriguingly, all three subscales were moderately intercorrelated, thereby indicating respondents' general agreement (or disagreement) with all three theories. Thus, the critical dimension of lay theories of suicide appears to be the belief that suicide has definite causes (regardless of type) versus that it is without causes (unpredictable). In addition, religiosity was positively associated (and overall knowledge about suicide negatively associated) with belief in intrapsychic causes, whereas liberal political views were negatively associated with belief in interpersonal causes.

  18. Austrian WBC intercomparison by means of a BOMAB phantom

    Energy Technology Data Exchange (ETDEWEB)

    Castellani, C.M.; Battisti, P.; Tarroni [ENEA, Centro Ricerche Ezio Clementel, Bologna (Italy). Dipt. Ambiente; Edelmeier, R. [Bundesamt fuer Eich- und Vermessungswesen, Wien (Austria)

    1998-07-01

    The paper discusses the results obtained in the intercomparison between the Austrian Institute for Legal Metrology and the ENEA (National Agency for New Technology, Energy and the Environment) Institute for Radiation Protection, which gave a BOMAB phantom. Values related to potassium content and MBA (minimum detectable activity) for each identified nuclide are also discussed. [Italian] L'Istituto Austriaco di Metrologia Legale ha organizzato l'interconfronto usando un fantoccio gelificato di tipo BOMAB fornito dall'Istituto di Radioprotezione dell'ENEA nel periodo marzo-giugno 1996. Vengono riportati i risultati ottenuti relativi al contenuto di potassio e all'attivita' minima rilevabile (MDA) per ogni nuclide identificato.

  19. 51. Annual symposium of the Austrian Physical Society

    International Nuclear Information System (INIS)

    Oberhummer, H.

    2001-01-01

    The 51th Symposium of the Austrian Physical Society was held from 17-21 September 2001 at the Technical University of Vienna (Austria). The topics covered deal with: energy (greenhouse effect, climatic change, environment protection, energy system transformation, innovative energy technologies), neutrons and synchrotron radiation, quantum mechanics, microscopy, accelerator-driven systems, physics aspects of radiotherapy, nano world, micro cosmos, modern physics, life in the universe, x-ray fluorescence, heavy-ion accelerator mass spectrometry, acoustics, atomic-, molecular- and plasma physics, solid-state physics, nuclear and particle physics, medical-, bio-and environmental physics, quantum electronics, electrodynamics and optics. Those contributions which are in the INIS subject scope are indexed separately. (nevyjel)

  20. 64th Annual Meeting of the Austrian Physical Society

    International Nuclear Information System (INIS)

    2014-01-01

    The 64th Annual Meeting of the Austrian physical society, including a special topical Energy Day. was held at the Echophysics – European Centre for the History of Physics, Schloss Pöllau 1, 8225 Pöllau, Austria. The plenary sessions gave an overview of the present status of research in quantum mechanics, particle physics and solid state physics.The topical sessions were dedicated to: nuclear and particle physics; atoms, molecules, quantum optics and plasmas; solid state physics and research with neutron and synchrotron radiation; history of physics; surfaces, interfaces and thin films; nanostructures; fundamental interactions; gravity, quantum chromodynamics; particle theory and collider physics; detectors and methods. Those contributions which are in the INIS subject scope are indexed individually

  1. The radiation protection units of the Austrian fire brigades

    International Nuclear Information System (INIS)

    Aspek, W.; Schoenhacker, S.

    2009-01-01

    Since the 1960s, Austrian fire brigades have been involved in radiation protection. With the preparations for the NPP Zwentendorf and the building of the research reactor in Seibersdorf, the first radiation protection units of the fire brigade were founded. 45 years later: The NPP Zwentendorf never saw its start-up, the use of nuclear energy for the production of electricity is prohibited by a constitutional law, and the research reactor is being decommissioned. What's left are the radiation protection units of the fire brigades. The contribution gives an overview of similarities and differences of the radiation protection units in the nine federal states of Austria, with a special focus on equipment, training and organisation. Nation-wide guidelines and regulations for the tactics of first responders at radiological emergencies are presented and a couple of incidents will be analysed. (orig.)

  2. Replacement of Pork Meat with Pork Head Meat for Frankfurters

    Science.gov (United States)

    Choi, Yun-Sang; Hwang, Ko-Eun; Kim, Hyun-Wook; Song, Dong-Heon; Jeon, Ki-Hong; Park, Jong-Dae; Sung, Jung-Min; Kim, Young-Boong; Kim, Cheon-Jei

    2016-01-01

    The effect of reducing pork meat concentrations from 50% to 30% and replacing it with up to 20% pork head meat on chemical composition, cooking characteristics, physicochemical and textural properties, apparent viscosity, and sensory characteristics of frankfurters was determined. The highest moisture content in frankfurters was found in the control and T1 (frankfurter with 45% pork meat + 5% pork head). Protein and fat contents in frankfurters with pork head meat added were significantly (ppork head meat was increased from 0% to 20%, cooking loss, total expressible fluid separation, fat separation, and pH of frankfurters were increased, while the lightness, redness, yellowness, and apparent viscosity of frankfurters were decreased. Ash contents, cohesiveness, color, and tenderness of sensory characteristics of frankfurters added with different amounts of pork meat or pork head meat were not significantly (p>0.05) different from those of the control or there treatments. Frankfurters in T4 (frankfurter with 30% pork meat + 20% pork head) had the lowest (p0.05) from that in the control. Frankfurters with higher pork head meat concentrations had lower flavor, juiciness, and overall acceptability scores. Therefore, replacing pork meat with pork head meat in the formulation could successfully produce results similar to those of control frankfurters. The best results were obtained when 10% pork head meat was used to replace pork meat. PMID:27621683

  3. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori

    2015-01-01

    propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  4. Authentic Montessori: The Teacher Makes the Difference

    Science.gov (United States)

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  5. Developmental Changes in Judgments of Authentic Objects

    Science.gov (United States)

    Frazier, Brandy N.; Gelman, Susan A.

    2009-01-01

    This study examined the development of an understanding of authenticity among 112 children (preschoolers, kindergarten, 1st graders, and 4th graders) and 119 college students. Participants were presented with pairs of photographs depicting authentic and non-authentic objects and asked to pick which one belongs in a museum and which one they would…

  6. 7 CFR 1.22 - Authentication.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to make...

  7. 22 CFR 92.37 - Authentication procedure.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication procedure. 92.37 Section 92.37... Notarial Acts § 92.37 Authentication procedure. (a) The consular officer must compare the foreign official...) Where the State law requires the consular officer's certificate of authentication to show that the...

  8. Integrity of nuclear genomic deoxyribonucleic acid in cooked meat: Implications for food traceability.

    Science.gov (United States)

    Aslan, O; Hamill, R M; Sweeney, T; Reardon, W; Mullen, A M

    2009-01-01

    It is essential to isolate high-quality DNA from muscle tissue for PCR-based applications in traceability of animal origin. We wished to examine the impact of cooking meat to a range of core temperatures on the quality and quantity of subsequently isolated genomic (specifically, nuclear) DNA. Triplicate steak samples were cooked in a water bath (100 degrees C) until their final internal temperature was 75, 80, 85, 90, 95, or 100 degrees C, and DNA was extracted. Deoxyribonucleic acid quantity was significantly reduced in cooked meat samples compared with raw (6.5 vs. 56.6 ng/microL; P 800 bp) were observed only when using DNA from raw meat and steak cooked to lower core temperatures. Small amplicons (food authentication, it is less abundant, and results suggest that analyses should be designed to use small amplicon sizes for meat cooked to high core temperatures.

  9. Meat and meat products as a source of bioactive peptides

    Directory of Open Access Journals (Sweden)

    Alfonso Totosaus

    2016-12-01

    Full Text Available Meat is a high protein content food, with great nutritional and biological value. Meat protein hydrolysis begins with the muscle to meat conversion, during meat ageing. After slaughter, endogen enzymes are responsible of meat softening since myofibrillar anchorage proteins are degraded. Protein hydrolysis continues during food preparation. When meat reaches the stomach, pepsin is the first enzyme to interact. As the food travel trough out gastrointestinal tract, pancreatic enzymes degraded the remained protein and the peptidases made the final proteolysis process. The small proteins or peptides are the absorbed to the circulatory system and distributed to the rest of the body. Bioactive peptides activity of meat and meat products is anti-hypertensive mainly, where histidine, carnosine and anserine are the main peptides identified. Another peptide with anti-oxidant activity is glutathione. The content depends on animal species.

  10. Czech Foreign Trade with Meat and Meat Products

    Directory of Open Access Journals (Sweden)

    Karina Pohlová

    2016-04-01

    Full Text Available The meat production and meat processing industry are the most important parts of the agribusiness in the Czech Republic. The problem of the industry is its low competitiveness towards foreign producers and processors which results in negative balance of foreign trade. The aim of the article is to evaluate long-term development of value and structure of Czech foreign trade flows of meat and meat products. The analysis covers the period of 2001–2014. The problems of the negative trade balance are revealed through description of the trade flows of meat and meat products, the RCA index and relations between import and export prices. The analysis points out the problems of low competitiveness of the intermediate and finalized meat. Alternatively, Czech Republic has comparative advantage in live animals, sausages and homogenized meat products.

  11. The embodiment of authentic leadership.

    Science.gov (United States)

    Waite, Roberta; McKinney, Nicole; Smith-Glasgow, Mary Ellen; Meloy, Faye A

    2014-01-01

    Development of student leadership capacity and efficacy is critical to the nursing profession, and vital to this process is a strong foundation in critical thinking that includes a depth of understanding of self (i.e., authentic leadership development). This article will (a) present a theoretical overview of authentic leadership as compared with other popular leadership theories, (b) provide an overview of development/implementation of an authentic leadership course, the first in a series of six one-credit courses as an integral component of the Macy Undergraduate Leadership Fellows Program for upper-level nursing students, and (c) discuss related implications for nursing education. Findings from an investigator-developed quantitative pre-post survey and qualitative evaluation questions are provided. Student feedback regarding the comprehensive nature of the course was extremely positive and affirmed the value of introspection associated with authentic leadership in ongoing personal and professional development. Critical pedagogy and action-oriented learning strategies also proved beneficial to student engagement. Copyright © 2014 Elsevier Inc. All rights reserved.

  12. Authentic Instruction and Technology Literacy

    Science.gov (United States)

    Cydis, Susan

    2015-01-01

    Technology integration is an important aspect of student competence in the 21st century. The use of technology in teaching and learning is a valuable practice for supporting student learning and engagement. Modelling the pedagogical practices that integrate authentic, performance-based opportunities for technology integration was the focus of a…

  13. An Authentic Interpretation of Laws

    Directory of Open Access Journals (Sweden)

    Teodor Antić

    2015-01-01

    Full Text Available Authentic interpretation of laws is a legal institute whereby a legislator gives the authentic meaning to a specific legal norm in case of its incorrect or diversified interpretation in practice. It has the same legal force as the law. Retroactivity and influence on pending cases are its inherent characteristics. Due to these characteristics and their relation to the principles of the rule of law, legal certainty and separation of powers, it is subjected to severe criticism not only by legal theory but also legal practice. The author analyses the institute of authentic interpretation from historical and comparative point of view and through the Croatian normative regulation, practice of the Croatian Parliament and academic debate, including opinions in favour as well as against it. On these grounds the author concludes that higher quality of law making procedure could make the authentic interpretation dispensable. On the other hand, should this institute be kept in the legal order it is essential to receive more effective constitutional control.

  14. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  15. Immersive Learning: Realism, Authenticity & Audience

    OpenAIRE

    Livingstone, Daniel

    2016-01-01

    For almost 20 years the Digital Design Studio has been exploring and applying virtual reality for a wide range of industrial, commercial and educational applications. Drawing from a range of recent projects, we explore the complex relationships between realism, authenticity and audience for effective engagement and education in immersive learning.

  16. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    . This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication...

  17. Literacy Cafe: Making Writing Authentic

    Science.gov (United States)

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  18. [CGM-Continuous Glucose Monitoring--Statement of the Austrian Diabetes Association].

    Science.gov (United States)

    Schütz-Fuhrmann, Ingrid; Rami-Merhar, Birgit; Hofer, Sabine; Stadler, Marietta; Bischof, Martin; Zlamal-Fortunat, Sandra; Laimer, Markus; Weitgasser, Raimund; Prager, Rudolf

    2016-04-01

    This position statement represents the recommendations of the Austrian Diabetes Association regarding the clinical diagnostic and therapeutic application, safety and benefits of continuous subcutaneous glucose monitoring systems in patients with diabetes mellitus, based on current evidence.

  19. [CGM-continuous glucose monitoring - statement of the Austrian Diabetes Association].

    Science.gov (United States)

    Schütz-Fuhrmann, Ingrid; Schober, Edith; Rami, Birgit; Stadler, Marietta; Bischof, Martin; Fortunat, Sandra; Laimer, Markus; Weitgasser, Raimund; Prager, Rudolf

    2012-12-01

    This position statement represents the recommendations of the Austrian Diabetes Association regarding the clinical diagnostic and therapeutic application, safety and benefits of continuous subcutaneous glucose monitoring systems in patients with diabetes mellitus, based on current evidence.

  20. Replacement of Pork Meat with Pork Head Meat for Frankfurters

    OpenAIRE

    Choi, Yun-Sang; Hwang, Ko-Eun; Kim, Hyun-Wook; Song, Dong-Heon; Jeon, Ki-Hong; Park, Jong-Dae; Sung, Jung-Min; Kim, Young-Boong; Kim, Cheon-Jei

    2016-01-01

    The effect of reducing pork meat concentrations from 50% to 30% and replacing it with up to 20% pork head meat on chemical composition, cooking characteristics, physicochemical and textural properties, apparent viscosity, and sensory characteristics of frankfurters was determined. The highest moisture content in frankfurters was found in the control and T1 (frankfurter with 45% pork meat + 5% pork head). Protein and fat contents in frankfurters with pork head meat added were significantly (p0...

  1. Image authentication using distributed source coding.

    Science.gov (United States)

    Lin, Yao-Chung; Varodayan, David; Girod, Bernd

    2012-01-01

    We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.

  2. Staging constructions of authenticity in organizational change

    DEFF Research Database (Denmark)

    Dupret, Katia

    2018-01-01

    Authenticity in organizations has gained increased focus in recent years. Authentic management and leadership are ways to motivate and make sustainable changes in the organization. But authenticity is also strategically worked with in order to serve social and political functions...... that are emotionally charged. Through a socio-material perspective this paper seeks to explore how change processes in organizations challenges the idea of authentic leadership as a merely individual ability or personality trait and suggest that the authentic leader is distributed into the practices of change...

  3. Decarbonising meat : Exploring greenhouse gas emissions in the meat sector

    NARCIS (Netherlands)

    Aan Den Toorn, S. I.; Van Den Broek, M. A.; Worrell, E.

    Consumption of meat is an important source of global greenhouse gas (GHG) emission and deep decarbonisation of the whole meat production chain is required to be able to meet global climate change (CC) mitigation goals. Emissions happen in different stages of meat production ranging from agricultural

  4. Meat and Appetite Regulation

    DEFF Research Database (Denmark)

    Kehlet, Ursula Nana

    effects of new formulations of pork products. Different strategies can be applied to potentially enhance the satiating properties of pork. Processed meat products such as meatballs can serve as a matrix for the addition of fiber ingredients. Based on their high protein and fiber contents, high......-fibre meatballs could provide a dual mechanistic action that would lead to greater satiety. For whole muscles, cooking is known to induce structural, physical and chemical changes of the meat proteins, which in turn may affect protein digestibility and potentially affect satiety. The overall aim of this Ph......D thesis was to investigate the effects of fiber addition to meatballs and the effects of cooking methods of pork on appetite regulation. The PhD thesis is based on three human meal test studies and one analytical study related to the characteristics of fiber meat products. In paper I, the objective...

  5. Myoglobin chemistry and meat color.

    Science.gov (United States)

    Suman, Surendranath P; Joseph, Poulson

    2013-01-01

    Consumers rely heavily on fresh meat color as an indicator of wholesomeness at the point of sale, whereas cooked color is exploited as an indicator of doneness at the point of consumption. Deviations from the bright cherry-red color of fresh meat lead to product rejection and revenue loss. Myoglobin is the sarcoplasmic heme protein primarily responsible for the meat color, and the chemistry of myoglobin is species specific. The mechanistic interactions between myoglobin and multiple extrinsic and intrinsic factors govern the color of raw as well as cooked meats. The objective of this review is to provide an overview of the current research in meat color and how the findings are applied in the meat industry. Characterizing the fundamental basis of myoglobin's interactions with biomolecules in postmortem skeletal muscles is necessary to interpret the chemistry of meat color phenomena and to engineer innovative processing strategies to minimize meat discoloration-induced revenue loss to the agricultural economy.

  6. Ecological safety of meat products

    OpenAIRE

    A. K. Mikhailenko

    2009-01-01

    The level of toxicants was studied, and the biological value of sheep meat in the area of anthropogenic influence was checked up. The level of toxicants in meat depends straight on the age of animals.

  7. The Remembrance of World War One and the Austrian Federation of Jewish War Veterans

    Directory of Open Access Journals (Sweden)

    Gerald Lamprecht

    2016-10-01

    Full Text Available This paper discusses discourses and activities of memory of the Austrian “Federation of Jewish War Veterans” (Bund jüdischer Frontsoldaten/BJF, based primarily on the analysis of the journal “Jewish Front” (Jüdische Front as well as on archival sources. A remarkable increase in anti-Semitic activities as well as acts of violence committed by the National Socialists led former Jewish soldiers of the Austrian army to found the BJF in 1932. The aim of the BJF was to defend the Austrian Jewry against anti-Semitic accusations as well as to strengthen their Jewish self-consciousness by focusing on the remembrance of the Jewish military service during the Great War and an idealized and exaggerated war experience. To reach their objectives, the BJF was organized hierarchically and militarily. The members wore uniforms, and the BJF organized military inspections, spread propaganda via the journal “Jewish Front” and initiated the erection of Jewish war memorials in several Austrian cities. Due to the fact that the BJF wanted to unify the Austrian Jewry under its leadership, it claimed to be above all party lines and propagandized a common Austrian Jewish identity.

  8. Sustainability and meat consumption: is reduction realistic?

    NARCIS (Netherlands)

    Dagevos, H.; Voordouw, J.

    2013-01-01

    Meat is critical with respect to sustainability because meat products are among the most energy-intensive and ecologically burdensome foods. Empirical studies of the meat-consumption frequency of Dutch consumers show that, apart from meat-avoiders and meat-eaters, many people are meat-reducers that

  9. THE YIELD OF DNA IN THERMAL TERATED DEER MEAT

    Directory of Open Access Journals (Sweden)

    Jozef Golian

    2011-07-01

    Full Text Available Residuals of DNA are one of the most important factors for detection, traceability and reverse authentication of deer meat. In this project we isolated DNA from deer processed meat and analysed by electrophoresis. Goal of the study was compute ratio between raw meat and several heat processed deer meat. Samples were prepared by five heat treatment techniques (pan roasted with temperature 180-240°C, fried with 156°C, braised with temperature 100-150°C, boiled in 100.2°C water and autoclaved in different time intervals. The highest amount of residual DNA 1927ng was obtained with two hours boiled sample. The lowest value 89.89ng was obtained with one hour braised sample. In technological adjustments highest amount of DNA and 1927ng, so the total yield of 192.7ng.-l was observed in the sample we cooked for two hours at boiling temperature.   doi:10.5219/153 

  10. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  11. Polina Fedorova, About Camel Meat

    OpenAIRE

    Gedeeva, Darina; Babaev, Andrei

    2016-01-01

    In the past, the Kalmyks ate beef and horse meat. The poor ate camel meat. People who ate camel meat had pimples on their faces. The camel’s pelt and humps were used to make vessels. The intestines were cleaned, stretched and dried. It was used to make strings for dombra instruments. Arcadia

  12. Infusing Authentic Inquiry into Biotechnology

    Science.gov (United States)

    Hanegan, Nikki L.; Bigler, Amber

    2009-10-01

    Societal benefit depends on the general public's understandings of biotechnology (Betsch in World J Microbiol Biotechnol 12:439-443, 1996; Dawson and Cowan in Int J Sci Educ 25(1):57-69, 2003; Schiller in Business Review: Federal Reserve Bank of Philadelphia (Fourth Quarter), 2002; Smith and Emmeluth in Am Biol Teach 64(2):93-99, 2002). A National Science Foundation funded survey of high school biology teachers reported that hands-on biotechnology education exists in advanced high school biology in the United States, but is non-existent in mainstream biology coursework (Micklos et al. in Biotechnology labs in American high schools, 1998). The majority of pre-service teacher content preparation courses do not teach students appropriate content knowledge through the process of inquiry. A broad continuum exists when discussing inquiry-oriented student investigations (Hanegan et al. in School Sci Math J 109(2):110-134, 2009). Depending on the amount of structure in teacher lessons, inquiries can often be categorized as guided or open. The lesson can be further categorized as simple or authentic (Chinn and Malhotra in Sci Educ 86(2):175-218, 2002). Although authentic inquiries provide the best opportunities for cognitive development and scientific reasoning, guided and simple inquiries are more often employed in the classroom (Crawford in J Res Sci Teach 37(9):916-937, 2000; NRC in Inquiry and the national science education standards: a guide for teaching and learning, 2000). For the purposes of this study we defined inquiry as "authentic" if original research problems were resolved (Hanegan et al. in School Sci Math J 109(2):110-134, 2009; Chinn and Malhotra in Sci Educ 86(2):175-218, 2002; Roth in Authentic school science: knowing and learning in open-inquiry science laboratories, 1995). The research question to guide this study through naturalistic inquiry research methods was: How will participants express whether or not an authentic inquiry experience enhanced

  13. Occupational radiation exposure in upper Austrian water supplies and Spas

    International Nuclear Information System (INIS)

    Ringer, W.; Simader, M.; Bernreiter, M.; Aspek, W.; Kaineder, H.

    2006-01-01

    The Council Directive 96/29/EURATOM lays down the basic safety standards for the protection of the workers and the general public against the dangers arising from ionising radiation, including natural radiation. Based on the directive and on the corresponding Austrian legislation a comprehensive study was conducted to determine the occupational radiation exposure in Upper Austrian water supplies and spas. The study comprises 45 water supplies and 3 spas, one of them being a radon spa. Most measurements taken were to determine the radon concentration in air at different workplaces (n = 184), but also measurements of the dose rate at dehumidifiers (n = 7) and gamma spectrometric measurements of back washing water (n = 4) were conducted. To determine the maximum occupational radon exposure in a water supply measurements were carried out in all water purification buildings and in at least half o f the drinking water reservoirs of the water supply. The results were combined with the respective working times in these locations (these data having been collected by means of a questionnaire). Where the calculated exposure was greater than 1 MBq h/m then all drinking water reservoirs of the concerned water suppl y were measured for their radon concentration to ensure a reliable assessment of the exposure. The results show that the radon concentrations in the water supplies were lower as expected, being in 55% of all measurement sites below 1000 Bq/m in 91% below 5000 Bq/m and with a maximum value of 38700 Bq/m.This leads to exposures that are below 2 MBq h/m (corresponding to approx. 6 mSv/a) in 42 water supplies. However, for the remaining three water supplies maximal occupational exposures due to radon of 2.8 MBq h/m (∼ 10 mSv/a), 15 MBq h/m (∼ 50 mSv/a), and 17 MBq h/m ( ∼ 56 mSv/a), respectively, were determined. In these water supplies remediation measures were proposed, based mainly on improved ventilation of and/or reduction of working time in the building

  14. Potentials to mitigate climate change using biochar - the Austrian perspective

    Science.gov (United States)

    Bruckman, Viktor J.; Klinglmüller, Michaela; Liu, Jay; Uzun, Basak B.; Varol, Esin A.

    2015-04-01

    Biomass utilization is seen as one of various promising strategies to reduce additional carbon emissions. A recent project on potentials of biochar to mitigate climate change (FOREBIOM) goes even a step further towards bioenergy in combination of CCS or "BECS" and tries to assess the current potentials, from sustainable biomass availability to biochar amendment in soils, including the identification of potential disadvantages and current research needs. The current report represents an outcome of the 1st FOREBIOM Workshop held in Vienna in April, 2013 and tries to characterize the Austrian perspective of biochar for climate change mitigation. The survey shows that for a widespread utilization of biochar in climate change mitigation strategies, still a number of obstacles have to be overcome. There are concerns regarding production and application costs, contamination and health issues for both producers and customers besides a fragmentary knowledge about biochar-soil interactions specifically in terms of long-term behavior, biochar stability and the effects on nutrient cycles. However, there are a number of positive examples showing that biochar indeed has the potential to sequester large amounts of carbon while improving soil properties and subsequently leading to a secondary carbon sink via rising soil productivity. Diversification, cascadic utilization and purpose designed biochar production are key strategies overcoming initial concerns, especially regarding economic aspects. A theoretical scenario calculation showed that relatively small amounts of biomass that is currently utilized for energy can reduce the gap between Austria's current GHG emissions and the Kyoto target by about 30% if biomass residues are pyrolized and biochar subsequently used as soil amendment. However, by using a more conservative approach that is representing the aims of the underlying FOREBIOM project (assuming that 10% of the annual biomass increment from forests is used for biochar

  15. First experiences with NORM regulations in the Austrian legislation

    International Nuclear Information System (INIS)

    Dauke, Michael; Katzlberger, C.; Haider, W.; Ringer, W.

    2008-01-01

    Full text: This paper gives a brief overview of important aspects of the recently implemented NORM ordinance in the Austrian Radiation Protection Legislation. It describes first experiences from pilot studies and dose assessments in this field. The field of application of this ordinance is defined by a list of work activities which might cause a significant increase in the exposure of workers and of members of the public. This list includes work activities, which potentially increase the exposure due to radon or uranium, thorium and their progenies and work activities, where residues with elevated levels of natural radionuclides may lead to a significant increase in the exposure of workers and the public. The first level of a dose assessment is the determination of activity concentrations in materials. It is assumed that the dose of workers does not exceed 1 mSv per year, if the activity concentrations of natural radionuclides are below 1 Bq/g. A notification of the workplace to the radiation protection authority is sufficient in this case. Otherwise a detailed dose assessment considering all relevant exposure pathways has to be performed as well as radiation protection measures and organisational measures, if needed. If the results of the dose assessment show higher levels than 6 mSv per year, radiation protection measures like personal dosimeters and periodical medical examination and reporting to the radiation protection authority are obligatory. A similar dose assessment procedure has to be applied for residues. The residues are allowed to be disposed as conventional waste, as long as the dose assessment shows a dose lower than 1 mSv per year. Otherwise the residues have to be treated as radioactive waste. Only accredited or certified institutions may perform authorised dose assessments. The Austrian Agency for Food and Health Safety performed pilot studies in this field for getting more experience in the field of dose assessment and to get an overview of the

  16. Compositional Signatures of Conventional, Free Range, and Organic Pork Meat Using Fingerprint Techniques

    Directory of Open Access Journals (Sweden)

    Gislene B. Oliveira

    2015-08-01

    Full Text Available Consumers’ interest in the way meat is produced is increasing in Europe. The resulting free range and organic meat products retail at a higher price, but are difficult to differentiate from their counterparts. To ascertain authenticity and prevent fraud, relevant markers need to be identified and new analytical methodology developed. The objective of this pilot study was to characterize pork belly meats of different animal welfare classes by their fatty acid (Fatty Acid Methyl Ester—FAME, non-volatile compound (electrospray ionization-tandem mass spectrometry—ESI-MS/MS, and volatile compound (proton-transfer-reaction mass spectrometry—PTR-MS fingerprints. Well-defined pork belly meat samples (13 conventional, 15 free range, and 13 organic originating from the Netherlands were subjected to analysis. Fingerprints appeared to be specific for the three categories, and resulted in 100%, 95.3%, and 95.3% correct identity predictions of training set samples for FAME, ESI-MS/MS, and PTR-MS respectively and slightly lower scores for the validation set. Organic meat was also well discriminated from the other two categories with 100% success rates for the training set for all three analytical approaches. Ten out of 25 FAs showed significant differences in abundance between organic meat and the other categories, free range meat differed significantly for 6 out of the 25 FAs. Overall, FAME fingerprinting presented highest discrimination power.

  17. Compositional Signatures of Conventional, Free Range, and Organic Pork Meat Using Fingerprint Techniques.

    Science.gov (United States)

    Oliveira, Gislene B; Alewijn, Martin; Boerrigter-Eenling, Rita; van Ruth, Saskia M

    2015-08-25

    Consumers' interest in the way meat is produced is increasing in Europe. The resulting free range and organic meat products retail at a higher price, but are difficult to differentiate from their counterparts. To ascertain authenticity and prevent fraud, relevant markers need to be identified and new analytical methodology developed. The objective of this pilot study was to characterize pork belly meats of different animal welfare classes by their fatty acid (Fatty Acid Methyl Ester-FAME), non-volatile compound (electrospray ionization-tandem mass spectrometry-ESI-MS/MS), and volatile compound (proton-transfer-reaction mass spectrometry-PTR-MS) fingerprints. Well-defined pork belly meat samples (13 conventional, 15 free range, and 13 organic) originating from the Netherlands were subjected to analysis. Fingerprints appeared to be specific for the three categories, and resulted in 100%, 95.3%, and 95.3% correct identity predictions of training set samples for FAME, ESI-MS/MS, and PTR-MS respectively and slightly lower scores for the validation set. Organic meat was also well discriminated from the other two categories with 100% success rates for the training set for all three analytical approaches. Ten out of 25 FAs showed significant differences in abundance between organic meat and the other categories, free range meat differed significantly for 6 out of the 25 FAs. Overall, FAME fingerprinting presented highest discrimination power.

  18. an intermediate moisture meat

    African Journals Online (AJOL)

    Bunmi

    A total of 50 sticks of Suya weighing from 38.10 - 59.30 grams of sliced meat per stick were prepared for .... prolong shelflife and provide a natural alternative (or supplement) to chemical preservatives. Its antimicrobial ... Although O. gratissimum appears safe to use in both food and as medicine, its level of inclusion in food.

  19. Authenticated Secure Container System (ASCS)

    International Nuclear Information System (INIS)

    1991-01-01

    Sandia National Laboratories developed an Authenticated Secure Container System (ASCS) for the International Atomic Energy Agency (IAEA). Agency standard weights and safeguards samples can be stored in the ASCS to provide continuity of knowledge. The ASCS consists of an optically clear cover, a base containing the Authenticated Item Monitoring System (AIMS) transmitter, and the AIMS receiver unit for data collection. The ASCS will provide the Inspector with information concerning the status of the system, during a surveillance period, such as state of health, tampering attempts, and movement of the container system. The secure container is located inside a Glove Box with the receiver located remotely from the Glove Box. AIMS technology uses rf transmission from the secure container to the receiver to provide a record of state of health and tampering. The data is stored in the receiver for analysis by the Inspector during a future inspection visit. 2 refs

  20. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Bork Petersen, Franziska

    2013-01-01

    In this thesis I investigate what ‘authenticity’ means in a contemporary popular context and how it is used in the staging of bodies. Furthermore, I analyse works of dance and fashion from the past fifteen years with a focus on their strategies of challenging the notion of ‘bodily authenticity...... self’. I scrutinise the staging techniques and the codes of appearance that bodies have to comply with in order to be deemed ‘authentic’ on the shows. To define them and place them in the history of the idea of ‘bodily authenticity’, I complement my study with an outline of how ‘authenticity...... and by a depiction of 'working hard'. But various techniques also mask the hard work, for example by showing a participant ‘having fun’ performing it. Contemporary works of dance and fashion challenge the problematic implications in the notion of ‘bodily authenticity’. I analyse three strategies of undermining...

  1. Detection of Salmonella in Meat

    DEFF Research Database (Denmark)

    Löfström, Charlotta; Hansen, Flemming; Mansdal, Susanne

    2012-01-01

    Cost-effective and rapid monitoring of Salmonella in the meat production chain can contribute to food safety. The objective of this study was to validate an easy-to-use pre-PCR sample preparation method based on a simple boiling protocol for screening of Salmonella in meat and carcass swab samples...... obtained (SP, SE, and AC were 100, 95, and 97%, respectively). This test is under implementation by the Danish meat industry, and can be useful for screening of large number of samples in the meat production, especially for fast release of minced meat with a short shelf life....

  2. Multi-Factor Authentication: A Survey

    Directory of Open Access Journals (Sweden)

    Aleksandr Ometov

    2018-01-01

    Full Text Available Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA starting from Single-Factor Authentication (SFA and through Two-Factor Authentication (2FA. Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.

  3. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  4. BIOMETRIC AUTHENTICATION SYSTEM USING RPI

    OpenAIRE

    Fatema A. Shaikh*; Prof.S.O.Rajankar

    2016-01-01

    A biometric authentication system acquires biometric sample such as fingerprint. The fingerprint signifies physiological features of an individual.This is a system which maintains the attendance records of students automatically. In this designing of an efficient module that comprises of a fingerprint sensor to manage the attendance records of students. This module enrolls the student’s as well as staff’s fingerprints. This enrolling is a onetime process and their fingerprints will be stored...

  5. Persistent Authentication in Smart Environments

    DEFF Research Database (Denmark)

    Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

    2008-01-01

    present a proof-of-concept implementation of the proposed mechanism, which employs camera based tracking with a single stationary 3D camera that uses the "time of flight" principle. A preliminary evaluation of the proposed mechanism indicates that persistent authentication is technically possible...... with the proposed hardware. The proposed model is sufficiently general to allow the addition of more cameras or supplemental tracking technologies, which will improve the robustness and scalability of the proposed mechanism....

  6. Survey of user authentication mechanisms

    OpenAIRE

    Magno, Marianna B.

    1996-01-01

    Approved for public release; distribution is unlimited The use of a password as the only traditional user authentication mechanism has been criticized for its weakness in computer security. One problem is for the user to select short, easy to remember passwords. Another problem is the selection of a password that is too long which the user tends to forget. Long passwords tend to be written down carelessly somewhere in the work space. Such practices can create serious security loopholes. Co...

  7. Authentic subjectivity and social transformation

    Directory of Open Access Journals (Sweden)

    Michael O'Sullivan

    2016-10-01

    Full Text Available Holiness in the Christian tradition has often been understood in a way that devalues embodiment and practical engagement with the world of one’s time. The latter understanding, for example, led to Marx’s critique and repudiation of Christianity. Both interpretations of holiness can be understood as mistaken efforts to express the dynamism for authenticity in contextualised human subjectivity. Vatican 2 opposed both views by addressing itself to all people of good will, declaring that everyone was called to holiness, and that authentic Christian identity involved solidarity with the world of one’s time, especially those who are poor. Vatican 2, therefore, provided an authoritative faith foundation for holiness expressed through social commitment and for viewing social commitment on the part of people of good will in whatever state of life as a form of holiness. This vision was also the conviction of leading spirituality writers of the period, like Thomas Merton, and inspired liberation theologians and the Latin American Catholic bishops at their conference in Medellín a few years after the Council. The argument of this article is that the emergence and development of a non-dualist Christian spirituality is grounded methodologically in the correct appropriation of the common innate dynamism for authenticity in concrete human persons and lived spiritual experiences consistent with and capable of enhancing this dynamism.

  8. Authentic subjectivity and social transformation

    Directory of Open Access Journals (Sweden)

    Michael O'Sullivan

    2016-05-01

    Full Text Available Holiness in the Christian tradition has often been understood in a way that devalues embodiment and practical engagement with the world of one’s time. The latter understanding, for example, led to Marx’s critique and repudiation of Christianity. Both interpretations of holiness can be understood as mistaken efforts to express the dynamism for authenticity in contextualised human subjectivity. Vatican 2 opposed both views by addressing itself to all people of good will, declaring that everyone was called to holiness, and that authentic Christian identity involved solidarity with the world of one’s time, especially those who are poor. Vatican 2, therefore, provided an authoritative faith foundation for holiness expressed through social commitment and for viewing social commitment on the part of people of good will in whatever state of life as a form of holiness. This vision was also the conviction of leading spirituality writers of the period, like Thomas Merton, and inspired liberation theologians and the Latin American Catholic bishops at their conference in Medellín a few years after the Council. The argument of this article is that the emergence and development of a non-dualist Christian spirituality is grounded methodologically in the correct appropriation of the common innate dynamism for authenticity in concrete human persons and lived spiritual experiences consistent with and capable of enhancing this dynamism.

  9. Consumer attitudes to meat eating.

    Science.gov (United States)

    Richardson, N J; Macfie, H J; Shepherd, R

    1994-01-01

    This study reports on current meat consumption in the UK and the factors that are percieved by the subjects to be influential in their choice of diet. A random sample of individuals from the population (n-1018) were questioned on their consumption and attitudes towards meat by a postal survey. The study revealed that 28·3% of the population considered themselves to be reducing meat consumption; attitudes found to be determinant in changes in the consumption of meat were healthiness, taste and concerns over additives. Hypothetical future events were found to affect people's estimated meat-eating. Knowledge of meat-related information was investigated with specific reference to the respondents' trust in the various sources used; food package labels were found to be an influential source of meat-related information. Copyright © 1993. Published by Elsevier Ltd.

  10. [Austrian guideline for palliative sedation therapy (long version) : Results of a Delphi process of the Austrian Palliative Society (OPG)].

    Science.gov (United States)

    Weixler, Dietmar; Roider-Schur, Sophie; Likar, Rudolf; Bozzaro, Claudia; Daniczek, Thomas; Feichtner, Angelika; Gabl, Christoph; Hammerl-Ferrari, Bernhard; Kletecka-Pulker, Maria; Körtner, Ulrich H J; Kössler, Hilde; Meran, Johannes G; Miksovsky, Aurelia; Pusswald, Bettina; Wienerroither, Thomas; Watzke, Herbert

    2017-02-01

    Palliative sedation therapy (PST) is an important and ethically accepted therapy in the care of selected palliative care patients with otherwise unbearable suffering from refractory distress. PST is increasingly used in end-of-life care. Austria does not have a standardized ethical guideline for this exceptional practice near end of life, but there is evidence that practice varies throughout the country. The Austrian Palliative Society (OPG) nominated a multidisciplinary working group of 16 palliative care experts and ethicists who established the national guideline on the basis of recent review work with the aim to adhere to the Europeans Association of Palliative Care's (EAPC) framework on palliative sedation therapy respecting Austrians legal, structural and cultural background. Consensus was achieved by a four-step sequential Delphi process. The Delphi-process was strictly orientated to the recently published EUROIMPACT-sedation-study-checklist and to the AGREE-2-tool. Additionally national stakeholders participated in the reflection of the results. As a result of a rigorous consensus process the long version of the Austrian National Palliative Sedation Guideline contains 112 statements within eleven domains and is supplemented by a philosophers excursus on suffering. By establishing a national guideline for palliative sedation therapy using the Delphi technique for consensus and stakeholder involvement the Austrian Palliative Society aims to ensure nationwide good practice of palliative sedation therapy. Screening for the practicability and efficacy of this guideline will be a future task.

  11. Structures and perspectives of the Austrian energy system

    International Nuclear Information System (INIS)

    Wohlgemut, N.

    1992-03-01

    The technical tools for projecting future energy demand can be grouped into two broad categories: Firstly, time series or cross section data based econometric models which contain information about customers' past behavior and thus enable to judge the causal effects of economic factors like incomes and prices on energy demand (passive forecasting). Secondly, structural simulation models which indicate how energy services transform to flows of useful, final and primary energy. These models enable to estimate the technical potential of improving the energy application and energy transformation systems (active scenario approach). Comparison of the two approaches with respect to projections for future energy demand yields that, typically, in the short run of econometric approach will dominate the structural simulation model. In the long run, however, this relation will be reversed. The econometric models suffer lack of technical information necessary to describe the demand for energy. The structural simulation model enables an incorporation of technical factors like efficiencies and fuel shares. An application of the structural model is a simulation run describing a scenario in order to reduce the Austrian CO 2 -emissions according to the recommendations of the conference of Toronto

  12. Holocaust Studies in Austrian Elementary and Secondary Schools

    Directory of Open Access Journals (Sweden)

    Philipp Mittnik

    2016-09-01

    Full Text Available This article presents arguments in support of teaching about the Holocaust and Nazism in Austria at an early age. To accomplish this, Austrian and German elementary school textbooks were analyzed for the amount of content dealing with the Holocaust and Jews; the results showed that since 1980 the amount of content on the Holocaust increased in Germany, and to a lesser extent in Austria. The article reviews some of the criticism in Europe of the term Holocaust Education and explores some of arguments about why that is. The author argues that moral education and teaching of Human Rights are important components of, but ought not be the main goal of teaching about the Holocaust. The role of Austria after World War II, and exploration of the so called victim myth, prevalent until the 1990s are important to understanding history and to how history textbooks were created. After a discussion of how the Holocaust can be taught to elementary and early secondary school aged children, some suggestions are made about approaches to teaching the Holocaust to students in these age groups.

  13. Attitude Towards End of Life Communication of Austrian Medical Students.

    Science.gov (United States)

    Rumpold, Tamara; Lütgendorf-Caucig, Carola; Löffler-Stastka, Henriette; Roider-Schur, Sophie; Pötter, Richard; Kirchheiner, Kathrin

    2018-04-23

    Medical students have to acquire theoretical knowledge, practical skills, and a personal attitude to meet the emerging needs of palliative care. The present study aimed to assess the personal attitude of Austrian medical students towards end of life communication (EOLC), as key part of palliative care. This cross-sectional, mono-institutional assessment invited all medical students at the Medical University of Vienna in 2015. The assessment was conducted web-based via questionnaire about attitudes towards EOLC. Additional socio-demographic and medical education-related parameters were collected. Overall, 743 medical students participated in the present report. Differences regarding the agreement or disagreement to several statements concerning the satisfaction of working with chronically ill patients, palliative care, and health care costs, as well as the extent of information about palliative disease, were found for age, gender, and academic years. The overall attitude towards EOLC in the present sample can be regarded as quite balanced. Nevertheless, a considerable number of medical students are still reluctant to inform patients about their incurable disease. Reservations towards palliative care as part of the health care system seem to exist. The influence of the curriculum as well as practical experiences seems to be important but needs further investigation.

  14. Cornerstones of the Austrian radon risk communication strategy

    International Nuclear Information System (INIS)

    Kunte, A.; Ringer, W.

    2015-01-01

    On behalf of the Federal Ministry of Agriculture, Forestry, Environment and Water Management (BMLFUW), the National Radon Centre of Austria developed the National Radon Risk Communication Strategy. The superior goal is the reduction of the radon exposure of Austrian citizens as well as the reduction of radon-related lung cancer deaths. Austria, like many other countries, follows the approach to raise awareness and to inform the public to achieve this goal. The presented strategy deals with the question of how radon protection issues can be communicated to the public, existing fears can be reduced and affected people can be motivated to take action (perform a radon test, if necessary, mitigate or install preventive measures in new buildings). The cornerstones of the National Radon Risk Communication Strategy can be summarized as follows: - Definition of communication goals - Identification and categorization of target groups - Development of specific key messages for each of the target groups - Determination of communication channels and assessment of their efficiency - Integration of the radon issue in education and training - Cooperation with relevant organizations and platforms. The communication objectives, target groups and communication paths (and their evaluation) will be discussed during the presentation in detail.

  15. A Proposal for an Austrian Nursing Minimum Data Set (NMDS)

    Science.gov (United States)

    Hackl, W.O.; Ammenwerth, E.

    2014-01-01

    Summary Objective Nursing Minimum Data Sets can be used to compare nursing care across clinical populations, settings, geographical areas, and time. NMDS can support nursing research, nursing management, and nursing politics. However, in contrast to other countries, Austria does not have a unified NMDS. The objective of this study is to identify possible data elements for an Austrian NMDS. Methods A two-round Delphi survey was conducted, based on a review of available NMDS, 22 expert interviews, and a focus group discussion. Results After reaching consensus, the experts proposed the following 56 data elements for an NMDS: six data elements concerning patient demographics, four data elements concerning data of the healthcare institution, four data elements concerning patient’s medical condition, 20 data elements concerning patient problems (nursing assessment, nursing diagnoses, risk assessment), eight data elements concerning nursing outcomes, 14 data elements concerning nursing interventions, and no additional data elements concerning nursing intensity. Conclusion The proposed NMDS focuses on the long-term and acute care setting. It must now be implemented and tested in the nursing practice. PMID:25024767

  16. 52. Annual symposium of the Austrian Physical Society

    International Nuclear Information System (INIS)

    Lippitsch, M.

    2002-01-01

    The 52th Symposium of the Austrian Physical Society was held from 23.-26. September 2002 at the Montan University of Leoben (Austria). The papers presented were organized under the following sessions: main session (intermetallic materials, nanostructures as sensors, volcanic products as dating materials); Fritz-Kohlrausch-price 2002 (electronic structure and charge transfer in doped single-walled carbon nanotubes), Max-Auwaerter-price 2002 ( growth phenomena of thin overlayers on semiconductor surfaces), Viktor-Hess-price 2002 (analysis of rare Ke4 - decays), Roman-Ulrich-Sexl-price 2002 (experienced physics); acoustics; atomic-, molecular- and plasma physics (plasma ion mass spectrometers, proton-transfer-reaction-mass-spectrometry, radiation damage, electron-molecule interactions, decay); solid physics (nanoopticcs, nanocrystalline magnetic materials, nanostructure, nanoelectronics); nuclear and particle physics (CP-violations, neutral kaons, quark-antiquark systems, QCD, kaonic atoms spectroscopy, hadronic decay, long-lived radionuclides); medical-, bio-and environmental physics (biological radiation damage, photons therapy, Med-AUSTRON, doses rate, endovascular brachytherapy); physics-industry-energy (ski-simulation, acoustic surface wave); neutrons and synchrotron radiation physics (neutron quantum interferometry, AUSTRON, synchrotron-induced x-ray analysis); polymer physics(micro-Raman spectroscopy, x-ray analysis); quantum electronics, electrodynamics and optics (solid-state lasers, doped lasers, quantum purification and teleportation, Bose-Einstein condensates, quantum optics, Talbot-Lau interferometry, neutron quantum phases) and two poster sessions with topics dealing with the subjects above mentioned. Those contributions which are in the INIS subject scope are indexed separately. (nevyjel)

  17. 55. Annual symposium of the Austrian Physical Society. Abstracts

    International Nuclear Information System (INIS)

    Vogl, G.; Sepiol, B.

    2005-01-01

    Full text: The 55 th Annual Symposium of the Austrian Physical Society was held from 27.-29. September 2005 at the University of Vienna (Austria), it consisted of a plenary session, oral and poster sessions devoted to: acoustics; women and physics; atomic-, molecular- and plasma physics; solid physics; nuclear and particle physics; medical-, bio-and environmental physics; neutrons and synchrotron radiation physics; surface and thin film analysis and quantum electronics, electrodynamics and optics. Topics such as graphs quantization, molecular interferometry, Brownian movement, ion beam diagnostics, electron emission, optical pumping, Bose-Einstein condensates, molecular matter waves, double-wall carbon nanotubes, quantum dots, ferromagnetic nanocomposites, nanowires, transmission electron microscopy analysis of nanostructures, nanocrystals studies, atomic defects in intermetallic compounds, electron energy loss spectroscopy of intermetallic compounds, CHIRALTEM project, covariance data, nuclear astrophysics, kaonic atoms, pionic hydrogen, geometric phase measurements with neutrons, International linear collider project, ATLAS muon spectrometer, ATLAS detector, LHC's protection system, baryon structure, QCD, lattice QCD, coherent tomography, light microscopy, high resolution magnetic resonance imaging, polymer gel dosimetry, radon microdosimetry, traffic air pollutants, BVOC seasonal variations, biogenic VOC emissions, ice dating, synchrotron small angle x-ray diffraction, small angle neutron scattering, stepped surfaces oxidation, grazing incidence synchrotron reflexion studies, magnetic thin films, atoms quantum dynamics, quantum entanglement, BEC and quantum gases experiments were discussed. This book of abstracts contains their summaries and those contributions which are in the INIS subject scope are indexed individually. (nevyjel)

  18. Heidegger's Concept of Authenticity and Sport Experience

    OpenAIRE

    Higuchi, Satoshi

    1991-01-01

    Carolyne Thomas regarded the aesthetic experience in sport as authentic in the meaning from Martin Heidegger's Being and Time. To examine the adequacy of the interpretation, the comparison between Thomas' concept of authenticity and the Heidegger's was attempted in this paper. Thomas' concept of authenticity is opposite to accidentality. It is also positive realization of a self, positive movement toward a capable being, a unique self, a unique experience, and honesty in a sport situation...

  19. Obfuscated authentication systems, devices, and methods

    Science.gov (United States)

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  20. Quantum Secure Direct Communication Based on Authentication

    International Nuclear Information System (INIS)

    Min-Jie, Wang; Wei, Pan

    2008-01-01

    We propose two schemes of quantum secure direct communication (QSDC) combined ideas of user authentication [Phys. Rev. A 73 (2006) 042305] and direct communication with dense coding [Phys. Rev. A. 68 (2003) 042317]. In these protocols, the privacy of authentication keys and the properties of the EPR pairs not only ensure the realization of identity authentication but also further improve the security of communication, and no secret messages are leaked even if the messages were broken. (general)

  1. Authentic leadership: What's in the construct?

    OpenAIRE

    Endrissat, Nada; Müller, Werner R.

    2006-01-01

    In a qualitative leadership study conducted in the German-speaking part of Switzerland the quest to be oneself i.e., to be authentic was found to be central for leadership. We will present the results in detail and highlight the difficulties leaders experience when trying to be authentic in their daily interaction. By providing a contextually rich description of authentic leadership from practitioners' point of views, our study contributes to the current endeavor to understand and define auth...

  2. Managing authenticity: the paradox of great leadership.

    Science.gov (United States)

    Goffee, Rob; Jones, Gareth

    2005-12-01

    Leaders and followers both associate authenticity with sincerity, honesty, and integrity. It's the real thing--the attribute that uniquely defines great managers. But while the expression of a genuine self is necessary for great leadership, the concept of authenticity is often misunderstood, not least by leaders themselves. They often assume that authenticity is an innate quality--that a person is either genuine or not. In fact, the authors say, authenticity is largely defined by what other people see in you and, as such, can to a great extent be controlled by you. In this article, the authors explore the qualities of authentic leadership. To illustrate their points, they recount the experiences of some of the authentic leaders they have known and studied, including the BBC's Greg Dyke, Nestlé's Peter Brabeck-Letmathe, and Marks & Spencer's Jean Tomlin. Establishing your authenticity as a leader is a two-part challenge. You have to consistently match your words and deeds; otherwise, followers will never accept you as authentic. But it is not enough just to practice what you preach. To get people to follow you, you also have to get them to relate to you. This means presenting different faces to different audiences--a requirement that many people find hard to square with authenticity. But authenticity is not the product of manipulation. It accurately reflects aspects of the leader's inner self, so it can't be an act. Authentic leaders seem to know which personality traits they should reveal to whom, and when. Highly attuned to their environments, authentic leaders rely on an intuition born of formative, sometimes harsh experiences to understand the expectations and concerns of the people they seek to influence. They retain their distinctiveness as individuals, yet they know how to win acceptance in strong corporate and social cultures and how to use elements of those cultures as a basis for radical change.

  3. Authentic leadership, authentic followership, basic need satisfaction, and work role performance: A cross-level study

    OpenAIRE

    Leroy, Hannes; Anseel, F.; Gardner, W.; Sels, Luc

    2015-01-01

    Authentic leadership occurs when individuals enact their true selves in their role as a leader. This article examines the role of authentic followership in the previously established relationship between authentic leadership and follower in-role and extrarole performance behaviors. Consideration of followers who enact their true selves is important to understand how authentic leadership fosters follower self-determined work motivation and thus work role performance. Using self-determination t...

  4. Multifactor Authentication: Its Time Has Come

    Directory of Open Access Journals (Sweden)

    Jim Reno

    2013-08-01

    Full Text Available Transactions of any value must be authenticated to help prevent online crime. Even seemingly innocent interactions, such as social media postings, can have serious consequences if used fraudulently. A key problem in modern online interactions is establishing the identity of the user without alienating the user. Historically, almost all online authentications have been implemented using simple passwords, but increasingly these methods are under attack. Multifactor authentication requires the presentation of two or more of the three authentication factor types: “What you know”, “What you have”, and “What you are”. After presentation, each factor must be validated by the other party for authentication to occur. Multifactor authentication is a potential solution to the authentication problem, and it is beginning to be implemented at websites operated by well-known companies. This article surveys the different mechanisms used to implement multifactor authentication. How a site chooses to implement multifactor authentication affects security as well as the overall user experience.

  5. ARE AUTHENTIC LEADERS SATISFIED WITH THEIR JOB?

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2016-06-01

    Full Text Available A crisis in management has led to the appearance of Authentic leadership. The aim of this work is to determine the characteristics of Authentic leadership in educational institutions and to respond to the question as to whether authentic leaders are satisfied with their job. The third aim is to determine differences among the researched regions. The sample included 227 randomly selected directors from primary and secondary schools in Serbia, Montenegro and the Republika Srpska. The research used an ALQ questionnaire for the estimation of leadership behaviour. Descriptions for the results prediction and multiple linear regressions were used. A multivariance analysis of variance was used to compare the groups. The research results showed that every fourth director is an authentic leader. Authentic leadership has a significant influence on job satisfaction through two aspects: internalised perspective and balanced processing. There are no differences in Authentic leadership in the researched areas. The results could be useful for educational institutions in countries where the research was conducted. Further research could be carried out in other countries while cultural differences should be taken into account. One limiting factor consists of the fact that the analysed data are obtained only from school directors. Leaders of educational institutions should provide management through the development of their own authenticity and the authenticity of their followers. The characteristics of Authentic leadership were reviewed and tested practically in the West-Balkan environment.

  6. User Authentication based on Continuous Touch Biometrics

    Directory of Open Access Journals (Sweden)

    Christina J Kroeze

    2016-12-01

    Full Text Available Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, leaving the device vulnerable if stolen. This paper investigates the possibility of unobtrusive, continuous authentication for smartphones based on biometric data collected using a touchscreen. The possibility of authenticating users on a smartphone was evaluated by conducting an experiment simulating real-world touch interaction. Touch data was collected from 30 participants during normal phone use. The touch features were analysed in terms of the information provided for authentication. It was found that features such as finger pressure, location of touch interaction and shape of the finger were important discriminators for authentication. The touch data was also analysed using two classification algorithms to measure the authentication accuracy. The results show that touch data is sufficiently distinct between users to be used in authentication without disrupting normal touch interaction. It is also shown that the raw touch data was more effective in authentication than the aggregated gesture data.

  7. User Authentication in Smartphones for Telehealth.

    Science.gov (United States)

    Smith, Katherine A; Zhou, Leming; Watzlaf, Valerie J M

    2017-01-01

    Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.

  8. Authentic Leadership and Spiritual Capital Development: Agenda ...

    African Journals Online (AJOL)

    Authentic Leadership and Spiritual Capital Development: Agenda for Building ... indicate that many business companies and government organizations which ... for the successful building of quality management and effective organizations.

  9. Identification and authentication. Common biometric methods review

    OpenAIRE

    Lysak, A.

    2012-01-01

    Major biometric methods used for identification and authentication purposes in modern computing systems are considered in the article. Basic classification, application areas and key differences are given.

  10. Authentic leadership: develop the leader within.

    Science.gov (United States)

    Yasinski, Lesia

    2014-03-01

    Great leadership usually starts with a willing heart, a positive attitude, and a desire to make a difference. Strong leadership is important, in today's health care climate, to ensure optimal patient outcomes and the fostering of future generations of knowledgeable, motivated and enthusiastic perioperative nurses. This article will explore key elements necessary for the development of authentic leadership. While highlighting the role that personal development plays in leadership skills, this article will also discuss ways to cultivate authenticity in leadership. The following questions will be addressed: What is authentic leadership? How does one become an authentic leader?

  11. Authenticity Lies in the Eye of the Beholder The Perception of Teachers' Authenticity by their Students

    NARCIS (Netherlands)

    De Bruyckere, Pedro

    2018-01-01

    Everything and everybody is urged to be authentic. Brands now need to create authentic experiences in music, artists survive if they are perceived as being real and nowadays, even in political elections, the perception of authenticity is an issue, certainly in the 2016 elections in the United

  12. Radurization of fowl meat

    International Nuclear Information System (INIS)

    Gel'fand, S.

    1974-01-01

    The effects of pre-slaughter adrenalization and of treatment with additives of semifinished poultry products were studied with a view to improving the storage quality of irradiated poultry. It was found that pre-slaughter adrenalization, pre-irradiation treatment with phosphates and, particularly, a combination of these two methods considerably delayed the formation of carbonyl compounds, the delay being somewhat greater in white meat. (E.T.)

  13. Gamma irradiation of meat

    International Nuclear Information System (INIS)

    Whitburn, K.D.; Hoffman, M.Z.; Taub, I.A.

    1982-01-01

    In ''A Re-Evaluation of the Products of Gamma Irradiation of Beef Ferrimyoglobin'', J. Food Sci. 46:1814 (1981), authors Whitburn, Hoffman and Taub state that color pigment myoglobin (Mb) undergoes chemical changes during irradiation that cause color changes in meat. They also state that they are in disagreement with Giddings and Markakis, J. Food Sci. 47:361 (1972) in regard to generation of MbO 2 in deaerated solutions, claiming their analysis demonstrates only Mb and Mb(IV) production. Giddings, in a letter, suggests that Whitburn, et al may have used differing systems and approaches which critically changed the radiation chemistry. He also states that radiation sterilization of aerobically packaged meats affects color only slightly. Whitburn, in a reply, shares Dr. Giddings concern for caution in interpretation of results for this system. The compositional changes are dependent on identity of free radicals, dose, O 2 and the time of analysis after irradiation. The quantification of these parameters in pure systems, sarcoplasma extracts and in meat samples should lead to a better understanding of color change mechanisms and how to minimize them

  14. What did we learn from the Austrian radon project?

    International Nuclear Information System (INIS)

    Friedmann, H.

    2004-01-01

    Approximately 40000 measurements of indoor radon concentrations were performed in randomly selected homes during the Austrian Radon Project. These measurements were carried out by using long-term measuring devices (SSNTD and Electret detectors) and short-term charcoal detectors with liquid scintillation counting as the method of analysis. In addition to the equilibrium factor, soil gas measurements and quasi-continuous indoor measurements, parallel-measurements with different detector systems in randomly selected homes were also performed. Very different results were occasionally obtained for one and the same room at the same time. This was so not only when comparing the long-term and short-term measuring devices; actually, different long-term detector systems also often showed significant discrepancies in results, although all detector systems had been carefully calibrated and tested in laboratories. The essential conclusion was that during a longer exposure in randomly selected homes, the detectors may be moved, opened, or handled in other unfavourable ways which introduce additional uncertainties in the measuring results. The aim of the Austrian Radon Project was to estimate the radon risk for geographic areas (municipalities). This task is different from the evaluation of the mean radon concentration in a single home. Generally, while long-term measurements (a year or even longer) are necessary to get reliable results for a particular house, this is not so where only the mean indoor radon concentrations for an area are of interest. Observed indoor radon concentrations give information about the actual radon exposures of the inhabitants but not about the radon risk from the ground. The house type, the way the house is constructed, the storey where people live, and some living patterns (ventilation rate etc.) modify the geological risk significantly, although it is the geological situation that has to be primarily taken into account when planning and constructing

  15. THE IMPORTANCE OF BACTERIOCINS IN MEAT AND MEAT PRODUCTS

    Directory of Open Access Journals (Sweden)

    Meltem SERDAROĞLU

    2000-03-01

    Full Text Available There is an increasing consumer demand for food products which are free of chemical additives, reduced in salt and processed as little as possible. These minimally processed foods require special application to assure their microbiological safety. The use of microorganisms and enzymes for food preservatives is called biopreservation. The most important group of microorganisms with antimicrobial effect used in the production of foods is the lactic acid bacteria. In meats although lactic acid bacteria constitue apart of the initial microflora, they become dominant during the processing of meats. In this research bacteriocins of lactic acid bacteria and their usage in meat and meat products for biopreservation are discussed.

  16. Impacts of Austrian Climate Variability on Honey Bee Mortality

    Science.gov (United States)

    Switanek, Matt; Brodschneider, Robert; Crailsheim, Karl; Truhetz, Heimo

    2015-04-01

    Global food production, as it is today, is not possible without pollinators such as the honey bee. It is therefore alarming that honey bee populations across the world have seen increased mortality rates in the last few decades. The challenges facing the honey bee calls into question the future of our food supply. Beside various infectious diseases, Varroa destructor is one of the main culprits leading to increased rates of honey bee mortality. Varroa destructor is a parasitic mite which strongly depends on honey bee brood for reproduction and can wipe out entire colonies. However, climate variability may also importantly influence honey bee breeding cycles and bee mortality rates. Persistent weather events affects vegetation and hence foraging possibilities for honey bees. This study first defines critical statistical relationships between key climate indicators (e.g., precipitation and temperature) and bee mortality rates across Austria, using 6 consecutive years of data. Next, these leading indicators, as they vary in space and time, are used to build a statistical model to predict bee mortality rates and the respective number of colonies affected. Using leave-one-out cross validation, the model reduces the Root Mean Square Error (RMSE) by 21% with respect to predictions made with the mean mortality rate and the number of colonies. Furthermore, a Monte Carlo test is used to establish that the model's predictions are statistically significant at the 99.9% confidence level. These results highlight the influence of climate variables on honey bee populations, although variability in climate, by itself, cannot fully explain colony losses. This study was funded by the Austrian project 'Zukunft Biene'.

  17. Austrian Painter Leopold Kupelwieser and Bishop Josip Juraj Strossmayer

    Directory of Open Access Journals (Sweden)

    Ljerka Dulibić

    2016-01-01

    Full Text Available All 20th-century chronologies of the collector’s activity of Bishop Josip Juraj Strossmayer (1815-1905 and overviews of the evolution of today’s Strossmayer’s Gallery of Old Masters at the Croatian Academy of Sciences and Arts mention the bishop’s cooperation with the Austrian Nazarene painter Leopold Kupelwieser (1796-1862, father of Paul Kupelwieser, the former owner of the Brijuni islands. This episode from the “prehistory” of Strossmayer’s Gallery has hitherto been known only as a brief notice repeated in almost identical formulations: “In 1857, the bishop sent the first larger group of paintings to Vienna in order to be restored under the supervision of painter Leopold Kupelwieser.” Research of archival documents mentioning the cooperation between Bishop Strossmayer and painter Kupelwieser has now been complemented with an overview of Kupelwieser’s activity in Croatia, with an aim of promoting the preservation and evaluation of this segment of his painting oeuvre. Besides paintings ordered by Strossmayer (presently at the Diocesan Museum of Zagreb, Kupelwieser produced two paintings for Croatian churches independently of his cooperation with the bishop (for the church of St Stephen of Hungary, today’s church of the Immaculate Conception of the Blessed Virgin Mary in Nova Gradiška, and for the chapel of St Peter and Paul in Dvor na Uni. Two more paintings are preserved on the Brijuni islands that do not directly belong to Kupelwieser’s oeuvre yet are closely linked to him.

  18. Alienation, authenticity and the self.

    Science.gov (United States)

    Rae, Gavin

    2010-01-01

    While many commentators have held that the concept "alienation" is of crucial importance when attempting to understand human existence, others have held that it is an inherently empty concept that we should abandon. In this article, I refute the latters' charge by showing that each conception of "alienation" is underpinned by a normative ontological conception of the preferable, or authentic, self and show that the concept "alienation" has ethical, existential and socio-political uses. From this I conclude that, when properly understood, the concept "alienation" can provide us with vital insights into human existence.

  19. Ultra-fast DNA-based multiplex convection PCR method for meat species identification with possible on-site applications.

    Science.gov (United States)

    Song, Kyung-Young; Hwang, Hyun Jin; Kim, Jeong Hee

    2017-08-15

    The aim of this study was to develop an ultra-fast molecular detection method for meat identification using convection Palm polymerase chain reaction (PCR). The mitochondrial cytochrome b (Cyt b) gene was used as a target gene. Amplicon size was designed to be different for beef, lamb, and pork. When these primer sets were used, each species-specific set specifically detected the target meat species in singleplex and multiplex modes in a 24min PCR run. The detection limit was 1pg of DNA for each meat species. The convection PCR method could detect as low as 1% of meat adulteration. The stability of the assay was confirmed using thermal processed meats. We also showed that direct PCR can be successfully performed with mixed meats and food samples. These results suggest that the developed assay may be useful in the authentication of meats and meat products in laboratory and rapid on-site applications. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. International red meat trade.

    Science.gov (United States)

    Brester, Gary W; Marsh, John M; Plain, Ronald L

    2003-07-01

    The maturation of the US beef and pork markets and increasing consumer demands for convenience, safety, and nutrition suggests that the beef and pork industries must focus on product development and promotion. New marketing arrangements are developing that help coordinate production with consumer demands. The relative high levels of incomes in the United States are likely to increase the demands for branded products rather than increase total per capita consumption. Foreign markets represent the greatest opportunity for increased demand for commodity beef and pork products. Increasing incomes in developing countries will likely allow consumers to increase consumption of animal-source proteins. Real prices of beef and pork have declined substantially because of sagging domestic demand and increasing farm-level production technologies. Increasing US beef and pork exports have obviated some of the price declines. Pork attained a net export position from a quantity perspective in 1995. The United States continues to be a net importer of beef on a quantity basis but is close to becoming a net exporter in terms of value. By-products continue to play a critical role in determining the red meat trade balance and producer prices. The United States, however, must continue to become cost, price, and quality competitive with other suppliers and must secure additional market access if it is to sustain recent trade trends. Several trade tensions remain in the red meat industry. For example, mandated COOL will undoubtedly have domestic and international effects on the beef and pork sectors. Domestically, uncertainty regarding consumer demand responses or quality perceptions regarding product origin, as well as added processor-retailer costs will be nontrivial. How these factors balance out in terms of benefits versus costs to the industry is uncertain. From an international perspective, some beef and pork export suppliers to the United States could view required labeling as a

  1. Identification of new food alternatives: how do consumers categorize meat and meat substitutes?

    NARCIS (Netherlands)

    Hoek, A.C.; Boekel, van M.A.J.S.; Voordouw, J.; Luning, P.A.

    2011-01-01

    New meat substitutes need to be recognized as alternatives to meat. We therefore investigated which category representations consumers have of meat and meat substitutes. Thirty-four non-vegetarian participants performed a free sorting task with 17 meat products and 19 commercially available meat

  2. Anonymous Authentication Systems Based on Private Information Retrieval

    OpenAIRE

    Nakamura, Toru; Inenaga, Shunsuke; Ikeda, Daisuke; Baba, Kensuke; Yasuura, Hiroto

    2009-01-01

    This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authenticati...

  3. Proton-transfer reaction mass spectrometry (PTR-MS) for the authentication of regionally unique South African lamb.

    Science.gov (United States)

    Erasmus, Sara W; Muller, Magdalena; Alewijn, Martin; Koot, Alex H; van Ruth, Saskia M; Hoffman, Louwrens C

    2017-10-15

    The volatile fingerprints of South African lamb meat and fat were measured by proton-transfer mass spectrometry (PTR-MS) to evaluate it as an authentication tool. Meat and fat of the Longissimus lumborum (LL) of lambs from six different regions were assessed. Analysis showed that the volatile fingerprints were affected by the origin of the meat. The classification of the origin of the lamb was achieved by examining the calculated and recorded fingerprints in combination with chemometrics. Four different partial least squares discriminant analysis (PLS-DA) models were fitted to the data to classify lamb meat and fat samples into "region of origin" (six different regions) and "origin" (Karoo vs. Non-Karoo). The estimation models classified samples 100% correctly. Validation of the first two models gave 42% (fat) and 58% (meat) correct classification of region, while the second two models performed better with 92% (fat) and 83% (meat) correct classification of origin. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Identification of hare meat by a species-specific marker of mitochondrial origin.

    Science.gov (United States)

    Santos, Cristina G; Melo, Vitor S; Amaral, Joana S; Estevinho, Letícia; Oliveira, M Beatriz P P; Mafra, Isabel

    2012-03-01

    Meat species identification in food has gained increasing interest in recent years due to public health, economic and legal concerns. Following the consumer trend towards high quality products, game meat has earned much attention. The aim of the present work was to develop a DNA-based technique able to identify hare meat. Mitochondrial cytochrome b gene was used to design species-specific primers for hare detection. The new primers proved to be highly specific to Lepus species, allowing the detection of 0.01% of hare meat in pork meat by polymerase chain reaction (PCR). A real-time PCR assay with the new intercalating EvaGreen dye was further proposed as a specific and fast tool for hare identification with increased sensitivity (1pg) compared to end-point PCR (10pg). It can be concluded that the proposed new primers can be used by both species-specific end-point PCR or real-time PCR to accurately authenticate hare meat. Copyright © 2011 Elsevier Ltd. All rights reserved.

  5. Quantifying low-value services by using routine data from Austrian primary care.

    Science.gov (United States)

    Sprenger, Martin; Robausch, Martin; Moser, Adrian

    2016-12-01

    Open debates about the reduction of low-value services, unnecessary diagnostic tests and ineffective therapeutic procedures and initiatives like "Choosing Wisely "in the USA and Canada are still absent in Austria. The objectives of this study are: (i) to establish a list of ineffective or low-value services possibly provided in Austrian primary care, (ii) to explore how many of these services are quantifiable using routine data and (iii) to estimate the number of affected beneficiaries and avoidable costs arising from the provision of these services. In May 2014, we identified low-value care services relevant for primary care in Austria. For our analysis we used routine data sets from the Austrian health insurance. All analysis refer to the insured population of the Lower Austrian Sickness Fund (n = 1 168 433) in the year 2013. (i) We found 453 low-value services possibly offered in Austrian primary care. (ii) Only 34 (7.5%) services were quantifiable using routine data. (iii) In the year 2013, these 34 services were provided to at least 246 131 beneficiaries and the estimated avoidable costs arising were at least 11.38 million Euros. This accounts for 1.2% of overall spending of the Lower Austrian Sickness Fund for drugs and services provided by primary care doctors in the year 2013. The absence of a homogeneous, transparent and accessible coding system for diagnosis in Austrian primary care restrained our assessment. However, our study findings illustrate the potential utility and limitations of using claims-based measures to identify low-value care. © The Author 2016. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  6. PCR-RFLP Using BseDI Enzyme for Pork Authentication in Sausage and Nugget Products

    Directory of Open Access Journals (Sweden)

    Y. Erwanto

    2011-04-01

    Full Text Available A polymerase chain reaction–restriction fragment length polymorphism (PCR–RFLP using BseDI restriction enzyme had been applied for identifying the presence of pork in processed meat (beef sausage and chicken nugget including before and after frying. Pork sample in various levels (1%, 3%, 5%, 10%, and 25 % was prepared in a mixture with beef and chicken meats and processed for sausage and nugget. The primers CYTb1 and CYTb2 were designed in the mitochondrial cytochrome b (cyt b gene and PCR successfully amplified fragments of 359 bp. To distinguish existence of porcine species, the amplified PCR products of mitochondrial DNA were cut by BseDI restriction enzyme. The result showed pig mitochondrial DNA was cut into 131 and 228 bp fragments. The PCR-RFLP species identification assay yielded excellent results for identification of porcine species. It is a potentially reliable technique for pork detection in animal food processed products for Halal authentication.

  7. Enhancing Authentication Models Characteristic Metrics via ...

    African Journals Online (AJOL)

    In this work, we derive the universal characteristic metrics set for authentication models based on security, usability and design issues. We then compute the probability of the occurrence of each characteristic metrics in some single factor and multifactor authentication models in order to determine the effectiveness of these ...

  8. Authenticated communication from quantum readout of PUFs

    NARCIS (Netherlands)

    Skoric, Boris; Pinkse, Pepijn Willemszoon Harry; Mosk, Allard

    2016-01-01

    Quantum Readout of Physical Unclonable Functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: a verifier can check if received classical data was sent by the PUF holder. We call this

  9. Pathways to Authenticity in Operatic Interpretation

    DEFF Research Database (Denmark)

    Grund, Cynthia M.; Westney, WIlliam

    is authentic in the sense of being believable, honest and compelling. Mastering pronunciation and knowing the literal narrative of an opera is one thing, but how can an opera singer find ways to transcend the libretto in order to really grip an audience through authenticity of a deeper and more personal kind...

  10. Athos: Efficient Authentication of Outsourced File Systems

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Goodrich, Michael T.; Papamanthou, Charalampos

    2008-01-01

    We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated...

  11. Entity Authentication:Analysis using Structured Intuition

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    In this paper, we propose a new method for the analysis that uses intuition of the analyst in a structured way. First we define entity authentication in terms of fine level authentication goals (FLAGs). Then we use some relevant structures in protocol narrations and use them to justify FLAGs...

  12. Novel continuous authentication using biometrics

    Science.gov (United States)

    Dubey, Prakash; Patidar, Rinku; Mishra, Vikas; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    We explore whether a classifier can consistent1y verify c1ients and interact with the computer using camera and behavior of users. In this paper we propose a new way of authentication of user which wi1l capture many images of user in random time and ana1ysis of its touch biometric behavior. In this system experiment the touch conduct of a c1ient/user between an en1istment stage is stored in the database and it is checked its mean time behavior during equa1 partition of time. This touch behavior wi1l ab1e to accept or reject the user. This wi1l modify the use of biometric more accurate to use. In this system the work p1an going to perform is the user wi1l ask single time to a1low to take it picture before 1ogin. Then it wi1l take images of user without permission of user automatica1ly and store in the database. This images and existing image of user wi1l be compare and reject or accept wi1l depend on its comparison. The user touch behavior wi1l keep storing with number of touch make in equa1 amount of time of the user. This touch behavior and image wi1l fina1ly perform authentication of the user automatically.

  13. Social, psychological and demographic reflections on the Austrian nuclear power question

    International Nuclear Information System (INIS)

    Bretschneider, R.

    1980-01-01

    The political history of an Austrian referendum in 1978, which led to abandonment of a nuclear power station, is reviewed, and an attempt is made to analyse the reasons for the 'No' vote. Surveys are presented which attempt to classify the yes, no and undecided voters in terms of political views. The effects of the Harrisburg accident on Austrian public opinion is examined and the possibility of accentuated differences between 'for' and 'against' groups is stated. It is noted that success in energy saving may reduce the significance of the atomic energy question. (G.M.E.)

  14. Meat Quality Assessment by Electronic Nose (Machine Olfaction Technology

    Directory of Open Access Journals (Sweden)

    Sundar Balasubramanian

    2009-07-01

    Full Text Available Over the last twenty years, newly developed chemical sensor systems (so called “electronic noses” have made odor analyses possible. These systems involve various types of electronic chemical gas sensors with partial specificity, as well as suitable statistical methods enabling the recognition of complex odors. As commercial instruments have become available, a substantial increase in research into the application of electronic noses in the evaluation of volatile compounds in food, cosmetic and other items of everyday life is observed. At present, the commercial gas sensor technologies comprise metal oxide semiconductors, metal oxide semiconductor field effect transistors, organic conducting polymers, and piezoelectric crystal sensors. Further sensors based on fibreoptic, electrochemical and bi-metal principles are still in the developmental stage. Statistical analysis techniques range from simple graphical evaluation to multivariate analysis such as artificial neural network and radial basis function. The introduction of electronic noses into the area of food is envisaged for quality control, process monitoring, freshness evaluation, shelf-life investigation and authenticity assessment. Considerable work has already been carried out on meat, grains, coffee, mushrooms, cheese, sugar, fish, beer and other beverages, as well as on the odor quality evaluation of food packaging material. This paper describes the applications of these systems for meat quality assessment, where fast detection methods are essential for appropriate product management. The results suggest the possibility of using this new technology in meat handling.

  15. Meat quality assessment by electronic nose (machine olfaction technology).

    Science.gov (United States)

    Ghasemi-Varnamkhasti, Mahdi; Mohtasebi, Seyed Saeid; Siadat, Maryam; Balasubramanian, Sundar

    2009-01-01

    Over the last twenty years, newly developed chemical sensor systems (so called "electronic noses") have made odor analyses possible. These systems involve various types of electronic chemical gas sensors with partial specificity, as well as suitable statistical methods enabling the recognition of complex odors. As commercial instruments have become available, a substantial increase in research into the application of electronic noses in the evaluation of volatile compounds in food, cosmetic and other items of everyday life is observed. At present, the commercial gas sensor technologies comprise metal oxide semiconductors, metal oxide semiconductor field effect transistors, organic conducting polymers, and piezoelectric crystal sensors. Further sensors based on fibreoptic, electrochemical and bi-metal principles are still in the developmental stage. Statistical analysis techniques range from simple graphical evaluation to multivariate analysis such as artificial neural network and radial basis function. The introduction of electronic noses into the area of food is envisaged for quality control, process monitoring, freshness evaluation, shelf-life investigation and authenticity assessment. Considerable work has already been carried out on meat, grains, coffee, mushrooms, cheese, sugar, fish, beer and other beverages, as well as on the odor quality evaluation of food packaging material. This paper describes the applications of these systems for meat quality assessment, where fast detection methods are essential for appropriate product management. The results suggest the possibility of using this new technology in meat handling.

  16. Authentication in the context of international safeguards

    International Nuclear Information System (INIS)

    Drayer, D.D.; Sonnier, C.S.; Augustson, R.

    1991-01-01

    The International atomic Energy Agency held its first Advisory Group meeting on the subject of authentication in 1981. This meeting concentrated on the application of authentication to in-plant Non-Destructive Assay equipment supplied by the Facility Operator/State. In the decade since this meeting, a considerable amount of interest has developed over the use of authentication technology as a vital element of effective International Safeguards. Attendant with this interest, confusion has developed over the meaning and the need for the application of the technology as it exists today, and it may exist in the future. This paper addresses the subject of authentication, with emphasis on its basic definition and the applications of authentication technology in International Safeguards

  17. [Brief introduction of geo-authentic herbs].

    Science.gov (United States)

    Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian

    2013-05-01

    The science of geo-authentic herbs is a characteristic discipline of traditional Chinese medicine established during thousands of years of clinical practices. It has a long history under the guidance of profound theories of traditional Chinese medicine. The words of "geo-authentic product" were derived from an administrative division unit in the ancient times, which layed stress on the good quality of products in particular regions. In ancient records of traditional Chinese medicine, the words of "geo-authentic product" were first found in Concise Herbal Foundation Compilation of the Ming dynasty, and the words of "geo-authentic herbs" were first discovered in Peony Pavilion of the late Ming dynasty. After all, clinical effect is the fundamental evaluation standard of geo-authentic herbs.

  18. User Authentication in Smartphones for Telehealth

    Directory of Open Access Journals (Sweden)

    Katherine A. Smith

    2017-11-01

    Full Text Available Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity.  When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.  Keywords: Authentication, Biometrics, HIPAA, Mobile security, Telehealth

  19. Bacterial spoilage of meat and cured meat products

    NARCIS (Netherlands)

    Borch, E.; Kant-Muermans, M.L.T.; Blixt, Y.

    1996-01-01

    The influence of environmental factors (product composition and storage conditions) on the selection, growth rate and metabolic activity of the bacterial flora is presented for meat (pork and beef) and cooked, cured meat products. The predominant bacteria associated with spoilage of refrigerated

  20. Meat and Meat Product Consumption among Infants in Latvia

    Directory of Open Access Journals (Sweden)

    Širina Inga

    2017-12-01

    Full Text Available Meat consumption during the first year of life is especially important to provide necessary iron requirements. The aim of the study was to assess meat and meat product consumption of Latvian infants during their first year of life, in relation to different factors. Data were collected by interview method using two types of questionnaires: food frequency questionnaires and food diary. The study included a representative sample of infants and toddlers from all regions of Latvia with a target sample of 560 participants. The study included 266 infants: 127 girls, 139 boys, aged from 0 to 12 month. Data were summarised using the Excel software and analysed using the SPSS software. For data analysis two age groups were created: 0–5.9 months and 6–12 months. Consumption was analysed by two parameters: frequency and amount per feeding. Meat products were defined as offal products, sausages, and meat in baby food. Meat was mainly consumed after 6 months of age and by 73% of infants (n = 107. Meat from baby food was consumed only after 6 months and by 23% (n = 34. Sausages and offal products were consumed after 6 months of age. Sausages were consumed by 18% (n = 28 and offal products by 11% (n = 16 of infants. Meat consumption for the majority of infants was introduced after 6 months and was in accordance with recommendations.

  1. Breast meat yield, muscle linear measurements and meat ...

    African Journals Online (AJOL)

    Breast meat yield, chemical composition, mineral profile and linear measurement of the resultant breast meat Supracoracoides and Pectoralis thoracicus of one hundred and eighty (28 days old BUT) male turkeys fed diet containing wheat or sorghum as sole cereal source were studied. One hundred and eighty 28-days old ...

  2. GAME MEAT MARKET IN EASTERN CROATIA

    OpenAIRE

    Z. Tolušić; T. Florijančić; I. Kralik; M. Sesar; M. Tolušić

    2006-01-01

    In the Republic of Croatia, game meat is consumed far less than meat of domestic animals. Yearly game meat consumption amounts to only 0.55 kg per household member. Consumers prefer meat of domestic animals, because it is cheaper, not paying attention to specific nutritive advantages of game meat. A research on the game meat market and consumers’ preferences was carried out on 101 examinees, chosen among inhabitants of Slavonia and Baranja. The majority of questioned inhabitants did consume g...

  3. Color of Meat and Poultry

    Science.gov (United States)

    ... color. It can also occur when vegetables containing nitrites are cooked along with the meat. Because doneness and safety cannot be judged by ... or greenish cast when exposed to heat and processing. Wrapping the meat in airtight packages and storing it away from ...

  4. Ecological safety of meat products

    Directory of Open Access Journals (Sweden)

    A. K. Mikhailenko

    2009-01-01

    Full Text Available The level of toxicants was studied, and the biological value of sheep meat in the area of anthropogenic influence was checked up. The level of toxicants in meat depends straight on the age of animals.

  5. The In vitro meat cookbook

    NARCIS (Netherlands)

    Mensvoort, van K.M.; Grievink, H.J.

    2014-01-01

    With the world's population expected to reach nine billion people by 2050, it becomes impossible to produce and consume meat like we do today. In vitro meat, grown from cells in a laboratory, could provide a sustainable and animal-friendly alternative. Yet, before we can decide if we are willing to

  6. Cultured Meat in Islamic Perspective.

    Science.gov (United States)

    Hamdan, Mohammad Naqib; Post, Mark J; Ramli, Mohd Anuar; Mustafa, Amin Rukaini

    2017-04-29

    Cultured meat is a promising product that is derived through biotechnology that partially circumvents animal physiology, thereby being potentially more sustainable, environmentally friendly and animal friendly than traditional livestock meat. Such a novel technology that can impact many consumers evokes ethical, philosophical and religious discussions. For the Islamic community, the crucial question is whether cultured meat is halal, meaning compliant with Islamic laws. Since the culturing of meat is a new discovery, invention and innovation by scientists that has never been discussed by classical jurists (fuqaha'), an ijtihad by contemporary jurists must look for and provide answers for every technology introduced, whether it comply the requirements of Islamic law or not. So, this article will discuss an Islamic perspective on cultured meat based on the original scripture in the Qur'an and interpretations by authoritative Islamic jurists. The halal status of cultured meat can be resolve through identifying the source cell and culture medium used in culturing the meat. The halal cultured meat can be obtained if the stem cell is extracted from a (Halal) slaughtered animal, and no blood or serum is used in the process. The impact of this innovation will give positive results in the environmental and sustain the livestock industry.

  7. Food safety and organic meats.

    Science.gov (United States)

    Van Loo, Ellen J; Alali, Walid; Ricke, Steven C

    2012-01-01

    The organic meat industry in the United States has grown substantially in the past decade in response to consumer demand for nonconventionally produced products. Consumers are often not aware that the United States Department of Agriculture (USDA) organic standards are based only on the methods used for production and processing of the product and not on the product's safety. Food safety hazards associated with organic meats remain unclear because of the limited research conducted to determine the safety of organic meat from farm-to-fork. The objective of this review is to provide an overview of the published results on the microbiological safety of organic meats. In addition, antimicrobial resistance of microbes in organic food animal production is addressed. Determining the food safety risks associated with organic meat production requires systematic longitudinal studies that quantify the risks of microbial and nonmicrobial hazards from farm-to-fork.

  8. Iodine in meat in Macedonia

    International Nuclear Information System (INIS)

    Bogdanov, Bogdan; Gonev, Mihajlo; Tadzher, Isak

    2000-01-01

    Iodine deficiency in Macedonia still persists in a mild form. In 1999 the iodination of salt rose to 20 m gr iodine in Kg salt. The consumption of salt diminished after the last war from 20-30 gr salt per day to 10-20 gr salt daily. This shows that the problem of the elimination of iodine deficiency is being vigorously tackled. Since 1956 the iodine in salt in Macedonia rose to 10 m gr KI/Kg salt. The content of iodine in the Macedonian diet seems to be important. The amount of iodine in milk, eggs and bread is low as found by the investigation of MANU. The content of iodine in meat is low, compared to British meat is 10 times lower. The average iodine content in Macedonian meat is 95.15 micro gr per Kg, whereas in British meat it is 850-1510 micro gr iodine per k gr meat. (Original)

  9. Managing meat tenderness.

    Science.gov (United States)

    Thompson, John

    2002-11-01

    This paper discusses the management of meat tenderness using a carcass grading scheme which utilizes the concept of total quality management of those factors which impact on beef palatability. The scheme called Meat Standards Australia (MSA) has identified the Critical Control Points (CCPs) from the production, pre-slaughter, processing and value adding sectors of the beef supply chain and quantified their relative importance using large-scale consumer testing. These CCPs have been used to manage beef palatability in two ways. Firstly, CCPs from the pre-slaughter and processing sectors have been used as mandatory criteria for carcasses to be graded. Secondly, other CCPs from the production and processing sectors have been incorporated into a model to predict palatability for individual muscles. The evidence for the importance of CCPs from the production (breed, growth path and HGP implants), pre-slaughter and processing (pH/temperature window, alternative carcass suspension, marbling and ageing) sectors are reviewed and the accuracy of the model to predict palatability for specific muscle×cooking techniques is presented.

  10. Authentication of forensic DNA samples.

    Science.gov (United States)

    Frumkin, Dan; Wasserstrom, Adam; Davidson, Ariane; Grafit, Arnon

    2010-02-01

    Over the past twenty years, DNA analysis has revolutionized forensic science, and has become a dominant tool in law enforcement. Today, DNA evidence is key to the conviction or exoneration of suspects of various types of crime, from theft to rape and murder. However, the disturbing possibility that DNA evidence can be faked has been overlooked. It turns out that standard molecular biology techniques such as PCR, molecular cloning, and recently developed whole genome amplification (WGA), enable anyone with basic equipment and know-how to produce practically unlimited amounts of in vitro synthesized (artificial) DNA with any desired genetic profile. This artificial DNA can then be applied to surfaces of objects or incorporated into genuine human tissues and planted in crime scenes. Here we show that the current forensic procedure fails to distinguish between such samples of blood, saliva, and touched surfaces with artificial DNA, and corresponding samples with in vivo generated (natural) DNA. Furthermore, genotyping of both artificial and natural samples with Profiler Plus((R)) yielded full profiles with no anomalies. In order to effectively deal with this problem, we developed an authentication assay, which distinguishes between natural and artificial DNA based on methylation analysis of a set of genomic loci: in natural DNA, some loci are methylated and others are unmethylated, while in artificial DNA all loci are unmethylated. The assay was tested on natural and artificial samples of blood, saliva, and touched surfaces, with complete success. Adopting an authentication assay for casework samples as part of the forensic procedure is necessary for maintaining the high credibility of DNA evidence in the judiciary system.

  11. Image content authentication based on channel coding

    Science.gov (United States)

    Zhang, Fan; Xu, Lei

    2008-03-01

    The content authentication determines whether an image has been tampered or not, and if necessary, locate malicious alterations made on the image. Authentication on a still image or a video are motivated by recipient's interest, and its principle is that a receiver must be able to identify the source of this document reliably. Several techniques and concepts based on data hiding or steganography designed as a means for the image authentication. This paper presents a color image authentication algorithm based on convolution coding. The high bits of color digital image are coded by the convolution codes for the tamper detection and localization. The authentication messages are hidden in the low bits of image in order to keep the invisibility of authentication. All communications channels are subject to errors introduced because of additive Gaussian noise in their environment. Data perturbations cannot be eliminated but their effect can be minimized by the use of Forward Error Correction (FEC) techniques in the transmitted data stream and decoders in the receiving system that detect and correct bits in error. This paper presents a color image authentication algorithm based on convolution coding. The message of each pixel is convolution encoded with the encoder. After the process of parity check and block interleaving, the redundant bits are embedded in the image offset. The tamper can be detected and restored need not accessing the original image.

  12. Perfumed historic buildings: Issues of authenticity

    Directory of Open Access Journals (Sweden)

    Tošić Jovana

    2016-01-01

    Full Text Available Contemporary historical preservation practice includes olfactory preservation as an experimental method of architectural preservation. The implementation of manufactured scents in historic buildings raises important issues of authenticity. This paper focuses on three important issues in the relation between olfactory preservation and authenticity: the importance of phenomenology in memory evocation; the relative character of the authenticity concept; and the significance of social values in historic preservation. This requires a critical examination of charters, documents and theoretical interpretations which reflect a broader concept of authenticity. The paper discusses certain articles of the Venice Charter, the Nara Document on Authenticity, as well as the sense of smell in architectural experience through critical analysis of the theories of John Ruskin, Viollet-le-Duc, Roger Scruton and Juhani Pallasmaa and their concepts of authenticity. Authenticity issues are illustrated by the examples of olfactory preservation: olfactory reconstruction of Philip Johnson’s Glass House; interior restoration and olfactory reconstruction of the Arts Club in Mayfair, London; and the creation process of the perfume brand Arquiste, a meaningful example which relocates the olfactory reconstruction context. These critical analyses raise the question of scent in historic buildings as a value in itself.

  13. Post-irradiation examination of HTR-fuel at the Austrian Research Centre Seibersdorf Ltd

    International Nuclear Information System (INIS)

    Reitsamer, G.; Proksch, E.; Stolba, G.; Strigl, A.; Falta, G.; Zeger, J.

    1984-02-01

    This paper describes methods and measurements developed at the Austrian Research Centre Seibersdorf for the evaluation of the irradiation performance of HTR fuel. Main interest is concentrated on particle failure rates, fission product release, burn-up and inventory measurements (solid and gaseous fission products, uranium inventory). (Author) [de

  14. 45. Annual Convention of the Austrian Physical Society; 45. Jahrestagung der Oesterreichischen Physikalischen Gesellschaft

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-12-31

    This volume contains lectures of the 45{sup th} symposium of the Austrian Physical Society which had been held in Leoben, Austria in 1995. The following topics are included: Atomic physics, molecular physics, plasma physics, solid state physics, nuclear and particle physics, biophysics, environmental physics, quantum electronics and quantum optics. (Suda).

  15. Progress Report 1985 of the Austrian Research Centre Seibersdorf. Abridged version

    International Nuclear Information System (INIS)

    Schwach, G.W.

    1986-06-01

    The report gives a short survey of the work carried out by the Austrian Research Centre Seibersdorf in 1985. The working programme comprises five main areas: Energy and safety; Materials research, isotope and radiation techniques; Measuring techniques and information processing; Environmental protection, health and food; Industrial consulting. (Author)

  16. Networking for Education for Sustainable Development in Austria: The Austrian ECOLOG-Schools Programme

    Science.gov (United States)

    Rauch, Franz

    2016-01-01

    This case describes networking for education for sustainable development within the Austrian ECOLOG-schools network. The article presents theoretical concepts of networks in education in general, and the organization of the ECOLOG-network in particular. Based upon these foundations, the concept and results of a participatory evaluation study are…

  17. Psychometric Properties of the Revised Facts on Suicide Quiz in Austrian Medical and Psychology Undergraduates

    Science.gov (United States)

    Voracek, Martin; Tran, Ulrich S.; Sonneck, Gernot

    2008-01-01

    Psychometric properties and demographic correlates of a German form of R. W. Hubbard and J. L. McIntosh's (1992) Revised Facts on Suicide Quiz (RFOS), an inventory for assessing overall knowledge about suicide, were investigated in a sample of 1,093 Austrian medical and psychology students. Internal consistency of the RFOS was weak, as were many…

  18. Coming together but staying apart: continuity and change in the Austrian and Swiss varieties of capitalism

    NARCIS (Netherlands)

    Afonso, A.; Mach, A.; Becker, U.

    2011-01-01

    This paper provides an overview of continuity and change in the Swiss and Austrian political economies over the last 20 years. After outlining the different institutional foundations of economic governance in both countries (fragmented state, constrained executive power and bourgeois dominance in

  19. PCDD/F and PCB levels in Austrian cow's milk

    Energy Technology Data Exchange (ETDEWEB)

    Thanner, G.; Moche, W. [Umweltbundesamt Wien (Austria)

    2004-09-15

    In 2003 the Federal Environment Agency carried out a first Austrian wide milk monitoring study with the objective to get an overview of average PCDD/F levels in cow's milk, additionally dioxinlike PCBs, according to WHO, and indicator PCBs, as listed by national regulations, were analysed.

  20. Heritabilities and genetic correlations for honey yield, gentleness, calmness and swarming behaviour in Austrian honey bees

    NARCIS (Netherlands)

    Brascamp, Evert; Willam, Alfons; Boigenzahn, Christian; Bijma, Piter; Veerkamp, Roel F.

    2016-01-01

    Heritabilities and genetic correlations were estimated for honey yield and behavioural traits in Austrian honey bees using data on nearly 15,000 colonies of the bee breeders association Biene Österreich collected between 1995 and 2014. The statistical models used distinguished between the genetic

  1. Measurement of the 226Ra-concentration in bottled Austrian mineral waters and table beverages

    International Nuclear Information System (INIS)

    Friedmann, H.; Hernegger, F.

    1978-01-01

    226 Ra being regarded nowadays as a toxic trace element, a systementic examination of bottled Austrian mineral waters and table beverages has been carried out. Only in one case was the maximum allowable concentration of 3.3 pCi/l, a value set up by the WHO, clearly exceeded. (orig.) [de

  2. Deaustrification? : the policy-area-specific evolution of Austrian social partnership.

    NARCIS (Netherlands)

    Kittel, B.E.A.

    2000-01-01

    Recently, the functioning of Austrian Social Partnership has been increasingly questioned. If this interpretation of current strains on the relations between the state and the main economic interest organizations would be correct, Austria would become a significant case in favor of disorganization

  3. 46th annual symposium of the Austrian Physical Society. Programme and abstracts

    International Nuclear Information System (INIS)

    Schindler, H.G.

    1996-01-01

    This volume contains lectures (short communications) of the 46 th symposium of the Austrian Physical Society which had been held at the University of Linz (Austria) in 1996. The following topics are included: atomic physics, molecular physics, plasma physics, solid state physics, nuclear and particle physics, biophysics, environmental physics, quantum electronics and quantum optics. (Suda)

  4. Quality of Austrian and Dutch Falls-Prevention Information: A Comparative Descriptive Study

    Science.gov (United States)

    Schoberer, Daniela; Mijnarends, Donja M.; Fliedner, Monica; Halfens, Ruud J. G.; Lohrmann, Christa

    2016-01-01

    Objectives: The aim of this study was to evaluate and compare the quality of written patient information material available in Austrian and Dutch hospitals and nursing homes pertaining to falls prevention. Design: Comparative descriptive study design Setting: Hospitals and nursing homes in Austria and the Netherlands. Method: Written patient…

  5. Evaluation of air pollution-related risks for Austrian mountain forests

    International Nuclear Information System (INIS)

    Smidt, Stefan; Herman, Friedl

    2004-01-01

    The present paper describes air pollution status and evaluation of risks related to effects of phytotoxic pollutants in the Austrian mountain forests. The results are based on Austrian networks (Forest Inventory, Forest Damage Monitoring System, Austrian Bioindicator Grid), the Austrian sample plots of the European networks of the UN-ECE (ICP Forests, Level I and Level II) and interdisciplinary research approaches. Based on the monitoring data and on modelling and mapping of Critical Thresholds, the evaluation of risk factors was possible. Cause-effect relationships between air pollution and tree responses were shown by tree-physiological measurements. Sulfur impact, proton and lead input, concentrations of nitrogen oxides, nitrogen input and ozone were evaluated. The risk was demonstrated at a regional and large-scale national level. Especially the increasing O 3 level and the accumulation of Pb with altitude present most serious risk for mountain forests. - Despite strong reduction of emissions in Europe, pollutants are still a potential stress factor, especially for sensitive mountain forest ecosystems in Austria

  6. Progress Report 1984 of the Austrian Research Centre Seibersdorf. Abridged version

    International Nuclear Information System (INIS)

    Schwach, G.W.

    1986-06-01

    The report gives a short survey of the work carried out by the Austrian Research Centre Seibersdorf in 1984. The working programme comprises five main areas: Energy and safety; Materials research, isotope and radiation techniques; Measuring techniques and information processing; Environmental protection, health and food; Industrial consulting. (Author)

  7. Civic Education under Pressure? A Case Study from an Austrian School

    Science.gov (United States)

    Schild, Isabella; Breitfuss, Judith

    2018-01-01

    When the politician Roman Haider of the party Freiheitliche Partei Österreichs (FPÖ--Freedom Party of Austria) caused the interruption of a lecture about political extremism in an Austrian school in spring 2017, a heated debate erupted over the place of politics in school education. While Haider accused the lecturer of political propaganda,…

  8. 50. Annual symposium of the Austrian Physical Society; 50. Jahrestagung der Oesterreichischen Physikalischen Gesellschaft

    Energy Technology Data Exchange (ETDEWEB)

    Lippitsch, M E [Institut fuer Experimentalphysik, Karl-Franzens-Universitaet Graz, Universitaetsplatz 5, A-8010 Graz (Austria)

    2000-07-01

    The conference held from 25. - 29. 9. 2000 at the University of Graz was elaborated by the Austrian society of physics in the fields of solid state physics, polymers physics, quantum electronics, electrodynamics, optics, nuclear and particle physics, atomic, molecules and plasma physics, acoustics, physics - industry - energy and physics teaching. (botek)

  9. 1983 Annual convention of the Austrian Physical Society, University of Linz, 28 - 30 September 1983

    International Nuclear Information System (INIS)

    1983-01-01

    Proceedings of lectures and poster presentations given at the 1983 convention of the Austrian Physical Society, with (German) abstracts only. The four topical sessions were: 1) electrodynamics and optics 2) solid state physics 3) nuclear and particle physics 4) physics of high polymers Only part of the presentations pertain to the subject scope of INIS. (G.Q.)

  10. Ionizing energy treatment of meat and meat products

    International Nuclear Information System (INIS)

    Macfarlane, J.J.; Eustace, I.J.; Grau, F.H.

    1983-01-01

    The radiation treatments that have received most attention with respect to red meats are radappertization, i.e. radiation sterilization (25-70 kGy), to enable the long term storage of meat without refrigeration, and radurization (0.5-10 kGy) in which a sufficient proportion of spoilage organisms are inactivated to enable the storage life of chilled meat to be extended. Shelf-stable radappertized meats cannot be produced in the fresh-like condition; they need to be heated to about 70 deg. C to inactivate endogenous enzymes that would otherwise cause flavour and texture defects. The products should be vacuum sealed in oxgyen-impermeable packages and irradiated in the frozen state, otherwise pronounced off-flavours and off-odours are formed. The radiation dose required to give a useful degree of microbial inactivation and permit an increase of storage life depends upon treatment and storage conditions. The dose required is likely to be in the range 0.25 to 1.0 kGy if aerobic conditions apply, and 1 to 4 kGy if anaerobic conditions apply. An acceleration in the rate of development of rancidity in meat as a result of irradiation may be of concern when meat is treated under aerobic conditions. At the highest dose indicated above for meat irradiated under anaerobic conditions (4 kGy), effects on the organoleptic attributes of mutton have been detected

  11. From the 'Austrian Foundation for Atomic Energy Research' to the 'Seibersdorf Laboratories'

    International Nuclear Information System (INIS)

    Rößner, M.

    2013-01-01

    The aim of this thesis is the description of the process of institutionalization of nuclear research in Austria in the context of the „Atoms for Peace“ program in the 1950s. This aspect of the history of Austrian nuclear research has been relatively unexplored. The focus of this work is the presentation of measures that have been put in Austria to participate in the 'Atoms for Peace' program. Moreover, the expectations and goals of the Austrian nuclear program are analyzed. For this purpose, foundation, structure and research activities of the “Austrian Atomic Energy Commission”, the “Austrian Society for the Study of Atomic Energy” and the “Nuclear Reactor Centre Seibersdorf“ in the period from 1954 until about 1970 are examined. To establish a relationship with the international historical research of the history of nuclear research, the Austrian situation is compared to the Swiss and the German. It turns out that the Austrian expectations and objectives in nuclear research at the beginning of the period of observation roughly corresponded with the international trends. It also follows that by the establishment of the SGAE and the “Nuclear Reactor Centre Seibersdorf“ the development course of Austrian nuclear research occupied a special position compared to foreign institutions.(author) [de

  12. Towards distortion-free robust image authentication

    International Nuclear Information System (INIS)

    Coltuc, D

    2007-01-01

    This paper investigates a general framework for distortion-free robust image authentication by multiple marking. First, by robust watermarking a subsampled version of image edges is embedded. Then, by reversible watermarking the information needed to recover the original image is inserted, too. The hiding capacity of the reversible watermarking is the essential requirement for this approach. Thus in case of no attacks not only image is authenticated but also the original is exactly recovered. In case of attacks, reversibility is lost, but image can still be authenticated. Preliminary results providing very good robustness against JPEG compression are presented

  13. Instant Java password and authentication security

    CERN Document Server

    Mayoral, Fernando

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication and password security, and who are looking to get a good grounding in how to implement it in a reliable way.It's assumed that the reader will have some experience in Java already, as well as being familiar with the basic idea behind user authentication.

  14. Final report for the network authentication investigation and pilot.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  15. 22 CFR 92.38 - Forms of certificate of authentication.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Forms of certificate of authentication. 92.38... SERVICES Specific Notarial Acts § 92.38 Forms of certificate of authentication. The form of a certificate of authentication depends on the statutory requirements of the jurisdiction where the authenticated...

  16. Identification of fraud (with pig stuffs) in chicken-processed meat through information of mitochondrial cytochrome b.

    Science.gov (United States)

    Yacoub, Haitham A; Sadek, Mahmoud A

    2017-11-01

    This study was conducted to find out the fraud in chicken-processed meat ingredients to protect consumers from commercial adulteration and authentication through a reliable way: direct amplification of conserved segment of cytochrome b gene of mitochondrial DNA, in addition, using species-specific primer assay for a certain cytochrome b. The results reported that chicken-processed meats were identified as a chicken meat based on amplification of conserved cytochrome b gene of mtDNA, while different fragments sizes were produced after the application of species-specific primer as follows: 227, 157, 274, 331, 389 and 439 bp for raw meat of chicken, goat, cattle, sheep, pig and horse, respectively. The results revealed that all chicken meat products are produced with 227 bp in size. While, an adulteration with pork stuffs was observed in some of the chicken meat products using a species-specific primer of cytochrome b gene, namely, chicken luncheon and chicken burger. This study represents a reliable technique that could be used to provide a promising solution for identifying the commercial adulteration and substitutions in processed meat in retail markets.

  17. Make me authentic, but not here: Reflexive struggles with academic identity and authentic leadership

    OpenAIRE

    Tomkins, Leah; Nicholds, Alyson

    2017-01-01

    This article presents a reflexive auto-ethnography of the experience of teaching authentic leadership to MBA students. It traces parallels between the challenges of authentic leadership and the challenges of academic identity work, grounded specifically in the experience of having to teach something one does not fully endorse. Both authentic leadership and academic identity work emerge as struggle – riddled with false starts, best intentions and self-deception, and entwined in the politics of...

  18. Austrian Daily Climate Data Rescue and Quality Control

    Science.gov (United States)

    Jurkovic, A.; Lipa, W.; Adler, S.; Albenberger, J.; Lechner, W.; Swietli, R.; Vossberg, I.; Zehetner, S.

    2010-09-01

    Checked climate datasets are a "conditio sine qua non" for all projects that are relevant for environment and climate. In the framework of climate change studies and analysis it is essential to work with quality controlled and trustful data. Furthermore these datasets are used as input for various simulation models. In regard to investigations of extreme events, like strong precipitation periods, drought periods and similar ones we need climate data in high temporal resolution (at least in daily resolution). Because of the historical background - during Second World War the majority of our climate sheets were sent to Berlin, where the historical sheets were destroyed by a bomb attack and so important information got lost - only several climate sheets, mostly duplicates, before 1939 are available and stored in our climate data archive. In 1970 the Central Institute for Meteorology and Geodynamics in Vienna started a first attempt to digitize climate data by means of punch cards. With the introduction of a routinely climate data quality control in 1984 we can speak of high-class-checked daily data (finally checked data, quality flag 6). Our group is working on the processing of digitization and quality control of the historical data for the period 1872 to 1983 for 18 years. Since 2007 it was possible to intensify the work (processes) in the framework of an internal project, namely Austrian Climate Data Rescue and Quality Control. The aim of this initiative was - and still is - to supply daily data in an outstanding good and uniform quality. So this project is a kind of pre-project for all scientific projects which are working with daily data. In addition to routine quality checks (that are running since 1984) using the commercial Bull Software we are testing our data with additional open source software, namely ProClim.db. By the use of this spatial and statistical test procedure, the elements air temperature and precipitation - for several sites in Carinthia - could

  19. Meat Consumption Culture in Ethiopia

    Science.gov (United States)

    Jo, Cheorun

    2014-01-01

    The consumption of animal flesh food in Ethiopia has associated with cultural practices. Meat plays pivotal and vital parts in special occasions and its cultural symbolic weight is markedly greater than that accorded to most other food. Processing and cooking of poultry is a gender based duty and has socio-cultural roles. Ethiopians are dependent on limited types of animals for meats due to the taboo associated culturally. Moreover, the consumption of meat and meat products has a very tidy association with religious beliefs, and are influenced by religions. The main religions of Ethiopia have their own peculiar doctrines of setting the feeding habits and customs of their followers. They influence meat products consumption through dictating the source animals that should be used or not be used for food, and scheduling the days of the years in periodical permeation and restriction of consumptions which in turn influences the pattern of meat consumption in the country. In Ethiopia, a cow or an ox is commonly butchered for the sole purpose of selling within the community. In special occasions, people have a cultural ceremony of slaughtering cow or ox and sharing among the group, called Kircha, which is a very common option of the people in rural area where access of meat is challenging frequently. PMID:26760739

  20. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  1. 9 CFR 319.80 - Barbecued meats.

    Science.gov (United States)

    2010-01-01

    ... CERTIFICATION DEFINITIONS AND STANDARDS OF IDENTITY OR COMPOSITION Cooked Meats § 319.80 Barbecued meats. Barbecued meats, such as product labeled “Beef Barbecue” or “Barbecued Pork,” shall be cooked by the direct... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Barbecued meats. 319.80 Section 319.80...

  2. GAME MEAT MARKET IN EASTERN CROATIA

    Directory of Open Access Journals (Sweden)

    Z. Tolušić

    2006-12-01

    Full Text Available In the Republic of Croatia, game meat is consumed far less than meat of domestic animals. Yearly game meat consumption amounts to only 0.55 kg per household member. Consumers prefer meat of domestic animals, because it is cheaper, not paying attention to specific nutritive advantages of game meat. A research on the game meat market and consumers’ preferences was carried out on 101 examinees, chosen among inhabitants of Slavonia and Baranja. The majority of questioned inhabitants did consume game meat (92%, of whom 66% consider game meat to be of better quality than meat of domestic animals. Significant number of examinees considers game meat as healthy food, being also convinced that game was healthier to consume if hunted in their natural environment, than if reared on specialized farms (90%. Irrespective of quality, only 22% of examinees buy game meat, and 51% think such meat is too expensive. This is the main reason why consumers have game meat only once a month (51%. Taking into consideration monthly income of their respective household, 58% of examinees can afford game meat only once a month, and, if having an opportunity, they would opt for meat of roe deer (55% and rabbit (25%. When asked what would stimulate the game meat market in Croatia, 56% of examinees believe this could be achieved by lowering of prices, 27% think the issue could be addressed by opening of specialty stores, and only 17% opted for more aggressive marketing activities.

  3. A Novel Multifactor Authentication System Ensuring Usability and Security

    OpenAIRE

    Mathew, Gloriya; Thomas, Shiney

    2013-01-01

    User authentication is one of the most important part of information security. Computer security most commonly depends on passwords to authenticate human users. Password authentication systems will be either been usable but not secure, or secure but not usable. While there are different types of authentication systems available alphanumeric password is the most commonly used authentication mechanism. But this method has significant drawbacks. An alternative solution to the text based authenti...

  4. ESnet authentication services and trust federations

    Energy Technology Data Exchange (ETDEWEB)

    Muruganantham, Dhivakaran; Helm, Mike; Genovese, Tony [ESnet, Energy Sciences Network, 1 Cyclotron Road, MS 50A-3111 Berkeley, California 94720 (United States)

    2005-01-01

    ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the 'roaming scientist' (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens)

  5. ESnet authentication services and trust federations

    International Nuclear Information System (INIS)

    Muruganantham, Dhivakaran; Helm, Mike; Genovese, Tony

    2005-01-01

    ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the 'roaming scientist' (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens)

  6. Multi-factor authentication using quantum communication

    Science.gov (United States)

    Hughes, Richard John; Peterson, Charles Glen; Thrasher, James T.; Nordholt, Jane E.; Yard, Jon T.; Newell, Raymond Thorson; Somma, Rolando D.

    2018-02-06

    Multi-factor authentication using quantum communication ("QC") includes stages for enrollment and identification. For example, a user enrolls for multi-factor authentication that uses QC with a trusted authority. The trusted authority transmits device factor information associated with a user device (such as a hash function) and user factor information associated with the user (such as an encrypted version of a user password). The user device receives and stores the device factor information and user factor information. For multi-factor authentication that uses QC, the user device retrieves its stored device factor information and user factor information, then transmits the user factor information to the trusted authority, which also retrieves its stored device factor information. The user device and trusted authority use the device factor information and user factor information (more specifically, information such as a user password that is the basis of the user factor information) in multi-factor authentication that uses QC.

  7. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  8. Identity-Based Authentication for Cloud Computing

    Science.gov (United States)

    Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao

    Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.

  9. Hardware device binding and mutual authentication

    Science.gov (United States)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  10. ECG authentication in post-exercise situation.

    Science.gov (United States)

    Dongsuk Sung; Jeehoon Kim; Myungjun Koh; Kwangsuk Park

    2017-07-01

    Human authentication based on electrocardiogram (ECG) has been a remarkable issue for recent ten years. This paper proposed an authentication technology with the ECG data recorded after the harsh exercise. 55 subjects voluntarily attended to this experiment. A stepper was used as an exercise equipment. The subjects are asked to do stepper for 5 minutes and their ECG signals are acquired before and after the exercise in rest, sitting posture. Linear discriminant analysis (LDA) was used for both feature extraction and classification. Even though, within the first 1 minute recording, the subject recognition accuracy was 59.64%, which is too low to utilize, after one minute the accuracy was higher than 90% and it increased up to 96.22% within 5 minutes, which is plausible to use in authentication circumstances. Therefore, we have concluded that ECG authentication techniques will be able to be used after 1 minute of catching breath.

  11. Irradiation of meats and poultry

    International Nuclear Information System (INIS)

    Urbain, W.M.

    1978-01-01

    A number of beneficial effects can be achieved by irradiating meats and poultry under different conditions. It is possible, for example, to extend the market life of both fresh and processed meats by applying radiation doses sufficient to reduce the microbial population, thereby delaying onset of spoilage; higher doses aimed at destroying both spoilage and pathogenic microorganisms can also be applied to meats, packaged to prevent recontamination, resulting in a shelf-stable product; the objective may also be to inactivate pathogenic bacteria, parasites and viruses in order to obtain a product which is acceptable from the point of view of public health. (orig.) [de

  12. Authentic Leadership: Practices to Promote Integrity.

    Science.gov (United States)

    Hughes, Vickie

    Integrity is a highly desired leadership trait. Authentic leaders reflect on their behavior and seek feedback about how their actions affect others. How can a nurse develop as an authentic leader who consistently demonstrates integrity? The following are discussed: Reflection; Connection to Christ and others; Social and Emotional Intelligence providing perceptive competency and social awareness; Aesthetic Qualities whereby leaders apply experiential knowing in leadership situations; and effective expression of Gratitude as a meaningful act of valuing others.

  13. Capturing Cognitive Processing Time for Active Authentication

    Science.gov (United States)

    2014-02-01

    the password with password -based access control to generate a hardened password [4]. Here, we present a biometric -based active authentication...typing rhythm (CTR), Support Vector Machine (SVM), Behavioral Biometrics 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF... biometrics , extracted from keystroke dynamics, as “something a user is” for active authentication. This scheme performs continual verification in the

  14. Improving functional value of meat products.

    Science.gov (United States)

    Zhang, Wangang; Xiao, Shan; Samaraweera, Himali; Lee, Eun Joo; Ahn, Dong U

    2010-09-01

    In recent years, much attention has been paid to develop meat and meat products with physiological functions to promote health conditions and prevent the risk of diseases. This review focuses on strategies to improve the functional value of meat and meat products. Value improvement can be realized by adding functional compounds including conjugated linoneleic acid, vitamin E, n3 fatty acids and selenium in animal diets to improve animal production, carcass composition and fresh meat quality. In addition, functional ingredients such as vegetable proteins, dietary fibers, herbs and spices, and lactic acid bacteria can be directly incorporated into meat products during processing to improve their functional value for consumers. Functional compounds, especially peptides, can also be generated from meat and meat products during processing such as fermentation, curing and aging, and enzymatic hydrolysis. This review further discusses the current status, consumer acceptance, and market for functional foods from the global viewpoints. Future prospects for functional meat and meat products are also discussed.

  15. Context-Aware Multimodal FIDO Authenticator for Sustainable IT Services

    Directory of Open Access Journals (Sweden)

    Seung-Hyun Kim

    2018-05-01

    Full Text Available Existing sustainable IT services have several problems related to user authentication such as the inefficiency of managing the system security, low security, and low usability. In this paper, we propose a Fast IDentity Online (FIDO authenticator that performs continuous authentication with implicit authentication based on user context and multimodal authentication. The proposed FIDO authenticator, a context-aware multimodal FIDO authentication (CAMFA method, combines information such as the user context, state of the mobile device, and user biometrics, then applies implicit and explicit authentication methods to meet the level of authentication required by the service provider. This reduces the user’s explicit authentication burden and continually authenticates users at risk during the session. Moreover, it is able to respond to attacks such as the theft of the authentication method or session hijacking. To study the effectiveness of CAMFA, we ran a user study by collecting data from 22 participants over 42 days of activity on a practical Android platform. The result of the user study demonstrates that the number of explicit authentication requests could be reduced by half. Based on the results of this study, an advanced user authentication that provides multimodal and continuous authentication could be applied to sustainable IT services.

  16. Facelock: familiarity-based graphical authentication.

    Science.gov (United States)

    Jenkins, Rob; McLachlan, Jane L; Renaud, Karen

    2014-01-01

    Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  17. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner\\'s signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  18. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin; Papadias, Dimitris; Papadopoulos, Stavros; Kalnis, Panos

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  19. Results of the Czech-Austrian calculations of BDBA radiological consequences

    International Nuclear Information System (INIS)

    Carny, P.; Hohenberg, J.-K.

    2003-01-01

    Full text: Common Czech - Austrian comparisons of codes and calculations of BDBA radiological consequences have been performed. Background of these comparisons is described in the paper presented at this symposium. Results of single steps are summarized and discussed in this poster presentation. From the Czech side calculations have been performed with computer codes PC Cosyma, este, RTARC, HAVAR, HERALD, PTM, RODOS/MATCH and long range code MEDIA used by the Czech meteorological institute (CHMI). Code PC Cosyma is taken as main comparable code in this inter-comparisons as it is used by the Czech and the Austrian side. For every accident scenario and for deterministic as well as probabilistic assessment of accident consequences results of both sides have been practically identical. Computer code 'este' is instrument for projection of release and evaluation of real release under real VVER 440 and WER 1000 emergency conditions. The code can be operated with real radiological, meteorological and technological data from the plant. The code calculates projection of avertable doses and simulates movement of radioactive clouds in the vicinity (up to 40-50 km) of the plant. The code participates in these comparisons as it serves as a support instrument for the staff at the emergency centre of the Czech nuclear regulatory body. Code RTARC (Real Time Accident Release Consequences) serves as an instrument for evaluation of radiation situation in the vicinity of the plant (up to 40 km) during the early phase of an accident. The code participates in these comparisons as it was used in the process of the Czech nuclear power plants protective action planning zone determination. Codes HERALD and HAVAR have been used by Skoda and Energoprojekt for analyses of consequences of design bases accidents in Temelin safety report. They were compared with PC Cosyma in one step of these common calculations by the Czech side. The code HAVAR enables to calculate ingestion doses, too, and

  20. The Ethics of Producing In Vitro Meat

    OpenAIRE

    Schaefer, G Owen; Savulescu, Julian

    2014-01-01

    The prospect of consumable meat produced in a laboratory setting without the need to raise and slaughter animals is both realistic and exciting. Not only could such in vitro meat become popular due to potential cost savings, but it also avoids many of the ethical and environmental problems with traditional meat productions. However, as with any new technology, in vitro meat is likely to face some detractors. We examine in detail three potential objections: 1) in vitro meat is disrespectful, e...

  1. Bioactive Compounds in Functional Meat Products

    OpenAIRE

    Ewelina Pogorzelska-Nowicka; Atanas G. Atanasov; Jarosław Horbańczuk; Agnieszka Wierzbicka

    2018-01-01

    Meat and meat products are a good source of bioactive compounds with positive effect on human health such as vitamins, minerals, peptides or fatty acids. Growing food consumer awareness and intensified global meat producers competition puts pressure on creating new healthier meat products. In order to meet these expectations, producers use supplements with functional properties for animal diet and as direct additives for meat products. In the presented work seven groups of key functional cons...

  2. Meat production perspective in Yucatan

    Directory of Open Access Journals (Sweden)

    Victor M. Toledo-Lopez

    2011-12-01

    Full Text Available The evolution of meat production in Mexico during the last decade is the result of the complex interaction between different areas of livestock production and consumers’ preferences, being the former widely influenced by new tendencies and purchasing capacity. In Yucatan, there are two meat product processing plants. Yucatan’s research projects are basically focused to production, handling and genetics. This research is developed in Research Centers like Universidad Autonoma Yucatan’s Ciencias Biologicas Agropecuarias Campus, INIFAP Mococha, Instituto Tecnologico Conkal and Instituto Tecnologoco Merida. Many projects are inter-institutional and others by Cuerpos Academicos inside the institutions. Grants are provided by state, national or international dependencies. In the Instituto Tecnologico Merida research projects are on different animals’ meat quality and novel meat products.

  3. Environmental costs of meat production

    DEFF Research Database (Denmark)

    Nguyen, T Lan T; Hermansen, John Erik; Mogensen, Lisbeth

    2012-01-01

    This paper aims to address two questions: First, what is the real cost of meat to society if taking into account the environmental costs arising throughout the product life cycle; and second, whether and how the environmental costs related to meat production can be reduced. In addressing the issues...... to be the main contributor to the costs (55%), followed by global warming (21%) and respiratory inorganics (18%). A viable option combining improvement measures in three aspects: feed use, manure management, and manure utilization, reduces the environmental costs by a factor of 1.4. This results in an equal size......, we use pig meat production in the EU as a case study. The environmental costs of meat are displayed first as characterized results at different midpoint categories e.g. global warming, nature occupation, acidification, eutrophication, ecotoxicity, etc., and then aggregated into a single score using...

  4. Why Credit Deflation Is More Likely than Mass Inflation: An Austrian Overview of the Inflation Versus Deflation Debate

    Directory of Open Access Journals (Sweden)

    Vijay Boyapati

    2010-12-01

    Full Text Available This article provides an Austrian overview of the inflation versus deflation debate which has captured the attention of the economics profession in the years following the US housing bust. Much of the Austrian analysis of this debate has focused on the massive expansion of the Federal Reserve’s balance sheet and attendant creation of new reserves. Several Austrian economists have predicted that the creation of new reserves will cause a massive increase in inflation. The money multiplier theory, on which these predictions are based, is criticized and an overview of the Austrian business cycle theory is provided to explain why banks are reluctant to issue new credit. Finally, an analysis of the politics of deflation is provided and a class theory is presented to explain why a policy of controlled credit deflation is more likely than a policy that would result in mass inflation or hyperinflation.

  5. Biblical Allusions in Expressionist Poetry in the Context of Austrian, German, and Ukrainian Literature : A Comparative Analysis

    NARCIS (Netherlands)

    Mykhalchuk, T.

    2016-01-01

    With the application of comparative methodology, this article analyzes biblical allusions, reminiscences, paraphrases, direct and indirect quotations, and symbols in the poetry of Austrian, German, and Ukrainian writers (Georg Heym, Mykola Bazhan, Mykola Khvyliovyj Todosii, T. Osmachka, Pavlo

  6. 9 CFR 355.42 - Marking of mule meat and animal food mule meat by-product.

    Science.gov (United States)

    2010-01-01

    ... mule meat by-product. 355.42 Section 355.42 Animals and Animal Products FOOD SAFETY AND INSPECTION... Meat and Animal Food, Mule Meat By-Product § 355.42 Marking of mule meat and animal food mule meat by-product. All mule meat and animal food mule meat by-product inspected under this part shall be marked and...

  7. Comparison of amount of physical load in the Czech and Austrian footballers at the same level of performance

    OpenAIRE

    Bujnovský, David

    2011-01-01

    Title: Comparison of the size of the motor load in the Czech and Austrian soccer players at the same performance level Objectives: The aim is to determine the size of the physical load of players during a football match. At the same time the next aim is to determinate the differences of physical load between Czech and Austrian soccer players at the same performance level. Methods: The indirect (mediated) observations was used in this bachelor thesis, because the data were recorded by computer...

  8. Robust image authentication in the presence of noise

    CERN Document Server

    2015-01-01

    This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.    Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:   Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the pre...

  9. Privacy-Preserving Biometric Authentication: Challenges and Directions

    Directory of Open Access Journals (Sweden)

    Elena Pagnin

    2017-01-01

    Full Text Available An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication. The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In this article, we present the most challenging issues that need to be taken into consideration when designing secure and privacy-preserving biometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric authentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric authentication protocols.

  10. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    Science.gov (United States)

    Kent, Alexander Dale [Los Alamos, NM

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  11. Effect of radiation processing on meat tenderisation

    International Nuclear Information System (INIS)

    Kanatt, Sweetie R.; Chawla, S.P.; Sharma, Arun

    2015-01-01

    The effect of radiation processing (0, 2.5, 5 and 10 kGy) on the tenderness of three types of popularly consumed meat in India namely chicken, lamb and buffalo was investigated. In irradiated meat samples dose dependant reduction in water holding capacity, cooking yield and shear force was observed. Reduction in shear force upon radiation processing was more pronounced in buffalo meat. Protein and collagen solubility as well as TCA soluble protein content increased on irradiation. Radiation processing of meat samples resulted in some change in colour of meat. Results suggested that irradiation leads to dose dependant tenderization of meat. Radiation processing of meat at a dose of 2.5 kGy improved its texture and had acceptable odour. - Highlights: • Effect of radiation processing on tenderness of three meat systems was evaluated. • Dose dependant reduction in shear force seen in buffalo meat. • Collagen solubility increased with irradiation

  12. Impact of Austrian hydropower plants on the flood control safety of the Hungarian Danube reach

    International Nuclear Information System (INIS)

    Zsuffa, I.

    1999-01-01

    Statistical analysis of daily water level data from four gauging stations along the Hungarian Danube reach has been carried out with the purpose of analysing the impact of the Austrian hydropower plants on the floods of the river. Conditional probability distribution functions of annual flood load maxima and annual number of floods were generated for the periods 1957-1976 and 1977-1996. By comparing these distribution functions, it could be shown that the flood load maxima have decreased, while the number of small and medium floods have increased during the past forty years. These changes indicate a decreased rate of flood superposition resulting from the barrages constructed in this period. The significantly decreased flood load maxima indicate that the Austrian barrage system has positive impact on the flood control safety of the Hungarian Danube reach

  13. Legal aspects of the crimes committed in insolvency proceedings – comparison of Czech and Austrian legislation

    Directory of Open Access Journals (Sweden)

    Marta Uhlířová

    2013-01-01

    Full Text Available The subject of this paper is to compare the Czech and Austrian legislation considering offenses which entrepreneurs and other entities (natural person may commit within the insolvency proceedings or which are related to the insolvency. Emphasis is placed on the comparison of Czech and Austrian legislation with regard cross-border relationships within the business environment and living between the Czech Republic and Austria.Czech entrepreneurs and natural person in Austria can get into a situation where their debtor is located in Austria and finds himself insolvent or vice versa. Also the Czech entrepreneurs and natural person may do their bussines or live in Austria and may get into such a situation when they are close to the situation which can lead to their decline. This paper would be for them a practical recommendation on how to avoid potential criminal liability.

  14. Manmade radionuclide vector in Austrian soil and vegetation near Temelin nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Sinojmeri, M.; Ringer, V. [Oesterreichische Agentur fuer Gesundheit und Ernaehrungssicherheit - AGES (Austria)

    2014-07-01

    Since Chernobyl NPP accident an environmental monitoring program concerning the Upper Austrian region near Czech Republic Nuclear Power Plant, NPP Temelin, is in progress between AGES and BMLFUV, the Austrian Federal Ministry of Agriculture, Forestry, Environment, Water and Food, in Austria. This paper presents the results obtained during the sampling campaign over biennial period of 2010-2011. Soil samples, grass and different cereal species were collected. Beside Cs-134, Cs-137 and Sr-89, Sr-90 isotopes, at this phase the number of isotopes determined was extended with plutonium isotopes Pu-238, Pu-239, Pu-240, Pu-241 and Am-241. A comparison of these results with the existing data so far is presented. New knowledge was obtained related the bio-kinetic parameters of these elements in the environment. Document available in abstract form only. (authors)

  15. Towards a Dynamic Resource-Based View: Insights from Austrian capital and Entrepreneurship Theory

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Ishikawa, Ibuki

    The dominant view in the strategic management field is the resource-based view ("RBV"). It has often been observed that the RBV is lacking in the dynamic dimension. For example, processes of building competitive advantages by means of combining existing complementary resources in novel ways...... are not inquired into. We argue that the RBV may profitably draw on Austrian (Misesian) and Knightian insights in entrepreneurship and capital theory, particularly in its Lachmannian manifestation, in order to strengthen its dynamic components. We link the RBV and Austrian ideas in the context of the theory...... of complex systems pioneered by Herbert Simon. We draw a number of implications for strategic management from this synthesis, notably into resource value and sustainability of competitive advantage.JEL Code: B53, D21, L23, M1...

  16. Austrian Capital Theory and the Link Between Entrepreneurship and the Theory of the Firm

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul; Klein, Peter G.

    2005-01-01

    tangible and intangible,are heterogeneous; arranging these assets to minimize contractual hazards, toprovide efficient investment incentives, or to exploit competitive advantage isconceived as the prime task of economic organization. None of these approaches,however, is based on a systematic theory......Several writers link entrepreneurship to asset ownership, trying to incorporatethe theory of entrepreneurship into the theory of the firm. The critical link, weargue, is capital heterogeneity. Transaction cost, property rights, and resourcebasedapproaches to the firm assume that assets, both...... of capital heterogeneity. Inthis paper we outline the approach to capital developed by the Austrian schoolof economics and integrate it into an entrepreneurial theory of the firm. We refineAustrian capital theory by defining capital heterogeneity in terms of subjectivelyperceived attributes, that is...

  17. Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

    International Nuclear Information System (INIS)

    Yang Jing; Wang Chuan; Zhang Ru

    2010-01-01

    In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.

  18. Radiation preservation of meat and meat products: A review.

    Science.gov (United States)

    Dempster, J F

    1985-01-01

    The World Health Organisation (WHO) in 1980 clarified the position regarding the medical acceptability of irradiated foods when it said'…no health hazard results from consuming any food irradiated up to a dose of one megarad (1 Mrad)'. This resulted in renewed interest in irradiation as a cost-effective alternative to traditional preservation methods such as canning and freezing. Thus, radurisation (the application of ionising radiation at a dose level which substantially reduces the microbial population) increases the shelf life of poultry, comminuted meat and meat dishes significantly. Low dose irradiation, or radicidation, eliminates parasites such as Trichinae and cysticerci in pork and, very importantly, salmonella organisms in poultry and red meat. Therefore, irradiation has an important rôle to play in public health protection. High dose irradiation, or radappertisation ('cold sterilisation'), uses doses in excess of 1 Mrad and is analogous to retorting as understood in the canning industry. However, it can adversely affect quality in producing 'free radicals' in high protein foods such as meat. To prevent this, special precautions are necessary, e.g. irradiation is conducted at very low temperatures and the product is usually vacuum packed. A further potential use of irradiation is its ability to reduce the quantity of nitrite necessary in cured meats. This may become of practical significance if legislation further reduces the amount of nitrite permitted in these products. Copyright © 1985. Published by Elsevier Ltd.

  19. Phylogenetic analysis of Austrian canine distemper virus strains from clinical samples from dogs and wild carnivores.

    Science.gov (United States)

    Benetka, V; Leschnik, M; Affenzeller, N; Möstl, K

    2011-04-09

    Austrian field cases of canine distemper (14 dogs, one badger [Meles meles] and one stone marten [Martes foina]) from 2002 to 2007 were investigated and the case histories were summarised briefly. Phylogenetic analysis of fusion (F) and haemagglutinin (H) gene sequences revealed different canine distemper virus (CDV) lineages circulating in Austria. The majority of CDV strains detected from 2002 to 2004 were well embedded in the European lineage. One Austrian canine sample detected in 2003, with a high similarity to Hungarian sequences from 2005 to 2006, could be assigned to the Arctic group (phocine distemper virus type 2-like). The two canine sequences from 2007 formed a clearly distinct group flanked by sequences detected previously in China and the USA on an intermediate position between the European wildlife and the Asia-1 cluster. The Austrian wildlife strains (2006 and 2007) could be assigned to the European wildlife group and were most closely related to, yet clearly different from, the 2007 canine samples. To elucidate the epidemiological role of Austrian wildlife in the transmission of the disease to dogs and vice versa, H protein residues related to receptor and host specificity (residues 530 and 549) were analysed. All samples showed the amino acids expected for their host of origin, with the exception of a canine sequence from 2007, which had an intermediate position between wildlife and canine viral strains. In the period investigated, canine strains circulating in Austria could be assigned to four different lineages reflecting both a high diversity and probably different origins of virus introduction to Austria in different years.

  20. Segregated integration : recent trends in the Austrian gender division of labor

    OpenAIRE

    Kreimer, Margareta; Mora, Ricardo

    2013-01-01

    Using micro data from the Austrian Labor Force Survey, this paper explores how decreases in the gender differential in participation rates together with increasing differentials in the incidence of part-time jobs and stable or rising levels of occupational segregation by gender affect the gender division of labor. To so so, we propose an index for the gender division of labor based on the Mutual Information index. Our main results show that the gender division of labor is very sta...

  1. Authority Relationship From a Societal Perspective: Social Representations of Obedience and Disobedience in Austrian Young Adults

    OpenAIRE

    Fattori, Francesco; Curly, Simone; J?rchel, Amrei C.; Pozzi, Maura; Mihalits, Dominik; Alfieri, Sara

    2015-01-01

    Obedience and disobedience have always been salient issues for both civil society and social psychologists. Since Milgram’s first studies on destructive obedience there has not been a bottom-up definition of what obedience and disobedience mean. The current study aimed at investigating the social representations young adults use to define and to co-construct knowledge about obedience and disobedience in Austria. One hundred fifty four (106 females, 68.8%) Austrian young adults (Mean age = 22....

  2. European parliament in Strasbourg more courageous against 'atomic neighbours' than Austrian politicians

    International Nuclear Information System (INIS)

    Stockinger, H.

    1987-01-01

    The author is refering to a notice in the german journal VDI-Nachrichten that the European Parliament claims that nuclear power stations should be put into operation upon agreement of the neighbouring member state up to a distance of 100 km from the border. The presently accepted distance is 30 km only. The author gives a list of claims the Austrian authorities should insist on when negotiating with neighbours operating nuclear power plants, primarily West Germany and Czechoslovakia. 1 fig. (qui)

  3. Longer Working Hours? More Flexible Work Schedules? Do Austrian Economic Policymakers Need to Act?

    OpenAIRE

    Alfred Stiglbauer

    2004-01-01

    On September 23, 2004, the Oesterreichische Nationalbank (OeNB) hosted a workshop to discuss extending working hours and increasing working time flexibility. After Peter Mooslechner (OeNB) outlined the development of the present discussion in the media and presented some facts, the participants delivered their statements. Erhard Fu‹rst (Federation of Austrian Industry and Austria perspektiv) called for more flexibility rather than for an extension of working hours. He supported this view by p...

  4. Open Access Policies of Research Funders: The Case Study of the Austrian Science Fund (FWF)

    OpenAIRE

    Tonto, Yaşar; Doğan, Güleda; Al, Umut; Madran, Orçun

    2015-01-01

    The Austrian Science Fund (FWF) is the main funder for basic research in Austria. FWF has been instrumental in promoting Open Access in Austria and elsewhere and possesses a strong Open Access policy for the research it funds. This case study presents FWF as a good practice of an effective funder policy on account of its comprehensive strategy and multi-faceted approach for implementing and supporting it.

  5. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  6. AUTHENTIC TEXTS FOR CRITICAL READING ACTIVITIES

    Directory of Open Access Journals (Sweden)

    Ila Amalia

    2016-03-01

    Full Text Available This research takes an action research aimed at promoting critical reading (“thinking” while reading skills using authentic materials among the students. This research also aims to reveal the students perception on using critical reading skills in reading activities. Nineteen English Education Department students who took Reading IV class, participated in this project. There were three cycles with three different critical reading strategies were applied. Meanwhile, the authentic materials were taken from newspaper and internet articles. The result revealed that the use of critical reading strategies along with the use of authentic materials has improved students’ critical reading skills as seen from the improvement of each cycle - the students critical reading skill was 54% (fair in the cycle 1 improved to 68% (average in cycle 2, and 82% (good in cycle 3.. In addition, based on the critical reading skill criteria, the students’ critical reading skill has improved from 40% (nearly meet to 80% (exceed. Meanwhile, from the students’ perception questionnaire, it was shown that 63% students agreed the critical reading activity using authentic text could improve critical thinking and 58% students agreed that doing critical reading activity could improve reading comprehension. The result had the implication that the use of authentic texts could improve students’ critical reading skills if it was taught by performing not lecturing them. Selectively choosing various strategies and materials can trigger students’ activeness in responding to a text, that eventually shape their critical reading skills.

  7. Disambiguating authenticity: Interpretations of value and appeal.

    Directory of Open Access Journals (Sweden)

    Kieran O'Connor

    Full Text Available While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity-type, moral, craft, and idiosyncratic-we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed to it through: (1 consumer value ratings, (2 willingness to pay, and (3 behavioral choice. We report empirical analyses from a research program of three multi-method studies using (1 archival data from voluntary consumer evaluations of restaurants in an online review system, (2 a university-based behavioral lab experiment, and (3 an online survey-based experiment. Evidence is consistent across the studies and suggests that perceptions of four distinct subtypes of socially constructed authenticity generate increased appeal and value even after controlling for option quality. Findings suggest additional directions for research on authenticity.

  8. Simulations in nursing practice: toward authentic leadership.

    Science.gov (United States)

    Shapira-Lishchinsky, Orly

    2014-01-01

    Aim  This study explores nurses' ethical decision-making in team simulations in order to identify the benefits of these simulations for authentic leadership. Background  While previous studies have indicated that team simulations may improve ethics in the workplace by reducing the number of errors, those studies focused mainly on clinical aspects and not on nurses' ethical experiences or on the benefits of authentic leadership. Methods  Fifty nurses from 10 health institutions in central Israel participated in the study. Data about nurses' ethical experiences were collected from 10 teams. Qualitative data analysis based on Grounded Theory was applied, using the atlas.ti 5.0 software package. Findings  Simulation findings suggest four main benefits that reflect the underlying components of authentic leadership: self-awareness, relational transparency, balanced information processing and internalized moral perspective. Conclusions  Team-based simulation as a training tool may lead to authentic leadership among nurses. Implications for nursing management  Nursing management should incorporate team simulations into nursing practice to help resolve power conflicts and to develop authentic leadership in nursing. Consequently, errors will decrease, patients' safety will increase and optimal treatment will be provided. © 2012 John Wiley & Sons Ltd.

  9. Snail meat: Significance and consumption

    Directory of Open Access Journals (Sweden)

    Dragićević Olgica

    2005-01-01

    Full Text Available The consumption of snail meat goes back to prehistoric times. Different ancient nations had snails on their menu, but Helices culture as a productive activity was born as a Roman culture. Some of the most economically important edible species are: Helix aspersa (Mtiller Helixpomatia (Linne, Helix iucorum (Linne, Helix aperta (Born, Eobania vermiculata (Miiller. Together with its tasie, snail meat has several advantages over others: quite low lipid rate and calorie values versus rich mineral, essential amino acid and fatty acid content. The composition of snail meat is presented. In addition, the composition of different snail species and the part analyzed (pedal mass and visceral mass is presented. Also, the differences in composition according to the species (snail meat horse/chicken meat, beef, swine meat, fish meat are presented. The French are the world's leading consumers of snails. !n France snails come to market in a variety of ways. Estimated consumption of snails in France is around 40 000 tones/year. Total French imports account for 25% of world imports. France is also the leading exporter of prepared snails, mainly sold as preserved snails and prepared dishes. Snail imports have been much higher than exports (65 tones exported in 2002. vs. 2.700 tones imported. Despite the large consumption, only 3% of snails in France come from production (farming. Italy is in second place in the world consumption of snails, and Spain and Germany are in the third and fourth place. The development of snails consumption in Italy is followed with the same amount of production of snails in the whole biological circle. In 2001, from 24,700 tons, 9,350 tons (37.8% came from production, 6 00 tons (2.4% came from nature, and 14,750 tons (59.70% came from imports (frozen, fresh and prepared snails. In Serbia, at the beginning of 2005, we had over 400 registered farms for snail production.

  10. Joint Annual Meeting of the Austrian Physical Society and the Swiss Physical Society together with the Austrian and Swiss Societies for Astronomy and Astrophysics

    International Nuclear Information System (INIS)

    2013-01-01

    The Joint Annual Meeting of the Austrian Physical Society and the Swiss Physical Society was organized together with both national societies of Astronomy and Astrophysics (SSAA and ÖGAA) at the Johannes Kepler University Linz, Altenberger Straße 69, 4040 Linz, Austria. The plenary sessions gave an overview of the present status of research in quantum mechanics, particle, atomic and molecular physics. The topical sessions were dedicated to: nuclear, particle- and astro particle physics; physics teachers; acoustics; atoms, molecules, quantum optics and plasmas; solid state physics and research with neutron and synchrotron radiation; history of physics; medical, bio and environmental physics; surfaces, interfaces and thin films; careers in physics. There were special sessions on thermoelectrics and photovoltaics. In addition to the regular program, an Energy Day (Energietag) with several parallel sessions on recent topics of energy generation, -transport and -storage was jointly organized by the Energy and Industry Subdivisions of the Austrian Physical Society and by the Johannes Kepler Universität Linz. Those contributions which are in the INIS subject scope are indexed individually

  11. [Comparison between the Austrian and German DRG systems in hand surgery].

    Science.gov (United States)

    Lotter, O; Jaminet, P; Schwarzach, S; Schaller, H E

    2013-02-01

    Diagnosis-Related Groups (DRG) are a patient classification system grouping related types of patients treated to the resources they consumed. In this analysis, we compared the Austrian and the German DRG systems. The 15 most common hand surgical diagnoses and their corresponding operative treatment were transferred into the Austrian system. Thus, the length of stay and the reimbursement of both countries could be obtained and compared. The mean values and the median values of the upper and lower thresholds of length of stay as well as the average length of stay were all lower in Austria compared to Germany. Reimbursement in Germany was higher in 13 of 19 cases. Total proceeds amounted to 1.67 million in the German and 1.70 million in the Austrian health care system. Considering the purchasing power applying consumer prize parities, the difference of reimbursement between the countries rose to 130,000 which equals a difference of almost 8%. Reimbursement of the top 15 diagnoses in hand surgery in Austria is 8% higher than in Germany. Except for one case, mean values as well as upper and lower thresholds of length of stay are considerably shorter in Austria. Comparison of international data to refine a national compensation system is advocated.

  12. Österreichs Wirtschaftsbeziehungen in Südostasien [Austrian Economic Relations to South-East Asia

    Directory of Open Access Journals (Sweden)

    Reinhart Zimmermann

    2008-01-01

    Full Text Available Der süd- und südostasiatische Raum befindet sich im Aufholprozess. Der anhaltende Wachstumstrend geht einher mit der steigenden Nachfrage aus den Industriestaaten sowie dem Binnenmarkt und führt auch zu erhöhtem Bedarf an Infrastruktur. Auch die österreichische Wirtschaft profitiert vom Asien-Boom. Dies zeigt das stete Wachstum österreichischer Warenexporte in die Region, der Anstieg heimischer Direktinvestitionen sowie die wachsende Präsenz österreichischer Firmen. Ziel der österreichischen WirtschaftsvertreterInnen ist es, die Tigerstaaten Südostasiens mehr aus dem Schatten der aufstrebenden Wirtschaftssupermacht China zu holen und die österreichische Wirtschaftsverflechtung mit diesen Ländern zu intensivieren.The South and South East Asian Area has been catching up with the developed world. The sustained economic growth trend goes hand in hand with a higher demand from industrialized nations and a stronger internal demand, pushing for better infrastructure. The Austrian economy is also benefiting from booming Asia, underscored by the steady increase of Austrian exports to this region, the rise of foreign direct investment and companies doing business in these countries. The Austrian business community would like to see the South East Asian tiger states more out of the shadow of the new super power China. The overall objective is to intensify the economic integration with South and South East Asia.

  13. Authentic And Concurrent Evaluation-refining

    DEFF Research Database (Denmark)

    Eriksson, Carina Ihlström; Åkesson, Maria; Kautz, Karlheinz

    2011-01-01

    This paper addresses the need for more detailed accounts for evaluation in design science research literature. By revisiting a design project regarding the future e-newspaper we give detailed descriptions of its authentic and concurrent evaluation approach by illustrating the what, why and how...... of all evaluation activities throughout the whole project. The project produced seven different design artifacts that were evaluated. The utility and theoretical outcomes of the evaluation activities clearly influenced design decisions regarding newspaper design, user value and business model design...... as well as decisions on strategic levels. We emphasize a holistic and concurrent approach to evaluation compared to the general design science research thinking and argue that reflecting on how to seek authenticity is important. By authenticity we refer to the notion of how closely an evaluation captures...

  14. Thawing of Frozen Tuna Meat

    Science.gov (United States)

    Tanaka, Takeo; Nishiwaki, Kôji; Kakuda, Kitonari; Tomimatsu, Takao

    Frozen southern bluefin tuna meat discolors easily and sometimes contracts when thawed caused by thaw rigor. These phenomenon often become problematic in the transaction or handling of this kind of frozen tuna. Frozen meat blocks of southern Bluefin tuna were thawed separately by air thawing, running water thawing and microwave thawing. Changes occurring during thawing were checked for meat color by met-myoglobin ratio determination and for contract by microscopic observation. Results are as follows : (1) Discoloration scarcely occurred in the process of running water thawing (at 10°C for 50 min, or at 0°C for 6 hr). (2) No contraction was observed during thawing with running water described above and air thawing (at 18-20°C for 6 hr). (3) Discoloration and contraction seemed to be minimized, as to latently contractile blocks, when meat temperature passed through rapidly between -10°C and -5°C, and slowly (for 5-6 hr) between -5°C and -1°C. When the block was originally not contractile, discloration was minimized by rising meat temperature rapidly from -10°C to -l°C.

  15. Physiology and taxonomy of lactobacilli surviving radurization of meat

    International Nuclear Information System (INIS)

    Hastings, J.W.

    1986-02-01

    The aim of this study was to isolate radiation-resistant lacto-bacilli from radurized (5 kGy) vacuum-packaged meat and subject them to biochemical, metabolic and physiological testing in order to gain a clearer understanding of the taxonomy of this group as well as determine characteristics which may be of technological significance. All 113 of the lactobacilli isolated were homofermentative, aciduric and were allocated to the sub-genus Streptobacterium. Numerical taxonomy by unweighted pair-group average linkage analysis revealed the existence of 5 clusters of the isolates. The same 113 isolates were classified using a purely classical taxonomic approach where the isolates were divided into 4 groups according to species designation. The basis upon which they were identified as a particular species was mainly their carbohydrate fermentation pattern. Several of the 113 isolates were selected for tests to determine characteristics of technological importance. All L.sake isolates exhibited the phenomenon of being more resistant to irradiation in the logarithmic phase than in the stationary phase of their growth cycle. This phenomenon was not characteristic of all the bacteria and was not always related to high radiation-resistance. Four L. sake isolates and three authentic strains were subjected to radiation-sensitivity testing in a natural food system where the bacteria were irradiated in minced meat packaged under four different conditions. The organisms exhibited the highest death rates under CO 2 packaging but resistance seemed to increase under N 2 -packaging. The radiation-resistance of the isolates was greater than that of the reference strains and all strains were approximately twice as resistant in the meat microenvironment than in a synthetic medium

  16. Strategies for designing novel functional meat products.

    Science.gov (United States)

    Arihara, Keizo

    2006-09-01

    In recent years, much attention has been paid to physiological functions of foods due to increasing concerns for health. Although there has been limited information of physiological functions of meat until recently, several attractive meat-based bioactive compounds, such as carnosine, anserine, l-carnitine, conjugated linoleic acid, have been studied. Emphasizing these activities is one possible approach for improving the health image of meat and developing functional meat products. This article provides potential benefits of representative meat-based bioactive compounds on human health and an overview of meat-based functional products. Strategies for designing novel functional meat products utilizing bioactive peptides and/or probiotic bacteria, is also discussed. This article focuses particularly on the possibility of meat protein-derived bioactive peptides, such as antihypertensive peptides. There are still some hurdles in developing and marketing novel functional meat products since such products are unconventional and consumers in many countries recognize meat and meat products to be bad for health. Along with accumulation of scientific data, there is an urgent need to inform consumers of the exact functional value of meat and meat products including novel functional foods.

  17. Facelock: familiarity-based graphical authentication

    Directory of Open Access Journals (Sweden)

    Rob Jenkins

    2014-06-01

    Full Text Available Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate, even after a one-year delay (86.1% success rate. Zero-acquaintance attackers were reduced to guessing (<1% success rate. Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate. In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate. Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  18. Authentic Assessment of Special Learners: Problem or Promise?

    Science.gov (United States)

    Choate, Joyce S.; Evans, Susan S.

    1992-01-01

    This article outlines differences between traditional assessment and authentic assessment procedures, discusses problems with each type of assessment in relation to special learners, and offers certain cautions that must be observed when implementing authentic assessment. (JDD)

  19. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  20. Group-ID based RFID Mutual Authentication

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-11-01

    Full Text Available For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator. Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.

  1. Multimedia encryption and authentication techniques and applications

    CERN Document Server

    Furht, Borko

    2006-01-01

    Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for thos

  2. Recent advance in DNA-based traceability and authentication of livestock meat PDO and PGI products.

    Science.gov (United States)

    Nicoloso, Letizia; Crepaldi, Paola; Mazza, Raffaele; Ajmone-Marsan, Paolo; Negrini, Riccardo

    2013-04-01

    This review updates the available molecular techniques and technologies and discusses how they can be used for traceability, food control and enforcement activities. The review also provides examples on how molecular techniques succeeded to trace back unknowns to their breeds of origin, to fingerprint single individuals and to generate evidence in court cases. The examples demonstrate the potential of the DNA based traceability techniques and explore possibilities for translating the next generation genomics tools into a food and feed control and enforcement framework.

  3. Power ultrasound in meat processing.

    Science.gov (United States)

    Alarcon-Rojo, A D; Janacua, H; Rodriguez, J C; Paniwnyk, L; Mason, T J

    2015-09-01

    Ultrasound has a wide range of applications in various agricultural sectors. In food processing, it is considered to be an emerging technology with the potential to speed up processes without damaging the quality of foodstuffs. Here we review the reports on the applications of ultrasound specifically with a view to its use in meat processing. Emphasis is placed on the effects on quality and technological properties such as texture, water retention, colour, curing, marinating, cooking yield, freezing, thawing and microbial inhibition. After the literature review it is concluded that ultrasound is a useful tool for the meat industry as it helps in tenderisation, accelerates maturation and mass transfer, reduces cooking energy, increases shelf life of meat without affecting other quality properties, improves functional properties of emulsified products, eases mould cleaning and improves the sterilisation of equipment surfaces. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Secure authentication of classical messages with single photons

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen; Fu-Chen, Zhu

    2009-01-01

    This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical. (general)

  5. Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

    OpenAIRE

    Lee, Wei-Han; Lee, Ruby B.

    2017-01-01

    Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the...

  6. Multi-modal Behavioural Biometric Authentication for Mobile Devices

    OpenAIRE

    Saevanee , Hataichanok; Clarke , Nathan ,; Furnell , Steven ,

    2012-01-01

    Part 12: Authentication and Delegation; International audience; The potential advantages of behavioural biometrics are that they can be utilised in a transparent (non-intrusive) and continuous authentication system. However, individual biometric techniques are not suited to all users and scenarios. One way to increase the reliability of transparent and continuous authentication systems is create a multi-modal behavioural biometric authentication system. This research investigated three behavi...

  7. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  8. Authentic Leadership Kepala Sekolah dalam Menanamkan Sistem Nilai

    OpenAIRE

    Aan Komariah

    2013-01-01

    Abstract: The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. ...

  9. Authentic Leadership Kepala Sekolah Dalam Menanamkan Sistem Nilai

    OpenAIRE

    Komariah, Aan

    2012-01-01

    : The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. The stud...

  10. 9 CFR 317.308 - Labeling of meat or meat food products with number of servings.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Labeling of meat or meat food products with number of servings. 317.308 Section 317.308 Animals and Animal Products FOOD SAFETY AND INSPECTION... Nutrition Labeling § 317.308 Labeling of meat or meat food products with number of servings. The label of...

  11. 9 CFR 317.300 - Nutrition labeling of meat or meat food products.

    Science.gov (United States)

    2010-01-01

    ... Labeling § 317.300 Nutrition labeling of meat or meat food products. (a) Nutrition labeling shall be... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Nutrition labeling of meat or meat food products. 317.300 Section 317.300 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE...

  12. Will novel protein foods beat meat? : consumer acceptance of meat substitutes - a multidisciplinary research approach

    NARCIS (Netherlands)

    Hoek, A.C.

    2010-01-01

    Meat production places a heavy burden on the environment and therefore options are sought to reduce meat consumption. One option is to let new meat substitutes take the place of meat on the plate. This can only succeed when these products are acceptable to consumers. The thesis investigated which

  13. The Efficacy of the clay meat ball as a method of traditional meat ...

    African Journals Online (AJOL)

    Keywords: meat ball, protein, mineral content. This work was carried out to determine the effectiveness of the use of clay meat balls (an African traditional method of preserving meat) in extending the shelf life of meat over a period of months against microbial (bacterial and fungal) spoilage and contamination without ...

  14. BIOTECHNOLOGIES OF MEAT PRODUCTS MANUFACTURE. CURRENT STATE

    OpenAIRE

    Bal-Prilipko L. V.; Leonova B. I.

    2014-01-01

    The analysis of literature and patents related to the possibilities of biotechnology for optimizing the domestic meat processing plants was the aim of the article. The analysis of the results of the use of biotechnological methods in the meat processing industry is given. The prospects for their implementation are evaluated. The main development strategy of technological meat processing to develop the methods of obtaining high quality and safe meat products is highlighted. Targeted use of spe...

  15. Goat Meat Consumer Preferences: Implications for Goat Meat Marketing in Metropolitan Nashville, Tennessee Area

    OpenAIRE

    Ekanem, Enefiok; Mafuyai-Ekanem, Mary; Tagegne, Fisseha; Singh, Surendra; Favors, Delicia

    2013-01-01

    Goat meat has become an increasingly good source of protein for meat eaters in the global marketplace. Goat meat constitutes about 63% of all red meat consumed worldwide. It is the main source of animal protein in many North African, Middle Eastern nations, Southeast Asia, the Caribbean, and other tropical regions. This notwithstanding, goat meat is yet to take such prominence in the U.S. diet. Despite the acknowledgement of the meat as lean, tasty and less fatty than other meats (USDA 2001),...

  16. Robust authentication through stochastic femtosecond laser filament induced scattering surfaces

    International Nuclear Information System (INIS)

    Zhang, Haisu; Tzortzakis, Stelios

    2016-01-01

    We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.

  17. Screen Fingerprints as a Novel Modality for Active Authentication

    Science.gov (United States)

    2014-03-01

    Screen fingerprint is the new cyber biometric modality that we have proposed to measure and analyze active authentication. The screen finger ...as a new biometric modality for active authentication. Such a fingerprint is acquired by taking a screen recording of the computer being used and...extracting discriminative visual feature from the recording. 15. SUBJECT TERMS Active authentication, screen fingerprints, biometrics 16. SECURITY

  18. Robust authentication through stochastic femtosecond laser filament induced scattering surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Haisu [Institute of Electronic Structure and Laser, Foundation for Research and Technology Hellas, Heraklion 71110 (Greece); Tzortzakis, Stelios, E-mail: stzortz@iesl.forth.gr [Institute of Electronic Structure and Laser, Foundation for Research and Technology Hellas, Heraklion 71110 (Greece); Materials Science and Technology Department, University of Crete, 71003 Heraklion (Greece); Science Program, Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar)

    2016-05-23

    We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.

  19. 22 CFR 61.5 - Authentication procedures-Imports.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication procedures-Imports. 61.5 Section... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide foreign...

  20. 29 CFR 18.901 - Requirement of authentication or identification.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Requirement of authentication or identification. 18.901... HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES Rules of Evidence Authentication and Identification § 18.901 Requirement of authentication or identification. (a) General provision. The requirement of...

  1. Quantum Dialogue with Authentication Based on Bell States

    Science.gov (United States)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  2. Authentic tasks in higher education: Studying design principles for assessment

    NARCIS (Netherlands)

    van Keulen, H.; van den Berg, I.; Ramaekers, S.

    2006-01-01

    Students may benefit significantly from learning through authentic tasks. But how do we assess their learning outcomes, taking into account the specific characteristics of authentic tasks? In the second presentation of this symposium on design principles for authentic tasks we present and discuss

  3. Authentic Leadership Kepala Sekolah dalam Menanamkan Sistem Nilai

    Directory of Open Access Journals (Sweden)

    Aan Komariah

    2013-07-01

    Full Text Available Abstract: The Authentic Leadership of School Principals in Inculcating Value System. The present article reports on a research project aimed at examining the extent to which “ authentic ladership” is important as an alternative leadership model to apply at schools to inculcate value and character systems of the school community. It was also aimed at examining the dimensionality of the authentic leaderhip . Delphi Survey method was implemented to assess the importance of authentic leadership. The study involved 62 superintendants who were formerly principals of secondary schools, high schools, and vocational schools in Bandung, West Java. The results show that authentic leadership was a suitable type of leadership model to effectively instill value system. It also demonstrated that authentic leadership was a unidimensional construct. Abstrak: Authentic Leadership Kepala Sekolah dalam Menanamkan Sistem Nilai. Penelitian ini bertujuan untuk menguji seberapa penting authentic leadership untuk dijadikan sebagai alternatif kepemimpinan di sekolah untuk menanamkan sistem nilai dan karakter warga sekolah serta menguji multidimensionalitas konstruk authentic leadership di sekolah. Metode Delphi Survey digunakan untuk pengujian tingkat pentingnya perilaku authentic leadership dengan partisipan 62 pengawas mantan kepala sekolah SMP, SMA dan SMK di Kota Bandung. Hasil penelitian menunjukan bahwa authentic leadership adalah tipe kepemimpinan yang tepat untuk menanamkan sistem nilai secara efektif. Penelitian juga membuktikan bahwa authentic leadership merupakan konstruk yang bersifat unidimensional.

  4. Toward Developing Authentic Leadership: Team-Based Simulations

    Science.gov (United States)

    Shapira-Lishchinsky, Orly

    2014-01-01

    Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…

  5. A Research on the Consequences of Authentic Leadership

    OpenAIRE

    Akif Tabak; Mustafa Polat; Serkan Cosar; Tolga Turkoz

    2013-01-01

    The present study examined the relationship between employees' authentic leadership perceptions and three relevant authentic leadership consequences, organizational trust, organizational commitment and organizational cynicism. With 371 employees in a Turkish firm, correlation analysis results showed that authentic leadership perceptions of employees were positively related to organizational trust and organizational commitment, but was negatively related with organizational cynicism. Moreover,...

  6. School Principals' Authentic Leadership and Teachers' Psychological Capital: Teachers' Perspectives

    Science.gov (United States)

    Feng, Feng-I

    2016-01-01

    This study examined teachers' perceptions of principals' authentic leadership and the relationship of authentic leadership to teachers' psychological capital in Taiwan. A total of 1,429 elementary and secondary school teachers were surveyed. The results showed that teachers perceived their principals' authentic leadership as moderate and that the…

  7. In the elderly, meat protein assimilation from rare meat is lower than that from meat that is well done.

    Science.gov (United States)

    Buffière, Caroline; Gaudichon, Claire; Hafnaoui, Noureddine; Migné, Carole; Scislowsky, Valérie; Khodorova, Nadezda; Mosoni, Laurent; Blot, Adeline; Boirie, Yves; Dardevet, Dominique; Santé-Lhoutellier, Véronique; Rémond, Didier

    2017-11-01

    Background: Meat cooking conditions in in vitro and in vivo models have been shown to influence the rate of protein digestion, which is known to affect postprandial protein metabolism in the elderly. Objective: The present study was conducted to demonstrate the effect of cooking conditions on meat protein assimilation in the elderly. We used a single-meal protocol to assess the meat protein absorption rate and estimate postprandial meat protein utilization in elderly subjects. Design: The study recruited 10 elderly volunteers aged 70-82 y. Each received, on 2 separate occasions, a test meal exclusively composed of intrinsically 15 N-labeled bovine meat (30 g protein), cooked at 55°C for 5 min [rare meat (RM)] or at 90°C for 30 min [fully cooked meat (FCM)], and minced. Whole-body fluxes of leucine, before and after the meal, were determined with the use of a [1- 13 C]leucine intravenous infusion. Meat protein absorption was recorded with the use of 15 N enrichment of amino acids. Results: Postprandial time course observations showed a lower concentration in the plasma of indispensable amino acids ( P meat leucine in the plasma ( P meat nitrogen to plasma amino acid nitrogen ( P meat amino acids with RM than with FCM. This was associated with decreased postprandial whole-body protein synthesis with RM than with FCM (40% compared with 56% of leucine intake, respectively; P meat cooking conditions have little effect on postprandial protein utilization in young adults, the present work showed that the bioavailability and assimilation of meat amino acids in the elderly is lower when meat is poorly cooked. In view to preventing sarcopenia, elderly subjects should be advised to favor the consumption of well-cooked meat. This trial was registered at clinicaltrials.gov as NCT02157805. © 2017 American Society for Nutrition.

  8. Radiation decontamination of meat lyophylized products

    International Nuclear Information System (INIS)

    Migdal, W.; Owczarczyk, H.B.

    2002-01-01

    There is an increasing demand for a powder soups and sauces composed with lyophylizated meat. Technology of lyophylization is not always accompanied by thermal treatment of raw materials. That is the reason the meat lyophylization process does not ensure as good microbiological quality as is required. Degree of microbiological decontamination and organoleptic properties of lyophilized meat were investigated after radiation treatment

  9. 9 CFR 319.261 - Meat loaf.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Meat loaf. 319.261 Section 319.261... ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION AND VOLUNTARY INSPECTION AND CERTIFICATION DEFINITIONS AND STANDARDS OF IDENTITY OR COMPOSITION Luncheon Meat, Loaves and Jellied Products...

  10. 9 CFR 319.500 - Meat pies.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Meat pies. 319.500 Section 319.500... ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION AND VOLUNTARY INSPECTION AND CERTIFICATION DEFINITIONS AND STANDARDS OF IDENTITY OR COMPOSITION Meat Food Entree Products, Pies, and...

  11. Breeding for meat quality in pigs

    NARCIS (Netherlands)

    Hovenier, R.

    1993-01-01

    The aim of this study was to investigate the possibilities of improving pig meat quality by selection. Therefore, literature is reviewed to determine the meat quality traits to be used and genetic parameters of those meat quality traits are calculated. A method is described to obtain

  12. 9 CFR 319.304 - Meat stews.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Meat stews. 319.304 Section 319.304... ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION AND VOLUNTARY INSPECTION AND CERTIFICATION DEFINITIONS AND STANDARDS OF IDENTITY OR COMPOSITION Canned, Frozen, or Dehydrated Meat Food...

  13. 9 CFR 319.260 - Luncheon meat.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Luncheon meat. 319.260 Section 319.260... ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION AND VOLUNTARY INSPECTION AND CERTIFICATION DEFINITIONS AND STANDARDS OF IDENTITY OR COMPOSITION Luncheon Meat, Loaves and Jellied Products...

  14. Meat consumption, diabetes and its complications

    NARCIS (Netherlands)

    Feskens, E.J.M.; Sluik, D.; Woudenbergh, van G.J.

    2013-01-01

    Several prospective studies have reported that risk of type 2 diabetes (T2DM) is elevated in meat consumers, especially when processed meats are consumed. Elevated risks of coronary heart disease (CHD) and stroke in meat consumers have also been reported. In this overview, the evidence regarding

  15. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  16. Determination of the species specificity of the primers for the detection of chicken and turkey meat by realtime PCR method

    Directory of Open Access Journals (Sweden)

    Lenka Maršálková

    2014-07-01

    Full Text Available The aim of this work was to use TaqMan Real-Time PCR for quantitative authentication of chicken and turkey meat. To meet this purpose, a specific pair of primers and TaqMan probe was used. The test was aimed at identifying the reaction cycle of turkey and chicken meat using by two sets of primers. With first set of primer designed for chicken we obtained the following results: Cp = 16.18 for 100% chicken DNA Cp = 29, 18 100% turkey DNA It was also amplified DNA of pig that exceeded the detection threshold fluorescence intensities in the 31.07 cycle (Cp = 31.07. Using primers designed for turkey we obtained the following results Cp = 31.16 for 100% CHDNA, Cp =16.18 100% TDNA. It was also amplified the 100% DNA of rabbit in 31.63 cycle (Cp = 31.63 and deer in cycle 32 (Cp = 32. The DNA of all other animal species was amplificated after more than 35 cycles (Cp >35. It follows that the second detection primer pair is specific enough to unrelated species of animals by 30 cycles of the reaction. Species authentication based on DNA analysis from this perspective overcomes all the shortcomings of proteins. At present, DNA analysis use different types of PCR. Is the most progressive Real-time PCR, which is suitable for the specific use of detection (primers and TaqMan probe. The TaqMan Real-time PCR is within the sensitivity and specificity, clearly one of the best methods for identifying the species of chicken and turkey meat. The specificity of this method, however, depends primarily on the specificity of the primers and TaqMan probe. The 30 cycle reaction was chosen by us as the threshold for specificity using primers for authentication chicken and turkey meat.

  17. Functional Characteristics of Spent Duck Meat for Use in Emulsion-Type Meat Products

    OpenAIRE

    Juni Sumarmono; Samsu Wasito

    2010-01-01

    Spent ducks produce nutritive meat; however the meat possesses undesirable characteristics such as strong odor and tough. Hence, appropriate yet simple processing technologies need to be developed in order to maximize the use of duck meat. The experiment was conducted to evaluate functional characteristics of spent duck meat as raw material for the production of emulsion-type meat products, such as nugget and sausage. Chilled carcasses of 96 spent ducks were deboned manually, then mixed thor...

  18. Community Engagement as Authentic Learning with Reflection

    Science.gov (United States)

    Power, Anne

    2010-01-01

    Authentic learning in teacher education is deeply connected with students' future professional practice. This paper describes coaching and mentoring strands of a unit in the preparation of pre-service teachers and critically evaluates reflections made in terms of Professional Teacher Standards. (Contains 1 table.)

  19. Investigating Background Pictures for Picture Gesture Authentication

    Science.gov (United States)

    2017-06-01

    using PGA as an optional replacement for text passwords with their Windows 8 consumer technology. This new method of authentication was announced by...screen or typing patterns. These recorded behaviours build a model of that user. When it suspects the current user does not match the model

  20. Assessment in Alberta: Dimensions of Authenticity.

    Science.gov (United States)

    Horvath, Frank G.

    The assessment programs of Alberta Education (Canada) are described, and the principles that guide these programs are reviewed. Alberta is committed to authentic assessment in its three major assessment programs: (1) the Diploma Examinations Program for certification in specific courses at the end of high school; (2) the Achievement Testing…

  1. Smartphone Sensors for Stone Lithography Authentication

    Directory of Open Access Journals (Sweden)

    Giuseppe Schirripa Spagnolo

    2014-05-01

    Full Text Available Nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. These facilities open them to innovative uses, other than the classical telephonic communication one. Smartphones are a more sophisticated version of classic mobile phones, which have advanced computing power, memory and connectivity. Because fake lithographs are flooding the art market, in this work, we propose a smartphone as simple, robust and efficient sensor for lithograph authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to “authenticate” non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the “not original artwork” is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative method for the authentication of stone lithographs. We use the color spots distribution captured by means of a smartphone camera as a non-cloneable texture of the specific artworks and an information management system for verifying it in mobility stone lithography.

  2. Using Rose and Compass for Authentication

    International Nuclear Information System (INIS)

    White, G.

    2009-01-01

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work

  3. Elemental Scanning Devices Authenticate Works of Art

    Science.gov (United States)

    2013-01-01

    To better detect aluminum compounds, Marshall Space Flight Center partnered with KeyMaster Inc. (later acquired by Madison, Wisconsin-based Bruker AXS Inc.) to develop a vacuum pump system that could be attached to X-ray fluorescence (XRF) scanners. The resulting technology greatly expanded XRF scanner capabilities, and hundreds of museums now use them to authenticate artifacts and works of art.

  4. Simulation for Authentic Learning in Informal Education

    Science.gov (United States)

    Dupuis, Jason; Ludwig-Palit, DeDee

    2016-01-01

    In 2011, the Museum of Science and Industry in Chicago, Illinois embarked on the creation of a program that allows middle and high school students to explore community health issues using human patient simulation. MedLab was created to engage students in an authentic exploration of medical science, biology, and human anatomy, with a particular…

  5. Capillary-Patterns for Biometric Authentication

    NARCIS (Netherlands)

    Paloma Benedicto, J.; Bruekers, A.A.M.; Presura, C.N.; Garcia Molina, G.

    2007-01-01

    In this report, we present a method using the capillary structuresunder the "distal interphalangeal joint" (DIP joint), which is located between the second and third (distal) phalanges of the finger, for achieving secure biometric authentication. Images of the DIPjoint are acquired using a

  6. Authentic Assessment: Reducing the Fear and Trembling.

    Science.gov (United States)

    Terry, C. Ann; Pantle, Tonya T.

    1994-01-01

    This discussion of authentic assessment stresses that such assessment should be contextual (based on the context of meaning), collaborative (involves learners), and constructive (supports risk-taking). It compares tools designed for formative assessment including criteria checklists, "kidwatching," profiles, conferences, and portfolios. (DB)

  7. Using Rose and Compass for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2009-07-09

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  8. Authentication and authorisation in entrusted unions

    NARCIS (Netherlands)

    Ayed, D.; Camenisch, J.; Ignatenko, T.; Johnstone, M.N.; Koster, R.P.; Lange, B.; Petkovic, M.; Sommer, D.; Zic, J.

    2014-01-01

    This paper reports on the status of a project whose aim is to implement and demonstrate in a real-life environment an integrated eAuthentication and eAuthorisation framework to enable trusted collaborations and delivery of services across different organisational/governmental jurisdictions. This aim

  9. Using Film to Teach Authentic Leadership

    Science.gov (United States)

    Scott, Meagan; Weeks, Penny Pennington

    2016-01-01

    Utilizing film as a teaching tool in a personal leadership development course helped undergraduate students synthesize authentic leadership concepts. "Iron Jawed Angels" facilitated the culminating lesson as students applied course concepts to an observed leader. Three objectives guided the final lesson: (a) critique Alice Paul's…

  10. Biometric authentication for a mobile personal device

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    2006-01-01

    Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a

  11. Method and apparatus for information carrier authentication

    NARCIS (Netherlands)

    2015-01-01

    The present invention relates to a method of enabling authentication of an information carrier, the information carrier comprising a writeable part and a physical token arranged to supply a response upon receiving a challenge, the method comprising the following steps; applying a first challenge to

  12. Progress in authentication of food and wine

    Science.gov (United States)

    Authentication of foods, wines and beverages for varietal, country- (or region-) of-origin, and processing conditions is becoming of increasing concern to consumers and regulators both in the U.S. and internationally. As markets become more globalized and foods and beverages are sourced from many lo...

  13. Culturally Speaking: Booktalking Authentic Multicultural Literature

    Science.gov (United States)

    York, Sheryl

    2008-01-01

    Booktalking authentic multicultural literature can encourage students to read, promote respect for all cultures, and help make all students feel welcome in libraries and media centers. It also provides opportunities to collaborate with teachers to increase diversity throughout the schools. This article presents selected booktalks of contemporary…

  14. The Authentic Teacher: Gestures of Behavior.

    Science.gov (United States)

    Shimabukuro, Gini

    1998-01-01

    Stresses the importance for Catholic school educators to reveal the Christian message through every gesture of behavior and foster an experiential faith in students' lives. States that this demands a great deal of skill, knowledge, and self-awareness on the teacher's part, and requires self-esteem, authentic caring, humility, and communication…

  15. Authenticity and Unification in Quechua Language Planning.

    Science.gov (United States)

    Hornberger, Nancy H.; King, Kendall

    1998-01-01

    Examines the potentially problematic tension between the goals of authenticity and unification in Quechua-language planning. One case study examines the orthographic debate that arose in Peru, and the second case study concerns two indigenous communities in Saraguro in the Southern Ecuadorian highlands where Spanish predominates but two Quichua…

  16. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information

  17. Multimodal Authentication Techniques For Staff Identification And ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2014-12-01

    Dec 1, 2014 ... securing and protecting our identity and valuable data have become areas of great concern ... authentication, verification, tracking and identification systems. It helps to ... managing access while protecting both the ..... Microsoft Operating System XP/Vista, ... range support of fingerprint readers and template.

  18. Towards an ethics of authentic practice.

    Science.gov (United States)

    Murray, Stuart J; Holmes, Dave; Perron, Amélie; Rail, Geneviève

    2008-10-01

    This essay asks how we might best elaborate an ethics of authentic practice. Will we be able to agree on a set of shared terms through which ethical practice will be understood? How will we define ethics and the subject's relation to authoritative structures of power and knowledge? We begin by further clarifying our critique of evidence-based medicine (EBM), reflecting on the intimate relation between theory and practice. We challenge the charge that our position amounts to no more than 'subjectivism' and 'antiauthoritarian' theory. We argue that an ethical practice ought to question the authority of EBM without falling into the trap of dogmatic antiauthoritarianism. In this, we take up the work of Hannah Arendt, who offers terms to help understand our difficult political relation to authority in an authentic ethical practice. We continue with a discussion of Michel Foucault's use of 'free speech' or parrhesia, which he adopts from Ancient Greek philosophy. Foucault demonstrates that authentic ethical practice demands that we 'speak truth to power.' We conclude with a consideration of recent biotechnologies, and suggest that these biomedical practices force us to re-evaluate our theoretical understanding of the ethical subject. We believe that we are at a crucial juncture: we must develop an ethics of authentic practice that will be commensurable with new and emergent biomedical subjectivities.

  19. Surfacing Authentic Leadership: Inspiration from "After Life"

    Science.gov (United States)

    Billsberry, Jon; North-Samardzic, Andrea

    2016-01-01

    This paper advocates an innovative approach to help leadership students analyze, capture, and remember the nature of their authentic leadership. This developmental activity was inspired by the Japanese film, "Wandâfuru raifu" ("After Life") (Kore-Eda, Sato, & Shigenobu, 1998), in which the recently deceased are asked to…

  20. Authentic Classroom Leaders: The Student Perspective

    Science.gov (United States)

    Downing, Megan S.

    2016-01-01

    In a qualitative study assessing students' perceptions of faculty-student interaction in the online learning environment, findings demonstrated that students make meaning of faculty-student interaction in ways that align with authentic leadership behaviors. Faculty interaction, or lack thereof, shaped students' perceptions of faculty authenticity…

  1. In Pursuit of Authentic School Leadership Practices.

    Science.gov (United States)

    Begley, Paul T.

    2001-01-01

    Describes authentic leadership and the essential characteristics of values. Discusses concept of values and semantic difficulties related thereto. Uses onion metaphors to illustrate syntax of values terminology and seven arenas of administration. Suggests that discussion and concepts presented in onion illustrations will contribute to school…

  2. Authentic Leadership in an Era of Change

    Science.gov (United States)

    Orem, Donna

    2016-01-01

    Donna Orem, interim president of the National Association of Independent Schools (NAIS), recalls two leaders in her early career who shaped her own approach to leadership and guided her through tough times. Here she shares some reflections on authentic leadership and focuses on the following four traits: (1) Being self aware and genuine; (2) Being…

  3. FAST PALMPRINT AUTHENTICATION BY SOBEL CODE METHOD

    Directory of Open Access Journals (Sweden)

    Jyoti Malik

    2011-05-01

    Full Text Available The ideal real time personal authentication system should be fast and accurate to automatically identify a person’s identity. In this paper, we have proposed a palmprint based biometric authentication method with improvement in time and accuracy, so as to make it a real time palmprint authentication system. Several edge detection methods, wavelet transform, phase congruency etc. are available to extract line feature from the palmprint. In this paper, Multi-scale Sobel Code operators of different orientations (0?, 45?, 90?, and 135? are applied to the palmprint to extract Sobel-Palmprint features in different direc- tions. The Sobel-Palmprint features extracted are stored in Sobel- Palmprint feature vector and matched using sliding window with Hamming Distance similarity measurement method. The sliding win- dow method is accurate but time taking process. In this paper, we have improved the sliding window method so that the matching time reduces. It is observed that there is 39.36% improvement in matching time. In addition, a Min Max Threshold Range (MMTR method is proposed that helps in increasing overall system accuracy by reducing the False Acceptance Rate (FAR. Experimental results indicate that the MMTR method improves the False Acceptance Rate drastically and improvement in sliding window method reduces the comparison time. The accuracy improvement and matching time improvement leads to proposed real time authentication system.

  4. Authentication Approaches for Standoff Video Surveillance

    International Nuclear Information System (INIS)

    Baldwin, G.; Sweatt, W.; Thomas, M.

    2015-01-01

    Video surveillance for international nuclear safeguards applications requires authentication, which confirms to an inspector reviewing the surveillance images that both the source and the integrity of those images can be trusted. To date, all such authentication approaches originate at the camera. Camera authentication would not suffice for a ''standoff video'' application, where the surveillance camera views an image piped to it from a distant objective lens. Standoff video might be desired in situations where it does not make sense to expose sensitive and costly camera electronics to contamination, radiation, water immersion, or other adverse environments typical of hot cells, reprocessing facilities, and within spent fuel pools, for example. In this paper, we offer optical architectures that introduce a standoff distance of several metres between the scene and camera. Several schemes enable one to authenticate not only that the extended optical path is secure, but also that the scene is being viewed live. They employ optical components with remotely-operated spectral, temporal, directional, and intensity properties that are under the control of the inspector. If permitted by the facility operator, illuminators, reflectors and polarizers placed in the scene offer further possibilities. Any tampering that would insert an alternative image source for the camera, although undetectable with conventional cryptographic authentication of digital camera data, is easily exposed using the approaches we describe. Sandia National Laboratories is a multi-programme laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. Support to Sandia National Laboratories provided by the NNSA Next Generation Safeguards Initiative is gratefully acknowledged. SAND2014-3196 A. (author)

  5. Meat, dairy, and cancer1234

    Science.gov (United States)

    Abid, Zaynah; Cross, Amanda J; Sinha, Rashmi

    2014-01-01

    In 2007 the World Cancer Research Fund and American Institute for Cancer Research (WCRF/AICR) report judged that the evidence for an association between red and processed meat consumption and colorectal cancer was convincing. In addition, the effect of other animal products on cancer risk has been studied, and the WCRF/AICR report concluded that milk probably decreases the risk of colorectal cancer but diets high in calcium probably increase the risk of prostate cancer, whereas there was limited evidence for an association between milk and bladder cancer and insufficient evidence for other cancers. There are several potential mechanisms relating meat to cancer, including heterocyclic amines, polycyclic aromatic hydrocarbons, N-nitroso compounds, and heme iron. Although the evidence in favor of a link between red and processed meat and colorectal cancer is convincing, the relations with other cancers are unclear. In this review, we summarize cohort studies conducted by the National Cancer Institute on meat and dairy intake in relation to cancer since the 2007 WCRF/AICR report. We also report the findings of meta-analyses published since 2007. PMID:24847855

  6. Clostridium difficile in Retail Meats

    Centers for Disease Control (CDC) Podcasts

    Clostridium difficile is a common cause of diarrhea in healthcare settings but little is known about what causes cases in the community. In this podcast, CDC's Dr. L. Clifford McDonald discusses two papers in the May 2009 edition of Emerging Infectious Diseases that explore whether the organism could be found in meat samples purchased in grocery stores in Arizona and Canada.

  7. High pressure processing of meat

    DEFF Research Database (Denmark)

    Grossi, Alberto; Christensen, Mette; Ertbjerg, Per

    the rheological properties of pork meat batters by inducing formation of protein gels. HP induced protein gels are suggested to be formed by high molecular weight myofibrillar protein aggregates and by peptides formed by lysosomal enzyme-induced cleavage of myofibrillar proteins. Perspectives: The data presented...

  8. Fetal programming in meat production.

    Science.gov (United States)

    Du, Min; Wang, Bo; Fu, Xing; Yang, Qiyuan; Zhu, Mei-Jun

    2015-11-01

    Nutrient fluctuations during the fetal stage affects fetal development, which has long-term impacts on the production efficiency and quality of meat. During the early development, a pool of mesenchymal progenitor cells proliferate and then diverge into either myogenic or adipogenic/fibrogenic lineages. Myogenic progenitor cells further develop into muscle fibers and satellite cells, while adipogenic/fibrogenic lineage cells develop into adipocytes, fibroblasts and resident fibro-adipogenic progenitor cells. Enhancing the proliferation and myogenic commitment of progenitor cells during fetal development enhances muscle growth and lean production in offspring. On the other hand, promoting the adipogenic differentiation of adipogenic/fibrogenic progenitor cells inside the muscle increases intramuscular adipocytes and reduces connective tissue, which improves meat marbling and tenderness. Available studies in mammalian livestock, including cattle, sheep and pigs, clearly show the link between maternal nutrition and the quantity and quality of meat production. Similarly, chicken muscle fibers develop before hatching and, thus, egg and yolk sizes and hatching temperature affect long-term growth performance and meat production of chicken. On the contrary, because fishes are able to generate new muscle fibers lifelong, the impact of early nutrition on fish growth performance is expected to be minor, which requires further studies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Meeting the demand for meat?

    NARCIS (Netherlands)

    Yates-Doerr, E.

    2012-01-01

    Renewed fears expressed by the United Nations about worldwide population growth have coincided with international concerns about the increased consumption of meat. This article, which draws upon long-term fieldwork in the Guatemalan highlands and ongoing scientific research in the Netherlands,

  10. Authentication of data for monitoring a comprehensive test ban treaty

    International Nuclear Information System (INIS)

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations

  11. Case studies in food safety and authenticity: Lessons from real-life situations

    DEFF Research Database (Denmark)

    . The contents are divided into six parts, covering outbreak investigations, source tracing, crisis management, farm-level interventions, safe food production and food adulteration and authenticity. Each chapter is organized as an independent story/case study that has evolved over a certain period of time...... the learning process. Some are supported by illustrations, graphs, photos or maps. The case studies examine among other food products: bakery products, fresh produce, sprouted seeds, drinking water, chicken products, cattle, milk and raw milk, fresh herbs, meat, street foods, dairy foods, animal feed, rice......The identification and control of food contaminants rely on careful investigation and implementation of appropriate management strategies. Using a wide range of worldwide examples, this book provides a vital insight into the practical application of strategies for control and prevention...

  12. Perceived Authenticity of the Visitor Experience in Museums

    DEFF Research Database (Denmark)

    Hede, Anne-Marie; Garma, Romana; Josiassen, Alexander

    2014-01-01

    of perceived authenticity, resonating with Bal's (1996) research in this area. Findings also confirm that consumer scepticism and expectations are antecedents to perceived authenticity of the visitor experience in museums, and that perceived authenticity in turn affects visitor satisfaction and perceived...... corporate hypocrisy. Practical implications -This research provides a framework for museums to manage visitors' perceptions of authenticity, and to plan and design exhibits accordingly. Originality/value - Our research, set in the museum context, articulates the basis of perceived authenticity, its....... To investigate authenticity in a model with two antecedents and two outcomes, an additional data set was collected. Hypotheses were tested using structural equation modelling. Findings -The results show that perceived authenticity of the museum, the visitor and the materials in the museum are dimensions...

  13. Examining the relationship between authenticity and self-handicapping.

    Science.gov (United States)

    Akin, Ahmet; Akin, Umran

    2014-12-01

    Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.

  14. Vein matching using artificial neural network in vein authentication systems

    Science.gov (United States)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  15. Attitudes among the general Austrian population towards neonatal euthanasia: a survey.

    Science.gov (United States)

    Goldnagl, Lena; Freidl, Wolfgang; Stronegger, Willibald J

    2014-10-07

    The Groningen Protocol aims at providing guidance in end-of-life decision-making for severely impaired newborns. Since its publication in 2005 many bioethicists and health care professionals have written articles in response. However, only very little is known about the opinion among the general population on this subject. The aim of this study was to present the general attitude towards neonatal euthanasia (NE) among the Austrian population and the factors associated with the respondents' opinion. A cross-sectional study was conducted among the general Austrian population. Computer-assisted telephone interviews were performed with 1,000 interviewees aged 16 years and older. Binary logistic regression was performed in order to determine factors that are independently associated with the respondents' opinion about neonatal euthanasia. While 63.6% of the participants rejected the idea of neonatal euthanasia for severely impaired newborns, 36.4% opted either in favor or were undecided. Regression analysis has shown the respondents' educational level (p = 0.005) and experience in the care of terminally ill persons (p = 0.001) to be factors that are positively associated with the rejection of neonatal euthanasia, whereas a higher age was associated with a lower degree of rejection (p = 0.021). We found that the majority of the Austrian population rejects the idea of neonatal euthanasia for severely impaired newborns. However, given the increasing levels of rejection of NE among the younger generations and among people with a higher educational level, it cannot be precluded that the rejection rate might in future increase even further, rather than decrease.

  16. THE AUSTRIAN CONSTITUTIONAL CONVENTION: CONTINUING THE PATH TO REFORM THE FEDERAL STATE?

    Directory of Open Access Journals (Sweden)

    Anna Gamper

    2006-04-01

    Full Text Available This article discusses the different debates and attempts to reform the Austrianfederal system over the last fifteen years. The article is based on a historicalperspective that describes the most relevant developments of Austrianfederalism during the 20th century, highlighting the importance of thecentralisation process through the constant transfer of powers from the Länderto the Federal Government, as well as various debates in this regard.According to the author, since 1995, the year of Austrian adhesion to theEuropean Union, two opportunities have been missed to carry out a generalreform of the federal system which could contribute to compensating thecentralisation process.The first missed opportunity is directly related to the Austrian adhesion tothe European Union. The Länder agreed to the adhesion under the conditionthat the Federal Constitution would include their participation in Europeandecision-making processes. By focussing on this point, the Länder set aside the opportunity to take advantage of the debate and, as a consequence,press for structural reform of the federal system. The second missed opportunitywas related to the dispersion of proposals resulting from the work ofthe Austrian Constitutional Convention. The Convention, created in 2003,had the mission of discussing those aspects of the reform of the Constitutionthat regulated the federal structure of the country and, as a consequence,of making a first draft reform. The incapability of establishing and definingcommon ground for reform, together with the lack of flexibility and ofseeking political commitment, weakened the role of the Convention and,thus, any possibility to carry on with the reform.

  17. Unraveling the chemical identity of meat pigments.

    Science.gov (United States)

    Pegg, R B; Shahidi, F

    1997-10-01

    This review examines the chemistry of nitrite curing of meat and meat products as it relates to the development of cured meat color and provides a detailed account of how nitrite-free processed meats could be prepared using the preformed cooked cured-meat pigment (CCMP). Thus, a chemical description of meat color, both raw and cooked, and characterization of nitrosylheme pigments follows. Based on electron paramagnetic resonance (EPR), visible and infrared spectroscopic studies, evidence has been provided to support the hypothesis that the chemical structure of the preformed CCMP is identical to that of the pigment prepared in situ after thermal processing of nitrite-cured meat and is in fact a mononitrosylheme complex. An appendix, which describes the basic principles of EPR spectroscopy used in the context of this review, is attached.

  18. Effect of radiation processing on meat tenderisation

    Science.gov (United States)

    Kanatt, Sweetie R.; Chawla, S. P.; Sharma, Arun

    2015-06-01

    The effect of radiation processing (0, 2.5, 5 and 10 kGy) on the tenderness of three types of popularly consumed meat in India namely chicken, lamb and buffalo was investigated. In irradiated meat samples dose dependant reduction in water holding capacity, cooking yield and shear force was observed. Reduction in shear force upon radiation processing was more pronounced in buffalo meat. Protein and collagen solubility as well as TCA soluble protein content increased on irradiation. Radiation processing of meat samples resulted in some change in colour of meat. Results suggested that irradiation leads to dose dependant tenderization of meat. Radiation processing of meat at a dose of 2.5 kGy improved its texture and had acceptable odour.

  19. Main Concerns of Pathogenic Microorganisms in Meat

    Science.gov (United States)

    Nørrung, Birgit; Andersen, Jens Kirk; Buncic, Sava

    Although various foods can serve as sources of foodborne illness, meat and meat products are important sources of human infections with a variety of foodborne pathogens, i.e. Salmonella spp., Campylobacter jejuni/coli, Yersinia enterocolitica, Verotoxigenic E. coli and, to some extent, Listeria monocytogenes. All these may be harboured in the gastrointestinal tract of food-producing animals. The most frequent chain of events leading to meat-borne illness involves food animals, which are healthy carriers of the pathogens that are subsequently transferred to humans through production, handling and consumption of meat and meat products. Occurrences of Salmonella spp., C. jejuni/coli, Y. enterocolitica and Verotoxigenic E. coli in fresh red meat vary relatively widely, although most often are between 1 and 10%, depending on a range of factors including the organism, geographical factors, farming and/or meat production practices.

  20. Kierkegaard and Sartre on God and Authenticity

    Directory of Open Access Journals (Sweden)

    Amirabbas Alizamani

    2014-09-01

    Full Text Available To evaluate and judge the notion of humanity, one has to use logic and logical criteria, since every notion's delimitation in logic requires an exact definition to be offered. And it is by definition that one can distinguish between one particular notion or extension and other notions and extensions. Different definitions have been suggested of the nature of humanity throughout the history of ideas every one of which casts light on an aspect of human existence. The intricate and deep nature of human being may have been the main obstacle in the way to an exact definition of human being. The past masters have defined man as a rational animal; i.e. man is inside the family of animals but an animal that have the power of thinking. Human rationality is not merely a matter of speaking, but rather it covers his all internal and external aspects. Since man is consisted of mind and body. Contemporary thinkers have left behind the traditional definition of man and approached him from different perspectives. In any case, what is important for us is human being's humanity.    On the other hand, the notion of humanity has always had an inseparable relationship with ethics. Needless to say, moral rules and maxims comprise a set of determinate oughts and ought-nots which should be adopted and followed by every human individual if s/he seeks to reach happiness. These moral rules are sometimes associated with religious and divine concepts which include a faith background and sometimes they go shoulder to shoulder with the rational rules where there is no occasion for extra-rational elements. One of the fundamental notions of ethics is authenticity, or to put it otherwise, how a man is authentic? What are the criteria of an authentic man? Authenticity can be verbally analyzed to the following notions: Authenticity in the sense of having a determinate family background. Authenticity in the sense of having a steady and impenetrable structure Authenticity in the