WorldWideScience

Sample records for austrian meat authenticity

  1. Halal authenticity issues in meat and meat products.

    Science.gov (United States)

    Nakyinsige, Khadijah; Man, Yaakob Bin Che; Sazili, Awis Qurni

    2012-07-01

    In the recent years, Muslims have become increasingly concerned about the meat they eat. Proper product description is very crucial for consumers to make informed choices and to ensure fair trade, particularly in the ever growing halal food market. Globally, Muslim consumers are concerned about a number of issues concerning meat and meat products such as pork substitution, undeclared blood plasma, use of prohibited ingredients, pork intestine casings and non-halal methods of slaughter. Analytical techniques which are appropriate and specific have been developed to deal with particular issues. The most suitable technique for any particular sample is often determined by the nature of the sample itself. This paper sets out to identify what makes meat halal, highlight the halal authenticity issues that occur in meat and meat products and provide an overview of the possible analytical methods for halal authentication of meat and meat products. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Significance of authenticity in meat and meat products in Iran

    Directory of Open Access Journals (Sweden)

    Tahereh Rezazadeh

    2014-06-01

    Full Text Available The Authenticity of meat products is very important for religious and health reasons in Iran. According to legislation in Iran, the consumption and importation of pork, horse, donkey and cat products should be banned. Therefore, the identification of meat products cannot be judged solely by its appearance. This issue led to the authenticity of bovine, sheep, pig, horse, donkey, chicken and soya (Glycine max in raw and processed meat products.In this study, specific primers were designed for the identification of pig ( base pair, donkey (325 base pair, chicken (391 base pair, sheep (499 base pair, horse (607 base pair, soya (707 base pair and bovine (853 base pair by Polymerase chain reaction. Following PCR, expected,, , 499,,  and  base pair fragments were detectable in pig, donkey, chicken, sheep, horse, soya and bovine, respectively. This protocol can be used for identification of raw and processed meat products in various animal species for replication to regulatory obligations for meat species safety in Iran.

  3. An Updated Review of Meat Authenticity Methods and Applications.

    Science.gov (United States)

    Vlachos, Antonios; Arvanitoyannis, Ioannis S; Tserkezou, Persefoni

    2016-05-18

    Adulteration of foods is a serious economic problem concerning most foodstuffs, and in particular meat products. Since high-priced meat demand premium prices, producers of meat-based products might be tempted to blend these products with lower cost meat. Moreover, the labeled meat contents may not be met. Both types of adulteration are difficult to detect and lead to deterioration of product quality. For the consumer, it is of outmost importance to guarantee both authenticity and compliance with product labeling. The purpose of this article is to review the state of the art of meat authenticity with analytical and immunochemical methods with the focus on the issue of geographic origin and sensory characteristics. This review is also intended to provide an overview of the various currently applied statistical analyses (multivariate analysis (MAV), such as principal component analysis, discriminant analysis, cluster analysis, etc.) and their effectiveness for meat authenticity.

  4. Inbreeding and its Effect on Performance Traits in Austrian Meat Sheep

    Directory of Open Access Journals (Sweden)

    Lina Maximini

    2011-10-01

    Full Text Available The aim of this study was to evaluate the level of inbreeding of meat performance tested herd book sheep in Austria and to evaluate the effect of individual inbreeding on growth and CT (computer tomography scan carcass traits. Performance data (13,614 records, five breeds: Merinoland, Suff olk, Texel, German Blackheaded Meat sheep, Jura were collected in the years 2000-2010. The traits analysed were live weight and average daily gain, as well as traits of body frame, back fat and eye muscle area, all measured on live animals with CT. Inbreeding coefficients (F were calculated with the soft ware PEDIG. F was nested within breed and tested in a mixed model using ASReml. Levels of inbreeding were low with O F of 1.5-3.1%. Only few traits were significantly affected by inbreeding. Both positive and negative effects were found. The effects were small, most oft en nonlinear and vary across breeds. Inbreeding and its effects on performance traits do not seem to be an issue in Austrian meat sheep populations at the moment. However, monitoring and further analyses are recommended.

  5. Inbreeding and its Effect on Performance Traits in Austrian Meat Sheep

    Directory of Open Access Journals (Sweden)

    Lina Maximini

    2011-09-01

    Full Text Available The aim of this study was to evaluate the level of inbreeding of meat performance tested herd book sheep in Austria and to evaluate the effect of individual inbreeding on growth and CT (computer tomography scan carcass traits. Performance data (13,614 records, five breeds: Merinoland, Suff olk, Texel, German Blackheaded Meat sheep, Jura were collected in the years 2000-2010. The traits analysed were live weight and average daily gain, as well as traits of body frame, back fat and eye muscle area, all measured on live animals with CT. Inbreeding coefficients (F were calculated with the soft ware PEDIG. F was nested within breed and tested in a mixed model using ASReml. Levels of inbreeding were low with O F of 1.5-3.1%. Only few traits were significantly affected by inbreeding. Both positive and negative effects were found. The effects were small, most oft en nonlinear and vary across breeds. Inbreeding and its effects on performance traits do not seem to be an issue in Austrian meat sheep populations at the moment. However, monitoring and further analyses are recommended.

  6. Peptide biomarkers as a way to determine meat authenticity.

    Science.gov (United States)

    Sentandreu, Miguel Angel; Sentandreu, Enrique

    2011-11-01

    Meat fraud implies many illegal procedures affecting the composition of meat and meat products, something that is commonly done with the aim to increase profit. These practices need to be controlled by legal authorities by means of robust, accurate and sensitive methodologies capable to assure that fraudulent or accidental mislabelling does not arise. Common strategies traditionally used to assess meat authenticity have been based on methods such as chemometric analysis of a large set of data analysis, immunoassays or DNA analysis. The identification of peptide biomarkers specific of a particular meat species, tissue or ingredient by proteomic technologies constitutes an interesting and promising alternative to existing methodologies due to its high discriminating power, robustness and sensitivity. The possibility to develop standardized protein extraction protocols, together with the considerably higher resistance of peptide sequences to food processing as compared to DNA sequences, would overcome some of the limitations currently existing for quantitative determinations of highly processed food samples. The use of routine mass spectrometry equipment would make the technology suitable for control laboratories.

  7. Authentication of meat and meat products vs. detection of animal species in feed – what is the difference?

    Science.gov (United States)

    Nešić, K.; Stojanović, D.; Baltić, Ž. M.

    2017-09-01

    Authenticity of food is an issue that is growing in awareness and concern. Although food adulteration has been present since antiquity, it has broadened to include entire global populations as modern food supply chains have expanded, enriched and become more complex. Different forms of adulteration influence not only the quality of food products, but also may cause harmful health effects. Meat and meat products are often subjected to counterfeiting, mislabelling and similar fraudulent activities, while substitutions of meat ingredients with other animal species is one among many forms of food fraud. Feed is also subject to testing for the presence of different animal species, but as part of the eradication process of transmissible spongiform encephalopathies (TSE). In both food and feed cases, the final goal is consumer protection, which should be provided by quick, precise and specific tools. Several analytical tests have been employed for such needs. This paper provides an overview of authentication of meat and meat products compared with species identification in feed control, highlighting the most prevalent laboratory methods.

  8. Control of Authenticity and Geographic Origin of Austrian, Slovenian, Romanian, Montenegrin and Argentinean wine

    Science.gov (United States)

    Horacek, Micha; Papesch, Wolfgang; Ogrinc, Nives; Magdas, Alina; Wunderlin, Daniel; Misurovic, Ana

    2014-05-01

    Consumers are willing to pay elevated prices for specific product qualities, e.g. for food from a certain region, thus there is the need to control the correct declaration of origin of these products. Conventionally this is done by estimating the flow of goods and by controlling the documentation accompanying the products. However, this means are often not sufficient to detect intentional deception. Since the 1990-ies the EU controls the authenticity of wine by isotope analyses of authentic wine samples from every wine-producing EU-country. Initially this was implemented to counteract adulteration of wine, but the produced data can also be used for the control geographic origin of wine samples. The measurement of the stable isotope composition of wine offers the possibility to investigate the product itself. The stable isotope ratios of the elements C and O are varying geographically due to diverse environmental conditions (e.g.: climate, soil, altitude, geography, cultivation…) thus creating individual patterns for different regions. Therefore analysis of the stable isotope pattern can be a potent tool for geographic differentiation. We investigated the stable isotope composition (C and O) of wine samples from Austria, Slovenia, Romania, Montenegro and Argentina from the years 2008 and 2009. Significant isotope variations are identified within samples from the same country as well as between samples from different countries, evidencing the potential of identifying wine from different regions in an individual country as well as discriminating wine from different countries. Also differences between the two investigated vintages exist, due to variations in the respective climate conditions.

  9. Authentication of processed meat products by peptidomic analysis using rapid ambient mass spectrometry.

    Science.gov (United States)

    Montowska, Magdalena; Alexander, Morgan R; Tucker, Gregory A; Barrett, David A

    2015-11-15

    We present the application of a novel ambient LESA-MS method for the authentication of processed meat products. A set of 25 species and protein-specific heat stable peptide markers has been detected in processed samples manufactured from beef, pork, horse, chicken and turkey meat. We demonstrate that several peptides derived from myofibrillar and sarcoplasmic proteins are sufficiently resistant to processing to serve as specific markers of processed products. The LESA-MS technique required minimal sample preparation without fractionation and enabled the unambiguous and simultaneous identification of skeletal muscle proteins and peptides as well as other components of animal origin, including the milk protein such as casein alpha-S1, in whole meat product digests. We have identified, for the first time, six fast type II and five slow/cardiac type I MHC peptide markers in various processed meat products. The study demonstrates that complex mixtures of processed proteins/peptides can be examined effectively using this approach.

  10. Authentication of beef versus horse meat using 60 MHz 1H NMR spectroscopy.

    Science.gov (United States)

    Jakes, W; Gerdova, A; Defernez, M; Watson, A D; McCallum, C; Limer, E; Colquhoun, I J; Williamson, D C; Kemsley, E K

    2015-05-15

    This work reports a candidate screening protocol to distinguish beef from horse meat based upon comparison of triglyceride signatures obtained by 60 MHz (1)H NMR spectroscopy. Using a simple chloroform-based extraction, we obtained classic low-field triglyceride spectra from typically a 10 min acquisition time. Peak integration was sufficient to differentiate samples of fresh beef (76 extractions) and horse (62 extractions) using Naïve Bayes classification. Principal component analysis gave a two-dimensional "authentic" beef region (p=0.001) against which further spectra could be compared. This model was challenged using a subset of 23 freeze-thawed training samples. The outcomes indicated that storing samples by freezing does not adversely affect the analysis. Of a further collection of extractions from previously unseen samples, 90/91 beef spectra were classified as authentic, and 16/16 horse spectra as non-authentic. We conclude that 60 MHz (1)H NMR represents a feasible high-throughput approach for screening raw meat.

  11. Assessment of meat authenticity using bioinformatics, targeted peptide biomarkers and high-resolution mass spectrometry.

    Science.gov (United States)

    Ruiz Orduna, Alberto; Husby, Erik; Yang, Charles T; Ghosh, Dipankar; Beaudry, Francis

    2015-01-01

    In recent years a significant increase of food fraud has been observed, ranging from false label claims to the use of additives and fillers to increase profitability. Recently in 2013 horse and pig DNAs were detected in beef products sold from several retailers. Mass spectrometry (MS) has become the workhorse in protein research, and the detection of marker proteins could serve for both animal species and tissue authentication. Meat species authenticity is performed in this paper using a well-defined proteogenomic annotation, carefully chosen surrogate tryptic peptides and analysis using a hybrid quadrupole-Orbitrap MS. Selected mammalian meat samples were homogenised and proteins were extracted and digested with trypsin. The samples were analysed using a high-resolution MS. Chromatography was achieved using a 30-min linear gradient along with a BioBasic C8 100 × 1 mm column at a flow rate of 75 µl min(-1). The MS was operated in full-scan high resolution and accurate mass. MS/MS spectra were collected for selected proteotypic peptides. Muscular proteins were methodically analysed in silico in order to generate tryptic peptide mass lists and theoretical MS/MS spectra. Following a comprehensive bottom-up proteomic analysis, we detected and identified a proteotypic myoglobin tryptic peptide (120-134) for each species with observed m/z below 1.3 ppm compared with theoretical values. Moreover, proteotypic peptides from myosin-1, myosin-2 and β-haemoglobin were also identified. This targeted method allowed comprehensive meat speciation down to 1% (w/w) of undesired product.

  12. Non-invasive analytical technology for the detection of contamination, adulteration, and authenticity of meat, poultry, and fish: a review.

    Science.gov (United States)

    Kamruzzaman, Mohammed; Makino, Yoshio; Oshita, Seiichi

    2015-01-01

    The requirement of real-time monitoring of food products has encouraged the development of non-destructive measurement systems. Hyperspectral imaging is a rapid, reagentless, non-destructive analytical technique that integrates traditional spectroscopic and imaging techniques into one system to attain both spectral and spatial information from an object that cannot be achieved with either digital imaging or conventional spectroscopic techniques. Recently, this technique has emerged as one of the most powerful and inspiring techniques for assessing different meat species and building chemical images to show the distribution maps of constituents in a direct and easy manner. After presenting a brief description of the fundamentals of hyperspectral imaging, this paper reviews the potential applications of hyperspectral imaging for detecting the adulteration, contamination, and authenticity of meat, poultry, and fish. These applications envisage that hyperspectral imaging can be considered as a promising non-invasive analytical technique for predicting the contamination, adulteration, and authenticity of meat, poultry, and fish in a real-time mode.

  13. DNA-based authentication method for detection of yak (Bos grunniens) in meat products.

    Science.gov (United States)

    Wang, Ping; Hu, Yue; Yang, Hairong; Han, Jiangxun; Zhao, Yongsheng; Chen, Ying

    2013-01-01

    A TaqMan probe real-time PCR method was developed for rapid detection of yak component in raw and cooked meat products. Specific primers and TaqMan probes of yak (Bos grunniens) were designed in the cytochrome b gene. The specificity of the method was evaluated using pure meat of eight yak breeds (Jiulong, Qinghai plateau, Maiwa, Gannan, Bazhou, Sibu, Zhongdian, and Jiali) samples and nine non-Bos grunniens animals (sheep, goat, pig, chicken, cattle, water buffalo, donkey, horse, and rabbit). DNA showed no cross-reaction with non-Bos grunniens animal DNA. This method proved to be sensitive in detecting the presence of low levels of target DNA obtained from 0.001% (w/w) component in a mixed meat sample. The method also successfully identified commercial yak meat products. The results showed that some yak meat might be involved in business fraud by using cattle meat (in this paper, cattle meat means meat of Bos taurus) instead of yak meat. In conclusion, real-time PCR assay used in this study was shown to be a rapid and sensitive method for detection of yak DNA in fresh meat and cooked meat products.

  14. Authentication of beef versus horse meat using 60 MHz 1H NMR spectroscopy

    OpenAIRE

    Jakes, W.; Gerdova, A.; Defernez, M.; Watson, A. D.; McCallum, C.; Limer, E.; Colquhoun, I. J.; Williamson, D. C.; Kemsley, E.K.

    2015-01-01

    This work reports a candidate screening protocol to distinguish beef from horse meat based upon comparison of triglyceride signatures obtained by 60 MHz 1H NMR spectroscopy. Using a simple chloroform-based extraction, we obtained classic low-field triglyceride spectra from typically a 10 min acquisition time. Peak integration was sufficient to differentiate samples of fresh beef (76 extractions) and horse (62 extractions) using Naïve Bayes classification. Principal component analysis gave a t...

  15. Dose-dependent response of nitrogen stable isotope ratio to proportion of legumes in diet to authenticate lamb meat produced from legume-rich diets.

    Science.gov (United States)

    Devincenzi, T; Delfosse, O; Andueza, D; Nabinger, C; Prache, S

    2014-01-01

    This study investigated the dose-dependent response in lamb meat of stable nitrogen isotope ratio to the dietary proportion of legumes, and the ability of the nitrogen isotope signature of the meat to authenticate meat produced from legume-rich diets. Four groups of nine male Romane lambs grazing a cocksfoot pasture were supplemented with different levels of fresh alfalfa forage to obtain four dietary proportions of alfalfa (0%, 25%, 50% and 75%) for 98 days on average before slaughter (groups L0, L25, L50 and L75). We measured the stable nitrogen isotope ratio in the forages and in the longissimus thoracis muscle. The δ(15)N value of the meat decreased linearly with the dietary proportion of alfalfa. The distribution of the δ(15)N values of the meat discriminated all the L0 lambs from the L75 lambs, and gave a correct classification score of 85.3% comparing lambs that ate alfalfa with those that did not.

  16. Novel TaqMan real-time polymerase chain reaction assay for verifying the authenticity of meat and commercial meat products from game birds.

    Science.gov (United States)

    Rojas, María; González, Isabel; Pavón, Miguel Angel; Pegels, Nicolette; Lago, Adriana; Hernández, Pablo E; García, Teresa; Martín, Rosario

    2010-06-01

    Species-specific real-time polymerase chain reaction (PCR) assays using TaqMan probes have been developed for verifying the labeling of meat and commercial meat products from game birds, including quail, pheasant, partridge, guinea fowl, pigeon, Eurasian woodcock and song thrush. The method combines the use of species-specific primers and TaqMan probes that amplify small fragments (amplicons <150 base pairs) of the mitochondrial 12S rRNA gene, and an endogenous control primer pair that amplifies a 141-bp fragment of the nuclear 18S rRNA gene from eukaryotic DNA. Analysis of experimental raw and heat-treated binary mixtures as well as of commercial meat products from the target species demonstrated the suitability of the assay for the detection of the target DNAs.

  17. Geogenic lead isotope signatures from meat products in Great Britain: Potential for use in food authentication and supply chain traceability

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Jane A.; Pashley, Vanessa [NIGL, BGS, Keyworth, NG12 5GG (United Kingdom); Richards, Gemma J. [School of Veterinary Science, University of Bristol, Bristol BS40 5DU (United Kingdom); Brereton, Nicola [The Food and Environment Research Agency, Sand Hutton, York YO41 1LZ (United Kingdom); Knowles, Toby G. [School of Veterinary Science, University of Bristol, Bristol BS40 5DU (United Kingdom)

    2015-12-15

    This paper presents lead (Pb) isotope data from samples of farm livestock raised in three areas of Britain that have elevated natural Pb levels: Central Wales, the Mendips and the Derbyshire Peak District. This study highlights three important observations; that the Pb found in modern British meat from these three areas is geogenic and shows no clear evidence of modern tetraethyl anthropogenic Pb contribution; that the generally excellent match between the biological samples and the ore field data, particularly for the Mendip and Welsh data, suggests that this technique might be used to provenance biological products to specific ore sites, under favourable conditions; and that modern systems reflect the same process of biosphere averaging that is analogous to cultural focusing in human archaeological studies that is the process of biological averaging leading to an homogenised isotope signature with increasing Pb concentration. - Highlights: • Lead (Pb) isotopes measured in modern British meat were geogenic in origin. • The match indicates that this technique may be used to provenance biological products. • There was no evidence for a contribution from modern anthropogenic Pb sources.

  18. Austrian Social Security Database

    OpenAIRE

    Zweimüller, Josef; Winter-Ebmer, Rudolf; Lalive, Rafael; Kuhn, Andreas; Wuellrich, Jean-Philippe; Ruf, Oliver; Büchi, Simon

    2009-01-01

    The Austrian Social Security Database (ASSD) is a matched firm-worker data set, which records the labor market history of almost 11 million individuals from January 1972 to April 2007. Moreover, more than 2.2 million firms can be identified. The individual labor market histories are described in the follow- ing dimensions: very detailed daily labor market states and yearly earnings at the firm-worker level, together with a limited set of demographic characteris- tics. Additionally the ASSD pr...

  19. Meat species authenticity identification by loop-mediated isothermal amplification assay in beef and mutton%环介导恒温扩增法鉴定牛羊肉中的搀杂肉

    Institute of Scientific and Technical Information of China (English)

    侯东军; 杨红菊; 于雷; 李颖; 王海; 姜艳彬

    2012-01-01

    A loop-mediated isothermal amplification(Lamp) method was developed for meat ingredients authenticity identification in beef and mutton. A set of universal primer used for Lamp at 63℃ was chosen to differentiate animal gene encoding cytochrome b with high sensitivity. 0.01%~2% pork could be detected in beef and mutton by the method. Besides,the method could be used to detect animal meats processed or unprocessed.%建立了一个鉴定牛羊肉中搀杂杂动物肉的环介导恒温扩增检测方法。确定了一套可在牛羊肉中特异并灵敏地检测出搀杂肉成分的引物对,以动物细胞色素b基因组为模板可在恒温63℃恒温特异性扩增出猪等基因片段而无其他扩增片段影响。可检测牛肉中0.01%~2%的猪肉成分。经与PCR方法比对,结果表明,该方法可有效用于实际生鲜肉或加工肉制品样本的鉴定。

  20. Meat authentication: a new HPLC-MS/MS based method for the fast and sensitive detection of horse and pork in highly processed food.

    Science.gov (United States)

    von Bargen, Christoph; Brockmeyer, Jens; Humpf, Hans-Ulrich

    2014-10-01

    Fraudulent blending of food products with meat from undeclared species is a problem on a global scale, as exemplified by the European horse meat scandal in 2013. Routinely used methods such as ELISA and PCR can suffer from limited sensitivity or specificity when processed food samples are analyzed. In this study, we have developed an optimized method for the detection of horse and pork in different processed food matrices using MRM and MRM(3) detection of species-specific tryptic marker peptides. Identified marker peptides were sufficiently stable to resist thermal processing of different meat products and thus allow the sensitive and specific detection of pork or horse in processed food down to 0.24% in a beef matrix system. In addition, we were able to establish a rapid 2-min extraction protocol for the efficient protein extraction from processed food using high molar urea and thiourea buffers. Together, we present here the specific and sensitive detection of horse and pork meat in different processed food matrices using MRM-based detection of marker peptides. Notably, prefractionation of proteins using 2D-PAGE or off-gel fractionation is not necessary. The presented method is therefore easily applicable in analytical routine laboratories without dedicated proteomics background.

  1. Visit of the Austrian Ambassador

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    The Austrian Ambassador Wolfgang Petritsch (light raincoat) learns about superconducting magnets at the LHC magnet test facility in building SM18 during a visit to CERN. The blue pipe-like structure in the left background is String 2: the 120-m long full-scale model of an LHC cell, which is used to test LHC systems.

  2. Mr. Wolfgang Petritsch, Austrian Ambassador

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    Dr.Peter Schmid/CERN/EP, Dr.Wolfgang Petritsch, Austrian Ambassador, Permanent representative at UN, Mrs.Nora Petritsch, Dr.Kurt Hubner/CERN/AC, Mrs. Frederike Klaus-Salesin, Adviser, Mrs.Andrea Strohmeier, Secretary of the Ambassador, Mr.Heinz Klaus, Attaché, Dr.Theodor Tortschanoff/CERN/LHC, Mr.Peter Storer, Advisor. Dr.Peter Schmid/CERN/EP, Dr.Wolfgang Petritsch, Austrian Ambassador, Permanent representative at UN, Mrs.Nora Petritsch, Dr.Kurt Hubner/CERN/AC, Mrs. Frederike Klaus-Salesin, Adviser, Mrs.Andrea Strohmeier, Secretary of the Ambassador, Mr.Heinz Klaus, Attaché, Dr.Theodor Tortschanoff/CERN/LHC, Mr.Peter Storer, Advisor.

  3. Geospatial Authentication

    Science.gov (United States)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  4. The Forgotten Austrian Economics Language

    Directory of Open Access Journals (Sweden)

    Elena Bianca Vieru

    2013-02-01

    Full Text Available In light of the current events, namely the crisisthat economy has to face for quite someyears now, plenty of questions are raised, not only among specialists in the field but also amongordinary people as they prove to be most impoverished by these imbalances. Thus, this paper aims, asa first objective, to explain, froma general perspective and using an inductive-subjectivemethodology based on a brief survey as well as on observation, two of the most important causes that,according to the Austrian Business Cycle Theory, are the leading motives for triggering crises. Weare referring particularly to an excessivestate interventionismmanifested throughout itsexpansionary monetary policy.Secondly, we seek to establish the interconnections between theseelements and the case of the Great Depression as well as the current recession. The results we cameacross point out towards the same pattern designed by the Austrian economists, although thecircumstances are, each time, different. Hence, the contribution of this paper consists of handling thedetails that surround the subject by extracting only the essential aspects regarding the triggering ofcrises; we refer to the main ideas that need to be underlined for a better comprehension of the topic.

  5. Speaker Authentication

    CERN Document Server

    Li, Qi (Peter)

    2012-01-01

    This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker’s identity based on his/her voice characteristics while the VIV approach validates a speaker’s identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speake...

  6. The consumer in Austrian economics and the Austrian perspective on consumer policy

    OpenAIRE

    Leen, A.R.

    1999-01-01

    In this thesis I examined the place of the competitive-entrepreneurial consumer in Austrian economic thought. For a neoclassical economist, competition among consumers is hard to find. For an Austrian economist, however, it is a necessity. The introduction puts forward the problem that although an Austrian economist believes that everyone -the consumer included- acts entrepreneurially, in his elucidation of the market process he gives the role of entrepreneur to the producer only.

    &l...

  7. Authenticating cache.

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Tyler Barratt; Urrea, Jorge Mario

    2012-06-01

    The aim of the Authenticating Cache architecture is to ensure that machine instructions in a Read Only Memory (ROM) are legitimate from the time the ROM image is signed (immediately after compilation) to the time they are placed in the cache for the processor to consume. The proposed architecture allows the detection of ROM image modifications during distribution or when it is loaded into memory. It also ensures that modified instructions will not execute in the processor-as the cache will not be loaded with a page that fails an integrity check. The authenticity of the instruction stream can also be verified in this architecture. The combination of integrity and authenticity assurance greatly improves the security profile of a system.

  8. Authenticating cache.

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Tyler Barratt; Urrea, Jorge Mario

    2012-06-01

    The aim of the Authenticating Cache architecture is to ensure that machine instructions in a Read Only Memory (ROM) are legitimate from the time the ROM image is signed (immediately after compilation) to the time they are placed in the cache for the processor to consume. The proposed architecture allows the detection of ROM image modifications during distribution or when it is loaded into memory. It also ensures that modified instructions will not execute in the processor-as the cache will not be loaded with a page that fails an integrity check. The authenticity of the instruction stream can also be verified in this architecture. The combination of integrity and authenticity assurance greatly improves the security profile of a system.

  9. Authentic leadership.

    Science.gov (United States)

    Kerfoot, Karlene

    2006-12-01

    There is leadership, and then there is authentic leadership. If you are not willing to engage from your heart, to passionately work to create a greater quality of work life for front-line staff every day, and to push yourself to the ultimate limit to make that happen, you might be a leader, but you will not be perceived as an authentic leader. Authentic leaders love, challenge people to do what they didn't believe was possible, and generate the energy to make the impossible possible by their passion for their people, their patients, and for doing the right thing. Thankfully, there are leaders who are willing to live on the edge, model their love, and inspire people to change the world. Will you be one of them?

  10. The Consumer in Austrian Economics and the Austrian Perspective on Consumer Policy

    NARCIS (Netherlands)

    Leen, A.R.

    1999-01-01

    In this thesis I examined the place of the competitive-entrepreneurial consumer in Austrian economic thought. For a neoclassical economist, competition among consumers is hard to find. For an Austrian economist, however, it is a necessity. The introduction puts forward the problem that although an A

  11. The consumer in Austrian economics and the Austrian perspective on consumer policy

    NARCIS (Netherlands)

    Leen, A.R.

    1999-01-01

    In this thesis I examined the place of the competitive-entrepreneurial consumer in Austrian economic thought. For a neoclassical economist, competition among consumers is hard to find. For an Austrian economist, however, it is a necessity. The introduction puts forward the problem that although an A

  12. The consumer in Austrian economics and the Austrian perspective on consumer policy

    NARCIS (Netherlands)

    Leen, A.R.

    1999-01-01

    In this thesis I examined the place of the competitive-entrepreneurial consumer in Austrian economic thought. For a neoclassical economist, competition among consumers is hard to find. For an Austrian economist, however, it is a necessity. The introduction puts forward the problem that although an

  13. Meat Processing.

    Science.gov (United States)

    Legacy, Jim; And Others

    This publication provides an introduction to meat processing for adult students in vocational and technical education programs. Organized in four chapters, the booklet provides a brief overview of the meat processing industry and the techniques of meat processing and butchering. The first chapter introduces the meat processing industry and…

  14. The Austrian UV monitoring network

    Science.gov (United States)

    Blumthaler, Mario; Klotz, Barbara; Schwarzmann, Michael; Schreder, Josef

    2017-02-01

    The Austrian UV Monitoring network is operational since 1998 providing a large data set of erythemally weighted UV irradiance recorded with broadband UV biometer at 12 stations distributed all over Austria. In order to obtain high quality data all biometer are recalibrated once a year, the detectors are checked regularly for humidity and quality control is done routinely. The collected data are processed and then published on the website http://www.uv-index.at where the UV-Index of all measurement sites is presented in near real time together with a map of the distribution of the UV-Index over Austria. These UV-Index data together with measurements of global radiation and ozone levels from OMI are used to study long term trends for the stations of the monitoring network. Neither for all weather conditions nor for clear sky conditions is a statistically significant trend found for the UV-Index (with one exception) and for ozone. Furthermore, the radiation amplification factor (RAF) is determined experimentally from the power law correlation between UV-Index and ozone level for the site Innsbruck (577 m above sea level, 47.26°N, 11.38°E) for 19°solar elevation. A value of 0.91 ± 0.05 is found for the RAF for clear sky days with low ground albedo and a value of 1.03 ± 0.08 for days with high ground albedo (snow cover).

  15. System and method for authentication

    Energy Technology Data Exchange (ETDEWEB)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  16. President Hans Ager of Austrian Federal Council Visits China

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    <正>An Austrian goodwill delegation led by Hans . Ager, president of the Austrian Federal Coun-cil and board member of the Austrian Association for Promotion of Friendship and Cultural Relations with China (AAPFCRC), paid a friendly visit to China in November, 2003 at the invitation of the CPAFFC. On the delegation were Dietmar Bachmann, president of the Industrial Federation of

  17. The Continuing Relevance of Austrian Capital Theory

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul

    2012-01-01

    The article presents a speech by Professor Nicolai J. Foss of Copenhagen Business School, delivered at the Austrian Scholars Conference held on March 8, 2012 in Auburn, Alabama, in which he discussed the knowledge essays by economist Friedrich A. von Hayek, the concept of capital theory and the w......The article presents a speech by Professor Nicolai J. Foss of Copenhagen Business School, delivered at the Austrian Scholars Conference held on March 8, 2012 in Auburn, Alabama, in which he discussed the knowledge essays by economist Friedrich A. von Hayek, the concept of capital theory...... and the works of Hayek on political philosophy and cultural evolution....

  18. Multiresistant Bacteria Isolated from Chicken Meat in Austria

    Directory of Open Access Journals (Sweden)

    Gernot Zarfel

    2014-12-01

    Full Text Available Multidrug resistant bacteria (MDR bacteria, such as extended spectrum beta-lactamase (ESBL Enterobacteriaceae, methicillin resistant Staphylococcus aureus (MRSA, and vancomycin-resistant Enterococci (VRE, pose a challenge to the human health care system. In recent years, these MDR bacteria have been detected increasingly outside the hospital environment. Also the contamination of food with MDR bacteria, particularly of meat and meat products, is a concern. The aim of the study was to evaluate the occurrence of MDR bacteria in chicken meat on the Austrian market. For this study, 50 chicken meat samples were analysed. All samples originated from chickens slaughtered in Austrian slaughterhouses and were marked as produced in Austria. Samples were analysed for the presence of ESBL Enterobacteriaceae, methicillin resistant Staphylococci and VRE. Resistance genes of the isolated bacteria were characterised by PCR and sequencing. In the present study 26 ESBL producing E. coli, five mecA gene harbouring Staphylococci (but no MRSA, and four VRE were detected in chicken meat samples of Austrian origin. In 24 (48% of the samples no ESBL Enterobacteriaceae, MRSA, methicillin resistant coagulase negative Staphylococcus (MRCNS or VRE could be detected. None of the samples contained all three types of investigated multiresistant bacteria. In concordance to previous studies, CTX-M-1 and SHV-12 were the dominant ESBL genes.

  19. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    . In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post...

  20. Austrian Airlines:Safety is our Business!

    Institute of Scientific and Technical Information of China (English)

    Guo Yan

    2006-01-01

    @@ Mighty Capacity Managed "Although Austrian Airlines is a middle-sized company, it has a mighty capacity of over 10 million customers every year. Because it has an extensive European service network." G(o)tz stressed to China's Foreign Trade.

  1. The Austrian x red pine hybrid

    Science.gov (United States)

    W. B. Critchfield

    1963-01-01

    The genetic improvement of red pine (Pinus resinosa Ait.) presents tree breeders with one of their most difficult problems. Not only is this valuable species remarkably uniform, but until 1955 it resisted all attempts to cross it with other pines. In that year red pine and Austrian pine (P. nigra var. austriaca [...

  2. Tibetan Interpretations of Authenticity

    DEFF Research Database (Denmark)

    Sobisch, Jan-Ulrich

    2015-01-01

    The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions.......The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions....

  3. AIS authentication

    CERN Multimedia

    2006-01-01

    Users are invited to use the NICE password for AIS authentication. As announced in CNL June-August 2006 (see http://www.cerncourier.com/articles/cnl/3/6/14/1) it is possible to use the NICE username and password to log on to AIS. The procedure is now fully operational and users can themselves reset the AIS password such that the NICE password will be used for authentication required by AIS applications. We strongly recommend CERN users who have a NICE account (this is the case of most users) to do this, with the objective to reduce the number of passwords they need to remember. This can be achieved very easily, directly from the Change Password option on the AIS login (https://aislogin.cern.ch/). Users should just select the '[Change Password]' option displayed at the bottom of the page, provide the 'Old Password' and then click on the button 'Use Nice password' followed by 'Submit'. Change Password option on the AIS login windowSetting the AIS password - Use Nice Password It should be noted that the proce...

  4. Authenticating the Leader

    DEFF Research Database (Denmark)

    Johnsen, Christian Garmann

    of authentication within discourse of authentic leadership. If authentic leadership is to make any sense, it is necessary to be able to distinguish the authentic from the inauthentic leader – in other words, it is necessary to authenticate the leader. This paper uses Gilles Deleuze’s reading of Plato as the point...... of departure for discussing the problem of authentication – separating the authentic leader form the inauthentic one – in the leadership guru Bill George’s model of authentic leadership. By doing so, the paper offers a way of conceptualizing the problem of authenticating leaders, as well as challenging...... procedure of separating the authentic from the inauthentic leader underlying the discourse on authentic leadership....

  5. Risk assessment of dietary exposure to tryptamine for the Austrian population.

    Science.gov (United States)

    Wüst, Nadja; Rauscher-Gabernig, Elke; Steinwider, Johann; Bauer, Friedrich; Paulsen, Peter

    2017-03-01

    Tryptamine acts as a neuromodulator and vasoactive agent in the human body. Dose-response data on dietary tryptamine are scarce and neither a toxicological threshold value nor tolerable levels in foods have been established so far. This paper reviews dose-response characteristics and toxicological effects of tryptamine as well as tryptamine contents in food, estimates dietary exposure of Austrian consumers, and calculates risk-based maximum tolerable limits for food categories. A dose without effect of 8 mg kg(-1) body weight day(-1) was derived from literature data. Dietary exposure via fish/seafood, beer, cheese and meat products was estimated for Austrian schoolchildren, female and male consumers, based on 543 food samples analysed in Austria 2010-15 and on food consumption data from 2008. Even worst-case estimates based on very high tryptamine contents reported in the literature did not exceed 5.9 mg kg(-1) body weight day(-1), and thus were below the dose without effect. Maximum tolerable levels for food commodities were calculated for high-consumption scenarios (95th percentile of female Austrian consumers). For fresh/cooked fish, preserved fish, cheese, raw sausage, condiments, sauerkraut and fermented tofu, maximum tolerable levels were 1650, 3200, 2840, 4800, 14,120, 1740 and 2400 mg kg(-1), respectively. For beer, the maximum tolerable limit of 65 mg kg(-1) included an uncertainty factor of 10. None of the Austrian occurrence data exceeded these levels (in fact, only 3.3% of samples demonstrated measurable amounts of tryptamine), and just one report was found in the literature on a raw fish sample exceeding the respective tolerable level. In sum, dietary intake of tryptamine should not cause adverse health effects in healthy individuals. The assessment did not take into account the combined effects of simultaneously ingested biogenic amines, and increased susceptibility to tryptamine, e.g., due to reduced monoamine oxidase activity.

  6. Authenticating Performances

    DEFF Research Database (Denmark)

    Rudolph, Michael

    2015-01-01

    Adherents of performance theory emphasize the constitutive and transformative potential of rituals with respect to patterns of social organization and authority. For them, rituals “not only mean something, but also do something, particularly the way they construct and inscribe power relationships......” (Bell 1997). This contribution focuses on the role of ritual in postcolonial identity constitution and the performative authentication of political power and social authority in Taiwan. Since the middle of the 1990s, traditionalist performances have been on the rise on the island. Generously subsidized...... at the contemporary rituals of the Taroko and Ami, which are characterized by the above mentioned dynamics, I argue that rituals publicly performed by aborigines today amalgamate different levels of meaning. While they articulate and negotiate the identity needs and social exigencies of the respective social group...

  7. Authenticity control of game meat products--a single method to detect and quantify adulteration of fallow deer (Dama dama), red deer (Cervus elaphus) and sika deer (Cervus nippon) by real-time PCR.

    Science.gov (United States)

    Druml, Barbara; Grandits, Stephanie; Mayer, Walter; Hochegger, Rupert; Cichna-Markl, Margit

    2015-03-01

    This contribution presents a single real-time PCR assay allowing the determination of the deer content (the sum of fallow deer (Dama dama), red deer (Cervus elaphus) and sika deer (Cervus nippon)) in meat products to detect food adulteration. The PCR assay does not show cross-reactivity with 20 animal species and 43 botanical species potentially contained in game meat products. The limit of quantification is 0.5% for fallow deer and red deer and 0.1% for sika deer. The deer content in meat products is determined by relating the concentration obtained with the deer PCR assay to that obtained with a reference system which amplifies mammals and poultry DNA. The analysis of binary meat mixtures with pork, a meat mixture containing equal amounts of fallow deer, red deer and sika deer in pork and a model game sausage showed that the quantification approach is very accurate (systematic error generally <25%). Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations in the...

  9. Should Teachers Be Authentic?

    Science.gov (United States)

    Bialystok, Lauren

    2015-01-01

    Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…

  10. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations...... in theoretical understanding of the meanings of authentication. We provide a new insight in this direction and formalize it in CFPS (Common Framework for authentication Protocols' Specifications). CFPS provides a precise scope of definition for authentication protocols, which could make the design and analysis...

  11. The voice of Austrians at CERN

    CERN Multimedia

    2009-01-01

    On 7 May the Austrian Minister for Science announced that, after over 50 years of membership, Austria would withdraw from CERN. By 18 May the Austrian Chancellor had reversed the decision. The Bulletin spoke to some of the Austrian community at CERN about the rollercoaster of events in between. var flash_video_player=get_video_player_path(); insert_player_for_external('Video/Public/Movies/2009/CERN-MOVIE-2009-056/CERN-MOVIE-2009-056-0753-kbps-640x360-25-fps-audio-64-kbps-44-kHz-stereo', 'mms://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2009/CERN-MOVIE-2009-056/CERN-MOVIE-2009-056-Multirate-200-to-753-kbps-640x360-25-fps.wmv', 'false', 533, 300, 'https://mediastream.cern.ch/MediaArchive/Video/Public/Movies/2009/CERN-MOVIE-2009-056/CERN-MOVIE-2009-056-posterframe-640x360-at-10-percent.jpg', '1180837', true, 'Video/Public/Movies/2009/CERN-MOVIE-2009-056/CERN-MOVIE-2009-056-0600-kbps-maxH-360-25-fps-audio-128-kbps-48-kHz-stereo.mp4'); To watch this video in German click here. There was jubil...

  12. Transparent User Authentication

    CERN Document Server

    Clarke, Nathan

    2011-01-01

    This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication -- where authentication credentials are captured during a user's normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discu

  13. Meet meat

    NARCIS (Netherlands)

    Bekker, Gerben A.; Tobi, Hilde; Fischer, Arnout R.H.

    2017-01-01

    In this cross-cultural study we investigated how study participants from China, Ethiopia and the Netherlands operationalize the concept of meat and to what extent cultured meat fits or does not fit into this operationalization. We argue that combining the conceptual approaches symbolic boundaries

  14. Authenticating the Leader

    DEFF Research Database (Denmark)

    Garmann Johnsen, Christian

    2015-01-01

    In the wake of a series of corporate scandals, there has been a growing call for authentic leadership in order to ensure ethical conduct in contemporary organizations. Authentic leadership, however, depends upon the ability to draw a distinction between the authentic and inauthentic leader....... This paper uses Deleuze’s discussion of Platonism as a point of departure for critically scrutinizing the problem of authenticating the leader - drawing a distinction between authentic and inauthentic leaders. This will be done through a reading of Bill George’s book Authentic Leadership. Informed by Deleuze......’s inverted Platonism, the paper challenges the practice by which authentic leaders are distinguished from inauthentic leaders. In conclusion, the paper suggests that an adequate concept of authentic leadership should consider how ethics can occur when the authentic leader is able to critically reflect his...

  15. Defining Authentic Classroom Assessment

    Science.gov (United States)

    Frey, Bruce B.; Schmitt, Vicki L.; Allen, Justin P.

    2012-01-01

    A commonly advocated best practice for classroom assessment is to make the assessments authentic. Authentic is often used as meaning the mirroring of real-world tasks or expectations. There is no consensus, however, in the actual definition of the term or the characteristics of an authentic classroom assessment. Sometimes, the realistic component…

  16. Authenticity in Adult Learning

    Science.gov (United States)

    Ashton, Sam

    2010-01-01

    This paper is concerned with the relationship between authenticity and adult learning and prompted by some studies in which adult "authentic learning" is a central concept. The implication revealed by them is that real-worldness of learning contexts, learning content and learning tasks is perceived as conferring authenticity on learning. Here,…

  17. Authentic Assessment, Professional's Guide.

    Science.gov (United States)

    Ryan, Concetta Doti

    Authentic assessment is the process of gathering evidence and documenting student learning and growth in an authentic context. Authentic assessment can do a better job than more traditional forms of assessment in informing educators and parents about a student's real achievement. The first chapter of this book presents an overview of authentic…

  18. Multi-factor authentication

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  19. Determination of sex origin of meat and meat products on the DNA basis: a review.

    Science.gov (United States)

    Gokulakrishnan, Palanisamy; Kumar, Rajiv Ranjan; Sharma, Brahm Deo; Mendiratta, Sanjod Kumar; Malav, Omprakash; Sharma, Deepak

    2015-01-01

    Sex determination of domestic animal's meat is of potential value in meat authentication and quality control studies. Methods aiming at determining the sex origin of meat may be based either on the analysis of hormone or on the analysis of nucleic acids. At the present time, sex determination of meat and meat products based on hormone analysis employ gas chromatography-mass spectrometry (GC-MS), high-performance liquid chromatography-mass spectrometry/mass spectrometry (HPLC-MS/MS), and enzyme-linked immunosorbent assay (ELISA). Most of the hormone-based methods proved to be highly specific and sensitive but were not performed on a regular basis for meat sexing due to the technical limitations or the expensive equipments required. On the other hand, the most common methodology to determine the sex of meat is unquestionably traditional polymerase chain reaction (PCR) that involves gel electrophoresis of DNA amplicons. This review is intended to provide an overview of the DNA-based methods for sex determination of meat and meat products.

  20. Characterization of 12S rRNA gene for meat identification of common wild and domestic small herbivores as an aid to wildlife forensic

    OpenAIRE

    E. Joseph; Sanjeev Singh; Rakesh Ranjan; Parmar, S. N. S.; Nidhi Rajput; Shrivastav, A. B.

    2013-01-01

    Aim: Chital and sambar are the common wild small herbivores, which are vulnerable to poaching for their meat. Many times poachers claim the wild meat to be that of goat or sheep. Hence, authentic evidences are required to stop such wildlife crime. The present investigation was carried out to study the species specific PCR-RFLP patterns for meat identification of chital and sambar and then differentiation from the meat of goat and sheep. Materials and Methods: Extracted DNA from meat samples w...

  1. Network Topology of the Austrian Airline Flights

    CERN Document Server

    Han, D D; Qian, J H

    2007-01-01

    We analyze the directed, weighted and evolutionary Austrian airline flight network. It is shown that such a specific airline flight network displays features of small-world networks, namely large clustering coefficient and small average shortest-path length. We study the detailed flight information both in a week and on a whole. In both cases, the degree distributions reveal power law with exponent value of 2 $\\sim$ 3 for the small degree branch and a flat tail for the large degree branch. Similarly, the flight weight distributions have power-law for the small weight branch. The degree-degree correlation analysis shows the network has disassortative behavior, i.e. the large airports are likely to link to smaller airports.

  2. Authentication over Noisy Channels

    CERN Document Server

    Lai, Lifeng; Poor, H Vincent

    2008-01-01

    In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution attacks, are investigated for both single message and multiple message authentication scenarios. For each scenario, information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably, in both scenarios, lower and upper bounds are shown to match, and hence the fundamental limit of message authentication over noisy channels is fully characterized. The opponent's success probability is further shown to be smaller than that derived in the classic authentication model in which the channel is assumed to be noiseless. These results rely on a proposed novel authentication scheme in which key information is used to provide simultaneous protection again both types of attacks.

  3. The Austrian Approach: Entering the World of Children.

    Science.gov (United States)

    Feistritzer, Patricia; Balcerack, Carl

    1979-01-01

    This photo-essay describes a Waldorf School. Developed by Austrian Rudolf Steiner, the Waldorf plan is dedicated to allowing the child a childlike environment. It emphasizes storytelling, creative dramatics, flexibility, improvisation, crafts, and movement. (SJL)

  4. Acidification and Nitrogen Eutrophication of Austrian Forest Soils

    OpenAIRE

    Robert Jandl; Stefan Smidt; Franz Mutsch; Alfred Fürst; Harald Zechmeister; Heidi Bauer; Thomas Dirnböck

    2012-01-01

    We evaluated the effect of acidic deposition and nitrogen on Austrian forests soils. Until thirty years ago air pollution had led to soil acidification, and concerns on the future productivity of forests were raised. Elevated rates of nitrogen deposition were believed to cause nitrate leaching and imbalanced forest nutrition. We used data from a soil monitoring network to evaluate the trends and current status of the pH and the C : N ratio of Austrian forest soils. Deposition measurements and...

  5. PEGASUS - An Austrian Nanosatellite for QB50

    Science.gov (United States)

    Scharlemann, Carsten; Seifert, Bernhard; Kohl, Dominik; Birschitzky, David; Gury, Lionel; Kerschbaum, Franz; Obertscheider, Christof; Ottensamer, Roland; Reissner, Alexander; Riel, Thomas; Sypniewski, Richard; Taraba, Michael; Trausmuth, Robert; Turetschek, Thomas

    2015-04-01

    PEGASUS - An Austrian Nanosatellite for QB50 C. Scharlemann* David Birschitzky* Lionel Gury*, Franz Kerschbaum~, Dominik Kohl#, Christof Obertscheider*, Roland Ottensamer~, Alexander Reissner+, Thomas Riel#, B. Seifert+, Richard Sypniewski*, Michael Taraba?, Robert Trausmuth*, Thomas Turetschek?, …. (*)University of Applied Sciences Wiener Neustadt, Austria (+)FOTEC GmbH, Wiener Neustadt, Austria (+) Spaceteam, TU Wien, Austria (~) University Wien, Wien, Austria The QB50 project is an international project with the goal to send up to 50 Nanosatellites, a.k.a. CubeSat, into the Thermosphere. The scientific goal of this mission is to monitor over a period of up to nine months the prevailing conditions in this rather unknown part of Earth's atmosphere. Each of the 50 nanosatellites will be equipped with one of three possible scientific instruments: (i) a set of Langmuir probes, (ii) atomic oxygen measurement device, (iii) ion/neutral mass spectrometer. All satellites will be launched together and released in a string-of-pearls type fashion. It is predicted that the satellites will drift apart rather rapidly following the release. Therefore, the QB50 missions offers the possibility of a measurement grid in the thermosphere of unprecedented scope and accuracy. One of the satellites, named PEGASUS, is designed and build by a team of Austrian researches and students. PEGASUS will be equipped with the aforementioned Langmuir probes and will provide information about essential properties of the plasma in the thermosphere such as the electrontemperature and -density. In order to ensure the capability to collect and downlink the data over several months, PEGASUS requires about the same types of subsystems as one would find on large-scale satellites. This includes an attitude control system, an on-board computer, telecommunication devices, an electrical power systems allowing to harvest the solar power and either distribute or store it for later use, a thermal control system

  6. Authenticity at work

    NARCIS (Netherlands)

    van den Bosch, Ralph

    2016-01-01

    Authenticity at work, loosely defined as the degree to which an individual stays true to their core self, has impact on workers in the workplace. This thesis shows that authenticity at work can be measured with a reliable and valid instrument: the IAM Work. Furthermore, results of this thesis show t

  7. Authenticity and Imagination

    Science.gov (United States)

    Dirkx, John M.

    2006-01-01

    Central to development of authenticity in teaching is self-understanding and self-awareness. Using a Jungian perspective, the author suggests that the imaginative dimensions of the self play a critical role in our journey and experience as teachers, and in developing self-awareness and authenticity in our teaching.

  8. Authenticity at work

    NARCIS (Netherlands)

    van den Bosch, Ralph

    2016-01-01

    Authenticity at work, loosely defined as the degree to which an individual stays true to their core self, has impact on workers in the workplace. This thesis shows that authenticity at work can be measured with a reliable and valid instrument: the IAM Work. Furthermore, results of this thesis show

  9. Decolonizing Researcher Authenticity

    Science.gov (United States)

    Daza, Stephanie Lynn

    2008-01-01

    This article examines the ways in which researcher authenticity is negotiated along three axes of difference, ethno-linguistic affiliation, sexual orientation and race/skin color. Ultimately, it analyzes how researcher authenticity is produced and played out within research, via interactions between participants, researchers and others who…

  10. Single password authentication

    OpenAIRE

    Küpçü, Alptekin; Acar, Tolga; Belenkiy, Mira

    2013-01-01

    Single Password Authentication Tolga Acar∗ Intel Corporation, Bellevue, WA, USA Mira Belenkiy Microsoft Research, Redmond, WA, USA Alptekin K up c u† Ko c University, _Istanbul, TURKEY May 11, 2013 Abstract Users frequently reuse their passwords when authenticating to various online services. Com-bined with the use of weak passwords or honeypot/phishing attacks, this brings high risks to th...

  11. AUTHENTICITY IN THE BLOGOSPHERE

    Directory of Open Access Journals (Sweden)

    Waclaw Branicki

    2010-01-01

    Full Text Available The primary purpose of this article is to answer the question of whether writing a blog defined as a personal diary can help to better understand himself. Self-awareness is a prerequisite for authentic existence. In the first part analyzed the concept of authenticity. Pointed out the relationship of authenticity to the categories of freedom, truth and responsibility. The second part presents the relationship between authentic existence and the process of self-disclosure, which may take place in the blogosphere. In the third part presents the question whether a writing blog affects the level authenticity of existence. It was recognized that a key element of this phenomenon is the sense of responsibility.

  12. Efforts to overcome vegetarian-induced dissonance among meat eaters.

    Science.gov (United States)

    Rothgerber, Hank

    2014-08-01

    Meat eaters face dissonance whether it results from inconsistency ("I eat meat; I don't like to hurt animals"), aversive consequences ("I eat meat; eating meat harms animals"), or threats to self image ("I eat meat; compassionate people don't hurt animals"). The present work proposes that there are a number of strategies that omnivores adopt to reduce this dissonance including avoidance, dissociation, perceived behavioral change, denial of animal pain, denial of animal mind, pro-meat justifications, reducing perceived choice, and actual behavioral change. The presence of vegetarians was speculated to cause meat eating to be a scrutinized behavior, remind meat eaters of their discomfort, and undermine the effectiveness of these strategies. It was therefore hypothesized that exposure to a description of a vegetarian would lead omnivores to embrace dissonance-reducing strategies. Supporting this hypothesis, participants who read a vignette about a vegetarian denied animal mind more than participants who read about a gluten-free individual. It was also hypothesized that omnivores would be sensitive to individual differences between vegetarians and would demonstrate using dissonance-reducing strategies more when the situation failed to provide cognitions consonant with eating meat or to reduce dissonant cognitions. Four experiments supported this prediction and found that authentic vegetarians, vegetarians freely making the decision to abandon meat, consistent vegetarians, and anticipating moral reproach from vegetarians produced greater endorsement of dissonance-reducing strategies than their counterpart conditions. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. Communicating food safety, authenticity and consumer choice. Field experiences.

    Science.gov (United States)

    Syntesa, Heiner Lehr

    2013-04-01

    The paper reviews patented and non-patented technologies, methods and solutions in the area of food traceability. It pays special attention to the communication of food safety, authenticity and consumer choice. Twenty eight recent patents are reviewed in the areas of (secure) identification, product freshness indicators, meat traceability, (secure) transport of information along the supply chain, country/region/place of origin, automated authentication, supply chain management systems, consumer interaction systems. In addition, solutions and pilot projects are described in the areas of Halal traceability, traceability of bird's nests, cold chain management, general food traceability and other areas.

  14. HORA - an Austrian platform for natural hazards

    Science.gov (United States)

    Hlatky, T.

    2009-04-01

    HORA - an Austrian platform for natural hazards as a new way in risk communication One initiatives launched in Austria demonstrate that public participation not only bears the risk of a partial transfer of responsibility by the authorities; it may above all prepare the ground for entirely new approaches and create new links. The recent installation of the first internet risk zoning system in Austria underscores the importance of involving private parties in natural disaster protection. This public-private partnership (PPP) between the Federal Ministry of Agriculture, Forestry, Environment and Water Management (BMLFUW) and the Austrian Insurance Association (VVO) was launched in the wake of the 2002 flood disaster. The first project phase, the Austrian flood risk zoning system called HORA (screenshot see fig. 1), has now been accessible on the Web since 1st June 2006. In accordance with a risk partnership concluded between federal government, insurance companies and private parties, the project initiators seek to offer the public a preliminary risk assessment tool for evaluation of their home, industrial enterprise, of infrastructure. Digital risk maps shall provide information on 30-year, 100-year and 200-year flood events as they occur alongside the 26.000-km-long domestic river network. The probability with which a certain block of land is immersed in water during a flood event can be calculated by means of hydraulic engineering methods. These have traditionally relied on statistical figures, which are known to be very inaccurate, especially when major events such as flooding are concerned. The Vienna University of Technology (TU) (Institute of Hydraulic and Water Resources Engineering) has dedicated many years to developing more accurate, process oriented risk assessment techniques. The starting points was to identify different flood-triggering processes and to divide them into specific categories as long-duration rainfalls, short-duration rainfalls, storms

  15. Sociotechnical scenarios for the Austrian energy system

    Directory of Open Access Journals (Sweden)

    Wächter Petra

    2012-10-01

    Full Text Available Reducing greenhouse gases by 80%, as demanded by the IPCC, is one of the great long-term challenges facing our societies today and will doubtless require transformative changes to current energy regimes. Large-scale system transitions such as the one envisaged for the global energy system in the next 30–40 years can only be realized through complex processes of change involving global, regional, national, and local levels. In this paper we use sociotechnical scenario analysis to contribute ideas for the transformative change of the current Austrian energy system over the long term and to identify some of the particular policy measures, as well as structural changes and broader shifts in perspective, that would be necessary to deal with such challenges. There is less emphasis on the technical issues involved than on the socio-economic and governance requirements such a shift would demand. We also explain our experiences with the sociotechnical scenario process and its outcomes. In particular, we identify examples of some critical issues and opportunities within one of the identified key action fields and discuss their various implications for energy policy and everyday practices.

  16. Compliance of Austrian tourists with prophylactic measures.

    Science.gov (United States)

    Kollaritsch, H; Wiedermann, G

    1992-03-01

    Physicians dealing with prophylactic measures for tourists going to developing countries will often not be able to foresee the outcome of their recommendations. Therefore an open study with 2,627 Austrian tourists on their flight home from a tropical destination was carried out to evaluate the behaviour of typical short-term travellers with respect to different kinds of precautionary measures. 94.1% of all tourists informed themselves before travelling abroad, but a high proportion of travellers tends to contact only their travel agency or their personal friends, this leading to inadequate information. Regarding the individual performance of precautionary measures the results indicate a few principal conclusions: Among the recommended inoculations the vaccinations against typhoid fever, poliomyelitis and tetanus are widely underestimated, the latter two in particular for adults, while compliance with the passive immunization against Hepatitis A is generally good (more than 80% of all travellers receive Hepatitis A immunoglobulins prophylactically). The most crucial point seems to be the chemoprophylaxis against malaria in as much as a) there seems to be a considerable lack of information about malaria endemic areas among physicians, b) tourists tend to use the most simple applicable drug unaware of epidemiological considerations and c) the regular intake of chemoprophylaxis declines significantly with the complexity of the intake procedure. In addition, tourists are in general well informed about nutritional risks, but only half of them will receive adequate information on the risk of sexually transmitted diseases and a basic medical travel kit.

  17. [Fight against epidemics: Austrian prisoners in Troyes].

    Science.gov (United States)

    Hetzel, Géraldine

    2014-01-01

    The victories near Ulm and Elchingen, where the Napoleonic army took 60000 prisoners between 15th and 20th of October 1805, lead to the arrival at Troyes (county "Aube") of nearly 2000 Austrian soldiers to be held inside former monasteries among whose, mainly the Jacobinians casern where more than half of them stayed. At the beginning of 1806, the government sent the epidemics medical practitioner Dr Desgenettes on an inspection tour to control the state of health of the populations of places where foreign prisoners were held, which lead him through several counties of the North-eastern part of France, where he surveyed several diseases ranging from all kinds offevers up to dysentery, scabies or gangrenes. With the means of acid fumigations invented by the chemist Guyton Morveau from Dijon, the authorities took care of combating and preventing the epidemics in the caserns. As soon as October 1805, the epidemics medical practitioner Dr Pigeotte from Troyes wrote to the county governor his observations recommending a better diet, airing of the rooms and also calls to take some exercise. All these precepts showed an astonishing modernity.

  18. Austrian Economics and the Transaction Cost Approach to the Firm

    Directory of Open Access Journals (Sweden)

    Nicolai J. Foss

    2009-10-01

    Full Text Available As the transaction cost theory of the firm was taking shape in the 1970s, another important movement in economics was emerging: a revival of the ‘Austrian’ tradition in economic theory associated with such economists as Ludwig von Mises and F. A. Hayek (1973; Dolan, 1976; Spadaro, 1978. As Oliver Williamson has pointed out, Austrian economics is among the diverse sources for transaction cost economics. In particular, Williamson frequently cites Hayek (e.g., Williamson, 1985, p. 8; 1991, p. 162, particularly Hayek’s emphasis on adaptation as a key problem of economic organisation (Hayek, 1945. Following Williamson’s lead, a reference to Hayek’s ‘The Use of Knowledge in Society’ (Hayek, 1945 has become almost mandatory in discussions of economic organisation (e.g., Ricketts, 1987, p. 59; Milgrom and Roberts, 1992, p. 56; Douma and Schreuder 1991, p. 9. However, there are many other potential links between Austrian and transaction cost economics that have not been explored closely and exploited.This article argues that characteristically Austrian ideas about property, entrepreneurship, economic calculation, tacit knowledge, and the temporal structure of capital have important implications for theories of economic organisation, transaction cost economics in particular. Austrian economists have not, however, devoted substantial attention to the theory of the firm, preferring to focus on business-cycle theory, welfare economics, political economy, comparative economic systems, and other areas. Until recently the theory of the firm was an almost completely neglected area in Austrian economics, but over the last decade, a small Austrian literature on the firm has emerged. While these works cover a wide variety of theoretical and applied topics, their authors share the view that Austrian insights have something to offer students of firm organisation.

  19. Data Authentication Using Cryptography

    Directory of Open Access Journals (Sweden)

    Sagar Chouksey

    2013-06-01

    Full Text Available We present a novel approach using cryptographyfor data authentication. The key idea is to provide aencoded quantized data projection as authenticationdata. This can be correctly decoded with the help ofan authentic data using as side information.Cryptography source coding provides the desiredrobustness against legitimate variations whiledetecting illegitimate modification. Additionaladjustments might not change the meaning of thecontent, but could be misclassified as tampering.Users might also beinterested in localizingtampered regions. Distinguishing legitimateencodings with possible adjustments fromtampering and localizing tampering are thechallenges addressed in this paper. We applycryptography source coding and statistical methodsto solve the data authentication problem.Experimental results have been presented for dataauthentication.

  20. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  1. Austrian diplomacy in a changing global and European context: : Between Innovation, Adaptation and Resilience

    NARCIS (Netherlands)

    Maurer, Heidi

    2016-01-01

    Twenty years after Austria joining the EU, this contribution investigates how Austrian diplomacy has been adjusting to the changing European demands and opportunities next to global and domestic pressures for adaptation. Austrian diplomatic adaptation has predominantly been reactive. EU membership

  2. Dongpo Meat

    Institute of Scientific and Technical Information of China (English)

    1996-01-01

    Su Dongpo (1037-1101), a famous literary figure of the Song Dynasty (960-1279), was fond of pork braised in brown sauce. He liked it so much that he wrote a poem about how to cook the dish. When Su took the post of Hangzhou Prefecture chief in 1089, he organized laborers to dredge the West Lake, store water and irrigate the fields. The locals, knowing that Su liked to eat meat, presented him with gifts of pork to show their gratitude for his good service. Soon, Su had so much pork that he did not know what to do with it He

  3. Quantum deniable authentication protocol

    Science.gov (United States)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  4. Authenticity in Anatomy Art.

    Science.gov (United States)

    Adkins, Jessica

    2017-01-12

    The aim of this paper is to observe the evolution and evaluate the 'realness' and authenticity in Anatomy Art, an art form I define as one which incorporates accurate anatomical representations of the human body with artistic expression. I examine the art of 17th century wax anatomical models, the preservations of Frederik Ruysch, and Gunther von Hagens' Body Worlds plastinates, giving consideration to authenticity of both body and art. I give extra consideration to the works of Body Worlds since the exhibit creator believes he has created anatomical specimens with more educational value and bodily authenticity than ever before. Ultimately, I argue that von Hagens fails to offer Anatomy Art 'real human bodies,' and that the lack of bodily authenticity of his plastinates results in his creations being less pedagogic than he claims.

  5. Air pollution damage to Austrian pine in New Jersey

    Energy Technology Data Exchange (ETDEWEB)

    Brennan, E.; Davis, S.H. Jr.

    1967-11-01

    Following a period of high pollution, extensive needle damage was observed on Austrian pine trees. Since the species is common in New Jersey, it was possible to obtain an approximation of its sensitivity. In nurseries, Christmas tree plantations and park areas, which included many species of conifers in addition to Austrian pine, species specifically noted as free from apparent damage were white pine (Pinus strobus), scotch pine (P. sylvestris), red pine (P. resinosa), Atlas cedar (Cedrus atlantica glauca), Norway spruce (Picea abies), Colorado spruce (P. pungens), white spruce (P. canadensis), balsam fir (Abies balsamea), Douglas-fir (Pseudotsuga taxifolia), and many varieties of juniper, arbor vitae, hemlock, and yew. During the survey needle damage, which could be traced back to the episode of 24 June, was also observed on Japanese red pine (P. densiflora) and Japanese black pine (P. densiflora) and Japanese black pine (P. Thunbergil). The injury to Japanese red pine was identical to that on Austrian pine, but on Japanese black pine the damage appeared not on the current year's needles, but on 1-year-old needles and it did not have the distinctive dividing line between injured and healthy tissue. These two species did not occur in sufficient number to allow further evaluation. Austrian pine has been cited in the literature as very tolerant of industrial smoke. Currently, German foresters are advising aginst the use of spruce and firs in industrial areas and are recommending ''resistant species as Austrian pine.'' In New Jersey fluoride damage has been observed on Austrian pine on occasion over the past 20 years. Because of the damage also caused by photochemical smog in New Jersey, the resistance of the species should be reevaluated. A need may develop for a breeding program to provide resistant material to the highly polluted metropolitan areas.

  6. The Austrian Business Cycle Theory: Validity and Implications

    OpenAIRE

    Eid, Tord Kopland

    2009-01-01

    In this thesis the Austrian business cycle theory is analyzed. Based on the work of Eugen von Böhm-Bawerk (1959[1889]), Knut Wicksell (1962[1898]) and Ludwig von Mises (1953[1912]), the theory was further developed and made famous by Friedrich von Hayek in the 1930s. Arguably, Hayek was the main rival of Keynes during this decade, but after heavy criticism and the publication of the General Theory (Keynes, 1936), the Austrian business cycle theory was left with few advocates by the end of Wor...

  7. PCR methods in meat species identification as a tool for the verification of regional and traditional meat products

    Directory of Open Access Journals (Sweden)

    Anita Spychaj

    2009-06-01

    Full Text Available In the times of industrial food production, regional and traditional food articles provide an attractive alternative for people looking for unforgettable sensory impressions. Regional or traditional food, commonly recognized as palatable and healthy, is also, for many consumers, a unique, sentimental journey back to tastes from childhood times. A gradual increase of demand for this type of food articles as well as relatively high prices of these products may generate among unscrupulous food manufacturers a number of improper production practices, e.g. replacement of a more expensive meat by a less expensive alternative. Species composition of meat products can be verified using chromatographic, immunological, electrophoretic, or genetic methods. One of the genetic methods applied in examining the authenticity of food composition, including meat and its products, is the polymerase chain reaction (PCR. This paper presents the most important techniques utilizing this technology to identify the origin of specific meat components constituting part of regional or traditional food articles. It was demonstrated that PCR techniques, in combination with species-specific primers, PCR- -RFLP, PCR-SSCP and real-time PCR, allow identification of meat species occurring independently or in mixtures with other meat species as well as meat subjected to thermal treatment or other technological processes in the course of industrial production. The only exception is the PCR-RAPD method that fails to identify meat species in the case of strong DNA degradation or in complex meat mixtures.

  8. THE HUNGARIAN CRISIS: AN AUSTRIAN SCHOOL EXPLANATION

    Directory of Open Access Journals (Sweden)

    Andras Toth

    2013-07-01

    Full Text Available The Hungarian model was heralded as one of the most successful post-socialist way of integration into the globalised world economy and European economic area in the nineties. Currently, Hungary is suffering from a full-blown crisis 1996 onwards. Increasingly large number of Hungarians is losing their faith in political parties, institutions, democracy and in market economy. The government, elected in 2010 by supermajority and still enjoying a broad support despite the deepening recession, condemns the development path taken after 1989 and openly rejects the wrong model of the last 20 years. The government intends to build a new economic model following a model, which one can call a model of economic nationalism as the only way out of the crisis. The paper intends to portray, through the case of Hungary, how economy and politics is interconnected, and why political elites are choosing a credit fuelled development path. The paper intends to portray how a credit fuelled growth was induced by politics and ended up in tears. Moreover, the paper describes the consequences of pro-etatist shift in the public sentiment due to the alleged “market-failure”, which was in reality a crisis, at first place, created for political purposes by political means. This article, based on the Austrian business cycle theory, argues that the tragedy of Hungary was that it went through a government inspired spending binge in the first half of the 2000s. The deficit spending of the government was accompanied by the expansion of credit by the commercial banks, mostly denominated in Swiss francs. The combined effect of deficit spending and credit expansion was the build-up of debt and loss of cost competitiveness. The 2008 crisis ended the credit fuelled development path and has started the long and painful period of deleveraging crisis. On the other hand, the Hungarian crisis is a post-Keynesian crisis. It had broken out when the state was already heavily indebted and

  9. Persistent Authentication in Smart Environments

    DEFF Research Database (Denmark)

    Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

    2008-01-01

    Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based...... will not be installed unless it is absolutely necessary. The cost of installing and maintaining an authentication infrastructure and the inconvenience of repeatedly authenticating toward different location based service providers mean that new models of authentication are needed in smart environments. This paper...... defines a persistent authentication model for a smart environment, which tracks inhabitants in the smart environment from the point of authentication to the protected resource, thus rendering authentication persistent by correlating the initial authentication event with the access control request. We...

  10. Species-specific expression of various proteins in meat tissue: proteomic analysis of raw and cooked meat and meat products made from beef, pork and selected poultry species.

    Science.gov (United States)

    Montowska, Magdalena; Pospiech, Edward

    2013-02-15

    The aim was to search for proteins differentiating the six species (cattle, pig, chicken, turkey, duck and goose) and relatively stable during the meat aging and only slightly degraded in ready-made products. The two-dimensional electrophoresis was used for analysis of the protein profiles from raw meat and frankfurters and sausages (15 products). The observed species-specific differences in protein expression in raw meat were retained in processed products after finishing the entire technological process. Regulatory proteins, metabolic enzymes, some myofibrillar and blood plasma proteins were identified, which were characterised by the electrophoretic mobility specific to the given species. Large differences in the primary structure were observed in serum albumin, apolipoprotein B, HSP27, H-FABP, ATP synthase, cytochrome bc-1 subunit 1 and alpha-ETF. Some of these proteins have potential to be used as markers in authentication of meat products. Copyright © 2012 Elsevier Ltd. All rights reserved.

  11. Acidification and Nitrogen Eutrophication of Austrian Forest Soils

    Directory of Open Access Journals (Sweden)

    Robert Jandl

    2012-01-01

    Full Text Available We evaluated the effect of acidic deposition and nitrogen on Austrian forests soils. Until thirty years ago air pollution had led to soil acidification, and concerns on the future productivity of forests were raised. Elevated rates of nitrogen deposition were believed to cause nitrate leaching and imbalanced forest nutrition. We used data from a soil monitoring network to evaluate the trends and current status of the pH and the C : N ratio of Austrian forest soils. Deposition measurements and nitrogen contents of Norway spruce needles and mosses were used to assess the nitrogen supply. The pH values of soils have increased because of decreasing proton depositions caused by reduction of emissions. The C : N ratio of Austrian forest soils is widening. Despite high nitrogen deposition rates the increase in forest stand density and productivity has increased the nitrogen demand. The Austrian Bioindicator Grid shows that forest ecosystems are still deficient in nitrogen. Soils retain nitrogen efficiently, and nitrate leaching into the groundwater is presently not a large-scale problem. The decline of soil acidity and the deposition of nitrogen together with climate change effects will further increase the productivity of the forests until a limiting factor such as water scarcity becomes effective.

  12. Forecasting Austrian national elections: The Grand Coalition model

    Science.gov (United States)

    Aichholzer, Julian; Willmann, Johanna

    2014-01-01

    Forecasting the outcomes of national elections has become established practice in several democracies. In the present paper, we develop an economic voting model for forecasting the future success of the Austrian ‘grand coalition’, i.e., the joint electoral success of the two mainstream parties SPOE and OEVP, at the 2013 Austrian Parliamentary Elections. Our main argument is that the success of both parties is strongly tied to the accomplishments of the Austrian system of corporatism, that is, the Social Partnership (Sozialpartnerschaft), in providing economic prosperity. Using data from Austrian national elections between 1953 and 2008 (n=18), we rely on the following predictors in our forecasting model: (1) unemployment rates, (2) previous incumbency of the two parties, and (3) dealignment over time. We conclude that, in general, the two mainstream parties benefit considerably from low unemployment rates, and are weakened whenever they have previously formed a coalition government. Further, we show that they have gradually been losing a good share of their voter basis over recent decades. PMID:26339109

  13. English, French, Spanish, Italian, Portuguese? Code Choice and Austrian Export

    Science.gov (United States)

    Lavric, Eva; Back, Bernhard

    2009-01-01

    This article deals with how "export oriented Austrian companies effect code choice in their business relationships with customers from Romance language speaking countries". The focus lies on the most widespread Romance languages, therefore on French, Spanish, Italian and Portuguese speaking customers.The question of code choice in export…

  14. English, French, Spanish, Italian, Portuguese? Code Choice and Austrian Export

    Science.gov (United States)

    Lavric, Eva; Back, Bernhard

    2009-01-01

    This article deals with how "export oriented Austrian companies effect code choice in their business relationships with customers from Romance language speaking countries". The focus lies on the most widespread Romance languages, therefore on French, Spanish, Italian and Portuguese speaking customers.The question of code choice in export…

  15. Occupational incidents with self-propelled machinery in Austrian agriculture.

    Science.gov (United States)

    Mayrhofer, Hannes; Quendler, Elisabeth; Boxberger, Josef

    2013-01-01

    Tractors, self-propelled harvesting machinery, and material handling machinery are the most commonly used self-propelled machineries in Austrian agriculture, and they have similarities in main accident scenarios. Statistical data of all occupational incidents with these machines reported between 2008 and 2010 were analyzed to obtain information about the circumstances of the incidents, and about the victims and their work environments. Criteria of recognized occupational incidents provided by the Austrian Social Insurance Institution for Farmers were analyzed according to machinery category by means of cross-tabulation and chi-square tests. The results were discussed and evaluated in the context of the literature. The results of the analysis of the databases show that 786 occupational incidents with tractors, self-propelled harvesting machinery, and material handling machinery occurred in Austrian agriculture between 2008 and 2010. There were 231 occupational incidents in 2008; the number rose to 268 in 2009 and to 286 in 2010. A total of 41 incidents were fatal. For the machinery categories analyzed, the majority of injured victims were male, older than 40 years, Austrian citizens, and managers of a mixed-agricultural farm. A large number of the incidents occurred in all machinery categories by loss of control during operating a vehicle.

  16. Hospital admissions for traumatic brain injury of Austrian residents vs. of visitors to Austria.

    Science.gov (United States)

    Mauritz, Walter; Brazinova, Alexandra; Majdan, Marek; Leitgeb, Johannes

    2014-01-01

    The goal was to compare epidemiology of hospital admissions for traumatic brain injury (TBI) in Austrian residents vs. visitors to Austria. Data on all hospital admissions due to TBI (ICD-10 codes S06.0-S06.9; years 2009-2011) was provided by the Austrian Statistical Office. Data on Austrian population and on tourism (visitor numbers, nights spent) was retrieved from www.statistik.at . Age, sex, mechanism of injury, season and mortality was analysed for Austrian residents vs. visitors. Visitors contributed 3.9% to the total population and 9.2% of all TBI cases. Incidence of hospital admissions was 292/100,000/year in Austrian residents and was 727/100,000/year in visitors. Male:female ratio was 1.39:1 in Austrian residents and 1.55:1 in visitors. Austrian cases were older than visitors' cases (mean age 41 vs. 28 years). Austrian cases were distributed evenly over the seasons, while 75% of the visitors' cases happened during winter and spring. The most frequently observed causes of TBI in Austrian residents were private accidents, while sports caused almost half of the visitors' cases. Hospital mortality was lower in visitors than in Austrian residents (0.8 vs. 2.1%). Sports-related TBI of visitors causes a significant workload for Austrian hospitals. Better prevention is warranted.

  17. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  18. Password authentication in cloud

    Directory of Open Access Journals (Sweden)

    Indal Singh

    2015-09-01

    Full Text Available Cloud computing is an Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers [1]. Cloud Computing is a term used to describe both a platform and type of application. As a platform it supplies, configures and reconfigures servers, while the servers can be physical machines or virtual machines. On the other hand, Cloud Computing describes applications that are extended to be accessible through the internet and for this purpose large data centers and powerful servers are used to host the web applications and web services. Authentication is one the most important security primitive [6]. Password authentication is most widely used authentication mechanism. Password provides security mechanism for authentication and protection services against unwanted access to resource. In this paper, we applied a technique to preserve our password using graphical authentication.

  19. Brand new authentic places

    DEFF Research Database (Denmark)

    Stender, Marie

    neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense......How are places and material surroundings ascribed with meaning when new residential neighbourhoods are designed, branded and taken into use? Existing research on housing, neighbourhoods and urban design tends to take the perspective of either the architect or the user rather than to explore...... the relation and interplay between the two. This study strives to fill this gap by ethnographically tracing the process from design to occupancy including the role of branding as a means to create authenticity. The concept of authenticity is often associated with old houses and neighbourhoods, but also in new...

  20. Brand new authentic places

    DEFF Research Database (Denmark)

    Stender, Marie

    How are places and material surroundings ascribed with meaning when new residential neighbourhoods are designed, branded and taken into use? Existing research on housing, neighbourhoods and urban design tends to take the perspective of either the architect or the user rather than to explore...... the relation and interplay between the two. This study strives to fill this gap by ethnographically tracing the process from design to occupancy including the role of branding as a means to create authenticity. The concept of authenticity is often associated with old houses and neighbourhoods, but also in new...... neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense...

  1. Two-factor authentication

    CERN Document Server

    Stanislav, Mark

    2015-01-01

    During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market.

  2. Converse PUF-based authentication

    NARCIS (Netherlands)

    Kocabas, U.; Peter, A.; Katzenbeisser, S.; Sadeghi, A.

    2012-01-01

    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich

  3. Two centuries of the Austrian Civil code (1811-2011

    Directory of Open Access Journals (Sweden)

    Nikolić Dušan

    2011-01-01

    Full Text Available Austrian civil code (Allgemeines bürgerliches Gesetzbuch - ABGB, ACC succeeded in resisting the challenges of time for two centuries. A number of factors influenced it's longevity. First of all, prior to adoption of the law, a long lasting and well designed work, which has been described in greater detail in this article, was done. The Code was written gradually, with lots of recalculations, checks and public debates. In legal literature, it is often written about a unique lawmaking experiment, which Austrian authorities made by implementing the Code in one part of the state territory. The Code was written for feudal order, but according to principles of natural law. This second thing has, in addition to widely formulated and flexible legal norms, left enough space for extensive interpretation of outdated rules, and filling in the legal lacunas, whose number was increasing as the time passed. Courts often used this opportunity in a creative manner, contributing to survival of the Code. Many additions and changes were made to the Code, but there were few of those who thought that it should be changed by a new one Code. Austrians are preparing a more detailed revision of the ACC, which will allow modernization of the national law and it's synchronization with trends in current European law, but on the other hand, to preserve the two century old legal heritage. The second part of this article is dedicated to the influence of the Austrian Civil Code on the development of civil law in the former Yugoslavia and Serbia. ACC served as model for adoption of the Serbian Civil Code of 1844. It was applied as a positive law in the first half of XX century, in one part of the territory of today's Autonomous Province of Vojvodina. Formally, legal rules of the Austrian Civil Code can even be applied today, according to the Law on Nullity of Legal Regulations Enacted Prior to 6th of April 1941, and During the Enemy Occupation. However, that possibility is more

  4. Low-bandwidth authentication.

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  5. Low-bandwidth authentication.

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  6. Tools for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-09

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  7. DNA Markers for Food Products Authentication

    Directory of Open Access Journals (Sweden)

    Daria Scarano

    2014-09-01

    Full Text Available Media constantly refer of unscrupulous producers that adulterate, alter or replace premium products in food chains with the goal to maximize illegally profits. Food traceability is a central issue for the identification of improper labeling of processed food and feed and there are rules aimed to protect consumers and producers against fraudulent substitution of quality products in food chain, but the tools available are not always appropriate. DNA-based markers proved very effective for fresh and processed food molecular authentication. In this review, we illustrate potential and limits of different DNA markers focusing on low, medium and high-throughput markers, in order to monitor the genetic identity of food components in meat, fish and plants net-chains.

  8. Austrian Wels Orchestra’s Performance Tour in Shandong

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    <正>On the evening of April 12, beau-tiful music wafted through the big hall of the Rizhao International Conference Center. When the enthusiastic and exciting Radezky March was played, an audience of over 1,000 people gave a standing ovation in time to the music as the Austrian Wels Orchestra’s performance tour in Shandong came to a successful end.

  9. The Austrian School on Happiness and Relational Goods

    OpenAIRE

    Antonio Magliulo

    2008-01-01

    Austrian economists do not directly face the problem of the relationships between economics and happiness. They even rather rarely use the word happiness and do not bother to define the philosophical meaning of it referring to Aristotle or to the Enlightenment. They prefer to speak of human welfare: a comprehensive welfare, not limited to the satisfaction of material needs. The problem that they directly face is whether and in what sense non-instrumental human relationships (that is relationa...

  10. THE AUSTRIAN SCHOOL OF ECONOMICS AND MARKET INSTABILITY

    Directory of Open Access Journals (Sweden)

    Claudiu Peptine

    2013-03-01

    Full Text Available Market equilibrium is an illusion. The economic reality shows us that the main characteristic of the markets is the state of instability. The complexity of the phenomenon and the strong implications engendered by the economic fluctuations in the macro system, justify the rich scientific research activity of the main schools of economic thought to explain it. The Austrian school of economic thought has one of the most realistic analyses of the factors who generate the market instability.

  11. Austrian Economics - The Ultimate Achievement of an Intellectual Journey

    Directory of Open Access Journals (Sweden)

    Pascal Salin

    2009-01-01

    Full Text Available In this lecture delivered November 2008 on the occasion of the presentation of the Mises Institute’s Gary G. Schlarbaum Prize for lifetime achievement in the cause of liberty, Professor Salin discusses his discovery of Austrian economics and his involvement in “the world of individual liberty,” and draws various lessons from his intellectual journey. The coherence of Austrian economics appealed to Salin—it is not a patchwork of partial theories, but a logical process of thought founded on realistic assumptions about individual action. Salin also discusses differences between the Chicago and Austrian approaches, and his views about monetary systems.The financial crisis beginning in late 2008 is not a crisis of capitalism, but of state intervention, caused by the expansionary monetary policy of the Fed. Capitalism is the solution, not the cause. There is no need to create money. There is never any balance of payments problem. What is required is tax systems more friendly to capital accumulation, a decrease in the role of the state, the end of monetary policy and, if possible, the disappearing of central banks and the IMF.

  12. FPGA Authentication Methods.

    Energy Technology Data Exchange (ETDEWEB)

    Brotz, Jay Kristoffer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hymel, Ross W [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Punnoose, Ratish J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mannos, Tom [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Grant, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom); Evans, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom)

    2017-05-01

    One of the greatest challenges facing designers of equipment to be used in a nuclear arms control treaty is how to convince the other party in the treaty to trust its results and functionality. Whether the host provides equipment meant to prove treaty obligations and the inspector needs to gain that trust (commonly referred to as authentication), or the inspector provides this equipment and the host needs to gain this trust (commonly considered to be included in certification), one party generally has higher confidence in the equipment at the start of a treaty regime and the other party needs to gain that confidence prior to use. While we focus on authentication in this document—that is, the inspector gaining confidence in host-provided equipment—our conclusions will likely apply to host certification of inspector-provided equipment.

  13. Haunted by the authentic

    DEFF Research Database (Denmark)

    d'Ambrosio, Luigi

    2013-01-01

    Facebook page has been conducted. Research limitations/implications: The data were collected among guests at only one Italian restaurant in Denmark. Therefore, generalizing the results for other segments of the restaurant industry may not be possible. However, the purpose of this study is not to generalize......Research description and purpose: The purpose of this investigation is to explore Danish guests’ experience when consuming ‘authentic’ Italian food in Italian restaurants in Denmark. In this context, the aim of the research is to engage in a discussion of the concept of authenticity in ethnic food...... consumption, and the guests’ experience with and reaction to the authentic culinary experience in ethnic restaurants in the consumers’ home country. Design/Methodology: The paper methodology is based on the use of mixed methods. A collection of primary quantitative and qualitative data through a questionnaire...

  14. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  15. Probabilistic authenticated quantum dialogue

    Science.gov (United States)

    Hwang, Tzonelih; Luo, Yi-Ping

    2015-12-01

    This work proposes a probabilistic authenticated quantum dialogue (PAQD) based on Bell states with the following notable features. (1) In our proposed scheme, the dialogue is encoded in a probabilistic way, i.e., the same messages can be encoded into different quantum states, whereas in the state-of-the-art authenticated quantum dialogue (AQD), the dialogue is encoded in a deterministic way; (2) the pre-shared secret key between two communicants can be reused without any security loophole; (3) each dialogue in the proposed PAQD can be exchanged within only one-step quantum communication and one-step classical communication. However, in the state-of-the-art AQD protocols, both communicants have to run a QKD protocol for each dialogue and each dialogue requires multiple quantum as well as classical communicational steps; (4) nevertheless, the proposed scheme can resist the man-in-the-middle attack, the modification attack, and even other well-known attacks.

  16. Towards authentic conversations. Authenticity in the patient-professional relationship.

    Science.gov (United States)

    Arnason, V

    1994-01-01

    The purpose of this paper is to evaluate the significance of the existential notion of authenticity for medical ethics. This is done by analyzing authenticity and examining its implications for the patient-professional relationship and for ethical decision-making in medical situations. It is argued that while authenticity implies important demand for individual responsibility, which has therapeutic significance, it perpetuates ideas which are antithetical both to authentic interaction between patients and professionals and to fruitful deliberation of moral dilemmas. In order to counteract these consequences, an alternative idea of authenticity is introduced. According to this idea, authenticity is not regarded primarily as individual sovereignty, but as an ability to participate in a dialogue in which the subjectivity of both partners is respected. Such practice, based on mutual trust and responsibility, would enhance common decision-making and overcome the alienation between patients and professionals.

  17. Authentication of vegetable oils.

    OpenAIRE

    Cunha, S.C.; Amaral, J S; Oliveira, M.B.P.P.

    2011-01-01

    Authenticity of vegetable oils continues to be a challenge and the target of many studies. Consumers expectancy on healthier products that conform to the labelled information, and the vast amount of legislation a bout the correct characterisation and classification of vegetable oils have boosted a number of scientific works on this subject. Analytical t echniques to face this challenge are, at least, as manifold as ar e the ways of adulteration, ranging fro...

  18. International safeguards data authentication

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  19. THE FUNCTIONS OF VIENNESE DIALECT IN THE WORKS OF MODERN AUSTRIAN FICTION

    Directory of Open Access Journals (Sweden)

    Chukshis Vadim Andreevich

    2015-03-01

    Full Text Available The problem of definition of linguistic status of the Austrian dialects and their functions in Austrian fiction continues to preserve the academic value. The main peculiarities of Viennese dialect are given, the conclusions of its status among the other Austrian dialects are made in the article, the characteristic features of the functions of the Viennese dialect are given in the works of Austrian fiction. The author of the article proceeds from the position that the Viennese dialect is the important stylistic means and makes the conclusion about its functions in the works of Austrian fiction. Three novels and one story of modern Austrian writers have been selected for the analysis: H. Anderle (The Worthy Funeral. The Mortal Histories, E. Menasse (Vienna, F. Nabl (Edhof, P Campa (The Second Travel. The article studies four functions of Viennese dialect based on the research of the texts of the Austrian fiction works. The analysis based on the utterances of the heroes helped to prove that Austrian writers use the Viennese dialect as 1 means of marking the regional characteristics; 2 means of marking the age; 3 means of marking the social type and 4 means of emotions expression. The research of the speech of the heroes permitted to reveal the most common Viennese words and expressions and demonstrate their role in the texts not only as the means of creating the speech portrait of the heroes but only the markers of the originality of modern Austrian German.

  20. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the con......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review...... of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop the criterion variable. From the literature review of concept and historical data in both traditions......, it becomes possible to specify employment relations parameters between the indirect and direct employer and employees in a manner that will ensure working conditions consistent with these traditions, substantially enhancing the prospect of authenticity in employment relations. This theology of the workplace...

  1. Identity Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-07-01

    Full Text Available Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy channels. Specifically, the authentication scenarios of single time and multiple times are investigated. For each scenario, the lower bound on the opponent’s success probability is derived, and it is smaller than the classical identity authentication’s. In addition, it can remain the same, even if the secret key is reused. Remarkably, the Cartesian authentication code proves to be helpful for hiding the secret key to maximize the secrecy performance. Finally, we show a potential application of this authentication technique.

  2. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    OpenAIRE

    Nebojsa Pavlovic

    2015-01-01

    This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The rese...

  3. Mobile authentication problems and solutions

    CERN Document Server

    Jakobsson, Markus

    2012-01-01

    Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine authentication with

  4. Meat quality evaluation by hyperspectral imaging technique: an overview.

    Science.gov (United States)

    Elmasry, Gamal; Barbin, Douglas F; Sun, Da-Wen; Allen, Paul

    2012-01-01

    During the last two decades, a number of methods have been developed to objectively measure meat quality attributes. Hyperspectral imaging technique as one of these methods has been regarded as a smart and promising analytical tool for analyses conducted in research and industries. Recently there has been a renewed interest in using hyperspectral imaging in quality evaluation of different food products. The main inducement for developing the hyperspectral imaging system is to integrate both spectroscopy and imaging techniques in one system to make direct identification of different components and their spatial distribution in the tested product. By combining spatial and spectral details together, hyperspectral imaging has proved to be a promising technology for objective meat quality evaluation. The literature presented in this paper clearly reveals that hyperspectral imaging approaches have a huge potential for gaining rapid information about the chemical structure and related physical properties of all types of meat. In addition to its ability for effectively quantifying and characterizing quality attributes of some important visual features of meat such as color, quality grade, marbling, maturity, and texture, it is able to measure multiple chemical constituents simultaneously without monotonous sample preparation. Although this technology has not yet been sufficiently exploited in meat process and quality assessment, its potential is promising. Developing a quality evaluation system based on hyperspectral imaging technology to assess the meat quality parameters and to ensure its authentication would bring economical benefits to the meat industry by increasing consumer confidence in the quality of the meat products. This paper provides a detailed overview of the recently developed approaches and latest research efforts exerted in hyperspectral imaging technology developed for evaluating the quality of different meat products and the possibility of its widespread

  5. Hydrogeological interpretation of natural radionuclide contents in Austrian groundwaters

    Science.gov (United States)

    Schubert, Gerhard; Berka, Rudolf; Hörhan, Thomas; Katzlberger, Christian; Landstetter, Claudia; Philippitsch, Rudolf

    2010-05-01

    The Austrian Agency for Health and Food Safety (AGES) stores comprehensive data sets of radionuclide contents in Austrian groundwater. There are several analyses concerning Rn-222, Ra-226, gross alpha and gross beta as well as selected analyses of Ra-228, Pb-210, Po-210, Uranium and U-234/U-238. In a current project financed by the Austrian Federal Ministry of Agriculture, Forestry, Environment and Water Management, AGES and the Geological Survey of Austria (GBA) are evaluating these data sets with regard to the geological backgrounds. Several similar studies based on groundwater monitoring have been made in the USA (for instance by Focazio, M.J., Szabo, Z., Kraemer, T.F., Mullin, A.H., Barringer, T.H., De Paul, V.T. (2001): Occurrence of selected radionuclides in groundwater used for drinking water in the United States: a reconnaissance survey, 1998. U.S. Geological Survey Water-Resources Investigations Report 00-4273). The geological background for the radionuclide contents of groundwater will be derived from geological maps in combination with existing Thorium and Uranium analyses of the country rocks and stream-sediments and from airborne radiometric maps. Airborne radiometric data could contribute to identify potential radionuclide hot spot areas as only airborne radiometric mapping could provide countrywide Thorium and Uranium data coverage in high resolution. The project will also focus on the habit of the sampled wells and springs and the hydrological situation during the sampling as these factors can have an important influence on the Radon content of the sampled groundwater (Schubert, G., Alletsgruber, I., Finger, F., Gasser, V., Hobiger, G. and Lettner, H. (2010): Radon im Grundwasser des Mühlviertels (Oberösterreich) Grundwasser. - Springer (in print). Based on the project results an overview map (1:500,000) concerning the radionuclide potential should be produced. The first version should be available in February 2011.

  6. Anonymous authenticated communications

    Science.gov (United States)

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  7. Molecular authentication of geo-authentic Scrophularia ningpoensis

    Institute of Scientific and Technical Information of China (English)

    Chuan CHEN; Li-na DUAN; Xiao-long ZHOU; Bing-long CHEN; Cheng-xin FU

    2011-01-01

    Scrophularia ningpoensis has long been used in the Chinese Materia Medica for inflammation. Like other herbal medicines, S. ningpoensis collected from different localities may considerably differ in their therapeutic efficacy,and the one grown in Zhejiang Province is recognized as geo-authentic. However, it is difficult to confirm the geographical authenticity by similar morphological characteristics. In the present study, inter-simple sequence repeat (ISSR) markers were conducted to detect S. ningpoensis from different origins. A 1259-bp fragment amplified by primer UBC874 was found only in geo-authentic ones. By cloning and sequencing that specific band, sequence characterized amplified region (SCAR) markers were designed to distinguish geo-authentic S. ningpoensis from others.This is a rapid and easy method that can be used to identify the geographical authenticity of S. ningpoensis.

  8. Myosin light chain isoforms retain their species-specific electrophoretic mobility after processing, which enables differentiation between six species: 2DE analysis of minced meat and meat products made from beef, pork and poultry.

    Science.gov (United States)

    Montowska, Magdalena; Pospiech, Edward

    2012-09-01

    Investigation of protein changes as well as authentication of meat is particularly difficult in processed meat products due to their different composition, complexity and very often inhomogeneity. The aim of this study was to check if the inter-species differences in the expression of myosin light chain (MLC) isoforms observed in raw meat were retained in meat products. MLCs from mixtures of minced meat (16 variants), frankfurters and sausages (15 products) made from cattle, pig, chicken, turkey, duck and goose were analysed by 2DE. Species-specific patterns of MLC isoforms were observed in all the mixtures and processed meat products. Relatively small degradation was observed in the MLCs after processing. Image analysis enabled species identification of the meat in all samples when the content of meat of one species was not lower than 10%. However, it was impossible to differentiate between all the six species under investigation on the basis of individual isoform. It was possible when the combination of all the three isoforms (myosin light chain 1 fast, myosin light chain 2 fast and myosin light chain 3 fast) was analysed. The results evidenced that MLCs have potential to be used as markers in authentication of meat products made from the analysed six species.

  9. Meat Managers' Expectations Regarding Marketing of Irradiated Red Meats

    OpenAIRE

    Gaynor, Joe; Jensen, Kimberly L.; Jaenicke, Edward C.

    2003-01-01

    The objective of this study is to assess meat managers' expectations about impact of the recent regulatory approval of irradiated raw meat and meat products on marketing decisions and plans by supermarkets and grocery meat retailers. Forty managers of meat departments were interviewed in person to obtain the information for the study. While many of the meat managers believed that irradiation would help increase shelf life and reduce spoilage, they were less optimistic about consumers being wi...

  10. Austrian diplomacy in a changing global and European context: Between innovation, adaptation and resilience

    NARCIS (Netherlands)

    Maurer, Heidi

    2016-01-01

    Twenty years after Austria joining the EU, this contribution investigates how Austrian diplomacy has been adjusting to the changing European demands and opportunities next to global and domestic pressures for adaptation. Austrian diplomatic adaptation has predominantly been reactive. EU membership a

  11. Religion and suicide risk in lesbian, gay and bisexual Austrians.

    Science.gov (United States)

    Kralovec, Karl; Fartacek, Clemens; Fartacek, Reinhold; Plöderl, Martin

    2014-04-01

    Religion is known to be a protective factor against suicide. However, religiously affiliated sexual minority individuals often report a conflict between religion and sexual identity. Therefore, the protective role of religion against suicide in sexual minority people is unclear. We investigated the effect of religion on suicide risk in a sample of 358 lesbian, gay and bisexual Austrians. Religion was associated with higher scores of internalized homophobia, but with fewer suicide attempts. Our data indicate that religion might be both a risk and a protective factor against suicidality in religiously affiliated sexual minority individuals.

  12. Profitable Technical Trading Rules For The Austrian Stock Market

    OpenAIRE

    Massoud Metghalchi; Yong Glasure; Xavier Garza-Gomez; Chien Chen

    2011-01-01

    Two moving average technical trading rules for the Austrian stock market are tested. Results indicate that moving average rules do indeed have predictive power and could discern recurring-price patterns for profitable trading. Results also support the hypothesis that technical trading rules can outperform the buy-and-hold strategy. Break-even one-way trading costs are estimated to be between .61 and 2.36 %. These break-even costs are larger than recent estimates of actual trading costs, imply...

  13. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  14. Meat science research tendencies

    Directory of Open Access Journals (Sweden)

    José Arturo García Macías

    2010-12-01

    Full Text Available Meat is a high quality food due its higher protein content, besides to provide energy, vitamins particularly B complex, water and minerals, resulting in an appreciated food for humans. Even in same country, consumers search for different stuffs, since north consumers looks for meat cuts with fat and bone, whereas center-south consumers prefers fatless debones meat cuts. Modern consumers demand excellent appearance, color, taste and flavor in foods, microbiologically safe, minimal processed and curing salts, very nutritive and cheap. All these together in one single product are a hard challenge in the meat products area.

  15. Authenticity, Culture and Language Learning

    Science.gov (United States)

    MacDonald, Malcolm N.; Badger, Richard; Dasli, Maria

    2006-01-01

    In philosophy, authenticity has been used with two meanings: one entails the notion of correspondence; the other entails the notion of genesis (Cooper, 1983: 15). As in certain branches of philosophy, language teaching has perhaps clung too long to the first of these notions of authenticity at the expense of the other. This paper reviews four key…

  16. Reading Authentic Polish, Volume II.

    Science.gov (United States)

    Walczynski, Waldemar

    The second volume on reading authentic Polish is the continuation of a supplementary textbook to be used either in the classroom or in independent study. The materials included in it are unaltered authentic texts from Polish newspapers, magazines, and other mass media that provide exposure to the context and format of everyday reading matter. The…

  17. Detection of pork and poultry meat and bone meals in animal feed using hyperspectral imaging

    Science.gov (United States)

    Animal feed with meat and bone meal (MBM) has been the source of bovine spongiform encephalopathy (BSE) in cattle and other livestock animals. Many countries have banned the use MBM as an animal feed ingredient. Spectral imaging techniques have shown potential for rapid assessment and authentication...

  18. Authenticity and commoditization at home

    DEFF Research Database (Denmark)

    Stender, Marie

    . In Denmark, the concept of authenticity is often associated with old houses. By way of design and branding, though, new neighbourhoods are made authentic, referring to their historical past, architectural uniqueness or sense of community. Based on a fieldwork in three new residential buildings in Copenhagen......This paper investigates how interest and affect are entangled in the built environment of new Danish homes. The paper unfolds tensions and conflicts in the process from design through branding to occupancy of the house, and the relationship between authenticity and commoditization is explored...... seems to be a key concept in contemporary branding of products, places, and more recently also private homes. On the one hand authenticity thus seems to be closely related to the commercial value of things, on the other hand the authentic is held to be an expression of an inner nature or feeling...

  19. Message Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-01-01

    Full Text Available The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent’s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication.

  20. Heterocyclic amines in meat and meat products

    Directory of Open Access Journals (Sweden)

    Aliye BULGAN

    2013-06-01

    Full Text Available Heterocyclic amines (HA are the mutagenic/carcinogenic compounds which generate as a result of cooking of red meat, poultry meat and fish fillets at high temperatures. Up to 20 different HAs were detected and classified in the researches that conducted on these types of meats cooked at high temperatures. HAs are the products of Maillard reactions and the Strecker degredation of main precursors such as creatine/creatinine, aminoacid and the polysaccharides. Many physical and chemical factors effect the formation of HAs. Thus, it was reported by many researchers that utilizing coating and marination processes in addition to using natural and synthetic antioxidants and seasonings-plant extracts were effective on inhibiting/decreasing the formation of HAs. Additionally, boiling/steaming and microwave cooking methodologies were recommended instead of barbecuing, grilling or frying to inhibit/decrease the formation of HAs. The HAs formed in meat and meat products and the factors which have effects on the formation of HAs are presented in this review.

  1. 4th February 2011 - Austrian Academy of Sciences President H. Denk visiting CMS underground area with Collaboration Spokesperson G. Tonelli, Austrian Academy of Sciences Secretary General A. Suppan, CERN Head of International Relations F. Pauss and Director, High Energy Physics Laboratory, Austrian Academy of Sciences C Fabjan.

    CERN Multimedia

    Maximilien Brice

    2011-01-01

    4th February 2011 - Austrian Academy of Sciences President H. Denk visiting CMS underground area with Collaboration Spokesperson G. Tonelli, Austrian Academy of Sciences Secretary General A. Suppan, CERN Head of International Relations F. Pauss and Director, High Energy Physics Laboratory, Austrian Academy of Sciences C Fabjan.

  2. 69 The Multicultural Education in Bucovina during the Austrian Domination

    Directory of Open Access Journals (Sweden)

    Vasile Baltag

    2014-12-01

    Full Text Available In 1775, the territory of Bucovina became part of the Habsburg monarchy and it stayed like that for 143 years. All throughout this period when the Romanians lived here next to Ukrainians, Germans, Jews and other nationalities, the Austrian government took into consideration their need for culture, which resulted in the development of a multicultural teaching system. This implied that the languages of teaching in the Bukovinian schools were: Latin, Greek, Romanian, Ukrainian and, more often than not, German. Although the weighty presence of the German language in the academic institutions limited the number of young Romanians in schools, the teaching in German enabled the access of the Bukovinian students to the great European universities from Vienna, Salzburg, Lemberg, Kraków or Prague, before the founding of the Chernivtsi University (1875. Thus, beyond the negative aspects of the separation of this territory from Romania, the Austrian occupation represented an effervescent period from a cultural viewpoint, which lent a specific identity to the teaching system in Bukovina.

  3. Meat and Drink

    Institute of Scientific and Technical Information of China (English)

    周立

    2003-01-01

    英语对话A: Do you think he’ll be doing the business all his life?B: I don’t think so. Doing business is not his meat and drink.A: What’s his meat and drink, then?B: He wants to write books. Books are what he depends on for life.

  4. Eat Without Meat

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Young people across China are becoming vegetarians for a variety of reasons,from weight loss to worries about the quality of meat Avegetarian diet,once associated with monks or priests,has become fashionable in China,spawning the launch of a raft of restaurants cater- ing to a new no-meat clientele.

  5. Volatile compounds in meat and meat products

    Directory of Open Access Journals (Sweden)

    Monika KOSOWSKA

    Full Text Available Abstract Meaty flavor is composed of a few hundreds of volatile compounds, only minor part of which are responsible for the characteristic odor. It is developed as a result of multi-directional reactions proceeding between non-volatile precursors contained in raw meat under the influence of temperature. The volatile compounds are generated upon: Maillard reactions, lipid oxidation, interactions between Maillard reaction products and lipid oxidation products as well as upon thiamine degradation. The developed flavor is determined by many factors associated with: raw material (breed, sex, diet and age of animal, conditions and process of slaughter, duration and conditions of meat storage, type of muscle, additives applied and the course of the technological process. The objective of this review article is to draw attention to the issue of volatile compounds characteristic for meat products and factors that affect their synthesis.

  6. Issues of authenticity

    Science.gov (United States)

    Vara, Renee N.

    2000-03-01

    The problems which the fake or copy present, has received much attention among the art historians, philosophers, and art professionals within the last ten years. This renewed interest has largely focused upon aspects of what constitutes originality or fraud, but also has elucidated the fact that making copies was a common artistic practice during classical antiquity, the Renaissance, the early baroque and most commonly during the post modern period. One academic conference, held in 1985 at National Gallery of Art Symposium, entitled 'Retaining the Original' was focused around the very nature of the question of originality and authenticity. In the introduction to the published paper, Henry Million reminded us, that historically, 'making copies...constituted a major part of the artistic 'enterprise;' copies were valued and costly.

  7. Authentic, Original, and Valuable

    DEFF Research Database (Denmark)

    Tupasela, Aaro Mikael; Tamminen, Sakari

    2015-01-01

    The idea of genetic authenticity and origin has been an important issue within genetics for decades for scientific, political, and economic reasons. The question of where species and populations come from, as well as the linking of genetic traits to particular geographical locations, has resurfaced...... as both a scientific and political site of interest more recently through the study of population genetics in both humans and non-humans. This article explores the ways in which genetics and notions of ‘authentic’, ‘indigenous’, and ‘endemic’ have become intertwined with everyday practices in research....... Using the case of human and non-human genetics to compare and contrast the various facets associated with genetic identity, we seek to develop a broader picture of the ways in which genetics plays an important role in stabilizing categories of origin....

  8. [Problems of food authenticity].

    Science.gov (United States)

    Czerwiecki, Ludwik

    2004-01-01

    In this review the several data concerning food authenticity were presented. Typical examples of food adulteration were described. The most known are adulteration of vegetable and fruit products, adulteration of wine, honeys, olive oil etc. The modern analytical techniques for detection of food adulteration were discussed. Among physicochemical methods isotopic techniques (SCIRA, IRMS, SNIF-NMR) were cited. The main spectral methods are: IACPAES, PyMs, FTIR, NIR. The chromatographic techniques (GC, HPLC, HPAEC, HPTLC) with several kinds of detectors were described and the ELISA and PCR techniques are mentioned, too. The role of chemometrics as a way of several analytical data processing was highlighted. It was pointed out at the necessity of more rigorous control of food to support of all activity in area of fight with fraud in food industry.

  9. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2015-06-01

    Full Text Available This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The research included the use of an ALQ questionnaire for the estimation of leadership behavior. The components of authentic leadership are defined using factor analysis and other statistics techniques. The findings developed in this research indicated the fact that directors in educational institutions have a specific authentic leadership style. We suggest the concept of authentic leadership based on the four following factors: Communication-conformist, self-consciousness, self-discovery, and self-concept. Supporting these factors provides the directors with the possibility of obtaining a high level of authentic leadership.

  10. The Austrian Tobacco Act in practice--analysing the effectiveness of partial smoking bans in Austrian restaurants and bars.

    Science.gov (United States)

    Reichmann, Gerhard; Sommersguter-Reichmann, Margit

    2012-03-01

    The purpose of this study is to examine the effectiveness of partial smoking bans in restaurants and bars, such as those currently in place in Austria, by evaluating adherence to the relevant regulations and assessing the satisfaction levels of those affected by these regulations. To evaluate adherence, 127 randomly selected restaurants and bars were observed using a form of structured observation. In order to evaluate their level of satisfaction with the regulations, 342 randomly selected customers and 29 restaurant owners were interviewed using standardized questionnaires. The customers widely adhered to the partial smoking bans, but many of them were dissatisfied with the fragmented Austrian solution. Most restaurant owners showed neither adherence to the relevant regulations nor satisfaction with the partial smoking bans. The present study reveals that partial bans on smoking are an ineffective solution. The presumed advantages of these regulations, such as still allowing smoking in restaurants provided a spatial separation of smoking and non-smoking areas is guaranteed, cannot be confirmed; adherence to the partial bans is rather inadequate, especially among restaurant owners, and the level of satisfaction with the Austrian solution is poor as well, not only among smoking and non-smoking customers, but also restaurant owners. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  11. Rapid discrimination of main red meat species based on near-infrared hyperspectral imaging technology

    Science.gov (United States)

    Qiao, Lu; Peng, Yankun; Chao, Kuanglin; Qin, Jianwei

    2016-05-01

    Meat is the necessary source of essential nutrients for people including protein, fat, and so on. The discrimination of meat species and the determination of meat authenticity have been an important issue in the meat industry. The objective of this study is to realize the fast and accurate identification of three main red meats containing beef, lamb and pork by using near-infrared hyperspectral imaging (HSI) technology. After acquiring the hyperspectral images of meat samples, the calibration of acquired images and selection of the region of interest (ROI) were carried out. Then spectral preprocessing method of standard normal variate correction (SNV) was used to reduce the light scattering and random noise before the spectral analysis. Finally, characteristic wavelengths were extracted by principal component analysis (PCA), and the Fisher linear discriminant method was applied to establish Fisher discriminant functions to identify the meat species. All the samples were collected from different batches in order to improve the coverage of the models. In addition to the validation of sample itself in train set and cross validation, three different meat samples were sliced at the size of 2cm×2cm×2 cm approximately and were spliced together in one interface to be scanned by HSI system. The acquired hyperspectral data was applied to further validate the discriminant model. The results demonstrated that the near-infrared hyperspectral imaging technology could be applied as an effective, rapid and non-destructive discrimination method for main red meats.

  12. Multimedia authentication for copyright protection

    Science.gov (United States)

    Yin, Mingsheng

    2017-06-01

    Multimedia contents are easy to be copied and modified, so it is important to use authentication technology to ensure reliability and copyright security. Multimedia authentication technology is usually divided into digital signature and digital watermarking. In this paper, we introduce some basic image and video authentication technology, such as PCA algorithm and image signature method based on DCT coefficient, LSB -based digital image watermark, SVD-based digital image watermark, and video watermark. Through these digital content security technology, digital contents can be ensured security

  13. Authenticity in CALL: Three Domains of "Realness"

    Science.gov (United States)

    Buendgens-Kosten, Judith

    2013-01-01

    This paper discusses the role of authenticity and authenticity claims in computer assisted language learning (CALL). It considers authenticity as the result of a social negotiation process rather than an innate feature of a text, object, person, or activity. From this basis, it argues that authenticity claims play an important role in both second…

  14. Authentic leadership: application to women leaders

    Science.gov (United States)

    Hopkins, Margaret M.; O’Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women. PMID:26236254

  15. Prevalence and antibiotic resistance of Salmonella spp. in meat products, meat preparations and minced meat

    Science.gov (United States)

    Rašeta, M.; Mrdović, B.; Janković, V.; Bečkei, Z.; Lakićević, B.; Vidanović, D.; Polaček, V.

    2017-09-01

    This study aimed to determine Salmonella spp. prevalence in meat products, meat preparations and minced meat. Over a period of three years, a total of 300 samples were taken (100 RTE meat products, 100 meat preparations and 100 minced meat) and examined for the presence of Salmonella spp. Sampling was carried out at the warehouses of the food manufacturers. Salmonella spp. were not detected in RTE meat products, while 7% of semi-finished meat products (fresh sausages, grill meat formed and unformed) contained Salmonella, as did 18% of minced meats (minced pork II category, minced beef II category, mixed minced meat). The 25 Salmonella isolates obtained were examined for antibiotic resistance by the disk diffusion test, according to the NCCLS and CLSI guidelines. Isolates showed resistance to ampicillin and nalidixic acid (80%), tetracycline (72%), cefotaxime/clavulanic acid (48%), but not to gentamicin (8%) or trimethoprim/sulfamethoxazole (0%).

  16. Effects of Helping on State Authenticity Versus Recalled Authenticity

    OpenAIRE

    Allan, Clare M.

    2011-01-01

    This study focuses on the under-researched subject of “state authenticity”, the experience of expressing one’s true self. The 2 major hypotheses of the causes of state authenticity are tested: behavioural content versus consistency with personal traits. Investigations examine the proposal that behaviour expressing values, specifically “helping others” increases state authenticity, regardless of an individual’s own helpfulness-traits. Using a web-based survey, 238 participants were randomly as...

  17. Methodological improvements of geoid modelling for the Austrian geoid computation

    Science.gov (United States)

    Kühtreiber, Norbert; Pail, Roland; Wiesenhofer, Bernadette; Pock, Christian; Wirnsberger, Harald; Hofmann-Wellenhof, Bernhard; Ullrich, Christian; Höggerl, Norbert; Ruess, Diethard; Imrek, Erich

    2010-05-01

    The geoid computation method of Least Squares Collocation (LSC) is usually applied in connection with the remove-restore technique. The basic idea is to remove, before applying LSC, not only the long-wavelength gravity field effect represented by the global gravity field model, but also the high-frequency signals, which are mainly related to topography, by applying a topographic-isostatic reduction. In the current Austrian geoid solution, an Airy-Heiskanen model with a standard density of 2670 kg/m3 was used. A close investigation of the absolute error structure of this solution reveals some correlations with topography, which may be explained with these simplified assumptions. On parameter of the remove-restore process to be investigated in this work is the depth of the reference surface of isostatic compensation, the Mohorovicic discontinuity (Moho). The recently compiled European plate Moho depth model, which is based on 3D-seismic tomography and other geophysical measurements, is used instead of the reference surface derived from the Airy-Heiskanen isostatic model. Additionally, the use of of the standard density of 2670 kg/m3 is replaced by a laterally variable (surface) density model. The impact of these two significant modifications of the geophysical conception of the remove-restore procedure on the Austrian geoid solution is investigated and analyzed in detail. In the current Austrian geoid solution the above described remove-restore concept was used in a first step to derive a pure gravimetric geoid and predicting the geoid height for 161 GPS/levelling points. The difference between measured and predicted geoid heights shows a long-wavelength structure. These systematic distortions are commonly attributed to inconsistencies in the datum, distortions of the orthometric height system, and systematic GPS errors. In order to cope with this systematic term, a polynomial of degree 3 was fitted to the difference of predicted geoid heights and GPS

  18. Security Gaps In Authentication Factor Credentials

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Authentication factors refer to user login credentials that a user supplies to an authentication process for it to decide whether to grant or deny access. While two-factor and three-factor authentication generally provides better security than one-factor authentication the aim of this paper is to review security in individual authentication factor credentials that are in use nowadays. These credentials will be discussed in factor categories knowledge factor possession factor and inherence factor. The paper details current security gaps and some novel approaches to diminish the gaps in these authentication factors. We believe that our recommendations will inspire development of better authentication credentials and systems.

  19. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori

    2015-01-01

    Recently companies have applied two-factor user authentication. Persistent Authentication is one of the interesting authentication mechanisms to establish security and usability of two-factor authentication systems. However, there is room to improve its feasibility and usability. In this paper, we...... propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  20. Information systems for administration, clinical documentation and quality assurance in an Austrian disease management programme.

    Science.gov (United States)

    Beck, Peter; Truskaller, Thomas; Rakovac, Ivo; Bruner, Fritz; Zanettin, Dominik; Pieber, Thomas R

    2009-01-01

    5.9% of the Austrian population is affected by diabetes mellitus. Disease Management is a structured treatment approach that is suitable for application to the diabetes mellitus area and often is supported by information technology. This article describes the information systems developed and implemented in the Austrian disease management programme for type 2 diabetes. Several workflows for administration as well as for clinical documentation have been implemented utilizing the Austrian e-Health infrastructure. De-identified clinical data is available for creating feedback reports for providers and programme evaluation.

  1. Authentic Assessment: Testing in Reality

    Science.gov (United States)

    Svinicki, Marilla D.

    2004-01-01

    The new learning paradigm brings with it the need for a change in assessment practices as well. In this chapter, one of the assessment practices that is most consistent with this paradigm, authentic assessment, is discussed.

  2. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...... is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection....

  3. Research on Mixed Encryption Authentication

    Institute of Scientific and Technical Information of China (English)

    SUN Zhi-xin; WANG Ru-chuan; WANG Shao-di

    2003-01-01

    With the development of network techniques, the problem of network security is also arising as we enjoy its open convenience. There are many developed methods to overcome this problem. Identity authentication is one of these important measures. The authentication methods of traditional symmetric cryptogram systems and asymmetric cryptogram systems have both advantages and defects. This paper brings forward a Mixed Encryption Model for Authentication (MEMA), which has obvious advantages compared to the two traditional methods. MEMA model can be used widely in opening network environment such as mobile agent systems, multi-agents security safeguard systems and other situations in which identity authentication of users are needed. At last, the paper also presents the MEMA model's structure and implementation of an experimental system.

  4. Authentically Assessing an Assembly Line.

    Science.gov (United States)

    Kirkwood, James J.; Kendrick, Martha L.

    1999-01-01

    Authentic assessment in elementary school technology education is linked to a continuum of teacher behavior: nondirective, mediating, directive, and concurrent with teaching. It should be a two-way process between the students and the activity. (JOW)

  5. A Thought Experiment Comparing Austrian and Keynesian Stimulus Packages

    Directory of Open Access Journals (Sweden)

    Wladimir Kraus

    Full Text Available Essentially, there are two competing views of how to overcome an economy-wide recession/depression. The Austrian view understands the free-play of competition as the most potent means to overcome the short-run mismatch between an excessive boom-level of nominal wages/prices and depressed crisis-level volume of aggregate spending. In the Keynesian view, the disastrous mismatch between desired saving and planned investment inherent in capitalist economies requires the government to step in and take up the burden of spending to infuse the lacking demand for products and labor.The thought experiment presented in the paper is designed to provide the reader with a direct comparison of major analytical claims of the two competing approaches to assess the ability of each of the two to affect, positively or negatively, employment, capital accumulation, and the general standard of living/real wages.

  6. Capillary electrophoresis in food authenticity.

    Science.gov (United States)

    Kvasnicka, Frantisek

    2005-06-01

    Food authenticity is a term which simply refers to whether the food purchased by the consumer matches its description. False description can occur in many forms, from the undeclared addition of water or other cheaper materials, or the wrong declaration of the amount of a particular ingredient in the product, to making false statements about the source of ingredients i.e., their geographic, plant, or animal origin. The aim of this review is to summarize applications of capillary electrophoresis in food authentication.

  7. Teaching Materials Should be Authentic

    Institute of Scientific and Technical Information of China (English)

    俞莹

    2008-01-01

    <正>In terms of the teaching materials,we hold the opinion that authentic materials should be adapted in the process of teaching,and students should have access to the original language. According to Richards(2001),authentic materials refer to the use in teaching of texts,photographs, video selections,and other teaching resources that were not specially prepared for pedagogical purposes.Created materials refer to textbooks and other specially developed instructional resources. The use of authentic materials in an EFL classroom is what many teachers involved in foreign language teaching have discussed in recent years.Most of the teachers throughout the world agree that authentic texts or materials are beneficial to the language learning process.Authentic materials enable learners to interact with the real language and content rather than the form.Learners feel that they are learning a target language as it is used outside the classroom.Exposing students to authentic materials can also help them better understand the target culture and envision how they might participate in this community.

  8. Meat and Appetite Regulation

    DEFF Research Database (Denmark)

    Kehlet, Ursula Nana

    D thesis was to investigate the effects of fiber addition to meatballs and the effects of cooking methods of pork on appetite regulation. The PhD thesis is based on three human meal test studies and one analytical study related to the characteristics of fiber meat products. In paper I, the objective...... pork products are also characterized as high fat products containing more than 10 g fat per 100 g. In this context, the Danish meat industry puts a lot of effort into developing meat products with a healthier nutritional profile. Thus, it is relevant to provide scientific evidence of the satiating...... effects of new formulations of pork products. Different strategies can be applied to potentially enhance the satiating properties of pork. Processed meat products such as meatballs can serve as a matrix for the addition of fiber ingredients. Based on their high protein and fiber contents, high...

  9. Finding horse meat in beef products--a global problem.

    LENUS (Irish Health Repository)

    O'Mahony, P J

    2013-06-01

    The Food Safety Authority of Ireland (FSAI) oversees the implementation of food safety controls in Ireland which are set out in EU and Irish law. The FSAI, a science-based consumer protection organization, has nurtured a close relationship with the scientific community allowing it to utilize the best scientific advice available to underpin risk assessments. In early 2013, a 2-month long investigation in to the authenticity of beef products culminated in the publication of results that demonstrated the presence of horse meat in a frozen burger produced in Ireland. The events that followed revealed a pan-European food fraud which will likely result in significant changes in the way this small section of the meat industry will be regulated in the future in the EU. Although revelations of implicated products and food businesses have relented, the EU-wide investigation is continuing in an effort to determine how a food fraud of this scale could have occurred in such a highly regulated industry and who was involved. The FSAI initially received some criticism after publication of the results, but was also commended for its scientific approach as well as its openness and transparency. The end result of this incident is likely to be that the complexity of the food chain will be addressed again and DNA-based or similar methods will become a regular feature in verifying the authenticity of meat-based foods.

  10. Meat spoilage during distribution.

    Science.gov (United States)

    Nychas, George-John E; Skandamis, Panos N; Tassou, Chrysoula C; Koutsoumanis, Konstantinos P

    2008-01-01

    Meat spoilage during distribution can be considered as an ecological phenomenon that encompasses the changes of the available substrata (e.g., low molecular compounds), during the prevailing of a particular microbial association, the so-called specific spoilage organisms (SSO). In fact, spoilage of meat depends on an even smaller fraction of SSO, called ephemeral spoilage organisms (ESO). These ESO are the consequence of factors that dynamically persist or imposed during, e.g., processing, transportation and storage in the market. Meanwhile spoilage is a subjective judgment by the consumer, which may be influenced by cultural and economic considerations and background as well as by the sensory acuity of the individual and the intensity of the change. Indeed, when spoilage progresses, most consumers would agree that gross discoloration, strong off-odors, and the development of slime would constitute the main qualitative criteria for meat rejection. On the other hand, meat industry needs rapid analytical methods or tools for quantification of these indicators to determine the type of processing needed for their raw material and to predict remaining shelf life of their products. The need of an objective evaluation of meat spoilage is of great importance. The use of metabolomics as a potential tool for the evaluation of meat spoilage can be of great importance. The microbial association of meat should be monitored in parallel with the estimation of changes occurring in the production and/or assimilation of certain compounds would allow us to evaluate spoilage found or produced during the storage of meat under different temperatures as well as packaging conditions.

  11. Second President of Austrian National Council Mag. Barbara Prammer Visits China

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    <正>At the invitation of the CPAFFC, a high-ranking delegation of the Austrian Association for Promotion of Friendship and Cultural Relations with China (AAPFCRC) led by Ms. Mag. Barbara Prammer, second president of the Aus-

  12. A short report of the investigations made on the facies of Austrian coal deposits

    Energy Technology Data Exchange (ETDEWEB)

    Sachsenhofer, Reinhard F. [Department of Geological Sciences, University of Leoben, A-8700 Leoben (Austria)

    2004-04-23

    Petrological studies on Austrian coal deposits started in the 1940s. During the last decade, multi-disciplinary investigations involving petrology, geochemistry, and palynology were performed to study the relationship between geodynamics, coal-forming environments, and coal properties.

  13. Efficient and secure source authentication scheme for multicast user authentication

    Institute of Scientific and Technical Information of China (English)

    JEONG; Yoon-su; LEE; Sang-hyuk; SHIN; Seung-soo

    2013-01-01

    Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services.

  14. New Promotion of Austrian Airlines to Celebrate the 10th Anniversary

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

      2005 marks the 10th Anniversary of Austrian Airlines' flight operations to China. Austrian Airlines kicks off the celebration year with super attractive roundtrip fares from Beijing and Shanghai to Europe starting at RMB4,500 (excluding taxes and surcharges). The earlier the tickets are booked and purchased,the lower the airfares are for travel during the period from February 13 to April 15,2005.……

  15. New Promotion of Austrian Airlines to Celebrate the 10th Anniversary

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    @@ 2005 marks the 10th Anniversary of Austrian Airlines' flight operations to China. Austrian Airlines kicks off the celebration year with super attractive roundtrip fares from Beijing and Shanghai to Europe starting at RMB4,500 (excluding taxes and surcharges). The earlier the tickets are booked and purchased,the lower the airfares are for travel during the period from February 13 to April 15,2005.

  16. Chemical safety of meat and meat products.

    Science.gov (United States)

    Andrée, Sabine; Jira, W; Schwind, K-H; Wagner, H; Schwägele, F

    2010-09-01

    Since the Second World War the consumer behaviour in developed countries changed drastically. Primarily there existed the demand for sufficient food after a period of starvation, afterwards the desire for higher quality was arising, whereas today most people ask for safe and healthy food with high quality. Therefore a united approach comprising consistent standards, sound science and robust controls is required to ensure consumers' health and to maintain consumers' confidence and satisfaction. Chemical analysis along the whole food chain downstream (tracking) from primary production to the consumer and upstream (tracing) from the consumer to primary production is an important prerequisite to ensure food safety and quality. In this frame the focus of the following paper is the "chemical safety of meat and meat products" taking into account inorganic as well as organic residues and contaminants, the use of nitrite in meat products, the incidence of veterinary drugs, as well as a Failure Mode and Effect Analysis (FMEA) system assessing (prioritizing) vulnerable food chain steps to decrease or eliminate vulnerability.

  17. [Recommendations of the Austrian Society of Rheumatology/Austrian Radiology-Rheumatology Initiative for Musculoskeletal Ultrasound for the application of ultrasound in rheumatology].

    Science.gov (United States)

    Duftner, Christina; Dejaco, Christian; Kainberger, Franz; Machold, Klaus; Mandl, Peter; Nothnagl, Thomas; DeZordo, Tobias; Husic, Rusmir; Schüller-Weidekamm, Claudia; Schirmer, Michael

    2014-12-01

    It is the current goal in rheumatology to diagnose and treat inflammatory rheumatic diseases early in order to avoid structural damage. Functional imaging methods such as musculoskeletal sonography are increasingly used to support the clinical diagnosis. To ascertain the quality of ultrasound assessments performed by rheumatologists in Austria, the Austrian Radiology-Rheumatology Initiative for Musculoskeletal Ultrasound (ARRIMUS) proposed recommendations for a training curriculum, technical standards for ultrasound equipment, minimum requirements for documentation, indications for sonography and the use of ultrasound for interventions. These recommendations have been endorsed by the Austrian Society of Rheumatology and should aid rheumatologists to perform high quality ultrasound assessment in clinical practice.

  18. Sequence Patterns of Identity Authentication Protocols

    Institute of Scientific and Technical Information of China (English)

    Tao Hongcai; He Dake

    2006-01-01

    From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

  19. Crab Meat with Potherb Mustard

    Institute of Scientific and Technical Information of China (English)

    1996-01-01

    Ingredients: Eight fresh crab. 75 grams of potherb mustard, two egg whites, scallions, ginger and cooking wine. Salt to the taste. Directions: 1. Slice and deep fry the potherb mustard till crisp. Place fried mustard on plate. 2. Steam the crab and remove meat. Stir fry meat with scallions, ginger, cooking wine and salt, Return meat to crab shells. 3. Beat egg white until stiff. Cover the crab meat with mixture and garnish. Steam meat for a few minutes. 4. Place the crab shells on fried mustard and serve. This attractive red and white dish features delicious crab meat with savory crisp mustard leaves.

  20. Application of Raman Spectroscopy for Quality Monitoring in the Meat Processing Industry

    DEFF Research Database (Denmark)

    Berhe, Daniel Tsegay

    parameters related to the final product quality. The work further shows that Raman spectroscopy has great potential for authentication of ‘ready to eat’ cooked meat products in the retail market to be used by the quality control authority. Finally, it should be stressed that the results in this thesis were......-destructive quality monitoring in the meat processing industry as it requires no further sample preparation. Water, which is the main component of meat, is also not a problem for Raman spectroscopic measurement because water is a poor Raman scatter. Two major product quality related issues, cooking of meat and fat...... quality were selected as focus areas: Endpoint Temperature (EPT) and gross fatty acid (FA) composition. Endpoint temperature of a cooked product is an important parameter as it is related to the microbial safety and palatability of the product. The project aimed at using Raman spectroscopy...

  1. Meat and meat products as a source of bioactive peptides

    Directory of Open Access Journals (Sweden)

    Alfonso Totosaus

    2016-12-01

    Full Text Available Meat is a high protein content food, with great nutritional and biological value. Meat protein hydrolysis begins with the muscle to meat conversion, during meat ageing. After slaughter, endogen enzymes are responsible of meat softening since myofibrillar anchorage proteins are degraded. Protein hydrolysis continues during food preparation. When meat reaches the stomach, pepsin is the first enzyme to interact. As the food travel trough out gastrointestinal tract, pancreatic enzymes degraded the remained protein and the peptidases made the final proteolysis process. The small proteins or peptides are the absorbed to the circulatory system and distributed to the rest of the body. Bioactive peptides activity of meat and meat products is anti-hypertensive mainly, where histidine, carnosine and anserine are the main peptides identified. Another peptide with anti-oxidant activity is glutathione. The content depends on animal species.

  2. Potentials to mitigate climate change using biochar - the Austrian perspective

    Science.gov (United States)

    Bruckman, Viktor J.; Klinglmüller, Michaela; Liu, Jay; Uzun, Basak B.; Varol, Esin A.

    2015-04-01

    Biomass utilization is seen as one of various promising strategies to reduce additional carbon emissions. A recent project on potentials of biochar to mitigate climate change (FOREBIOM) goes even a step further towards bioenergy in combination of CCS or "BECS" and tries to assess the current potentials, from sustainable biomass availability to biochar amendment in soils, including the identification of potential disadvantages and current research needs. The current report represents an outcome of the 1st FOREBIOM Workshop held in Vienna in April, 2013 and tries to characterize the Austrian perspective of biochar for climate change mitigation. The survey shows that for a widespread utilization of biochar in climate change mitigation strategies, still a number of obstacles have to be overcome. There are concerns regarding production and application costs, contamination and health issues for both producers and customers besides a fragmentary knowledge about biochar-soil interactions specifically in terms of long-term behavior, biochar stability and the effects on nutrient cycles. However, there are a number of positive examples showing that biochar indeed has the potential to sequester large amounts of carbon while improving soil properties and subsequently leading to a secondary carbon sink via rising soil productivity. Diversification, cascadic utilization and purpose designed biochar production are key strategies overcoming initial concerns, especially regarding economic aspects. A theoretical scenario calculation showed that relatively small amounts of biomass that is currently utilized for energy can reduce the gap between Austria's current GHG emissions and the Kyoto target by about 30% if biomass residues are pyrolized and biochar subsequently used as soil amendment. However, by using a more conservative approach that is representing the aims of the underlying FOREBIOM project (assuming that 10% of the annual biomass increment from forests is used for biochar

  3. Biometric Authentication using Nonparametric Methods

    CERN Document Server

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy kmeans classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based o...

  4. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    The combination of user-names and passwords has become the predominant method of user authentication in computer systems. Most users have multiple accounts on different systems, which impose different constraints on the length and complexity of passwords that the user is allowed to select....... This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication......, which accepts the most common typing mistakes. The proposed algorithm has been implemented in secure hardware and integrated into a standard Unix system. We present the design, implementation and preliminary evaluation of the developed passphrase authentication prototype....

  5. Biometric Authentication using Nonparametric Methods

    CERN Document Server

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy k-means classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based ...

  6. Designing Pu600 for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-10

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work.

  7. Authentic counterfeit in viral marketing

    OpenAIRE

    2016-01-01

    This master thesis deals with authentic fake, a phenomenon present in viral marketing. After a brief introduction into the issue and clarification of terms, the study aims to find out whether a seemingly authentic video recording of a catchy incident helps a marketing campaign to succeed, that is to say to achieve high sharing figures amongst internet users. In a theoretical part, the thesis elaborates information from technical books, publications and internet sources dealing with authentici...

  8. Quantified Trust Levels for Authentication

    Science.gov (United States)

    Thomas, Ivonne; Menzel, Michael; Meinel, Christoph

    Service-oriented Architectures (SOAs) facilitate applications to integrate seamlessly services from collaborating business partners regardless of organizational borders. In order to secure access to these services, mechanisms for authentication and authorisation must be deployed that control the access based on identity-related information. To enable a business partners’ users to access the provided services, an identity federation is often established that enables the brokering of identity information across organisational borders. The establishment of such a federation requires complex agreements and contracts that define common policies, obligations and procedures. Generally, this includes obligations on the authentication process as well.

  9. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    Science.gov (United States)

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  10. The new Austrian tunnelling method in coal mining

    Energy Technology Data Exchange (ETDEWEB)

    Thierse, D.

    1987-12-03

    The new Austrian tunnelling method (NATM), as a composite support and lining system of bolts, steel mats and shotcrete, prevents the deconsolidation of the strata and activates the self-supporting properties of the strata envelope. By bringing in the strata for support it provides an exceptionally high support resistance, which outdoes steel supports and which is needed at increasing depths with their predictable high rock pressures and with large cross-sections in rooms where the limits of conventional steel arches are exceeded. Even thin shotcrete casing has a high support resistance. Where effects of other workings are present the NATM can be relied upon to have good stability over a long period and to be repair-friendly, as flaking off the casing can be made good by re-bolting and re-spraying. In contrast with the costly changing of entire support arches, partial surfaces can be repaired as required. The NATM is particularly cost-effective in the construction of drainage roads, which have to be lined against aggressive water, shaft porches, branch-offs, large rooms such as workshops, landings, belt drive rooms with internal cross-sections of 25 to 30 m/sup 2/ and shaft widening and traversing with irregular cross-sections. In geologically extremely difficult levels, such as those of the Laura and Zollverein 7/8 seams, the NATM has also been successfully used to construct drainage roads, branch-offs and shaft traverses. 30 refs., 8 figs., 6 tabs.

  11. Holocaust Studies in Austrian Elementary and Secondary Schools

    Directory of Open Access Journals (Sweden)

    Philipp Mittnik

    2016-09-01

    Full Text Available This article presents arguments in support of teaching about the Holocaust and Nazism in Austria at an early age. To accomplish this, Austrian and German elementary school textbooks were analyzed for the amount of content dealing with the Holocaust and Jews; the results showed that since 1980 the amount of content on the Holocaust increased in Germany, and to a lesser extent in Austria. The article reviews some of the criticism in Europe of the term Holocaust Education and explores some of arguments about why that is. The author argues that moral education and teaching of Human Rights are important components of, but ought not be the main goal of teaching about the Holocaust. The role of Austria after World War II, and exploration of the so called victim myth, prevalent until the 1990s are important to understanding history and to how history textbooks were created. After a discussion of how the Holocaust can be taught to elementary and early secondary school aged children, some suggestions are made about approaches to teaching the Holocaust to students in these age groups.

  12. France and the Austrian Empire 1815-1918

    Directory of Open Access Journals (Sweden)

    Horel Catherine

    2007-01-01

    Full Text Available Relations between France and the Habsburg Empire during the long nineteenth century went through several phases bounded by the events crucial not just to the two countries' mutual relations but to all of Europe. The Congress of Vienna defined their mutual relations for the next thirty years. The Habsburgs and their omnipresent minister Metternich were fearful of revolutionary and liberal movements traditionally having their origins in France. And it was the revolutionary events of 1848 that brought about a change in the balance of power and their mutual relations. Metternich's retirement and, more importantly, the arrival of the Russian armies in Central Europe and the subsequent strengthening of Prussia, conferred a new importance to the role of the Habsburg Monarchy as a bulwark against the advancement of Russia and a vital counterweight to Prussia. With the defeat of Napoleon III and the creation of Germany with Alsace and Lorraine Franco-Austrian relations entered a new phase. The destiny of the two provinces alienated the Habsburgs from the French Republic, especially after the reorganization of Europe into two confronting blocs. The logic of alliances led to their being adversaries in the world conflict, although Napoleon III's geo-strategic analyses remained present almost to its very end, when Clemenceau's government gave support to the nationality principle thereby crucially contributing to the collapse of the Habsburg Monarchy.

  13. Pattern of microbial contamination of meat during meat display at the Bodija meat market, Ibadan, Nigeria

    Directory of Open Access Journals (Sweden)

    A. E. J. Awosanya

    2011-07-01

    Full Text Available The pattern of microbial contamination of meat carcasses on display on wooden tables over a period of 90 minutes at the Bodija meat market was studied. This is to understudy the role of meat display methods on meat contamination. Swab samples were taken from four wooden meat display tables and meat carcasses on them at intervals of 30 minutes for a period of 1 hour 30 minutes and cultured on nutrient agar and Macconkey agar to determine the total aerobic counts (TAC and coliform counts (TCC over time. The result showed that the mean log TAC and TCC increased significantly (P<0.05 on the wooden meat display tables by 0.11 and 0.30 log CFU/cm2respectively and on the meat carcasses by 0.29 log CFU/cm2 each over the 1 hour 30 minutes period. There is a direct relationship (r = + 1 in the pattern of microbial growth (TAC and TCC on the wooden meat display tables and meat carcasses on display with time. This is suggestive of a common extraneous source of contamination of both the meat display tables and meat displayed on them. It is therefore recommended that meat carcasses should be hygienically displayed by preventing direct exposure to air and other environmental conditions so as to minimize contamination.

  14. Authentic Montessori: The Teacher Makes the Difference

    Science.gov (United States)

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  15. 28 CFR 68.46 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Authenticity. 68.46 Section 68.46... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.46 Authenticity. The authenticity of all documents submitted as proposed exhibits in advance of the hearing shall be deemed...

  16. Authenticity, Autonomy and Altruism: Keys for Transformation

    Science.gov (United States)

    Clarken, Rodney

    2011-01-01

    The value of authentic knowing, autonomous behavior and altruistic motivation is presented. Authenticity, autonomy and altruism are primary human capacities and keys for individual and collective transformation. Realizing the full development of these three basic potentialities can serve as goals and standards for well-being. Authenticity,…

  17. 29 CFR 18.50 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Authenticity. 18.50 Section 18.50 Labor Office of the Secretary of Labor RULES OF PRACTICE AND PROCEDURE FOR ADMINISTRATIVE HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES General § 18.50 Authenticity. The authenticity of all documents submitted as...

  18. Authentic Montessori: The Teacher Makes the Difference

    Science.gov (United States)

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  19. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    . This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication...

  20. Literacy Cafe: Making Writing Authentic

    Science.gov (United States)

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  1. Authenticity in a Digital Environment.

    Science.gov (United States)

    Cullen, Charles T.; Hirtle, Peter B.; Levy, David; Lynch, Clifford A.; Rothenberg, Jeff

    On January 24, 2000, the Council on Library and Information Resources (CLIR) convened a group of experts from different domains of the information resources community to address the question, "What is an authentic digital object?" Five writers--an archivist, a digital library expert, a documentary editor and special collections…

  2. The embodiment of authentic leadership.

    Science.gov (United States)

    Waite, Roberta; McKinney, Nicole; Smith-Glasgow, Mary Ellen; Meloy, Faye A

    2014-01-01

    Development of student leadership capacity and efficacy is critical to the nursing profession, and vital to this process is a strong foundation in critical thinking that includes a depth of understanding of self (i.e., authentic leadership development). This article will (a) present a theoretical overview of authentic leadership as compared with other popular leadership theories, (b) provide an overview of development/implementation of an authentic leadership course, the first in a series of six one-credit courses as an integral component of the Macy Undergraduate Leadership Fellows Program for upper-level nursing students, and (c) discuss related implications for nursing education. Findings from an investigator-developed quantitative pre-post survey and qualitative evaluation questions are provided. Student feedback regarding the comprehensive nature of the course was extremely positive and affirmed the value of introspection associated with authentic leadership in ongoing personal and professional development. Critical pedagogy and action-oriented learning strategies also proved beneficial to student engagement.

  3. Authentic Supervision Reconciles the Irreconcilables.

    Science.gov (United States)

    Pajak, Edward F.; Seyfarth, John T.

    1983-01-01

    Successful supervisors share a characteristic of "authenticity," rather than a particular pattern of behavior. From a background of Gestalt psychology, four steps are offered to help supervisors become aware of their own needs and feelings and recognize the "shoulds" that prevent real contact with others. (MLF)

  4. Authenticity and Lesbian Health Educators

    Science.gov (United States)

    Weiler-Timmins, Rebecca A.

    2011-01-01

    This qualitative study used narrative inquiry to explore how lesbian health educators navigate authenticity in a heteronormative higher education setting. The study was grounded in a lesbian standpoint pedagogical viewpoint, which provided a lens with which to view the nine participants' experiences. Of particular interest was how the educators in…

  5. Authenticity or School-only?

    DEFF Research Database (Denmark)

    Fougt, Simon Skov

    Challenging the apparent distinction among educational researchers between ‘authenticity’ outside schools and ‘school-only’ inside schools, this paper investigates the concept of meaningfulness from different perspectives with a focus on formal learning in schools, as it states that teaching...... and learning inside school also can be authentic....

  6. Embodying Authenticity in Higher Education

    Science.gov (United States)

    Douglass, Laura

    2016-01-01

    Orienting to the community of higher education involves a learning experience that is authentic and embodied for one new college administrator. Reflecting on her experience, she articulates how her relationship to her body helps to understand and respond to the tensions of engaging with a scholarly community.

  7. Literacy Cafe: Making Writing Authentic

    Science.gov (United States)

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  8. Embodying Authenticity in Higher Education

    Science.gov (United States)

    Douglass, Laura

    2016-01-01

    Orienting to the community of higher education involves a learning experience that is authentic and embodied for one new college administrator. Reflecting on her experience, she articulates how her relationship to her body helps to understand and respond to the tensions of engaging with a scholarly community.

  9. Plant extracts as natural antioxidants in meat and meat products.

    Science.gov (United States)

    Shah, Manzoor Ahmad; Bosco, Sowriappan John Don; Mir, Shabir Ahmad

    2014-09-01

    Antioxidants are used to minimize the oxidative changes in meat and meat products. Oxidative changes may have negative effects on the quality of meat and meat products, causing changes in their sensory and nutritional properties. Although synthetic antioxidants have already been used but in recent years, the demand for natural antioxidants has been increased mainly because of adverse effects of synthetic antioxidants. Thus most of the recent investigations have been directed towards the identification of natural antioxidants from various plant sources. Plant extracts have been prepared using different solvents and extraction methods. Grape seed, green tea, pine bark, rosemary, pomegranate, nettle and cinnamon have exhibited similar or better antioxidant properties compared to some synthetic ones. This review provides the recent information on plant extracts used as natural antioxidants in meat and meat products, specifically red meat. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Compositional Signatures of Conventional, Free Range, and Organic Pork Meat Using Fingerprint Techniques

    Directory of Open Access Journals (Sweden)

    Gislene B. Oliveira

    2015-08-01

    Full Text Available Consumers’ interest in the way meat is produced is increasing in Europe. The resulting free range and organic meat products retail at a higher price, but are difficult to differentiate from their counterparts. To ascertain authenticity and prevent fraud, relevant markers need to be identified and new analytical methodology developed. The objective of this pilot study was to characterize pork belly meats of different animal welfare classes by their fatty acid (Fatty Acid Methyl Ester—FAME, non-volatile compound (electrospray ionization-tandem mass spectrometry—ESI-MS/MS, and volatile compound (proton-transfer-reaction mass spectrometry—PTR-MS fingerprints. Well-defined pork belly meat samples (13 conventional, 15 free range, and 13 organic originating from the Netherlands were subjected to analysis. Fingerprints appeared to be specific for the three categories, and resulted in 100%, 95.3%, and 95.3% correct identity predictions of training set samples for FAME, ESI-MS/MS, and PTR-MS respectively and slightly lower scores for the validation set. Organic meat was also well discriminated from the other two categories with 100% success rates for the training set for all three analytical approaches. Ten out of 25 FAs showed significant differences in abundance between organic meat and the other categories, free range meat differed significantly for 6 out of the 25 FAs. Overall, FAME fingerprinting presented highest discrimination power.

  11. Meat, dairy, and cancer.

    Science.gov (United States)

    Abid, Zaynah; Cross, Amanda J; Sinha, Rashmi

    2014-07-01

    In 2007 the World Cancer Research Fund and American Institute for Cancer Research (WCRF/AICR) report judged that the evidence for an association between red and processed meat consumption and colorectal cancer was convincing. In addition, the effect of other animal products on cancer risk has been studied, and the WCRF/AICR report concluded that milk probably decreases the risk of colorectal cancer but diets high in calcium probably increase the risk of prostate cancer, whereas there was limited evidence for an association between milk and bladder cancer and insufficient evidence for other cancers. There are several potential mechanisms relating meat to cancer, including heterocyclic amines, polycyclic aromatic hydrocarbons, N-nitroso compounds, and heme iron. Although the evidence in favor of a link between red and processed meat and colorectal cancer is convincing, the relations with other cancers are unclear. In this review, we summarize cohort studies conducted by the National Cancer Institute on meat and dairy intake in relation to cancer since the 2007 WCRF/AICR report. We also report the findings of meta-analyses published since 2007.

  12. Authenticity as an aim of psychoanalysis.

    Science.gov (United States)

    Neri, Claudio

    2008-12-01

    This paper will present a series of predominantly clinical observations concerning the lengthy work a patient carries out, with the help of the analyst, in order to achieve greater personal authenticity. When this work is drawing to a close and the patient has gained a degree of authenticity, this authenticity remains within him, almost without his realizing it. The power of authenticity is instead revealed through the patient's most intimate and important relationships. In the long term, the patient's authenticity also alters his perception of himself and of his role in the world. He feels more alive and less overcome by a sense of futility, if earlier this had been the case.

  13. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  14. Quantum identity authentication with single photon

    Science.gov (United States)

    Hong, Chang ho; Heo, Jino; Jang, Jin Gak; Kwon, Daesung

    2017-10-01

    Quantum identity authentication with single photons is proposed in the paper. It can verify a user's identity without exposing to an authentication key information. The protocol guarantees high efficiency in that it can verify two bits of authentication information using just a single photon. The security of our authentication scheme is analyzed and confirmed in the case of a general attack. Moreover, the proposed protocol is practicable with current technology. Our quantum identity authentication protocol does not require quantum memory registration and any entangled photon sources.

  15. Sustainable meat consumption in China

    Institute of Scientific and Technical Information of China (English)

    Satoru Shimokawa

    2015-01-01

    Sustainable meat consumption is critical to achieve a sustainable food system because meat products are among the most energy-intensive, ecological y burdensome, and ethical y concerned foods. This paper focuses on the case of China and discusses the dififculties and possibilities to achieve sustainable meat consumption in China by reviewing previous empirical studies and descriptive statistics, particularly considering consumers’ dietary transitions in quantity and quality fol owing China’s rapid economic growth. Given China’s sheer size of population and meat demand, the sustainable meat consumption in China is also a relevant topic in the global food system.

  16. An inventory of glacial lakes in the Austrian Alps

    Science.gov (United States)

    Buckel, Johannes; Otto, Jan-Christoph; Keuschnig, Markus; Götz, Joachim

    2016-04-01

    The formation of lakes is one of the consequences of glacier retreat due to climate change in mountain areas. Numerous lakes have formed in the past few decades in many mountain regions around the globe. Some of these lakes came into focus due to catastrophic hazard events especially in the Himalayas and the Andes. Glacial lake development and lifetime is controlled by the complex interplay of glacier dynamics, geomorphological process activity and geological boundary conditions. Besides the hazard potential new lakes in formerly glaciated areas will significantly contribute to a new landscape setting and to changing geomorphologic, hydrologic and ecologic conditions at higher alpine altitudes. We present an inventory of high alpine lakes in the Austrian Alps located above an altitude of 1700 m asl. Most of these lakes are assumed to be of glacial origin, but other causes for development, like mass movements are considered as well. The inventory is a central part of the project FUTURELAKES that aims at modelling the potential development of glacial lakes in Austria (we refer to the presentation by Helfricht et al. during the conference for more details on the modelling part). Lake inventory data will serve as one basis for model validation since modelling is performed on different time steps using glacier inventory data. The purpose of the lake inventory is to get new insights into boundary conditions for lake formation and evolution by analysing existing lake settings. Based on these information the project seeks to establish a model of lake sedimentation after glacier retreat in order to assess the potential lifetime of the new lakes in Austria. Lakes with a minimum size of 1000 m² were mapped using multiple aerial imagery sources. The dataset contains information on location, geometry, dam type, and status of sedimentation for each lake. Additionally, various geologic, geomorphic and morphometric parameters describe the lake catchments. Lake data is related to

  17. What lessons can be learned from the Austrian events?

    Science.gov (United States)

    Sarny, Stephanie; Habermann, Walter; Ossimitz, Guenther; Stammberger, Heinz

    2013-01-01

    The death of 5 children in Austria below the age of 6 years due to posttonsillectomy haemorrhage in 2006 and 2007 led to an intensive discussion on the potential life-threatening risks of tonsil surgery. On this occasion, a consensus paper with clear recommendations for tonsil surgery was released by the Austrian Societies of Otorhinolaryngology, Head and Neck Surgery and Paediatrics followed by a nationwide multicentre study. All consecutive tonsillectomies, tonsillotomies and adenoidectomies performed in public hospitals in Austria within 9 months were assessed. Data on all participating patients were collected via an online questionnaire requesting patient characteristics, surgery details and postoperative haemorrhage. A strict definition for postoperative bleeding episodes with 7 severity grades was applied. Every bleeding episode after extubation was counted as postoperative bleeding event. The study population - all younger than 18 years of age - consisted of 6,765 patients (tonsillectomy 2,080, 31%; tonsillotomy 1,292, 19%; adenoidectomy 3,393, 50%). Postoperative haemorrhage episodes were reported in 15% after tonsillectomy and in 2.3% after tonsillotomy, with the risk increasing parallel to age. Multiple bleeding episodes were recorded in one fourth of all tonsillectomy bleedings, but were rare after tonsillotomy. Surgical revision under general anaesthesia was necessary in 4.2% after tonsillectomy and in 0.9% after tonsillotomy. As the incidence of tonsillectomy in children younger than 6 years has declined following the recommendations of the consensus paper issued in 2007, tonsillotomy has become more frequent in this age group. Overnight hospital admission and observation is suggested for all patients experiencing postoperative haemorrhage, as the occurrence of one minor bleeding doubled the risk of a second severe bleeding. Copyright © 2013 S. Karger AG, Basel.

  18. 5th Austrian Hungarian workshop on celestial mechanics

    Science.gov (United States)

    Süli, Áron

    2011-06-01

    The 5th Hungarian-Austrian Workshop on Celestial Mechanics took place from 9th until the 10th of April 2010 in Vienna, Austria. The workshop was held in the Institute for Astronomy of Vienna University. From the Eötvös University and from the host institute experts and PhD students gathered together to discuss the challenges and new results of the actual problems of celestial mechanics. The workshop was held in the meeting room at the Sternwarte of the Vienna University located in a magnificent park in the heart of Vienna. Following the themes of the four previous events the focus for this workshop ranged from the Trojan problem, dynamics in binary star systems and exoplanetray systems. We were pleased to acknowledge the support of the host university. The talks were characterized by a large spectrum, which is typical of the workshops on celestial mechanics. Several talks discussed different aspects of the trojan problem, such as the three Trojan Problem, dynamics of trojan-like planets in binary stars, the frequencies of their motion around the triangular lagrangian points, etc. Several speakers focused on the formation of planetary systems and on the field of exoplanetary systems, like exoplanetary systems in higher order mean motion resonances, formation of planets in binary systems, stability of exomoons etc. Some of the presentation used sophisticated mathematical tools in order to understand mean motion resonances, the Sitnikov problem applying the KAM and the Nekhoroshev theorem. The theme of a number of talks was the motion of Solar System bodies: dynamics of the newly discovered moons of Pluto and of near-Earth asteroids. General problems were also addressed, among others chaos in Hamiltonian systems, adaptive Lie-integration method and iterative solution approximation to the generalised Sitnikov problem.

  19. Impacts of Austrian Climate Variability on Honey Bee Mortality

    Science.gov (United States)

    Switanek, Matt; Brodschneider, Robert; Crailsheim, Karl; Truhetz, Heimo

    2015-04-01

    Global food production, as it is today, is not possible without pollinators such as the honey bee. It is therefore alarming that honey bee populations across the world have seen increased mortality rates in the last few decades. The challenges facing the honey bee calls into question the future of our food supply. Beside various infectious diseases, Varroa destructor is one of the main culprits leading to increased rates of honey bee mortality. Varroa destructor is a parasitic mite which strongly depends on honey bee brood for reproduction and can wipe out entire colonies. However, climate variability may also importantly influence honey bee breeding cycles and bee mortality rates. Persistent weather events affects vegetation and hence foraging possibilities for honey bees. This study first defines critical statistical relationships between key climate indicators (e.g., precipitation and temperature) and bee mortality rates across Austria, using 6 consecutive years of data. Next, these leading indicators, as they vary in space and time, are used to build a statistical model to predict bee mortality rates and the respective number of colonies affected. Using leave-one-out cross validation, the model reduces the Root Mean Square Error (RMSE) by 21% with respect to predictions made with the mean mortality rate and the number of colonies. Furthermore, a Monte Carlo test is used to establish that the model's predictions are statistically significant at the 99.9% confidence level. These results highlight the influence of climate variables on honey bee populations, although variability in climate, by itself, cannot fully explain colony losses. This study was funded by the Austrian project 'Zukunft Biene'.

  20. Occupational accidents with mowing machines in Austrian agriculture

    Directory of Open Access Journals (Sweden)

    Robert Kogler

    2015-02-01

    Full Text Available The number of recognized accidents during agricultural work is still very high in Austria. In the years 2008 to 2009, there occurred 84 approved work accidents with mowing machines. The main causes of accidents were the loss of control of machines, transportations or conveyances, hand tools, objects or animals. In the literature, numerous studies of general agricultural and forestry accident situations are available. Detailed studies on specific types of agricultural machines, which describe concrete circumstances and causes of accidents, are in limited numbers. The accident database from the General Accident Insurance Institution and the Austrian Social Insurance Institution of Farmers, with personal and accidental data information about mowing machine accidents, were analyzed. The results showed that most accidents occurred on mixed agricultural farms (68%. The majority of the injured persons were male (86%, over 40-years-old (86% with an agricultural or forestry education (91%. The most common accidents occurred in the summer months (69% and on afternoons during the working week (79%. The majority of accidents were caused by contact with the machine (55% and the loss of control (73% during their operation (60% and harvesting work (63%. The most frequently injuries were wounds, fractures and superficial injuries (81% to the upper and lower extremities (66%. The results of the chi-square test showed significant correlations between the specific task with the form of contact, the working process, the day and season. Results of the odds ratio determination showed an increased risk of suffering serious injury for men in the first half of the year and half of the day due to loss of control over the machine during agricultural harvesting work.

  1. No Austrians in South Tyrol? Why the German-speaking community in Italy’s South Tyrol (Alto Adige province is not usually called an Austrian minority

    Directory of Open Access Journals (Sweden)

    Michael Julian Emanuel Volkmer

    2016-08-01

    Full Text Available No Austrians in South Tyrol? Why the German-speaking community in Italy’s South Tyrol (Alto Adige province is not usually called an Austrian minority The article discusses the question why the German-speakers in Northern Italy’s South Tyrol province are only very rarely referred to as an Austrian minority, in spite of the fact that they were split off from Austria, and not Germany, in the aftermath of World War I. An analysis of the naming of German-speaking South Tyroleans in German, Austrian, Italian and English-speaking news media, which demonstrates a preference for terms such as “German-speaking minority” or “German minority” over “Austrian minority and equivalents, is followed by a discussion of three hypotheses to account for the situation. The author shows how the question of how to name the German-speaking South Tyroleans is closely intertwined with the issue of Austrian national identity and its re-orientation away from Germany in the aftermath of the Second World War. The author comes to the conclusion that the minority is not usually referred to as Austrian both due to the fact that it is difficult to include them in the young (civic Austrian nation in a logically consistent manner, and due to the German-speaking South Tyroleans’ own inconsistent self-identification as Austrians.   Nie ma Austriaków w Tyrolu Południowym? Dlaczego niemieckojęzyczna wspólnota we włoskiej prowincji Tyrol Południowy (Alto Adige zwykle nie jest nazywana mniejszością austriacką Artykuł podejmuje kwestię, dlaczego niemieckojęzyczna ludność północnowłoskiej prowincji Tyrol Południowy rzadko bywa nazywana mniejszością austriacką, pomimo tego że w efekcie I wojny światowej odłączona została ona od Austrii, a nie od Niemiec. Analiza nazewnictwa odnoszonego do niemieckojęzycznej ludności Tyrolu Południowego, które występuje w informacyjnych środkach przekazu: niemiecko-, austriacko-, włosko- i angloj

  2. Infusing Authentic Inquiry into Biotechnology

    Science.gov (United States)

    Hanegan, Nikki L.; Bigler, Amber

    2009-10-01

    Societal benefit depends on the general public's understandings of biotechnology (Betsch in World J Microbiol Biotechnol 12:439-443, 1996; Dawson and Cowan in Int J Sci Educ 25(1):57-69, 2003; Schiller in Business Review: Federal Reserve Bank of Philadelphia (Fourth Quarter), 2002; Smith and Emmeluth in Am Biol Teach 64(2):93-99, 2002). A National Science Foundation funded survey of high school biology teachers reported that hands-on biotechnology education exists in advanced high school biology in the United States, but is non-existent in mainstream biology coursework (Micklos et al. in Biotechnology labs in American high schools, 1998). The majority of pre-service teacher content preparation courses do not teach students appropriate content knowledge through the process of inquiry. A broad continuum exists when discussing inquiry-oriented student investigations (Hanegan et al. in School Sci Math J 109(2):110-134, 2009). Depending on the amount of structure in teacher lessons, inquiries can often be categorized as guided or open. The lesson can be further categorized as simple or authentic (Chinn and Malhotra in Sci Educ 86(2):175-218, 2002). Although authentic inquiries provide the best opportunities for cognitive development and scientific reasoning, guided and simple inquiries are more often employed in the classroom (Crawford in J Res Sci Teach 37(9):916-937, 2000; NRC in Inquiry and the national science education standards: a guide for teaching and learning, 2000). For the purposes of this study we defined inquiry as "authentic" if original research problems were resolved (Hanegan et al. in School Sci Math J 109(2):110-134, 2009; Chinn and Malhotra in Sci Educ 86(2):175-218, 2002; Roth in Authentic school science: knowing and learning in open-inquiry science laboratories, 1995). The research question to guide this study through naturalistic inquiry research methods was: How will participants express whether or not an authentic inquiry experience enhanced

  3. Information fusion for palmprint authentication

    Science.gov (United States)

    Wu, Xiangqian; Wang, Kuanquan; Zhang, David

    2006-04-01

    A palmprint can be represented using different features and the different representations reflect the different characteristic of a palmprint. Fusion of multiple palmprint features may enhance the performance of a palmprint authentication system. This paper investigates the fusion of two types of palmprint information: the phase (called PalmCode) and the orientation (called OrientationCode). The PalmCode is extracted using the 2-D Gabor filters based algorithm and the OrientationCode is computed using several directional templates. Then several fusion strategies are investigated and compared. The experimental results show that the fusion of the PalmCode and OrientationCode using the Product, Sum and Weighted Sum strategies can greatly improve the accuracy of palmprint authentication, which is up to 99.6%.

  4. Lightweight query authentication on streams

    OpenAIRE

    2014-01-01

    We consider a stream outsourcing setting, where a data owner delegates the management of a set of disjoint data streams to an untrusted server. The owner authenticates his streams via signatures. The server processes continuous queries on the union of the streams for clients trusted by the owner. Along with the results, the server sends proofs of result correctness derived from the owner's signatures, which are easily verifiable by the clients. We design novel constructions for a collection o...

  5. Food authentication by molecular methods

    OpenAIRE

    Oliveira, B; Mafra, I; J. COSTA; Amaral, J.S.; FARIA, M.; Fernandes, T.J.R.; Soares, S.

    2011-01-01

    Quality and authenticity evaluation of foods encompasses many issues, such as the entire or partial fraudulent substitution of higher commercial value constituents by others with lower value and the presence of undeclared constituents/ingredients. To protect consumers from misleading labeling, regulations issued across the world have implemented specific guidelines and listed particular foods that sh ould be declared on the label. Particularly in the case of genetically modi...

  6. Oxysterol content in selected meats and meat products

    Directory of Open Access Journals (Sweden)

    Dorota Derewiaka

    2009-09-01

    Full Text Available Background. High consumption of oxysterols contributes to the development of arteriosclerosis. Thus it is necessary to monitor changes of their concentration in foodstuffs. The aim of this study was to determine the content of oxysterols in selected meats and meat products before and after heat treatment. Material and methods. Meats and meat products were pan fried in rapeseed oil for 10 minutes. Oxysterols methodology applied for the study of fat extraction, saponification, derivatization and determination by gas chromatography coupled with mass spectrometer. Results. The content of cholesterol oxidation products in meats and meat products after heat treatment (17.5 to 34.9 µg/g of fat was statistically higher than before frying (2.2 to 10.7 µg/g of fat. Raw meats and processed meat products contained mainly cholesterol oxidation products which equalled from 1.0 to 8.3% of cholesterol content. In fried meats and meat products has been found phytosterol oxidation products (0.1-1.7 µg/g of fat but only in small amounts. Conclusions. The increase in the content of phytosterol oxidation products in analysed meat samples after frying was probably the result of intensive phytosterol oxidation included in the rapeseed oil, also induced by haeme dyes within meat. From the results of the samples analyzed, it seems that multiple parameters are associated with the formation of oxysterols. Further studies should be performed to identify the factors e.g. water content, pro-oxidants, exposure to light, storage time and conditions, that may affect oxysterol formation during home frying.

  7. Authentic subjectivity and social transformation

    Directory of Open Access Journals (Sweden)

    Michael O'Sullivan

    2016-05-01

    Full Text Available Holiness in the Christian tradition has often been understood in a way that devalues embodiment and practical engagement with the world of one’s time. The latter understanding, for example, led to Marx’s critique and repudiation of Christianity. Both interpretations of holiness can be understood as mistaken efforts to express the dynamism for authenticity in contextualised human subjectivity. Vatican 2 opposed both views by addressing itself to all people of good will, declaring that everyone was called to holiness, and that authentic Christian identity involved solidarity with the world of one’s time, especially those who are poor. Vatican 2, therefore, provided an authoritative faith foundation for holiness expressed through social commitment and for viewing social commitment on the part of people of good will in whatever state of life as a form of holiness. This vision was also the conviction of leading spirituality writers of the period, like Thomas Merton, and inspired liberation theologians and the Latin American Catholic bishops at their conference in Medellín a few years after the Council. The argument of this article is that the emergence and development of a non-dualist Christian spirituality is grounded methodologically in the correct appropriation of the common innate dynamism for authenticity in concrete human persons and lived spiritual experiences consistent with and capable of enhancing this dynamism.

  8. Authenticity assessment of dairy products.

    Science.gov (United States)

    de la Fuente, Miguel Angel; Juárez, Manuela

    2005-01-01

    The authenticity of dairy products has become a focal point, attracting the attention of scientists, producers, consumers, and policymakers. Among many others, some of the practices not allowed in milk and milk products are the substitution of part of the fat or proteins, admixtures of milk of different species, additions of low-cost dairy products (mainly whey derivatives), or mislabeling of products protected by denomination of origin. A range of analytical methods to detect frauds have been developed, modified, and continually reassessed to be one step ahead of manufacturers who pursue these illegal activities. Traditional procedures to assess the authenticity of dairy products include chromatographic, electrophoretic, and immunoenzymatic methods. New approaches such as capillary electrophoresis, polymerase chain reaction, and isotope ratio mass spectrometry have also emerged alongside the latest developments in the former procedures. This work intends to provide an updated and extensive overview since 1991 on the principal applications of all these techniques together with their advantages and disadvantages for detecting the authenticity of dairy products. The scope and limits of different tools are also discussed.

  9. THE IMPORTANCE OF BACTERIOCINS IN MEAT AND MEAT PRODUCTS

    Directory of Open Access Journals (Sweden)

    Meltem SERDAROĞLU

    2000-03-01

    Full Text Available There is an increasing consumer demand for food products which are free of chemical additives, reduced in salt and processed as little as possible. These minimally processed foods require special application to assure their microbiological safety. The use of microorganisms and enzymes for food preservatives is called biopreservation. The most important group of microorganisms with antimicrobial effect used in the production of foods is the lactic acid bacteria. In meats although lactic acid bacteria constitue apart of the initial microflora, they become dominant during the processing of meats. In this research bacteriocins of lactic acid bacteria and their usage in meat and meat products for biopreservation are discussed.

  10. A Lightning Detector Onboard Austrian Nanosatellite (LiNSAT)

    Science.gov (United States)

    Jaffer, G.; Koudelka, O.; Schwingenschuh, K.; Eichelberger, H.

    2010-12-01

    This paper presents architecture of a lightning detector onboard future Austrian Lightning Nanosatellite (LiNSAT) in low-earth-orbit (LEO) and results of two terrestrial measurement campaigns to geo-locate and discriminate lightning types in presence of noise sources. The LiNSAT is proposed to be launched with three satellites constellation for the purpose of Time-of-Arrival technique. Our main scientific objective is to investigate lightning events by the observation of VHF electromagnetic signals (Sferics) and to derive the signatures of lightning. One of the important parameters is lightning flash rate, which can be used as a proxy for locating severe weather activity. Another objective is to discriminate the discharges of lightning events evaluated by the inherent features and to differentiate cloud discharges (IC; intercloud and Intracloud) from ground discharges (CG; cloud-to-ground), return strokes, leaders and transionospheric pulse pairs. The discrimination is important because the ratio of the two (IC/CG) is a good indicator of convective storm development. We conducted two measurement campaigns; one for artificial lightning produced in high voltage chamber and second natural lightning recorded at urban environment. We focus mainly on envelopes of the received time series including noisy features and narrowband carriers to extract characteristic parameters. We determined the chamber inter-walls distance by considering reflections in the first measurements. Initially the algorithm for the instruments onboard electronics has been developed and verified in Matlab and will be transformed to machine language. Next consideration is to use existing lightning data from previous French mission “DEMETER” to validate the accomplished results. The lightning detector onboard has to perform tasks like determination of pulse-width, pulse-count, pulse rise/fall time etc; we get noise possibly from narrowband carriers and artifacts from satellite itself (EMC) in

  11. Ultra-fast DNA-based multiplex convection PCR method for meat species identification with possible on-site applications.

    Science.gov (United States)

    Song, Kyung-Young; Hwang, Hyun Jin; Kim, Jeong Hee

    2017-08-15

    The aim of this study was to develop an ultra-fast molecular detection method for meat identification using convection Palm polymerase chain reaction (PCR). The mitochondrial cytochrome b (Cyt b) gene was used as a target gene. Amplicon size was designed to be different for beef, lamb, and pork. When these primer sets were used, each species-specific set specifically detected the target meat species in singleplex and multiplex modes in a 24min PCR run. The detection limit was 1pg of DNA for each meat species. The convection PCR method could detect as low as 1% of meat adulteration. The stability of the assay was confirmed using thermal processed meats. We also showed that direct PCR can be successfully performed with mixed meats and food samples. These results suggest that the developed assay may be useful in the authentication of meats and meat products in laboratory and rapid on-site applications. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Identification of new food alternatives: how do consumers categorize meat and meat substitutes?

    NARCIS (Netherlands)

    Hoek, A.C.; Boekel, van M.A.J.S.; Voordouw, J.; Luning, P.A.

    2011-01-01

    New meat substitutes need to be recognized as alternatives to meat. We therefore investigated which category representations consumers have of meat and meat substitutes. Thirty-four non-vegetarian participants performed a free sorting task with 17 meat products and 19 commercially available meat

  13. 9 CFR 317.308 - Labeling of meat or meat food products with number of servings.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Labeling of meat or meat food products... Nutrition Labeling § 317.308 Labeling of meat or meat food products with number of servings. The label of any package of a meat or meat food product that bears a representation as to the number of servings...

  14. 19 CFR 4.72 - Inspection of meat, meat-food products, and inedible fats.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Inspection of meat, meat-food products, and... Inspection of meat, meat-food products, and inedible fats. (a) No clearance shall be granted to any vessel carrying meat or meat-food products, as defined and classified by the U.S. Department of Agriculture, Food...

  15. Identification of new food alternatives: how do consumers categorize meat and meat substitutes?

    NARCIS (Netherlands)

    Hoek, A.C.; Boekel, van M.A.J.S.; Voordouw, J.; Luning, P.A.

    2011-01-01

    New meat substitutes need to be recognized as alternatives to meat. We therefore investigated which category representations consumers have of meat and meat substitutes. Thirty-four non-vegetarian participants performed a free sorting task with 17 meat products and 19 commercially available meat sub

  16. An Examination of Career Indecision and Application to Dispositional Authenticity

    Science.gov (United States)

    White, Nathan J.; Tracey, Terence J. G.

    2011-01-01

    Authenticity has been viewed as a dimension related to life satisfaction, but we propose that authenticity is related to career outcomes. In this study, we examined the relation between authenticity and career indecision. Authenticity was assessed by the Authenticity Scale and it was found to be moderately related to different indices of career…

  17. Staging constructions of authenticity in organizational change

    DEFF Research Database (Denmark)

    Dupret, Katia

    2015-01-01

    Authenticity in organizations has gained increased focus in recent years. Authentic management and leadership are ways to motivate and make sustainable changes in the organization. But authenticity is also strategically worked with in order to serve social and political functions...... that are emotionally charged. Through a socio-material perspective this paper seeks to explore how change processes in organizations challenges the idea of authentic leadership as a merely individual ability or personality trait and suggest that the authentic leader is distributed into the practices of change....... The paper explores how staged organizational change where authentic role-play and scripts from everyday life combined with meta-reflection and feedback construct new forms of reflection where its ethical side-effects should be discussed....

  18. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  19. Autonomy and authenticity of enhanced personality traits.

    Science.gov (United States)

    Bublitz, Jan Christoph; Merkel, Reinhard

    2009-07-01

    There is concern that the use of neuroenhancements to alter character traits undermines consumer's authenticity. But the meaning, scope and value of authenticity remain vague. However, the majority of contemporary autonomy accounts ground individual autonomy on a notion of authenticity. So if neuroenhancements diminish an agent's authenticity, they may undermine his autonomy. This paper clarifies the relation between autonomy, authenticity and possible threats by neuroenhancements. We present six neuroenhancement scenarios and analyse how autonomy accounts evaluate them. Some cases are considered differently by criminal courts; we demonstrate where academic autonomy theories and legal reasoning diverge and ascertain whether courts should reconsider their concept of autonomy. We argue that authenticity is not an appropriate condition for autonomy and that new enhancement technologies pose no unique threats to personal autonomy.

  20. Quantum Communication Complexity of Quantum Authentication Protocols

    CERN Document Server

    Guedes, Elloá B

    2011-01-01

    In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the channel is subject to eavesdropping. However, even in face of the various existing definitions of quantum authentication protocols in the literature, little is known about them in this perspective, and this lack of knowledge may unfavor comparisons and wise choices. In the attempt to overcome this limitation, in the present work we aim at showing an approach to evaluate quantum authentication protocols based on the determination of their quantum communication complexity. Based on our investigation, no similar methods to analyze quantum authentication protocols were found in the literature. Pursuing this further, our approa...

  1. International red meat trade.

    Science.gov (United States)

    Brester, Gary W; Marsh, John M; Plain, Ronald L

    2003-07-01

    The maturation of the US beef and pork markets and increasing consumer demands for convenience, safety, and nutrition suggests that the beef and pork industries must focus on product development and promotion. New marketing arrangements are developing that help coordinate production with consumer demands. The relative high levels of incomes in the United States are likely to increase the demands for branded products rather than increase total per capita consumption. Foreign markets represent the greatest opportunity for increased demand for commodity beef and pork products. Increasing incomes in developing countries will likely allow consumers to increase consumption of animal-source proteins. Real prices of beef and pork have declined substantially because of sagging domestic demand and increasing farm-level production technologies. Increasing US beef and pork exports have obviated some of the price declines. Pork attained a net export position from a quantity perspective in 1995. The United States continues to be a net importer of beef on a quantity basis but is close to becoming a net exporter in terms of value. By-products continue to play a critical role in determining the red meat trade balance and producer prices. The United States, however, must continue to become cost, price, and quality competitive with other suppliers and must secure additional market access if it is to sustain recent trade trends. Several trade tensions remain in the red meat industry. For example, mandated COOL will undoubtedly have domestic and international effects on the beef and pork sectors. Domestically, uncertainty regarding consumer demand responses or quality perceptions regarding product origin, as well as added processor-retailer costs will be nontrivial. How these factors balance out in terms of benefits versus costs to the industry is uncertain. From an international perspective, some beef and pork export suppliers to the United States could view required labeling as a

  2. Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity.

    NARCIS (Netherlands)

    Gulikers, Judith; Bastiaens, Theo; Kirschner, Paul A.; Kester, Liesbeth

    2008-01-01

    Gulikers, J. T. M., Bastiaens, Th. J., Kirschner, P. A., & Kester, L. (2008). Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity. Journal of Vocational Education and Training, 60(4)

  3. SPECIES IDENTIFICATION OF MEAT BY ELECTROPHORETIC METHODS

    Directory of Open Access Journals (Sweden)

    Edward Pospiech

    2007-03-01

    Full Text Available Electrophoretic methods can be used to identify meat of various animal species. The protein electrophoresis, especially the IEF of the sarcoplasmic proteins, is a well-established technique for species identification of raw fish and is used in the control of seafood authenticity. However, in the case of the analysis of heat-processed fish, the method is applicable only to those species which possess characteristic patterns of the heat-stable parvalbumins. Heat-denatured fish muscle proteins may be solubilised by urea or sodium dodecylsulfate (SDS and separated by urea-IEF or SDS-PAGE, respectively. The comparison of these two methods allowed to conclude that, basically, each of them can be used for species identification of heated fishery products. However, extensively washed products may be preferentially analysed by the SDS-PAGE, because most of the parvalbumins are washed out leaving mainly myosins. On the other hand, the IEF method may be preferred for the differentiation of closely related species rich in parvalbumins isoforms. It is evident from the literature data that species-specific protein separations yield proteins of low molecular weight made up of three light chains of myosin (14-23 kDa, troponin (19-30 kDa and parvalbumin (about 12 kDa. Investigations showed that the SDS-PAGE method can be used to identify meats of: cattle, sheep, lambs, goats, red deer and rabbits. The technique allowed researchers to identify the following myofibrillar and sarcoplasmic muscle proteins: myosin and actin, α-actinin, tropomyosin, troponin. SDS-PAGE allowed the identification of myofibrillar proteins taking into account their molecular weights which was not possible with the assistance of the PAGIF because too many protein bands were obtained. It was possible to obtain differences in the separation of proteins characteristic for certain species, e.g. beef, resulting from the presence of sin-gle myofibrillar proteins.

  4. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  5. Quantum Secure Direct Communication Based on Authentication

    Institute of Scientific and Technical Information of China (English)

    WANG Min-Jie; PAN Wei

    2008-01-01

    We propose two schemes of quantum secure direct communication (QSDC) combined ideas of user authentication [Phys. Rev. A 73 (2006) 042305] and direct communication with dense coding [Phys. Rev. A. 68 (2003) 042317]. In these protocols, the privacy of authentication keys and the properties of the EPR pairs not only ensure the realization of identity authentication but also further improve the security of communication, and no secret messages are leaked even if the messages were broken.

  6. Authentication Methods in Cloud Computing: A Survey

    Directory of Open Access Journals (Sweden)

    Mahnoush Babaeizadeh

    2015-03-01

    Full Text Available This study presents a review on the various methods of authentication in cloud environment. Authentication plays an important role in security of Cloud Computing (CC. It protects Cloud Service Providers (CSP against various types of attacks, where the aim is to verify a user’s identity when a user wishes to request services from cloud servers. There are multiple authentication technologies that verify the identity of a user before granting access to resources.

  7. Environmental costs of meat production

    DEFF Research Database (Denmark)

    Nguyen, T Lan T; Hermansen, John Erik; Mogensen, Lisbeth

    2012-01-01

    This paper aims to address two questions: First, what is the real cost of meat to society if taking into account the environmental costs arising throughout the product life cycle; and second, whether and how the environmental costs related to meat production can be reduced. In addressing the issues......, we use pig meat production in the EU as a case study. The environmental costs of meat are displayed first as characterized results at different midpoint categories e.g. global warming, nature occupation, acidification, eutrophication, ecotoxicity, etc., and then aggregated into a single score using...

  8. Red meat and colorectal cancer

    Directory of Open Access Journals (Sweden)

    Nuri Faruk Aykan

    2015-12-01

    Full Text Available Colorectal cancer (CRC is the third most common cancer in men and the second in women worldwide. More than half of cases occur in more developed countries. The consumption of red meat (beef, pork, lamb, veal, mutton is high in developed countries and accumulated evidence until today demonstrated a convincing association between the intake of red meat and especially processed meat and CRC risk. In this review, meta-analyses of prospective epidemiological studies addressed to this association, observed link of some subtypes of red meat with CRC risk, potential carcinogenic compounds, their mechanisms and actual recommendations of international guidelines are presented.

  9. User Authentication based on Continuous Touch Biometrics

    Directory of Open Access Journals (Sweden)

    Christina J Kroeze

    2016-12-01

    Full Text Available Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, leaving the device vulnerable if stolen. This paper investigates the possibility of unobtrusive, continuous authentication for smartphones based on biometric data collected using a touchscreen. The possibility of authenticating users on a smartphone was evaluated by conducting an experiment simulating real-world touch interaction. Touch data was collected from 30 participants during normal phone use. The touch features were analysed in terms of the information provided for authentication. It was found that features such as finger pressure, location of touch interaction and shape of the finger were important discriminators for authentication. The touch data was also analysed using two classification algorithms to measure the authentication accuracy. The results show that touch data is sufficiently distinct between users to be used in authentication without disrupting normal touch interaction. It is also shown that the raw touch data was more effective in authentication than the aggregated gesture data.

  10. ARE AUTHENTIC LEADERS SATISFIED WITH THEIR JOB?

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2016-06-01

    Full Text Available A crisis in management has led to the appearance of Authentic leadership. The aim of this work is to determine the characteristics of Authentic leadership in educational institutions and to respond to the question as to whether authentic leaders are satisfied with their job. The third aim is to determine differences among the researched regions. The sample included 227 randomly selected directors from primary and secondary schools in Serbia, Montenegro and the Republika Srpska. The research used an ALQ questionnaire for the estimation of leadership behaviour. Descriptions for the results prediction and multiple linear regressions were used. A multivariance analysis of variance was used to compare the groups. The research results showed that every fourth director is an authentic leader. Authentic leadership has a significant influence on job satisfaction through two aspects: internalised perspective and balanced processing. There are no differences in Authentic leadership in the researched areas. The results could be useful for educational institutions in countries where the research was conducted. Further research could be carried out in other countries while cultural differences should be taken into account. One limiting factor consists of the fact that the analysed data are obtained only from school directors. Leaders of educational institutions should provide management through the development of their own authenticity and the authenticity of their followers. The characteristics of Authentic leadership were reviewed and tested practically in the West-Balkan environment.

  11. A compression tolerant scheme for image authentication

    Institute of Scientific and Technical Information of China (English)

    刘宝锋; 张文军; 余松煜

    2004-01-01

    Image authentication techniques used to protect the recipients against malicious forgery. In this paper, we propose a new image authentication technique based on digital signature. The authentication is verified by comparing the features of the each block in tested image with the corresponding features of the block recorded in the digital signature. The proposed authentication scheme is capable of distinguishing visible but non-malicious changes due to common processing operations from malicious changes. At last our experimental results show that the proposed scheme is not only efficient to protect integrity of image, but also with low computation,which are feasible for practical applications.

  12. Authentic leadership: develop the leader within.

    Science.gov (United States)

    Yasinski, Lesia

    2014-03-01

    Great leadership usually starts with a willing heart, a positive attitude, and a desire to make a difference. Strong leadership is important, in today's health care climate, to ensure optimal patient outcomes and the fostering of future generations of knowledgeable, motivated and enthusiastic perioperative nurses. This article will explore key elements necessary for the development of authentic leadership. While highlighting the role that personal development plays in leadership skills, this article will also discuss ways to cultivate authenticity in leadership. The following questions will be addressed: What is authentic leadership? How does one become an authentic leader?

  13. Multifactor Authentication: Its Time Has Come

    Directory of Open Access Journals (Sweden)

    Jim Reno

    2013-08-01

    Full Text Available Transactions of any value must be authenticated to help prevent online crime. Even seemingly innocent interactions, such as social media postings, can have serious consequences if used fraudulently. A key problem in modern online interactions is establishing the identity of the user without alienating the user. Historically, almost all online authentications have been implemented using simple passwords, but increasingly these methods are under attack. Multifactor authentication requires the presentation of two or more of the three authentication factor types: “What you know”, “What you have”, and “What you are”. After presentation, each factor must be validated by the other party for authentication to occur. Multifactor authentication is a potential solution to the authentication problem, and it is beginning to be implemented at websites operated by well-known companies. This article surveys the different mechanisms used to implement multifactor authentication. How a site chooses to implement multifactor authentication affects security as well as the overall user experience.

  14. Networking for Education for Sustainable Development in Austria: The Austrian ECOLOG-Schools Programme

    Science.gov (United States)

    Rauch, Franz

    2016-01-01

    This case describes networking for education for sustainable development within the Austrian ECOLOG-schools network. The article presents theoretical concepts of networks in education in general, and the organization of the ECOLOG-network in particular. Based upon these foundations, the concept and results of a participatory evaluation study are…

  15. Quality of Austrian and Dutch Falls-Prevention Information: A Comparative Descriptive Study

    Science.gov (United States)

    Schoberer, Daniela; Mijnarends, Donja M.; Fliedner, Monica; Halfens, Ruud J. G.; Lohrmann, Christa

    2016-01-01

    Objectives: The aim of this study was to evaluate and compare the quality of written patient information material available in Austrian and Dutch hospitals and nursing homes pertaining to falls prevention. Design: Comparative descriptive study design Setting: Hospitals and nursing homes in Austria and the Netherlands. Method: Written patient…

  16. PCDD/F and PCB levels in Austrian cow's milk

    Energy Technology Data Exchange (ETDEWEB)

    Thanner, G.; Moche, W. [Umweltbundesamt Wien (Austria)

    2004-09-15

    In 2003 the Federal Environment Agency carried out a first Austrian wide milk monitoring study with the objective to get an overview of average PCDD/F levels in cow's milk, additionally dioxinlike PCBs, according to WHO, and indicator PCBs, as listed by national regulations, were analysed.

  17. Minority Schools in the South Tyrol and in the Austrian Burgenland: A Comparison of Two Models.

    Science.gov (United States)

    Rowley, A. R.

    1986-01-01

    Presents findings from an empirical study comparing the status of the German minority in the Italian South Tyrol and the Croatian minority in the Austrian Burgenland. The article analyzes observations of actual language use in schools and compares school authorities, curricula, and employment opportunities of the two minorities. (SED)

  18. Monitoring Language Skills in Austrian Primary (Elementary) Schools: A Case Study.

    Science.gov (United States)

    Zangl, Renate

    2000-01-01

    Provides an overview of how language skills in young learners have been assessed in two primary school contexts, carried out in a total of seven Austrian primary schools. The schools took part in an initiative where the integration of a foreign language was introduced when children entered primary school at the age of six. (Author/VWL)

  19. F.A. FON HAYEK''S AUSTRIAN THEORY OF COMPETITION

    OpenAIRE

    Nesterenko, O.

    2008-01-01

    F.A. fon Hayek's approach to competition's understanding has been clarified, critical analysis directions of neo-classical model of perfect competition have been analyzed. Specific points of Austrian competitive theory have been determined and scientist ideas evolution to competitive process has been worked out.

  20. Coming together but staying apart: continuity and change in the Austrian and Swiss varieties of capitalism

    NARCIS (Netherlands)

    Afonso, A.; Mach, A.; Becker, U.

    2011-01-01

    This paper provides an overview of continuity and change in the Swiss and Austrian political economies over the last 20 years. After outlining the different institutional foundations of economic governance in both countries (fragmented state, constrained executive power and bourgeois dominance in Sw

  1. Networking for Education for Sustainable Development in Austria: The Austrian ECOLOG-Schools Programme

    Science.gov (United States)

    Rauch, Franz

    2016-01-01

    This case describes networking for education for sustainable development within the Austrian ECOLOG-schools network. The article presents theoretical concepts of networks in education in general, and the organization of the ECOLOG-network in particular. Based upon these foundations, the concept and results of a participatory evaluation study are…

  2. Meat Quality Assessment by Electronic Nose (Machine Olfaction Technology

    Directory of Open Access Journals (Sweden)

    Sundar Balasubramanian

    2009-07-01

    Full Text Available Over the last twenty years, newly developed chemical sensor systems (so called “electronic noses” have made odor analyses possible. These systems involve various types of electronic chemical gas sensors with partial specificity, as well as suitable statistical methods enabling the recognition of complex odors. As commercial instruments have become available, a substantial increase in research into the application of electronic noses in the evaluation of volatile compounds in food, cosmetic and other items of everyday life is observed. At present, the commercial gas sensor technologies comprise metal oxide semiconductors, metal oxide semiconductor field effect transistors, organic conducting polymers, and piezoelectric crystal sensors. Further sensors based on fibreoptic, electrochemical and bi-metal principles are still in the developmental stage. Statistical analysis techniques range from simple graphical evaluation to multivariate analysis such as artificial neural network and radial basis function. The introduction of electronic noses into the area of food is envisaged for quality control, process monitoring, freshness evaluation, shelf-life investigation and authenticity assessment. Considerable work has already been carried out on meat, grains, coffee, mushrooms, cheese, sugar, fish, beer and other beverages, as well as on the odor quality evaluation of food packaging material. This paper describes the applications of these systems for meat quality assessment, where fast detection methods are essential for appropriate product management. The results suggest the possibility of using this new technology in meat handling.

  3. Bacterial spoilage of meat and cured meat products

    NARCIS (Netherlands)

    Borch, E.; Kant-Muermans, M.L.T.; Blixt, Y.

    1996-01-01

    The influence of environmental factors (product composition and storage conditions) on the selection, growth rate and metabolic activity of the bacterial flora is presented for meat (pork and beef) and cooked, cured meat products. The predominant bacteria associated with spoilage of refrigerated

  4. Bacterial spoilage of meat and cured meat products

    NARCIS (Netherlands)

    Borch, E.; Kant-Muermans, M.L.T.; Blixt, Y.

    1996-01-01

    The influence of environmental factors (product composition and storage conditions) on the selection, growth rate and metabolic activity of the bacterial flora is presented for meat (pork and beef) and cooked, cured meat products. The predominant bacteria associated with spoilage of refrigerated bee

  5. Case studies in food safety and authenticity: Lessons from real-life situations

    DEFF Research Database (Denmark)

    . The contents are divided into six parts, covering outbreak investigations, source tracing, crisis management, farm-level interventions, safe food production and food adulteration and authenticity. Each chapter is organized as an independent story/case study that has evolved over a certain period of time...... the learning process. Some are supported by illustrations, graphs, photos or maps. The case studies examine among other food products: bakery products, fresh produce, sprouted seeds, drinking water, chicken products, cattle, milk and raw milk, fresh herbs, meat, street foods, dairy foods, animal feed, rice...

  6. Intakes of red meat, processed meat, and meat mutagens increase lung cancer risk.

    Science.gov (United States)

    Lam, Tram Kim; Cross, Amanda J; Consonni, Dario; Randi, Giorgia; Bagnardi, Vincenzo; Bertazzi, Pier Alberto; Caporaso, Neil E; Sinha, Rashmi; Subar, Amy F; Landi, Maria Teresa

    2009-02-01

    Red and processed meat intake may increase lung cancer risk. However, the epidemiologic evidence is inconsistent and few studies have evaluated the role of meat mutagens formed during high cooking temperatures. We investigated the association of red meat, processed meat, and meat mutagen intake with lung cancer risk in Environment And Genetics in Lung cancer Etiology, a population-based case-control study. Primary lung cancer cases (n = 2,101) were recruited from 13 hospitals within the Lombardy region of Italy examining approximately 80% of the cases from the area. Noncancer population controls (n = 2,120), matched to cases on gender, residence, and age, were randomly selected from the same catchment area. Diet was assessed in 1,903 cases and 2,073 controls and used in conjunction with a meat mutagen database to estimate intake of heterocyclic amines (HCA) and benzo(a)pyrene (BaP). Multivariable odds ratios (OR) and 95% confidence intervals (95% CI) for sex-specific tertiles of intake were calculated using unconditional logistic regression. Red and processed meat were positively associated with lung cancer risk (highest-versus-lowest tertile: OR, 1.8; 95% CI, 1.5-2.2; P trend processed meat, and meat mutagens were independently associated with increased risk of lung cancer.

  7. Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol

    NARCIS (Netherlands)

    Pavlovic, Dusko; Meadows, Catherine; Mislove, M.; Selinger, P.

    2010-01-01

    As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g., location authentication. Many interesting protocols have been proposed and implemented to provide such strengthened forms of authe

  8. Authentic Learning and Alien Worlds

    Science.gov (United States)

    Watt, Sara D.; Watt, Keith; Gleim, Brian

    2015-01-01

    Glendale Community College has developed a laboratory course and observing program which provides non-science majors with opportunities to perform authentic science in a community college setting. The program is designed around experiential learning which allows students to meaningfully construct concepts within contexts that involve real-world problems that are relevant to the learner. Students learn observational astronomy and data analysis techniques by observing exoplanet transits using 8-inch Celestron telescopes. The exoplanet data gathered and analyzed by the students is contributed to the exoplanet database. This poster presents an overview of the program and highlights early educational results.

  9. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Bork Petersen, Franziska

    2013-01-01

    In this thesis I investigate what ‘authenticity’ means in a contemporary popular context and how it is used in the staging of bodies. Furthermore, I analyse works of dance and fashion from the past fifteen years with a focus on their strategies of challenging the notion of ‘bodily authenticity...... and by a depiction of 'working hard'. But various techniques also mask the hard work, for example by showing a participant ‘having fun’ performing it. Contemporary works of dance and fashion challenge the problematic implications in the notion of ‘bodily authenticity’. I analyse three strategies of undermining...

  10. Iron, Meat and Health

    Directory of Open Access Journals (Sweden)

    Catherine Geissler

    2011-02-01

    Full Text Available This article is a summary of the publication “Iron and Health” by the Scientific Advisory Committee on Nutrition (SACN to the U.K. Government (2010, which reviews the dietary intake of iron and the impact of different dietary patterns on the nutritional and health status of the U.K. population. It concludes that several uncertainties make it difficult to determine dose-response relationships or to confidently characterize the risks associated with iron deficiency or excess. The publication makes several recommendations concerning iron intakes from food, including meat, and from supplements, as well as recommendations for further research.

  11. Consumption of red meat, white meat and processed meat in Irish adults in relation to dietary quality.

    Science.gov (United States)

    Cosgrove, Meadhbh; Flynn, Albert; Kiely, Máiréad

    2005-06-01

    The aim of the present study was to examine the association of red meat, white meat and processed meat consumption in Irish adults with dietary quality. A cross-sectional study of subjects, randomly selected using the electoral register, estimated habitual food intakes using a 7 d food diary in a nationally representative sample of 662 men and 717 women (not pregnant or lactating) aged 18-64 years. Consumers were classified into thirds, based on the distribution of mean daily intakes for red meat, white meat and processed meat. The mean intakes of red meat, white meat and processed meat were 51, 33 and 26 g/d respectively, and men consumed significantly more (Pprocessed meat intake was associated with a lower (Pprocessed meat consumption was associated with lower (Pprocessed meat intakes. It is important to distinguish between meat groups, as there was a large variation between the dietary quality in consumers of red meat, white meat and processed meat. Processed meat consumption is negatively associated with dietary quality and might therefore be a dietary indicator of poor dietary quality. This has important implications in nutritional epidemiological studies and for the development of food-based dietary guidelines.

  12. Authentication Model Based Bluetooth-enabled Mobile Phone

    OpenAIRE

    Rania Abdelhameed; Sabira Khatun; Borhanuddin M. Ali; Abdul R. Ramli

    2005-01-01

    Authentication is a mechanism to establish proof of identities, the authentication process ensure that who a particular user is. Current PC, laptop user authentication systems are always done once and hold until it explicitly revoked by the user, or asking the user to frequently reestablish his identity which encouraging him to disable authentication. Zero-Interaction Authentication (ZIA) provides solution to this problem. In ZIA, a user wears a small authentication token ...

  13. Bluetooth-based authentication system for ambient intelligence

    Institute of Scientific and Technical Information of China (English)

    Jian HE; Hui LI; Yong ZHANG; Zhang-qin HUANG

    2008-01-01

    According to the requirement of natural human-computer interaction for Ambient Intelligence (AmI), a Bluetooth-based authentication technique is provided. An authentication network combining advantages of Bluetooth ad hoc network with the Ethernet is introduced first in detail. Then we propose a Bluetooth badge for storing the user's identification information. Finally, the authentication system based on Bluetooth badge and authentication network is introduced. It is demonstrated experimentally that the Bluetooth-based authentication technique can authenticate the user automatically.

  14. Cultured Meat in Islamic Perspective.

    Science.gov (United States)

    Hamdan, Mohammad Naqib; Post, Mark J; Ramli, Mohd Anuar; Mustafa, Amin Rukaini

    2017-04-29

    Cultured meat is a promising product that is derived through biotechnology that partially circumvents animal physiology, thereby being potentially more sustainable, environmentally friendly and animal friendly than traditional livestock meat. Such a novel technology that can impact many consumers evokes ethical, philosophical and religious discussions. For the Islamic community, the crucial question is whether cultured meat is halal, meaning compliant with Islamic laws. Since the culturing of meat is a new discovery, invention and innovation by scientists that has never been discussed by classical jurists (fuqaha'), an ijtihad by contemporary jurists must look for and provide answers for every technology introduced, whether it comply the requirements of Islamic law or not. So, this article will discuss an Islamic perspective on cultured meat based on the original scripture in the Qur'an and interpretations by authoritative Islamic jurists. The halal status of cultured meat can be resolve through identifying the source cell and culture medium used in culturing the meat. The halal cultured meat can be obtained if the stem cell is extracted from a (Halal) slaughtered animal, and no blood or serum is used in the process. The impact of this innovation will give positive results in the environmental and sustain the livestock industry.

  15. Probiotic Meat Products and Nutrition

    Directory of Open Access Journals (Sweden)

    Sena Özbay Doğu

    2015-01-01

    Full Text Available Meat and meat products are the basic building blocks of nutrition and are recognized as good sources of high biological value proteins, group B vitamins, minerals as well as some other bioactive compounds. The trend today is the development of novel food for special health use, called functional food, to promote human health and well-being of consumers. The trends are based on either reducing the content of unhealthy substances (like salt or improving the content of substances with healthy benefits (like probiotics. Thus, it may also change the perspective of consumers towards meat products which associated with coronary artery disease. Meat is an ideal structure for probiotic microorganisms. Probiotic meat products are obtained by addition of probiotic to fermented meat products. These probiotic meat products are offered both healthy and improved taste and flavor, but also as safe food to consumer. Thus, when these probiotic meat products ensure flavor and nutritional to consumers, additionally they have a positive impact on their health.

  16. Detection of Salmonella in Meat

    DEFF Research Database (Denmark)

    Löfström, Charlotta; Hansen, Flemming; Mansdal, Susanne

    2012-01-01

    Cost-effective and rapid monitoring of Salmonella in the meat production chain can contribute to food safety. The objective of this study was to validate an easy-to-use pre-PCR sample preparation method based on a simple boiling protocol for screening of Salmonella in meat and carcass swab samples...

  17. Food safety and organic meats.

    Science.gov (United States)

    Van Loo, Ellen J; Alali, Walid; Ricke, Steven C

    2012-01-01

    The organic meat industry in the United States has grown substantially in the past decade in response to consumer demand for nonconventionally produced products. Consumers are often not aware that the United States Department of Agriculture (USDA) organic standards are based only on the methods used for production and processing of the product and not on the product's safety. Food safety hazards associated with organic meats remain unclear because of the limited research conducted to determine the safety of organic meat from farm-to-fork. The objective of this review is to provide an overview of the published results on the microbiological safety of organic meats. In addition, antimicrobial resistance of microbes in organic food animal production is addressed. Determining the food safety risks associated with organic meat production requires systematic longitudinal studies that quantify the risks of microbial and nonmicrobial hazards from farm-to-fork.

  18. Test-Task Authenticity: The Multiple Perspectives

    Science.gov (United States)

    Gan, Zhengdong

    2012-01-01

    Leung and Lewkowicz remind us that the debate over the past two decades that is most relevant to ELT (English languge teaching) pedagogy and curriculum concerns test-task authenticity. This paper first reviews how the authenticity debate in the literature of second language acquisition, pedagogy and testing has evolved. Drawing on a body of…

  19. Authentic Interdisciplinary Instruction: Raising the Bar

    Science.gov (United States)

    Mohnsen, Bonnie

    2011-01-01

    This article addressed the need for authentic interdisciplinary instruction. Authentic interdisciplinary instruction is defined as a learning activity that simultaneously improves student performance related to grade-level standards in two or more disciplines (e.g., science and physical education). The process described for creating authentic…

  20. Authenticity, Validity and a Tea Party.

    Science.gov (United States)

    Stevenson, Douglas K.

    1985-01-01

    Discusses authenticity in language testing in relation to the language proficiency movement. Looks at both sociolinguistic and psychometric principles as they are concerned with authenticity and validity as well as the inferential distance that separates face validity from techical validities. Criticizes the belief that some test type possess…

  1. Difference packing arrays and systematic authentication codes

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    In this paper, a type of combinatorial design (called difference packing array)is proposed and used to give a construction of systematic authentication codes. Taking advantage of this construction, some new series of systematic authentication codes are obtainable in terms of existing difference packing arrays.

  2. Teacher Authenticity: A Theoretical and Empirical Investigation

    Science.gov (United States)

    Akoury, Paul N.

    2013-01-01

    This study builds on a small, under-acknowledged body of educational works that speak to the problem of an overly technical focus on teaching, which negates a more authentic consideration of what it means to teach, including an exploration of the spiritual and moral dimensions. A need for educational change and the teacher's authentic way of…

  3. Research on Secure Authentication Mechanism of Grid

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Based on the analysis on the security mechanism of grid, this paper discusses the advantages of latest techniques of grid security, and presents a secure authentication scheme of grid based on elliptic curve cryptosystem (ECC). The secure authentication scheme may provide reference value for the further application of grid.

  4. Making it Real: Authenticity, Process and Pedagogy

    Science.gov (United States)

    Badger, Richard; MacDonald, Malcolm

    2010-01-01

    Authenticity has been a part of the intellectual resources of language teaching since the 1890s but its precise meaning and implications are contested. This commentary argues for a view of authenticity which recognizes the limits of the concept as a guide for pedagogic practice and acknowledges the fact that texts are processes rather than…

  5. Efficient Quantum Secure Direct Communication with Authentication

    Institute of Scientific and Technical Information of China (English)

    LIU Wen-Jie; CHEN Han-Wu; LI Zhi-Qiang; LIU Zhi-Hao

    2008-01-01

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73 (2006) 042305] were recently indicated to be insecure against the authenticator Trent attacks [Phys. Rev. A 75 (2007) 026301]. We present two efficient protocols by using four Pauli operations, which are secure against inner Trent attacks as well as outer Eve attacks. Finally, we generalize them to multiparty quantum direction communication.

  6. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...

  7. Authenticated communication from quantum readout of PUFs

    NARCIS (Netherlands)

    Skoric, Boris; Pinkse, Pepijn W.H.; Mosk, Allard P.

    2016-01-01

    Quantum Readout of Physical Unclonable Functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: a verifier can check if received classical data was sent by the PUF holder. We call this modific

  8. Ignoring Authentic African Literature Means Ignoring Africans

    Science.gov (United States)

    Romano, Carlin

    2005-01-01

    Africa produces imaginative and authentic literature whose texture makes it impossible to think of Africans as statistics. African writers, however have to struggle to get recognized in America due to their culture and other racial and social differences, hence suggesting that efforts should be made to give authentic African literature its due.

  9. Authentication of digital video evidence

    Science.gov (United States)

    Beser, Nicholas D.; Duerr, Thomas E.; Staisiunas, Gregory P.

    2003-11-01

    In response to a requirement from the United States Postal Inspection Service, the Technical Support Working Group tasked The Johns Hopkins University Applied Physics Laboratory (JHU/APL) to develop a technique tha will ensure the authenticity, or integrity, of digital video (DV). Verifiable integrity is needed if DV evidence is to withstand a challenge to its admissibility in court on the grounds that it can be easily edited. Specifically, the verification technique must detect additions, deletions, or modifications to DV and satisfy the two-part criteria pertaining to scientific evidence as articulated in Daubert et al. v. Merrell Dow Pharmaceuticals Inc., 43 F3d (9th Circuit, 1995). JHU/APL has developed a prototype digital video authenticator (DVA) that generates digital signatures based on public key cryptography at the frame level of the DV. Signature generation and recording is accomplished at the same time as DV is recorded by the camcorder. Throughput supports the consumer-grade camcorder data rate of 25 Mbps. The DVA software is implemented on a commercial laptop computer, which is connected to a commercial digital camcorder via the IEEE-1394 serial interface. A security token provides agent identification and the interface to the public key infrastructure (PKI) that is needed for management of the public keys central to DV integrity verification.

  10. Why Credit Deflation Is More Likely than Mass Inflation: An Austrian Overview of the Inflation Versus Deflation Debate

    Directory of Open Access Journals (Sweden)

    Vijay Boyapati

    2010-12-01

    Full Text Available This article provides an Austrian overview of the inflation versus deflation debate which has captured the attention of the economics profession in the years following the US housing bust. Much of the Austrian analysis of this debate has focused on the massive expansion of the Federal Reserve’s balance sheet and attendant creation of new reserves. Several Austrian economists have predicted that the creation of new reserves will cause a massive increase in inflation. The money multiplier theory, on which these predictions are based, is criticized and an overview of the Austrian business cycle theory is provided to explain why banks are reluctant to issue new credit. Finally, an analysis of the politics of deflation is provided and a class theory is presented to explain why a policy of controlled credit deflation is more likely than a policy that would result in mass inflation or hyperinflation.

  11. DEVELOPMENT OF TECHNOLOGY OF PRODUCTION OF COLD-SHAPED REINFORCING STEEL ACCORDING TO THE AUSTRIAN STANDARD ONORM В 4200

    Directory of Open Access Journals (Sweden)

    S. N. Kolos

    2008-01-01

    Full Text Available It is shown that the developed technology of melting, pouring, rolling allowed to receive cold-shaped reinforcing steel, corresponding to the requirements of Austrian standard ONORM В 4200. 

  12. Biblical Allusions in Expressionist Poetry in the Context of Austrian, German, and Ukrainian Literature : A Comparative Analysis

    NARCIS (Netherlands)

    Mykhalchuk, T.

    2016-01-01

    With the application of comparative methodology, this article analyzes biblical allusions, reminiscences, paraphrases, direct and indirect quotations, and symbols in the poetry of Austrian, German, and Ukrainian writers (Georg Heym, Mykola Bazhan, Mykola Khvyliovyj Todosii, T. Osmachka, Pavlo Tychyn

  13. 9 CFR 317.300 - Nutrition labeling of meat or meat food products.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Nutrition labeling of meat or meat..., DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION... Labeling § 317.300 Nutrition labeling of meat or meat food products. (a) Nutrition labeling shall be...

  14. Meat Consumption Culture in Ethiopia.

    Science.gov (United States)

    Seleshe, Semeneh; Jo, Cheorun; Lee, Mooha

    2014-01-01

    The consumption of animal flesh food in Ethiopia has associated with cultural practices. Meat plays pivotal and vital parts in special occasions and its cultural symbolic weight is markedly greater than that accorded to most other food. Processing and cooking of poultry is a gender based duty and has socio-cultural roles. Ethiopians are dependent on limited types of animals for meats due to the taboo associated culturally. Moreover, the consumption of meat and meat products has a very tidy association with religious beliefs, and are influenced by religions. The main religions of Ethiopia have their own peculiar doctrines of setting the feeding habits and customs of their followers. They influence meat products consumption through dictating the source animals that should be used or not be used for food, and scheduling the days of the years in periodical permeation and restriction of consumptions which in turn influences the pattern of meat consumption in the country. In Ethiopia, a cow or an ox is commonly butchered for the sole purpose of selling within the community. In special occasions, people have a cultural ceremony of slaughtering cow or ox and sharing among the group, called Kircha, which is a very common option of the people in rural area where access of meat is challenging frequently.

  15. 9 CFR 319.500 - Meat pies.

    Science.gov (United States)

    2010-01-01

    ... CERTIFICATION DEFINITIONS AND STANDARDS OF IDENTITY OR COMPOSITION Meat Food Entree Products, Pies, and Turnovers § 319.500 Meat pies. Meat pies such as “Beef Pie,” “Veal Pie,” and “Pork Pie” shall contain meat of the species specified on the label, in an amount not less than 25 percent of all...

  16. GAME MEAT MARKET IN EASTERN CROATIA

    Directory of Open Access Journals (Sweden)

    Z. Tolušić

    2006-12-01

    Full Text Available In the Republic of Croatia, game meat is consumed far less than meat of domestic animals. Yearly game meat consumption amounts to only 0.55 kg per household member. Consumers prefer meat of domestic animals, because it is cheaper, not paying attention to specific nutritive advantages of game meat. A research on the game meat market and consumers’ preferences was carried out on 101 examinees, chosen among inhabitants of Slavonia and Baranja. The majority of questioned inhabitants did consume game meat (92%, of whom 66% consider game meat to be of better quality than meat of domestic animals. Significant number of examinees considers game meat as healthy food, being also convinced that game was healthier to consume if hunted in their natural environment, than if reared on specialized farms (90%. Irrespective of quality, only 22% of examinees buy game meat, and 51% think such meat is too expensive. This is the main reason why consumers have game meat only once a month (51%. Taking into consideration monthly income of their respective household, 58% of examinees can afford game meat only once a month, and, if having an opportunity, they would opt for meat of roe deer (55% and rabbit (25%. When asked what would stimulate the game meat market in Croatia, 56% of examinees believe this could be achieved by lowering of prices, 27% think the issue could be addressed by opening of specialty stores, and only 17% opted for more aggressive marketing activities.

  17. Processed meat: the real villain?

    Science.gov (United States)

    Rohrmann, Sabine; Linseisen, Jakob

    2016-08-01

    Meat is a food rich in protein, minerals such as iron and zinc as well as a variety of vitamins, in particular B vitamins. However, the content of cholesterol and saturated fat is higher than in some other food groups. Processed meat is defined as products usually made of red meat that are cured, salted or smoked (e.g. ham or bacon) in order to improve the durability of the food and/or to improve colour and taste, and often contain a high amount of minced fatty tissue (e.g. sausages). Hence, high consumption of processed foods may lead to an increased intake of saturated fats, cholesterol, salt, nitrite, haem iron, polycyclic aromatic hydrocarbons, and, depending upon the chosen food preparation method, also heterocyclic amines. Several large cohort studies have shown that a high consumption of processed (red) meat is related to increased overall and cause-specific mortality. A meta-analysis of nine cohort studies observed a higher mortality among high consumers of processed red meat (relative risk (RR) = 1·23; 95 % CI 1·17, 1·28, top v. bottom consumption category), but not unprocessed red meat (RR = 1·10; 95 % CI 0·98, 1·22). Similar associations were reported in a second meta-analysis. All studies argue that plausible mechanisms are available linking processed meat consumption and risk of chronic diseases such as CVD, diabetes mellitus or some types of cancer. However, the results of meta-analyses do show some degree of heterogeneity between studies, and it has to be taken into account that individuals with low red or processed meat consumption tend to have a healthier lifestyle in general. Hence, substantial residual confounding cannot be excluded. Information from other types of studies in man is needed to support a causal role of processed meat in the aetiology of chronic diseases, e.g. studies using the Mendelian randomisation approach.

  18. NO MEAT FOR ME PLEASE

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Vegetarian way of life is slowly being embraced EVER thought of celebrating a major traditional festival without meat on the menu? On the evening of November 25,over 50 guests gathered at Beijing’s Vegan Hut,a cozy vegetarian restaurant,and enjoyed a delicious vegan Thanksgiving dinner.Though meat-free,the feast was complete with tofurkey(pseudo turkey meat made from tofu),local organic pumpkin pie,pesticide-free potatoes, meatless gravy and milk-free soy ice cream,in addition to eight other tasty Chinese homestyle dishes.

  19. Improving functional value of meat products.

    Science.gov (United States)

    Zhang, Wangang; Xiao, Shan; Samaraweera, Himali; Lee, Eun Joo; Ahn, Dong U

    2010-09-01

    In recent years, much attention has been paid to develop meat and meat products with physiological functions to promote health conditions and prevent the risk of diseases. This review focuses on strategies to improve the functional value of meat and meat products. Value improvement can be realized by adding functional compounds including conjugated linoneleic acid, vitamin E, n3 fatty acids and selenium in animal diets to improve animal production, carcass composition and fresh meat quality. In addition, functional ingredients such as vegetable proteins, dietary fibers, herbs and spices, and lactic acid bacteria can be directly incorporated into meat products during processing to improve their functional value for consumers. Functional compounds, especially peptides, can also be generated from meat and meat products during processing such as fermentation, curing and aging, and enzymatic hydrolysis. This review further discusses the current status, consumer acceptance, and market for functional foods from the global viewpoints. Future prospects for functional meat and meat products are also discussed.

  20. Abstract: Lightweight Authentication for HIP

    Science.gov (United States)

    Heer, Tobias

    In recent years numerous solutions for overcoming the architectural constraints of the Internet have emerged. One of the most promising among them is the Host Identity Protocol (HIP) [2], which was recently approved as an experimental standard by the IETF. HIP adds an additional protocol layer between TCP and IP to implement the Identifier/Locator split. Apart from mobility and multihoming, HIP supports host authentication, payload encryption, and a cryptographic namespace without requiring changes to the network infrastructure or network applications. However, especially mobile devices with tightly limited CPU resources are slowed down by HIP. Its poor performance on these mobile devices is a result of the extensive use of public-key (PK) cryptography for securing the main protocol functions.

  1. Perfumed historic buildings: Issues of authenticity

    Directory of Open Access Journals (Sweden)

    Tošić Jovana

    2016-01-01

    Full Text Available Contemporary historical preservation practice includes olfactory preservation as an experimental method of architectural preservation. The implementation of manufactured scents in historic buildings raises important issues of authenticity. This paper focuses on three important issues in the relation between olfactory preservation and authenticity: the importance of phenomenology in memory evocation; the relative character of the authenticity concept; and the significance of social values in historic preservation. This requires a critical examination of charters, documents and theoretical interpretations which reflect a broader concept of authenticity. The paper discusses certain articles of the Venice Charter, the Nara Document on Authenticity, as well as the sense of smell in architectural experience through critical analysis of the theories of John Ruskin, Viollet-le-Duc, Roger Scruton and Juhani Pallasmaa and their concepts of authenticity. Authenticity issues are illustrated by the examples of olfactory preservation: olfactory reconstruction of Philip Johnson’s Glass House; interior restoration and olfactory reconstruction of the Arts Club in Mayfair, London; and the creation process of the perfume brand Arquiste, a meaningful example which relocates the olfactory reconstruction context. These critical analyses raise the question of scent in historic buildings as a value in itself.

  2. Red meat, processed meat and cancer in South Africa.

    Science.gov (United States)

    Stefan, Daniela Cristina

    2015-12-16

    Epidemiological studies around the world were analysed recently by the International Agency for Research on Cancer, demonstrating a positive correlation between consumption of red meat and processed meat and colorectal cancer. In South Africa (SA) there is a great variation in the incidence of this type of cancer between various ethnic groups, related to diet and other risk factors. Strengthening the SA cancer registry and co-ordinated research on diet and cancer are required to provide specific answers for our population.

  3. Manmade radionuclide vector in Austrian soil and vegetation near Temelin nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Sinojmeri, M.; Ringer, V. [Oesterreichische Agentur fuer Gesundheit und Ernaehrungssicherheit - AGES (Austria)

    2014-07-01

    Since Chernobyl NPP accident an environmental monitoring program concerning the Upper Austrian region near Czech Republic Nuclear Power Plant, NPP Temelin, is in progress between AGES and BMLFUV, the Austrian Federal Ministry of Agriculture, Forestry, Environment, Water and Food, in Austria. This paper presents the results obtained during the sampling campaign over biennial period of 2010-2011. Soil samples, grass and different cereal species were collected. Beside Cs-134, Cs-137 and Sr-89, Sr-90 isotopes, at this phase the number of isotopes determined was extended with plutonium isotopes Pu-238, Pu-239, Pu-240, Pu-241 and Am-241. A comparison of these results with the existing data so far is presented. New knowledge was obtained related the bio-kinetic parameters of these elements in the environment. Document available in abstract form only. (authors)

  4. Praxeology and the firm: a contribution to the Austrian redefinition of the economic organization problem

    Directory of Open Access Journals (Sweden)

    Janković Ivan

    2006-01-01

    Full Text Available The aim of this paper is to syntetize theory of entrepreneurship of the Austrian School of economics with the contractual theory of the firm. Transaction cost theory of Ronald Coase and his followers holds that the firm is the organization with dominant component of ordering, while market is defined by competition and rivalry. But, market also includes interdependency and cooperation, such as in the case of cartel. Therefore non-competitive forms of economic coordination are not specificity for the firm, and can be observed in the open market as well. Agency theory rejects the notion of the firm as a hierarchy, and it is based on completeness of knowledge and contract. Theory of entrepreneurship and monetary calculation of Austrian School enables us to integrate contractual theory into the theoretical setting characterized by uncertainty, information asymmetry and positive transaction costs.

  5. Austrian Capital Theory and the Link Between Entrepreneurship and the Theory of the Firm

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul; Klein, Peter G.;

    2005-01-01

    Several writers link entrepreneurship to asset ownership, trying to incorporatethe theory of entrepreneurship into the theory of the firm. The critical link, weargue, is capital heterogeneity. Transaction cost, property rights, and resourcebasedapproaches to the firm assume that assets, both...... tangible and intangible,are heterogeneous; arranging these assets to minimize contractual hazards, toprovide efficient investment incentives, or to exploit competitive advantage isconceived as the prime task of economic organization. None of these approaches,however, is based on a systematic theory...... of capital heterogeneity. Inthis paper we outline the approach to capital developed by the Austrian schoolof economics and integrate it into an entrepreneurial theory of the firm. We refineAustrian capital theory by defining capital heterogeneity in terms of subjectivelyperceived attributes, that is...

  6. Effect of climate index on diameter increment of 40 Austrian pine half-sib lines

    Directory of Open Access Journals (Sweden)

    Vukin Marina

    2006-01-01

    Full Text Available The effects of the climate characters and climate index calculated by Thornthwaite-Mather method on diameter increment of Austrian pine trees in the seedling seed orchard on Jelova Gora was studied in the period from 1996 to 2002. The samples for dendrometric analysis were taken from 498 trees in 40 half-sib lines originating from the best natural sites of this species. A strong correlation was determined between the range of precipitation regime and Thornthwaite-Mather climate index, and the development of current diameter increment. The study results indicate that the diameter increment of Austrian pine increases considerably with the increase of humidity, regardless of the relatively modest demands regarding the site productive characteristics.

  7. Negotiating Partnership: How Serbian Hauzmajstor Established a Business Relationship with Austrian Rustler

    Directory of Open Access Journals (Sweden)

    Vesna Vučinić-Nešković

    2016-02-01

    Full Text Available This study is an account of how Serbian Hauzmajstor negotiated and entered into partnership with the Austrian Rustler. The introduction is devoted to the development of Hauzmajstor, a small real estate maintenance firm, founded by a Serbian repatriate in 2004. Beginning with its start up as the first daughter firm of Komon sens, a consulting and project development firm, the study follows its adaptation to the local business environment, concentrating on its organizational and business culture. The focus of the study is on the detailed description and analysis of experiences of the Hauzmajstor insiders with the Austrian Rustler, first as a potential, and later as an actual partner. In the end, a view from the other side, i.e. perceptions of Hauzmajstor by the Rustler Group area manager are given.

  8. Microbiology of Fresh Comminuted Turkey Meat

    Science.gov (United States)

    1976-04-12

    product (23). This procedure provides the turkey state. meat with an inoculum of spoilage organisms as well as Indirect aspects of transmission become...Comminuted turkey, a furtheir-processed product Standard plate counts. coliform plate and most probable number prepared from the dark meat of the fowl...being meat products . The adopted standards for ground and encouraged to try other comminuted meat products such whole cuts of red meats established a

  9. Meat consumption among adults in Slovenia

    OpenAIRE

    Kodrič, Mateja

    2016-01-01

    Meat is an important part of human diet. However, health problems occur when meat consumption is excessive and if meat is processed and prepared in unhealthy way. The aim of the presented thesis is to determine the difference in habits of meat and meat products consumption of the Slovenian population in different geographical areas. The data were collected through the research Nutritional habits of the adult population in Slovenia, conducted by the National Institute of Public Health. T...

  10. Convenient meat and meat products. Societal and technological issues.

    Science.gov (United States)

    Leroy, Frédéric; Degreef, Filip

    2015-11-01

    In past and contemporary foodscapes, meat and meat products have not only been following convenience trends, they have been at the heart of them. Historically, the first substantial demands for meat convenience must have been for the outsourcing of hunting or domestication, as well as slaughtering activities. In its turn, this prompted concerns for shelf-life stabilisation and the development of preservation strategies, such as meat fermentation. Demands for ease of preparation and consumption can be traced back to Antiquity but have gained in importance over the centuries, especially with the emergence of novel socio-cultural expectations and (perceived) time scarcity. Amongst other trends, this has led to the creation of ready meals and meat snacks and the expansion of urban fast food cultures. Additionally, contemporary requirements focus on the reduction of mental investments, via the "convenient" concealment of slaughtering, the optimisation of nutritional qualities, and the instant incorporation of more intangible matters, such as variety, hedonistic qualities, reassurance, and identity. An overview is given of the technological issues related to the creation of meat convenience, in its broadest sense, along with their societal implications. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Austrian parliament adopts legislation on income tax reform, ESPN Flash Report

    OpenAIRE

    Fink, Marcel

    2015-01-01

    On 7 July 2015, the National Assembly of the Austrian parliament adopted the Tax Reform Act 2015/2016. This encompassing reform comprises no less than 43 different measures, of which major changes to income tax is one of the most important. Income tax will be reduced for most taxpayers from 2016. However, the positive impact for low-income households will be rather limited.

  12. Susceptibility of Austrian Clinical Klebsiella and Enterobacter Isolates Linked to Patient-Related Data

    OpenAIRE

    Badura, Alexandra; Pregartner, Gudrun; Holzer, Judith C.; Feierl, Gebhard; Grisold, Andrea J.

    2016-01-01

    The aim of the study was to analyze the antimicrobial susceptibility of Austrian clinical Klebsiella sp. and Enterobacter sp. isolates linked to patient-related data over a time period from 1998 to 2014. The main findings of this study were (i) a marked difference of antibiotic susceptibility rates between different infection sites for both Klebsiella sp. and Enterobacter sp., (ii) significantly greater percentages of resistant isolates among both Klebsiella sp. and Enterobacter sp. in male p...

  13. Phylogenetic analysis of Austrian canine distemper virus strains from clinical samples from dogs and wild carnivores.

    Science.gov (United States)

    Benetka, V; Leschnik, M; Affenzeller, N; Möstl, K

    2011-04-01

    Austrian field cases of canine distemper (14 dogs, one badger [Meles meles] and one stone marten [Martes foina]) from 2002 to 2007 were investigated and the case histories were summarised briefly. Phylogenetic analysis of fusion (F) and haemagglutinin (H) gene sequences revealed different canine distemper virus (CDV) lineages circulating in Austria. The majority of CDV strains detected from 2002 to 2004 were well embedded in the European lineage. One Austrian canine sample detected in 2003, with a high similarity to Hungarian sequences from 2005 to 2006, could be assigned to the Arctic group (phocine distemper virus type 2-like). The two canine sequences from 2007 formed a clearly distinct group flanked by sequences detected previously in China and the USA on an intermediate position between the European wildlife and the Asia-1 cluster. The Austrian wildlife strains (2006 and 2007) could be assigned to the European wildlife group and were most closely related to, yet clearly different from, the 2007 canine samples. To elucidate the epidemiological role of Austrian wildlife in the transmission of the disease to dogs and vice versa, H protein residues related to receptor and host specificity (residues 530 and 549) were analysed. All samples showed the amino acids expected for their host of origin, with the exception of a canine sequence from 2007, which had an intermediate position between wildlife and canine viral strains. In the period investigated, canine strains circulating in Austria could be assigned to four different lineages reflecting both a high diversity and probably different origins of virus introduction to Austria in different years.

  14. Authenticated communication from quantum readout of PUFs

    Science.gov (United States)

    Škorić, Boris; Pinkse, Pepijn W. H.; Mosk, Allard P.

    2017-08-01

    Quantum readout of physical unclonable functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: A verifier can check if received classical data were sent by the PUF holder. We call this modification QR-d or, in the case of the optical-PUF implementation, QSA-d. We discuss how QSA-d can be operated in a parallel way. We also present a protocol for authenticating quantum states.

  15. Authentication Systems in Internet of Things

    Directory of Open Access Journals (Sweden)

    Tuhin Borgohain

    2015-01-01

    Full Text Available This paper analyzes the various authentication systems implemented for enhanced security and private reposition of an individual’s login credentials. The first part of the paper describes the multi-factor authentication (MFA systems, which, though not applicable to the field of Internet of Things, provides great security to a user’s credentials. MFA is followed by a brief description of the working mechanism of interaction of third party clients with private resources over the OAuth protocol framework and a study of the delegation based authentication system in IP-based IoT.

  16. Authenticated Key Agreement in Group Settings

    Institute of Scientific and Technical Information of China (English)

    LI Ming; WANG Yong; GU Da-wu; BAI Ying-cai

    2006-01-01

    An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.

  17. Authentic And Concurrent Evaluation-refining

    DEFF Research Database (Denmark)

    Eriksson, Carina Ihlström; Åkesson, Maria; Kautz, Karlheinz

    2011-01-01

    This paper addresses the need for more detailed accounts for evaluation in design science research literature. By revisiting a design project regarding the future e-newspaper we give detailed descriptions of its authentic and concurrent evaluation approach by illustrating the what, why and how...... as well as decisions on strategic levels. We emphasize a holistic and concurrent approach to evaluation compared to the general design science research thinking and argue that reflecting on how to seek authenticity is important. By authenticity we refer to the notion of how closely an evaluation captures...

  18. Towards distortion-free robust image authentication

    Energy Technology Data Exchange (ETDEWEB)

    Coltuc, D [EE Department, Valahia University Targoviste (Romania)

    2007-07-15

    This paper investigates a general framework for distortion-free robust image authentication by multiple marking. First, by robust watermarking a subsampled version of image edges is embedded. Then, by reversible watermarking the information needed to recover the original image is inserted, too. The hiding capacity of the reversible watermarking is the essential requirement for this approach. Thus in case of no attacks not only image is authenticated but also the original is exactly recovered. In case of attacks, reversibility is lost, but image can still be authenticated. Preliminary results providing very good robustness against JPEG compression are presented.

  19. Authentication planning for XOR network coding

    CERN Document Server

    Jaffres-Runser, Katia

    2011-01-01

    This paper formulates the authentication planning problem when network coding is implemented in a wireless sensor network. The planning problem aims at minimizing the energy consumed by the security application which is guarantied using message authentication codes. This paper proposes a binary non-linear optimization formulation for this planning problem whose decision variables are the authentication decision of the nodes and the MAC modes of operation. It is illustrated for a butterfly topology. Results show that there is a real trade-off between energy efficiency and message throughput in this context.

  20. Final report for the network authentication investigation and pilot.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  1. [The Austrian Red Cross and Austrian bacteriologists in the Balkan wars 1912/13 - Centenary of the first application of the bacteriology in theatres of war].

    Science.gov (United States)

    Flamm, Heinz

    2012-04-01

    When Austria joined the Geneva Convention the "Patriotischer Hilfsverein" (Patriotic Aid Society) which was founded for the concerns of wounded soldiers, was named "Austrian Society of the Red Cross". It had to stand its first big test in 1912 in the first Balkan war; military surgeons and bacteriologists were deployed to all warring states. The cholera dominated under the infectious diseases among the various forces and the civilian populations. Upon request of the Bulgarian king renowned bacteriologists of the University of Vienna were dispatched. Their work presented the first action of bacteriology for disease control on theatres of war. The great success of the surgical and hygienic measures initiated in 1912 a reform of the Austrian Red Cross. In 1913 Austria made a detailed application to the International Committee of the Red Cross in order to extend the Geneva Convention to war epidemics. The Committee forwarded and recommended this application to all member states, however, the outbreak of the First World War then prevented its resolution.

  2. Österreichs Wirtschaftsbeziehungen in Südostasien [Austrian Economic Relations to South-East Asia

    Directory of Open Access Journals (Sweden)

    Reinhart Zimmermann

    2008-01-01

    Full Text Available Der süd- und südostasiatische Raum befindet sich im Aufholprozess. Der anhaltende Wachstumstrend geht einher mit der steigenden Nachfrage aus den Industriestaaten sowie dem Binnenmarkt und führt auch zu erhöhtem Bedarf an Infrastruktur. Auch die österreichische Wirtschaft profitiert vom Asien-Boom. Dies zeigt das stete Wachstum österreichischer Warenexporte in die Region, der Anstieg heimischer Direktinvestitionen sowie die wachsende Präsenz österreichischer Firmen. Ziel der österreichischen WirtschaftsvertreterInnen ist es, die Tigerstaaten Südostasiens mehr aus dem Schatten der aufstrebenden Wirtschaftssupermacht China zu holen und die österreichische Wirtschaftsverflechtung mit diesen Ländern zu intensivieren.The South and South East Asian Area has been catching up with the developed world. The sustained economic growth trend goes hand in hand with a higher demand from industrialized nations and a stronger internal demand, pushing for better infrastructure. The Austrian economy is also benefiting from booming Asia, underscored by the steady increase of Austrian exports to this region, the rise of foreign direct investment and companies doing business in these countries. The Austrian business community would like to see the South East Asian tiger states more out of the shadow of the new super power China. The overall objective is to intensify the economic integration with South and South East Asia.

  3. Effects of Renal Denervation Documented in the Austrian National Multicentre Renal Denervation Registry

    Science.gov (United States)

    Lambert, Thomas; Steinwender, Clemens; Weber, Thomas; Suppan, Markus; Brussee, Helmut; Koppelstätter, Christian; Kerschbaum, Julia; Watschinger, Bruno; Hohenstein-Scheibenecker, Katharina; Reindl-Schwaighofer, Roman; Sturmberger, Thomas; Kindslehner, Claudia; Weiss, Thomas Werner; Rohla, Miklos; Gruener, Peter; Maister, Petra; Auer, Johann; Dechant, Cornelia; Sykora, Josef; Krismer, Christoph; Glaser, Stefan; Zweiker, Robert

    2016-01-01

    Renal denervation (RDN) is a new procedure for treatment-resistant hypertensive patients. In order to monitor all procedures undergone in Austria, the Austrian Society of Hypertension established the investigator-initiated Austrian Transcatheter Renal Denervation (TREND) Registry. From April 2011 to September 2014, 407 procedures in 14 Austrian centres were recorded. At baseline, office and mean 24-h ambulatory blood pressure (ABP) were 171/94 and 151/89 mmHg, respectively, and patients were taking a median of 4 antihypertensive medications. Mean 24-h ABP changes after 2–6 weeks, 3, 6 and 12 months were -11/-6, -8/-4, -8/-5 and -10/-6 mmHg (p<0.05 at all measurements), respectively. The periprocedural complication rate was 2.5%. Incidence of long-term complications during follow-up (median 1 year) was 0.5%. Office BP and ABP responses showed only a weak correlation (Pearson coefficient 0.303). Based on the data from the TREND registry, ambulatory blood pressure monitoring in addition to office BP should be used for patient selection as well as for monitoring response to RDN. Furthermore, criteria for optimal patient selection are suggested. PMID:27529426

  4. Meat and Poultry Labeling Terms

    Science.gov (United States)

    ... regulations enacted in 2004 to protect consumers against Bovine Spongiform Encephalopathy, mechanically separated beef is considered inedible ... in raising the animals. [ Top of Page ] NO ANTIBIOTICS (red meat and poultry): The terms "no antibiotics ...

  5. Color of Meat and Poultry

    Science.gov (United States)

    ... or freezer, color changes are normal for fresh meat and poultry. 2. Does a change in color indicate spoilage? Change in color alone does not mean the product is spoiled. Color changes are normal for fresh ...

  6. Control of Thermal Meat Processing

    Science.gov (United States)

    Griffis, Carl L.; Osaili, Tareq M.

    The recent growth of the market for ready-to-eat (RTE) meat and poultry products has led to serious concern over foodborne illnesses due to the presence of pathogens, particularly Salmonella spp, Listeria monocytogenes and Escherichia coli O157:H7 in meat and poultry products. Emphasis has been placed on thermal processing since heat treatment is still considered the primary means of eliminating foodborne pathogens from raw meat and poultry products (Juneja, Eblen, & Ransom, 2001). Inadequate time/temperature exposure during cooking is a contributing factor in food poisoning outbreaks. Optimal heat treatment is required not only to destroy pathogenic microorganisms in meat and poultry products but also to maintain desirable food quality and product yield.

  7. Meat production perspective in Yucatan

    Directory of Open Access Journals (Sweden)

    Victor M. Toledo-Lopez

    2011-12-01

    Full Text Available The evolution of meat production in Mexico during the last decade is the result of the complex interaction between different areas of livestock production and consumers’ preferences, being the former widely influenced by new tendencies and purchasing capacity. In Yucatan, there are two meat product processing plants. Yucatan’s research projects are basically focused to production, handling and genetics. This research is developed in Research Centers like Universidad Autonoma Yucatan’s Ciencias Biologicas Agropecuarias Campus, INIFAP Mococha, Instituto Tecnologico Conkal and Instituto Tecnologoco Merida. Many projects are inter-institutional and others by Cuerpos Academicos inside the institutions. Grants are provided by state, national or international dependencies. In the Instituto Tecnologico Merida research projects are on different animals’ meat quality and novel meat products.

  8. Probiotic Meat Products and Nutrition

    OpenAIRE

    Sena Özbay Doğu; Cemalettin Sarıçoban

    2015-01-01

    Meat and meat products are the basic building blocks of nutrition and are recognized as good sources of high biological value proteins, group B vitamins, minerals as well as some other bioactive compounds. The trend today is the development of novel food for special health use, called functional food, to promote human health and well-being of consumers. The trends are based on either reducing the content of unhealthy substances (like salt) or improving the content of substances with healthy b...

  9. Snail meat: Significance and consumption

    OpenAIRE

    Dragićević Olgica; Baltić Milan Ž.

    2005-01-01

    The consumption of snail meat goes back to prehistoric times. Different ancient nations had snails on their menu, but Helices culture as a productive activity was born as a Roman culture. Some of the most economically important edible species are: Helix aspersa (Mtiller) Helixpomatia (Linne), Helix iucorum (Linne), Helix aperta (Born), Eobania vermiculata (Miiller). Together with its tasie, snail meat has several advantages over others: quite low lipid rate and calorie values versus rich mine...

  10. Development and quality evaluation of dehydrated chicken meat rings using spent hen meat and different extenders

    OpenAIRE

    MISHRA, BIDYUT PRAVA; CHAUHAN, GEETA; Mendiratta, S. K.; B. D. Sharma; Desai, B. A.; Rath, P. K.

    2013-01-01

    It is recommended that for effective utilization of spent hen meat, it should be converted into value added or shelf stable meat products. Since we are lacking in cold chain facilities, therefore there is imperative need to develop shelf stable meat products. The present study was envisaged with the objective to develop dehydrated chicken meat rings utilizing spent hen meat with different extenders. A basic formulation and processing conditions were standardized for dehydrated chicken meat ri...

  11. Use of conservation technologies in meat proccesins and produktion of meat products

    OpenAIRE

    KUBECOVÁ, Dagmar

    2015-01-01

    This thesis deals with the use of conservation technologies in meat processing and production of meat products. The aim is to gather available information on methods to extend the life of the issue of meat and meat products. In her first retrieval character are generally mentioned meanings conservation technologies and described the principles of conservation, protection and legal requirements associated with it. It further describes the various methods of preserving meat and meat products an...

  12. The Effect of Authentic versus Non-Authentic Texts on Upper Intermediate Iranian EFL Learners' Vocabulary Retention

    Science.gov (United States)

    Nematollahi, Shirin; Maghsoudi, Mojtaba

    2015-01-01

    In this current study the researchers have tried to investigate the possible effect of authentic and non-authentic texts on Iranian EFL learners' vocabulary retention. Despite the great deal of studies conducted in the area of EFL/ESL learning, the effect of authentic versus non-authentic texts have almost gained little attention and been…

  13. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  14. Guap-A strong user authentication protocol for GSM

    OpenAIRE

    Aydemir, Özer

    2005-01-01

    Cataloged from PDF version of article. Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings limitations and restrictions on the functionality of the system. In this thesis we propose a user authentication protocol for GSM (Global System for Mobile) based cellular phone networks. Our protocol permits the use of weak secrets (e.g. passwords or PINs) for authentication ...

  15. Authentication Schemes Using Polynomials Over Non-Commutative Rings

    OpenAIRE

    Valluri, Maheswara Rao

    2013-01-01

    Authentication is a process by which an entity,which could be a person or intended computer,establishes its identity to another entity.In private and public computer networks including the Internet,authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic.Internet business and many other transactions require a more stringent authentication process. The aim of this paper is to propose two authentication sche...

  16. Developing Listening Skills with Authentic Materials.

    Science.gov (United States)

    Miller, Lindsay

    2003-01-01

    Discusses how to help English-as-a-Second-Language learners develop effective listening skills. Suggests a process for helping ESL learners develop their listening skills and makes suggestions for how this might be achieved with authentic materials. (VWL)

  17. Adapting Authentic Materials for Language Teaching.

    Science.gov (United States)

    Darian, Steven

    2001-01-01

    Illustrates the process of adapting authentic materials for use in the English-as-a-Second-language classroom. Focuses on four areas: semantic elements, lexical elements, syntactic elements, and discourse elements.(Author/VWL)

  18. Developing Listening Skills with Authentic Materials.

    Science.gov (United States)

    Miller, Lindsay

    2003-01-01

    Discusses how to help English-as-a-Second-Language learners develop effective listening skills. Suggests a process for helping ESL learners develop their listening skills and makes suggestions for how this might be achieved with authentic materials. (VWL)

  19. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    that fusion of two remote biometric modalities, facial recognition and appearance analysis, gives a significant improvement over each of the individual experts. Furthermore, the experimental results show that using remote biometrics increases the performance of tracking in persistent authentication...

  20. Robust audio hashing for audio authentication watermarking

    Science.gov (United States)

    Zmudzinski, Sascha; Steinebach, Martin

    2008-02-01

    Current systems and protocols based on cryptographic methods for integrity and authenticity verification of media data do not distinguish between legitimate signal transformation and malicious tampering that manipulates the content. Furthermore, they usually provide no localization or assessment of the relevance of such manipulations with respect to human perception or semantics. We present an algorithm for a robust message authentication code in the context of content fragile authentication watermarking to verify the integrity of audio recodings by means of robust audio fingerprinting. Experimental results show that the proposed algorithm provides both a high level of distinction between perceptually different audio data and a high robustness against signal transformations that do not change the perceived information. Furthermore, it is well suited for the integration in a content-based authentication watermarking system.

  1. Intrinsic-surface-tag image authentication

    Energy Technology Data Exchange (ETDEWEB)

    Palm, R.G.; DeVolpi, A.

    1991-12-01

    The objective of this work is to further the development of a unique treaty limited item (TLI) intrinsic surface tag for arms control applications. This tag's unique feature is the ability to capture the sub-micron scale topography of the TLI surface. The surface topography is captured by plastic castings of the surface as digitally imaged by an electron microscope. Tag authentication is accomplished by comparing digital castings images obtained in two different inspections. Surface replication experiments are described, as these experiments from the basis for the authentication algorithm. Both the experiments and the authentication algorithm are analyzed using the modulation transfer function. Recommendations for future improvements in tag authentication are also suggested by the modulation transfer function analysis. 4 refs.

  2. Intrinsic-surface-tag image authentication

    Energy Technology Data Exchange (ETDEWEB)

    Palm, R.G.; DeVolpi, A.

    1991-12-01

    The objective of this work is to further the development of a unique treaty limited item (TLI) intrinsic surface tag for arms control applications. This tag`s unique feature is the ability to capture the sub-micron scale topography of the TLI surface. The surface topography is captured by plastic castings of the surface as digitally imaged by an electron microscope. Tag authentication is accomplished by comparing digital castings images obtained in two different inspections. Surface replication experiments are described, as these experiments from the basis for the authentication algorithm. Both the experiments and the authentication algorithm are analyzed using the modulation transfer function. Recommendations for future improvements in tag authentication are also suggested by the modulation transfer function analysis. 4 refs.

  3. Authentication for Propulsion Test Streaming Video Project

    Data.gov (United States)

    National Aeronautics and Space Administration — An application was developed that could enforce two-factor authentication for NASA access to the Propulsion Test Streaming Video System.  To gain access to the...

  4. IPCT: A scheme for mobile authentication

    Directory of Open Access Journals (Sweden)

    Vishnu Shankar

    2016-09-01

    Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.

  5. Design of Anonymous Attribute Authentication Mechanism

    Science.gov (United States)

    Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki

    Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication.In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.

  6. Hardware device binding and mutual authentication

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  7. Athos: Efficient Authentication of Outsourced File Systems

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Goodrich, Michael T.; Papamanthou, Charalampos

    2008-01-01

    outsourced storage. Using light-weight cryptographic primitives and efficient data-structuring techniques, we design authentication schemes that allow a client to efficiently verify that the file system is fully consistent with the exact history of updates and queries requested by the client. In Athos, file-system......We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated...... operations are verified in time that is logarithmic in the size of the file system using optimal storage complexity-constant storage overhead at the client and asymptotically no extra overhead at the server. We provide a prototype implementation of Athos validating its performance and its authentication...

  8. Authenticating Devices in Ubiquitous Computing Environment

    Directory of Open Access Journals (Sweden)

    Kamarularifin Abd Jalil

    2015-05-01

    Full Text Available The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such environment are said to be exposed to attacks such as identity impostor, man-in-the-middle attacks and also unauthorized attacks. Thus, this has created skeptical among the users and has resulted them of keeping their distance from such applications. For this reason, in this paper, we are proposing a new authentication protocol to be used in such environment. Unlike other authentication protocols which can be adopted to be used in such environment, our proposed protocol could avoid a single point of failures, implements trust level in granting access and also promotes decentralization. It is hoped that the proposed authentication protocol can reduce or eliminate the problems mentioned.

  9. Adapting Authentic Materials for Language Teaching.

    Science.gov (United States)

    Darian, Steven

    2001-01-01

    Illustrates the process of adapting authentic materials for use in the English-as-a-Second-language classroom. Focuses on four areas: semantic elements, lexical elements, syntactic elements, and discourse elements.(Author/VWL)

  10. Authentic professional competence in clinical neuropsychology.

    Science.gov (United States)

    Denney, Robert L

    2010-08-01

    Authentic Professional Competence in Clinical Neuropsychology was Dr Denney's 2009 presidential address at the Annual Conference of the National Academy of Neuropsychology. In his address, he highlighted the need for clinical neuropsychologists to strive for authentic professional competence rather than a mere pretense of expertise. Undisputed credibility arises from authentic professional competence. Achieving authentic professional competence includes the completion of a thorough course of training within the defined specialty area and validation of expertise by one's peers through the board certification process. Included in the address were survey results regarding what the consumer believes about board certification as well as survey results regarding the experiences of recent neuropsychology diplomates. It is important for neuropsychologists to realize that the board certification process enhances public perception and credibility of the field as well as personal growth for the neuropsychologist. Lastly, he urged all neuropsychologists to support the unified training model and pursue board certification.

  11. Entity Authentication:Analysis using Structured Intuition

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    In this paper, we propose a new method for the analysis that uses intuition of the analyst in a structured way. First we define entity authentication in terms of fine level authentication goals (FLAGs). Then we use some relevant structures in protocol narrations and use them to justify FLAGs...... specification of security in terms of FLAGs; and secondly the outcome can be used to transform basic protocol narrations into more detailed specifications, which makes a subsequent formal analysis much more meaningful....

  12. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  13. Keystroke Dynamics Authentication For Collaborative Systems

    OpenAIRE

    Giot, Romain; El-Abed, Mohamad; Rosenberger, Christophe

    2009-01-01

    International audience; We present in this paper a study on the ability and the benefits of using a keystroke dynamics authentication method for collaborative systems. Authentication is a challenging issue in order to guarantee the security of use of collaborative systems during the access control step. Many solutions exist in the state of the art such as the use of one time passwords or smart-cards. We focus in this paper on biometric based solutions that do not necessitate any additional se...

  14. Dual Authentication For Bluetooth Connection

    Directory of Open Access Journals (Sweden)

    Diallo Alhassane Saliou

    2014-07-01

    Full Text Available Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN. This is because the radio frequency (RF waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS. These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. Bluetooth technology started with a form of pairing called legacy pairing prior to any communication. However, due to the serious security issues found in the legacy pairing, a secure and simple pairing called SPP was announced with Bluetooth 2.1 and later since 2007. SPP has solved the main security issue which is the weaknesses of the PIN code in the legacy pairing, however it has been found with some vulnerabilities such as eavesdropping and man-in-the-middle (MITM attacks. Since the discovery of these vulnerabilities, some enhancements have been proposed to the Bluetooth Specification Interest Group (SIG which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC algorithm with Secure Hash Algorithm (SHA-256. The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE as software and a Bluetooth (BT Shield connected to an Arduino Uno R3 boards as hardware. The result was verified on a Graphical User Interface (GUI built in Microsoft Visual Studio 2010 with C sharp as default environment. It has shown that the proposed scheme works perfectly with the used hardware and software. In addition, the

  15. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner\\'s signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  16. Citrus essential oils: Extraction, authentication and application in food preservation.

    Science.gov (United States)

    Mahato, Neelima; Sharma, Kavita; Koteswararao, Rakoti; Sinha, Mukty; Baral, Ek Raj; Cho, Moo Hwan

    2017-09-28

    Citrus EOs is an economic, eco-friendly and natural alternatives to chemical preservatives and other synthetic antioxidants, such as sodium nitrites, nitrates or benzoates, commonly utilized in food preservation. Citrus based EOs is obtained mainly from the peels of citrus fruits which are largely discarded as wastes and cause environmental problems. The extraction of citrus oils from the waste peels not only saves environment but can be used in various applications including food preservation. The present article presents elaborated viewpoints on the nature and chemical composition of different EOs present in main citrus varieties widely grown across the globe; extraction, characterization and authentication techniques/methods of the citrus EOs; and reviews the recent advances in the application of citrus EOs for the preservation of fruits, vegetables, meat, fish and processed food stuffs. The probable reaction mechanism of the EOs based thin films formation with biodegradable polymers is presented. Other formulation, viz., EOs microencapsulation incorporating biodegradable polymers, nanoemulsion coatings, spray applications and antibacterial action mechanism of the active compounds present in the EOs have been elaborated. Extensive research is required on overcoming the challenges regarding allergies and obtaining safer dosage limits. Shift towards greener technologies indicate optimistic future towards safer utilization of citrus based EOs in food preservation.

  17. Snail meat: Significance and consumption

    Directory of Open Access Journals (Sweden)

    Dragićević Olgica

    2005-01-01

    Full Text Available The consumption of snail meat goes back to prehistoric times. Different ancient nations had snails on their menu, but Helices culture as a productive activity was born as a Roman culture. Some of the most economically important edible species are: Helix aspersa (Mtiller Helixpomatia (Linne, Helix iucorum (Linne, Helix aperta (Born, Eobania vermiculata (Miiller. Together with its tasie, snail meat has several advantages over others: quite low lipid rate and calorie values versus rich mineral, essential amino acid and fatty acid content. The composition of snail meat is presented. In addition, the composition of different snail species and the part analyzed (pedal mass and visceral mass is presented. Also, the differences in composition according to the species (snail meat horse/chicken meat, beef, swine meat, fish meat are presented. The French are the world's leading consumers of snails. !n France snails come to market in a variety of ways. Estimated consumption of snails in France is around 40 000 tones/year. Total French imports account for 25% of world imports. France is also the leading exporter of prepared snails, mainly sold as preserved snails and prepared dishes. Snail imports have been much higher than exports (65 tones exported in 2002. vs. 2.700 tones imported. Despite the large consumption, only 3% of snails in France come from production (farming. Italy is in second place in the world consumption of snails, and Spain and Germany are in the third and fourth place. The development of snails consumption in Italy is followed with the same amount of production of snails in the whole biological circle. In 2001, from 24,700 tons, 9,350 tons (37.8% came from production, 6 00 tons (2.4% came from nature, and 14,750 tons (59.70% came from imports (frozen, fresh and prepared snails. In Serbia, at the beginning of 2005, we had over 400 registered farms for snail production.

  18. What is artiifcial meat and what does it mean for the future of the meat industry?

    Institute of Scientific and Technical Information of China (English)

    Sarah P F Bonny; Graham E Gardner; David W Pethick; Jean-Franois Hocquette

    2015-01-01

    The meat industry cannot respond to increases in demand by ever increasing resource use. The industry must ifnd solutions to issues regarding animal welfare, health and sustainability and wil have to do so in the face of competition from emerging non-traditional meat and protein products in an increasingly complex regulatory environment. These novel meat and protein products, otherwise known as‘artiifcial meat’ are utilising ground breaking technologies designed to meet the issues facing the conventional meat industry. These artiifcial meats, in vitro or cultured meat and meat from genetical y modiifed organisms have no real capacity to compete with conventional meat production in the present environment. However, meat replacements manufactured from plant proteins and mycoproteins are currently the biggest competitors and are gaining a smal percentage of the market. Manufactured meats may push conventional meat into the premium end of the market, and supply the bulk, cheap end of the market if conventional meat products become more expensive and the palatability and versatility of manufactured meats improve. In time the technology for other artiifcial meats such as meat from genetic modiifed organisms or cultured meat may become sufifciently developed for these products to enter the market with no complexity of the competition between meat products. Conventional meat producers can assimilate agroecology ecology concepts in order to develop sustainable animal production systems. The conventional meat industry can also beneift from assimilating biotechnologies such as cloning and genetic modiifcation technologies, using the technology to adapt to the changing environment and respond to the increasing competition from artiifcial meats. Although it wil depend at least partly on the evolution of conventional meat production, the future of artiifcial meat produced from stem cel s appears uncertain at this time.

  19. Biogenic amines in meat and fermented meat products

    Directory of Open Access Journals (Sweden)

    Joanna Stadnik

    2010-09-01

    Full Text Available Recent trends in food quality and safety promote an increasing search for trace compounds that can affect human health. Biogenic amines belong to this group of substances. They can cause distinctive pharmacological, physiological and toxic effects in organisms. Their amounts are usually increasing as a consequence of the use of poor quality raw materials, during controlled or spontaneous microbial fermentation or in the course of food spoilage. The origin of biogenic amines makes them suitable as chemical indicators of the hygienic quality and freshness of some foods being associated to the degree of food fermentation or degradation. The development of appropriate manufacturing technologies to obtain products free or nearly free from biogenic amines is a challenge for the meat industry. This review briefly summarises current knowledge on the biological implications of biogenic amines on human health and collects data on the factors affecting their formation in meat and fermented meat products.

  20. Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity

    NARCIS (Netherlands)

    Gulikers, J.T.M.; Bastiaens, Th.J.; Kirschner, P.A.; Kester, L.

    2008-01-01

    In vocational education and training (VET) in the Netherlands, learning and working are integrated from the start. Authentic assessments are used during competence-based VET curricula to achieve correspondence between learning and working. The premise behind this study is that authenticity is subjec

  1. Perceptions of Leadership Coaches Regarding Leader Authenticity and Authenticity Development Strategies

    Science.gov (United States)

    Stone, Anne H.

    2012-01-01

    Purpose: The purpose of this study was to identify what leadership coaches perceive to be the benefits of authenticity to their clients' success. Another purpose was to identify what barriers leadership coaches perceive as preventing their clients from developing authenticity. A final purpose of this study was to identify which strategies…

  2. Authenticity Is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity

    Science.gov (United States)

    Gulikers, Judith T. M.; Bastiaens, Theo J.; Kirschner, Paul A.; Kester, Liesbeth

    2008-01-01

    In vocational education and training (VET) in the Netherlands, learning and working are integrated from the start. Authentic assessments are used during competence-based VET curricula to achieve correspondence between learning and working. The premise behind this study is that authenticity is subjective and that perceptions of assessment…

  3. Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs

    Institute of Scientific and Technical Information of China (English)

    Rajeev Singh; Teek Parval Sharma

    2015-01-01

    Authentication per frame is an implicit necessity for security in wireless local area networks (WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames. It utilizes the sequence number of the frame along with the authentication stream generators for authentication. Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation.

  4. Robust image authentication in the presence of noise

    CERN Document Server

    2015-01-01

    This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.    Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:   Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the pre...

  5. Authentication Model Based Bluetooth-enabled Mobile Phone

    Directory of Open Access Journals (Sweden)

    Rania Abdelhameed

    2005-01-01

    Full Text Available Authentication is a mechanism to establish proof of identities, the authentication process ensure that who a particular user is. Current PC, laptop user authentication systems are always done once and hold until it explicitly revoked by the user, or asking the user to frequently reestablish his identity which encouraging him to disable authentication. Zero-Interaction Authentication (ZIA provides solution to this problem. In ZIA, a user wears a small authentication token that communicates with a laptop over a short-range, wireless link. ZIA combine authentication with a file encryption. Here we proposed a Laptop-user Authentication Based Mobile phone (LABM, in our model of authentication, a user uses his Bluetooth-enabled mobile phone, which work as an authentication token that provides the authentication for laptop over a Bluetooth wireless link, in the concept of transient authentication with out combining it with encryption file system. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range, wireless link.

  6. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    Science.gov (United States)

    Kent, Alexander Dale

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  7. The ACOnet (Austrian Academic Computer Network) is data carrier for teleradiological consultations; Das ACOnet (Austrian Academic Computer Network) als Datentraeger fuer teleradiologische Konsultationen

    Energy Technology Data Exchange (ETDEWEB)

    Giacomuzzi, S.M. [Universitaetsklinik fuer Radiodiagnostik, Innsbruck (Austria)]|[Universitaetsklinik Innsbruck (Austria). Inst. fuer Medizinische Physik; Springer, P.; Dessl, A.; Waldenberger, P.; Buchberger, W.; Bodner, G.; Bale, R.; Jaschke, W. [Universitaetsklinik fuer Radiodiagnostik, Innsbruck (Austria); Stoeger, A. [Universitaetsklinik Innsbruck (Austria). Inst. fuer MRI; Schreder, J.G. [Universitaetsklinik Innsbruck (Austria). Inst. fuer Medizinische Physik; Gell, G. [Universitaetsklinik Innsbruck (Austria). Inst. fuer Medizinische Informatik

    1998-04-01

    Purpose: To assess the feasibility of image transfer for teleradiologic consultations using the Austrian Academic Computer Network (ACOnet). The ACOnet corresponds between the main univerisities to a MAN (Metropolitan Area Network) with a transfer rate of 4 Mbps. Its use is free of charge for university institutions. Materials and methods: 1740 test image data sets and 620 image data sets for teleradiological consultations were exchanged without annotations between the Departments of Diagnostic Radiology of the universities of Innsbruck and Graz, using the ACOnet. Results: Data transmission was reliable and fast with an average transfer capacity of 170.2 kBytes/s (94-341 kBytes/s). There were no major problems with image transfer during the test phase. Conclusion: Due to its high transfer capacity, the ACOnet is considered a reasonable alternative to the ISDN service. (orig.) [Deutsch] Ziel: Radiologische Bilddatensaetze sollten fuer telemedizinische Konsultationen mittels des Austrian Academic Computer Network (ACOnet) zwischen den Universitaetskliniken Innsbruck und Graz ausgetauscht werden. Das ACOnet, dessen Benutzung fuer Universitaeten frei ist, entspricht zwischen den Landesuniversitaeten einem MAN (Metropolitan Area Network) mit einer Uebertragungsrate von 4 Mbps. Material und Methode: Die Uebertragung von 1740 Testbilddatensaetzen und 12 radiologischen Konsultationen (620 Bilddatensaetze), ohne Annotationen, zwischen den radiologischen Abteilungen der Universitaetskliniken Innsbruck und Graz zum Zwecke teleradiologischer Konsultationen mittels ACOnet. Ergebnisse: Die Uebertragungen ergaben eine hohe durchschnittliche Uebertragungskapazitaet von 170,2 kBytes/s (94-341 kBytes/s). Das ACOnet erwies sich waehrend der gesamten Testphase als zuverlaessig und praktikabel fuer die Uebertragung teleradiologischer Bilddatensaetze. Schlussfolgerungen: Durch die hohe Uebertragungskapazitaet stellt das ACOnet eine erfolgversprechende Alternative zum ISDN-Service dar

  8. Effect of probiotics on broiler meat quality

    African Journals Online (AJOL)

    STORAGESEVER

    2009-08-04

    Aug 4, 2009 ... INTRODUCTION. There is currently a world trend to reduce the use of anti- ... this study was undertaken to know the effect of probiotics .... tics fed broilers. ..... International Organization for Standardization, on meat and meat.

  9. Additives In Meat and Poultry Products

    Science.gov (United States)

    ... Viewer (JSR 286) Actions ${title} Loading... Additives in Meat and Poultry Products People have been using food additives for thousands ... may be used in canned hams or jellied meat products. HUMECTANT - substance added to foods to help retain ...

  10. STUDY REGARDING THE LEGISLATIVE CONDITIONS IN THE EUROPEAN UNION IMPORT FOR FRESH MEAT AND MEAT PRODUCTS

    Directory of Open Access Journals (Sweden)

    S. STANCIU

    2013-12-01

    Full Text Available The European Union is by far the biggest importer of food worldwide. Import rulesfor meat and meat products are fully harmonized and the European Commissionacts as the competent authority on behalf of the 25 Member States. The EUCommission is the sole negotiating partner for all non-EU countries in questionsrelated to import conditions for meat and meat products.

  11. Will novel protein foods beat meat? : consumer acceptance of meat substitutes - a multidisciplinary research approach

    NARCIS (Netherlands)

    Hoek, A.C.

    2010-01-01

    Meat production places a heavy burden on the environment and therefore options are sought to reduce meat consumption. One option is to let new meat substitutes take the place of meat on the plate. This can only succeed when these products are acceptable to consumers. The thesis investigated which

  12. 9 CFR 319.761 - Potted meat food product and deviled meat food product.

    Science.gov (United States)

    2010-01-01

    .... “Potted Meat Food Product” and “Deviled Meat Food Product” shall not contain cereal, vegetable flour... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Potted meat food product and deviled meat food product. 319.761 Section 319.761 Animals and Animal Products FOOD SAFETY AND INSPECTION...

  13. Will novel protein foods beat meat? : consumer acceptance of meat substitutes - a multidisciplinary research approach

    NARCIS (Netherlands)

    Hoek, A.C.

    2010-01-01

    Meat production places a heavy burden on the environment and therefore options are sought to reduce meat consumption. One option is to let new meat substitutes take the place of meat on the plate. This can only succeed when these products are acceptable to consumers. The thesis investigated which fa

  14. Will novel protein foods beat meat? : consumer acceptance of meat substitutes - a multidisciplinary research approach

    NARCIS (Netherlands)

    Hoek, A.C.

    2010-01-01

    Meat production places a heavy burden on the environment and therefore options are sought to reduce meat consumption. One option is to let new meat substitutes take the place of meat on the plate. This can only succeed when these products are acceptable to consumers. The thesis investigated which fa

  15. 9 CFR 319.311 - Chow mein vegetables with meat, and chop suey vegetables with meat.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Chow mein vegetables with meat, and chop suey vegetables with meat. 319.311 Section 319.311 Animals and Animal Products FOOD SAFETY AND... COMPOSITION Canned, Frozen, or Dehydrated Meat Food Products § 319.311 Chow mein vegetables with meat, and...

  16. High pressure processing of meat

    DEFF Research Database (Denmark)

    Grossi, Alberto; Christensen, Mette; Ertbjerg, Per

    in the myofibrillar protein pattern and HP-induced change in activity of cathepsin B and L were investigated. Results: In this study we showed that HP treatment of pork meat emulsion, ranging from 0.1 to 800 MPa, induced protein gel formation as shown by the increased Young’s modulus (Fig.1). Analysis of SDS...... the rheological properties of pork meat batters by inducing formation of protein gels. HP induced protein gels are suggested to be formed by high molecular weight myofibrillar protein aggregates and by peptides formed by lysosomal enzyme-induced cleavage of myofibrillar proteins. Perspectives: The data presented......Abstract Background: The research of high pressure (HP) processing of meat based foods needs to address how pressure affects protein interactions, aggregation and/or gelation. The understanding of the gel forming properties of myofibrillar components is fundamental for the development of muscle...

  17. Power ultrasound in meat processing.

    Science.gov (United States)

    Alarcon-Rojo, A D; Janacua, H; Rodriguez, J C; Paniwnyk, L; Mason, T J

    2015-09-01

    Ultrasound has a wide range of applications in various agricultural sectors. In food processing, it is considered to be an emerging technology with the potential to speed up processes without damaging the quality of foodstuffs. Here we review the reports on the applications of ultrasound specifically with a view to its use in meat processing. Emphasis is placed on the effects on quality and technological properties such as texture, water retention, colour, curing, marinating, cooking yield, freezing, thawing and microbial inhibition. After the literature review it is concluded that ultrasound is a useful tool for the meat industry as it helps in tenderisation, accelerates maturation and mass transfer, reduces cooking energy, increases shelf life of meat without affecting other quality properties, improves functional properties of emulsified products, eases mould cleaning and improves the sterilisation of equipment surfaces. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Microorganism Reduction Methods in Meat Products

    OpenAIRE

    ZÁHOROVÁ, Jana

    2011-01-01

    In Bachelor thesis I deal with a theme of the influences on the reduction of microorganisms of meat products. First, I focused on the characteristics of individual organisms, the factors affecting their growth, incidence of microorganisms in meat, forms of microbial degradation and contamination of meat microorganisms in slaughterhouses. The next section deals with the means to fight against microorganisms and methods which can reduce their presence in meat products. In the end there is menti...

  19. The knowledge balance of the inter- and transdisciplinary Austrian Landscape Research programme

    Directory of Open Access Journals (Sweden)

    Karolina Begusch-Pfefferkorn

    2009-03-01

    Full Text Available Austrian Landscape Research, a programme of the Austrian Ministry of Science, has created scientific foundations for the sustainable development of Austrian landscapes and regions (plus bordering regions. Landscapes and regions were to be explored from different angles; implementing the research findings was to be part of the research work. The programme was designed to make room for science open to society, for unconventional ideas, methods, and courses of action. Programmatic targets and research principles supported this intent. The results of the programme met with national and international approval. The ALR knowledge balance is an attempt at presenting and assessing the achievements of this comprehensive contract research programme.Le programme du Ministère autrichien des Sciences, intitulé « Recherche sur le paysage autrichien », visait à construire les fondements scientifiques d’un développement durable des paysages et des régions de l’Autriche et des territoires limitrophes. Les paysages et les régions ont été étudiés selon différentes approches disciplinaires et la mise en pratique des résultats de cette étude était partie prenante du programme de recherche. La vocation de ce programme était de faire la place à une science ouverte sur la société, à des idées, méthodes et pratiques non conventionnelles. Les objectifs du programme et les principes de recherche vont dans le sens de ces exigences. Les résultats du programme ont été reconnus sur le plan national et international. Le bilan des connaissances du programme de recherche sur le paysage autrichien (KLF a pour but de présenter et d’évaluer les performances de ce vaste programme de recherche.

  20. Austrian dose measurements onboard space station MIR and the International Space Station--overview and comparison.

    Science.gov (United States)

    Berger, T; Hajek, M; Summerer, L; Vana, N; Akatov, Y; Shurshakov, V; Arkhangelsky, V

    2004-01-01

    The Atominstitute of the Austrian Universities has conducted various space research missions in the last 12 years in cooperation with the Institute for Biomedical Problems in Moscow. They dealt with the exact determination of the radiation hazards for cosmonauts and the development of precise measurement devices. Special emphasis will be laid on the last experiment on space station MIR the goal of which was the determination of the depth distribution of absorbed dose and dose equivalent in a water filled Phantom. The first results from dose measurements onboard the International Space Station (ISS) will also be discussed. The spherical Phantom with a diameter of 35 cm was developed at the Institute for Biomedical Problems and had 4 channels where dosimeters can be exposed in different depths. The exposure period covered the timeframe from May 1997 to February 1999. Thermoluminescent dosimeters (TLDs) were exposed inside the Phantom, either parallel or perpendicular to the hull of the spacecraft. For the evaluation of the linear energy transfer (LET), the high temperature ratio (HTR) method was applied. Based on this method a mean quality factor and, subsequently, the dose equivalent is calculated according to the Q(LET infinity) relationship proposed in ICRP 26. An increased contribution of neutrons could be detected inside the Phantom. However the total dose equivalent did not increase over the depth of the Phantom. As the first Austrian measurements on the ISS dosimeter packages were exposed for 248 days, starting in February 2001 at six different locations onboard the ISS. The Austrian dosimeter sets for this first exposure on the ISS contained five different kinds of passive thermoluminescent dosimeters. First results showed a position dependent absorbed dose rate at the ISS.

  1. Attitudes among the general Austrian population towards neonatal euthanasia: a survey.

    Science.gov (United States)

    Goldnagl, Lena; Freidl, Wolfgang; Stronegger, Willibald J

    2014-10-07

    The Groningen Protocol aims at providing guidance in end-of-life decision-making for severely impaired newborns. Since its publication in 2005 many bioethicists and health care professionals have written articles in response. However, only very little is known about the opinion among the general population on this subject. The aim of this study was to present the general attitude towards neonatal euthanasia (NE) among the Austrian population and the factors associated with the respondents' opinion. A cross-sectional study was conducted among the general Austrian population. Computer-assisted telephone interviews were performed with 1,000 interviewees aged 16 years and older. Binary logistic regression was performed in order to determine factors that are independently associated with the respondents' opinion about neonatal euthanasia. While 63.6% of the participants rejected the idea of neonatal euthanasia for severely impaired newborns, 36.4% opted either in favor or were undecided. Regression analysis has shown the respondents' educational level (p = 0.005) and experience in the care of terminally ill persons (p = 0.001) to be factors that are positively associated with the rejection of neonatal euthanasia, whereas a higher age was associated with a lower degree of rejection (p = 0.021). We found that the majority of the Austrian population rejects the idea of neonatal euthanasia for severely impaired newborns. However, given the increasing levels of rejection of NE among the younger generations and among people with a higher educational level, it cannot be precluded that the rejection rate might in future increase even further, rather than decrease.

  2. SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    RAVIKIRAN PEELUKHANA,

    2011-04-01

    Full Text Available The cloud virtualization technology improves the economy of scale for data centers through server consolidation, application consolidation and resources consolidation. Virtualization allows the provider to move Virtual Images from more congested host to less-congested hosts, as required. Enterprises also get improved server reliability, which in turn increases application performance. Despite these benefits, it includes major security challenges with the portability of Virtual Images between different cloud providers.The security and integrity of Virtual images is the foundation for the overall security of the cloud. Many of the Virtual images are intended to be shared by diverse and unrelated users. Unfortunately, existing approaches to cloud security built by cloud practitioners fall short when dealing with Virtual images. Secure transmission of virtual Images can bepossible by providing authentication using Blind Authentication protocol (BAP. The proposed approach authenticates the allocation of virtual images using Blind authentication protocol. It provides provable protection against replay and client side attacks even if the keys of the user are compromised. The encryption also provides template protection, revocability and alleviates the concerns on privacy in widespread use of biometrics. Carrying out the authentication in the encrypted domain is a secure process, while the encryption key acts as an additional layer of security.

  3. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  4. IMAGE AUTHENTICATION TECHNIQUES AND ADVANCES SURVEY

    Directory of Open Access Journals (Sweden)

    Derroll David

    2015-10-01

    Full Text Available With the advanced technologies in the area of Engineering the World has become a smaller place and communication is in our finger tips. The multimedia sharing traffic through electronic media has increased tremendously in the recent years with the higher use of social networking sites. The statistics of amount of images uploaded in the internet per day is very huge. Digital Image security has become vulnerable due to increase transmission over non-secure channel and needs protection. Digital Images play a crucial role in medical and military images etc. and any tampering of them is a serious issue. Several approaches are introduced to authenticate multimedia images. These approaches can be categorized into fragile and semi-fragile watermarking, conventional cryptography and digital signatures based on the image content. The aim of this paper is to provide a comparative study and also a survey of emerging techniques for image authentication. The important requirements for an efficient image authentication system design are discussed along with the classification of image authentication into tamper detection, localization and reconstruction and robustness against image processing operation. Furthermore, the concept of image content based authentication is enlightened.

  5. Stereo Image Reversible Watermarking for Authentication

    Science.gov (United States)

    Luo, Ting; Jiang, Gangyi; Peng, Zongju; Shao, Feng; Yu, Mei

    2015-03-01

    To authenticate stereo image, this paper proposes a stereo image reversible watermarking method for three dimensional television systems. The proposed method can recover the original stereo image without any distortion if stereo image is not tampered. Otherwise, it can authenticate stereo image with the capability of locating tamper. Difference expansion is used to embed authentication bits reversibly into each block for locating tamper. Pixel pairs without resulting in overflow/underflow after expansion are chosen as candidates of embedding locations. In order to avoid transmit big size of embedding location map, the same embedding locations for each block are decided in advance, which adaptively determines the block size. Moreover, in order to resist collage attack, authentication bits generated from each block embedded into its mapping blocks, so that authentication of each block is not independent. Experimental results demonstrate that stereo image can be totally recovered if watermarked stereo image is not modified. Moreover, it proves suitability and stability of the proposed method for tamper location with relationships of stereo images.

  6. Authentication: science and art at odds?

    Science.gov (United States)

    Chartier, Duane R.; Notehelfer, Fred G.

    1998-05-01

    Contrary to popular belief, there is a very great difference between the detection of forgery versus the authentication of works of art. Sciences is generally very good at producing evidence of falsification but often is equally poor at proving authenticity. The primary reason for these gross differences is that connoisseurship and art history are more strongly involved in the process of authentication than are scientific testing and analysis. There is also a pronounced lack of substantive interaction between art conservation professionals, scientists and art historians. The case of a recently discovered painting by John Constable will be used to illustrate the difficulties and opportunities of a balanced and systematic approach to the process of authentication. There is much more than science involved in such endeavors and this would not surprise anyone who has attempted to introduce works of art through non-traditional channels. Great problems arise when the curatorial community is asked to consider works that do not so easily 'fit' into a neat art historical period or stylistic pigeonhole. Connoisseurs often will only accept the best works of an artist and discount the inevitable products of the artist's evolution -- less accomplished works. Scientific principles and technical evidence can and must be used in order to elevate the practice of authentication.

  7. Austria between Utopia and Dystopia in Austrian, German, and American Post-Exile Writings

    DEFF Research Database (Denmark)

    Ortner, Jessica

    2015-01-01

    Exile, in the sense of a literal forced transgression of borders due to persecution during the time of the Nazi regime, has fostered a broad range of “post-exile writings” in which the present generation “fictionally recreat[es] the experiences of their elders” (Stern, 1994). These writings can...... be understood as a distinct variation of postmemory (Hirsch, 1997) in which the children and grandchildren of the expelled individuals fictionally cross the borderlines back to the lost homeland of Austria and former parts of the Austrian empire. The post-exile novels of Anna Mitgutsch (2000) Barbara Honigmann...

  8. The Austrian newspaper «Reichspost» about Hunger in the USSR 1932–1933

    Directory of Open Access Journals (Sweden)

    Igor G. Ivantcov

    2014-12-01

    Full Text Available The Article is devoted to one of the tragic pages of history of the USSR, the famine of 1932–1933. Closeness of archival documents in the Soviet period on the subject was the cause of much speculation, as in post-Soviet Russia and in other former Soviet republics. Moreover, in many studies appeared quite mystical figure of 10 million dead from starvation. The article is completely one from the archives, namely early translation of the article from the Austrian newspaper «Reichpost» where it was first announced this figure.

  9. Breeding for meat quality in pigs

    NARCIS (Netherlands)

    Hovenier, R.

    1993-01-01

    The aim of this study was to investigate the possibilities of improving pig meat quality by selection. Therefore, literature is reviewed to determine the meat quality traits to be used and genetic parameters of those meat quality traits are calculated. A method is described to obtain margin

  10. Variations in land requirements for meat production

    NARCIS (Netherlands)

    Elferink, E.V.; Nonhebel, S.

    2007-01-01

    Production of meat requires substantial amounts of feed grains which in turn require vast amounts of land. Future population growth and increase in consumption will raise the demand for meat and with it the land required for meat production. This paper analyses the various factors that affect land r

  11. Meat consumption, diabetes and its complications

    NARCIS (Netherlands)

    Feskens, E.J.M.; Sluik, D.; Woudenbergh, van G.J.

    2013-01-01

    Several prospective studies have reported that risk of type 2 diabetes (T2DM) is elevated in meat consumers, especially when processed meats are consumed. Elevated risks of coronary heart disease (CHD) and stroke in meat consumers have also been reported. In this overview, the evidence regarding mea

  12. Processed Meat Ingredients: Past, Present and Future

    Science.gov (United States)

    Ingredients were first utilized to preserve meat and improve its palatability which date back to when our ancestors used salt and fire to preserve meat. Since that time man has incorporated a wide variety of ingredients to develop unique meat products and find ways to extend the shelf life of these ...

  13. Variations in land requirements for meat production

    NARCIS (Netherlands)

    Elferink, E. V.; Nonhebel, S.

    2007-01-01

    Production of meat requires substantial amounts of feed grains which in turn require vast amounts of land. Future population growth and increase in consumption will raise the demand for meat and with it the land required for meat production. This paper analyses the various factors that affect land r

  14. Sustainability and meat consumption: is reduction realistic?

    Directory of Open Access Journals (Sweden)

    Jantine Voordouw

    2013-10-01

    Full Text Available Meat is critical with respect to sustainability because meat products are among the most energy-intensive and ecologically burdensome foods. Empirical studies of the meat-consumption frequency of Dutch consumers show that, apart from meat-avoiders and meat-eaters, many people are meat-reducers that eat no meat at least one day per week. Meat-consumption frequencies provide empirical evidence for different modes of “flexitarianism,” including light, medium, and heavy flexitarians. In particular, the existence of heavy flexitarians suggests that the customary position of meat and other animal-based dietary products in the food hierarchy is not inviolable. To improve our understanding of meat reduction, cluster analysis adds information about differences across flexitarians. Given the enormous environmental impact of animal-protein consumption and the apparent sympathy of consumers for meat reduction, it is surprising that politicians and policy makers demonstrate little, if any, interest in strategies to reduce meat consumption and to encourage more sustainable eating practices.

  15. Qualitative analysis of meat and meat products by multiplex ...

    African Journals Online (AJOL)

    Jane

    2011-08-22

    Aug 22, 2011 ... an allergy against special meat and Its products do not. *Corresponding author. ... Some of the PCR approaches used for the determination of the identity of .... Categorized according to the type of process. PM. 57. 61.3. RMM.

  16. Bacterial spoilage of meat and cured meat products.

    Science.gov (United States)

    Borch, E; Kant-Muermans, M L; Blixt, Y

    1996-11-01

    The influence of environmental factors (product composition and storage conditions) on the selection, growth rate and metabolic activity of the bacterial flora is presented for meat (pork and beef) and cooked, cured meat products. The predominant bacteria associated with spoilage of refrigerated beef and pork, are Brochothrix thermosphacta, Carnobacterium spp., Enterobacteriaceae, Lactobacillus spp., Leuconostoc spp., Pseudomonas spp. and Shewanella putrefaciens. The main defects in meat are off-odours and off-flavours, but discolouration and gas production also occur. Bacteria associated with the spoilage of refrigerated meat products, causing defects such as sour off-flavours, discolouration, gas production, slime production and decrease in pH, consist of B. thermosphacta, Carnobacterium spp. Luctobacillus spp. Leuconostoc spp. and Weissella spp. Analysis of spoilage as measured by bacterial and chemical indicators is discussed. It is concluded that a multivariate approach based on spectra of chemical compounds, may be helpful in order to analyse spoilage, at least for spoilage caused by lactic acid bacteria. The consequences of bacteria bacteria interactions should be evaluated more.

  17. Should we stop meating like this? Reducing meat consumption through substitution

    OpenAIRE

    Apostolidis, Chrysostomos; McLeay, Fraser

    2016-01-01

    High levels of meat consumption are increasingly being criticised for ethical, environmental, and social reasons. Plant-based meat substitutes have been identified as healthy sources of protein that, in comparison to meat, offer a number of social, environmental and health benefits and may play a role in reducing meat consumption. However, there has been a lack of research on the role they can play in the policy agenda and how specific meat substitute attributes can influence consumers to rep...

  18. Authentic moral conflicts and students' moral development

    Institute of Scientific and Technical Information of China (English)

    Fu Wei-li

    2006-01-01

    This research deals with the different psychological processes people undergo when they experience firsthand authentic moral conflicts.It also discusses the value of authentic moral conflicts in students' moral development,and reasons for the ineffectiveness of moral education in China.The main reason for the unsatisfactory effects of moral education in China over a period of time lies in the predominance of virtual moral education.In authentic situations,the proper arrangement of moral conflicts requires careful analysis of values hidden in the prearranged or generated moral conflicts so as to utilize,guide,and control them properly.Such arrangement of moral conflicts should be adapted to students' life experience for deepening their understanding of the moral aspects of life.Also,special attention should be attached to students' varied requirements,thus leaving enough options and space for their independent participation in activities of moral education.

  19. Enhanced Authentication Mechanism Using Multilevel Security Model

    Directory of Open Access Journals (Sweden)

    Abdulameer Hussain

    2009-06-01

    Full Text Available This paper presents a proposed multilevel authentication method which is implemented especially in sensitive applications where they contain multilevel secure and confidential data. The proposed method divides the system into multiple sensitive levels and tests users against different authentication methods for each level. Most levels are subdivided further into secure sublevels. Each sublevel contains its own privileges and data types which are managed by an Identity Manager (IM whose responsibility is to transit users to other higher sublevels. The transition’s decision is done by assigning different weights to each authentication method .After a series of tests, the IM must generate a status report describing the results and the decision made to each user’s activity. This technique permits granting only the required privileges for a selected group of users and limits the configuration functions of those that users in a particular user group can perform.

  20. Authenticating Tripartite Key Agreement Protocol with Pairings

    Institute of Scientific and Technical Information of China (English)

    Sheng-Li Liu; Fang-Guo Zhang; Ke-Fei Chen

    2004-01-01

    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.

  1. Approximate Public Key Authentication with Information Hiding

    Energy Technology Data Exchange (ETDEWEB)

    THOMAS,EDWARD V.; DRAELOS,TIMOTHY J.

    2000-10-01

    This paper describes a solution for the problem of authenticating the shapes of statistically variant gamma spectra while simultaneously concealing the shapes and magnitudes of the sensitive spectra. The shape of a spectrum is given by the relative magnitudes and positions of the individual spectral elements. Class-specific linear orthonormal transformations of the measured spectra are used to produce output that meet both the authentication and concealment requirements. For purposes of concealment, the n-dimensional gamma spectra are transformed into n-dimensional output spectra that are effectively indistinguishable from Gaussian white noise (independent of the class). In addition, the proposed transformations are such that statistical authentication metrics computed on the transformed spectra are identical to those computed on the original spectra.

  2. A lightweight authentication scheme with user untraceability

    Institute of Scientific and Technical Information of China (English)

    Kuo-Hui YEH

    2015-01-01

    With the rapid growth of electronic commerce and associated demands on variants of Internet based applications, application systems providing network resources and business services are in high demand around the world. To guarantee ro-bust security and computational efficiency for service retrieval, a variety of authentication schemes have been proposed. How-ever, most of these schemes have been found to be lacking when subject to a formal security analysis. Recently, Changet al. (2014) introduced a formally provable secure authentication protocol with the property of user-untraceability. Unfortunately, based on our analysis, the proposed scheme fails to provide the property of user-untraceability as claimed, and is insecure against user impersonation attack, server counterfeit attack, and man-in-the-middle attack. In this paper, we demonstrate the details of these malicious attacks. A security enhanced authentication scheme is proposed to eliminate all identified weaknesses.

  3. CRYPTOGRAPHIC PROTOCOL DEPENDING ON BIOMETRIC AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    SANJUKTA PAL

    2013-02-01

    Full Text Available In modern age, security is the most challenging issue for using the secure data used by computer. This cryptographic protocol on biometric authentication is nothing but the combination of cryptography and biometric authentication. Here the same idea of cryptography is working (i.e. using key, conversion of plain textinto cipher text called encryption and the reverse, means cipher text to plain text called decryption. Here the most promising method fingerprint geometry of biometric authentication is used as the key for encryption and decryption. Here this cryptographic protocol is just an algorithm for matching the key means matching of stored fingerprint images say DB Images with further given fingerprint image say Final Image. For matching purpose we used binary conversion of images. This algorithm is suitable for any type of data (means text data, multimedia data etc.

  4. Austrian's syndrome: The first described case of pneumococcal meningitis pneumonia and endocarditis in an injecting drug user.

    Science.gov (United States)

    Beadsworth, Mike B J; Wooton, Dan; Chenzbraun, Adrian; Beeching, Nick J

    2007-12-01

    We describe the first reported case of Austrian's syndrome in an injecting drug user (IDU). The triad of endocarditis, meningitis and pneumonia caused by invasive pneumococcal disease (IPD) is most commonly associated with excess alcohol. Injecting drug use is a recognised risk factor for IPD, whose prevalence and resistance continue to rise. We propose that injecting drug use is associated with Austrian's syndrome and that it should at least be considered in 'at risk' groups presenting with IPD. Furthermore, IDU presenting with IPD, meningitis and pneumonia should be considered for echocardiography.

  5. Feasibility and acceptance of biofeedback-assisted mental training in an Austrian elementary school: a pilot study.

    Science.gov (United States)

    Crevenna, Richard; Krammer, Christine; Keilani, Mohammad

    2016-04-01

    This pilot study aimed to investigate feasibility, acceptance, and effects of biofeedback-assisted mental training in a population of fifteen 10-year-old pupils in an Austrian elementary school. Participants were instructed in relaxation techniques by using biofeedback. Before intervention, after 6 weeks with active mental training and with regular instructions by the teacher, and after a further time period of 6 weeks without instructions, attention and concentration improved. The results indicate feasibility, good acceptance, and beneficial effects of biofeedback-assisted mental techniques in Austrian elementary school pupils.

  6. Facelock: familiarity-based graphical authentication

    Directory of Open Access Journals (Sweden)

    Rob Jenkins

    2014-06-01

    Full Text Available Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate, even after a one-year delay (86.1% success rate. Zero-acquaintance attackers were reduced to guessing (<1% success rate. Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate. In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate. Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  7. Android Based Total Security for System Authentication

    Directory of Open Access Journals (Sweden)

    Mithil Vasani

    2015-04-01

    Full Text Available In this Paper [5], A highly severe menace to any computing device is the impersonation of an authenticate user. The most frequent computer authentication scheme is to use alphanumerical usernames and passwords. But the textual passwords are prone to dictionary attacks, eves dropping, shoulder surfing and social engineering. As such, graphical passwords have been introduced as an alternative to the traditional authentication process. Though the graphical password schemes provide a way of making more user friendly passwords, while increasing the level of security, they are vulnerable to shoulder surfing. To address this problem, text can be used in combination with the colors and images to generate the session passwords, thereby making a stronger authentication means. In general, session passwords are those that can be used only once and for every new session, a new password is engendered. This paper [7] describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for One Time Password generation. The generated One Time Password is valid for only a short user defined period of time and is generated by factors that are unique to both, the user and the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization. The proposed method has been implemented and tested. Initial results show the success of the proposed method.

  8. Designing authentic assessment: strategies for nurse educators.

    Science.gov (United States)

    Poindexter, Kathleen; Hagler, Debra; Lindell, Deborah

    2015-01-01

    Increased emphasis on health care safety requires renewed attention to teaching and learning processes for future health care professionals. When presented with problems situated in a clinical context, learners have rich opportunities to demonstrate integration of concepts. Authentic assessment is an approach to evaluation of learning through which students can demonstrate acquired knowledge, skills, and attitudes in the context of real-world or realistic nursing practice activities. This article describes features, approaches, and examples of authentic assessment processes in the context of classroom, clinical, and online nursing education.

  9. Multimedia encryption and authentication techniques and applications

    CERN Document Server

    Furht, Borko

    2006-01-01

    Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for thos

  10. Biometrics Identity Authentication in Secure Electronic Transactions

    Directory of Open Access Journals (Sweden)

    Deepu Saini

    2012-06-01

    Full Text Available There are so many ways by which a person can be identified, but authentication of a person by biometric methods is assumed to be more secure. There are many reasons behind this e.g. in this world each person is having different biometric features, even thetwins in this world having different biometrics features. In electronic transactions, biometric method is used from very early days but now a day’s it is supposed to be the best and secure method for electronic transactions. In this paper the concepts regarding biometric identity authentication are explained.

  11. Fingerprint Recognition on Various Authentication Sensors

    Institute of Scientific and Technical Information of China (English)

    A.Tirupathi Rao; N.Pattabhi Ramaiah; C.Krishna Mohan

    2014-01-01

    Fingerprint is a very popular and an ancient biometric technology to uniquely identify a person. In this paper, a fingerprint matcher is proposed which uses the global and local adaptive binarization and global minutia features. The fingerprint data is collected using three different authentication devices based on optical sensors. The experimental results are compared with the National Institute of Standards and Technology (NIST) Bozorth algorithm and various authentication fingerprint sensors. The accuracy of the proposed algorithm has been improved significantly compared with that of the NIST Bozorth algorithm.

  12. ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    Amit Rana

    2012-09-01

    Full Text Available The Internet Engineering Task Force (IETF has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service. The proposedprotocol - PEAP provides for Client identity protection andkey generation thus preventing unauthorized user accessand protecting or encrypting the data against maliciousactivities.

  13. Entity Authentication:Analysis using Structured Intuition

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    In this paper, we propose a new method for the analysis that uses intuition of the analyst in a structured way. First we define entity authentication in terms of fine level authentication goals (FLAGs). Then we use some relevant structures in protocol narrations and use them to justify FLAGs...... for the protocol. All along this process, we discover vulnerabilities and unstated assumptions of the protocol. As the method is intuition based, the quality of results depends on the expertise of the security analyst, however, the structured intuition has two major advantages: Firstly we get a precise...

  14. Environmental footprints in the meat chain

    Science.gov (United States)

    Đekić, I.; Tomašević, I.

    2017-09-01

    The objective of this paper was to present environmental performance of the meat chain and highlight main environmental footprints. The meat sector is recognized as one of the leading polluting sectors in the food industry. The meat chain was analyzed from a five-link perspective introducing the following actors: farm(er)s, slaughterhouses, meat processors, customers and consumers. Meat production needs natural resources (water and energy) resulting in waste and waste water discharge. As an outcome it has a high influence on climate change in respect to global warming, acidification and eutrophication potentials and ozone depletion substances.

  15. Meat Production and Market in Italy

    Directory of Open Access Journals (Sweden)

    Giulio Cozzi

    2003-06-01

    Full Text Available Aim of this review was to describe the Italian meat production and market.The weight of Italian meat production in terms of the national agriculture gross domestic product (GDP is around the 25%. The present review will analyze the market and the productive systems of the main types of meat sold in the Italian market focusing the attention on their strength and weakness points as well as the possible future developments. The final part of the article will evaluate the recent trends of consumptions for the different meat in Italy as well as the expectations of the Italian consumer when buying meat products.

  16. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    OpenAIRE

    Sreedharan Ajish

    2016-01-01

    The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption ...

  17. The role of authenticity in electoral social media campaigns

    OpenAIRE

    Grow, Gabrielle; Ward, Janelle

    2013-01-01

    textabstractAuthenticity is a popular buzzword in electoral politics: Electoral candidates and politicians are expected to be authentic in their public interactions. Since 2008, campaigning via social media has become an integral part of elections in the United States, and continues to gain importance. In such an environment, this paper presents research into the role of authenticity in electoral social media campaigns. Using Gilpin, et al.'s (2010) definition of authenticity as the theoretic...

  18. Color Based Authentication Scheme for Publically Disclosable Entities

    Directory of Open Access Journals (Sweden)

    A. S. Syed Shahul Hameed

    2015-01-01

    Full Text Available Traditional password authentication system are not strong enough to cope up with the current age of cybercrime. It’s high time that new password authentication schemes are explored and studied. This paper aims to provide an authentication system based on color recognition which would provide a way to encrypt both the username and password. The Color based authentication system would provide an efficient way to encrypt account details for sensitive applications like defense and banking.

  19. A study of user authentication using mobile phone

    OpenAIRE

    Hallsteinsen, Steffen Gullikstad

    2007-01-01

    The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentication scheme is based on usernames and passwords which are neither secure nor user-friendly. Hence, better solutions for simplified, yet secure authentication, is required in the future. This thesis present an authentication scheme based on a One-Time Password (OTP) MIDlet running on a mobile phone for unified authenti...

  20. Austrian pine phenolics are likely contributors to systemic induced resistance against Diplodia pinea.

    Science.gov (United States)

    Sherwood, Patrick; Bonello, Pierluigi

    2013-08-01

    The molecular basis of the systemic induced resistance (SIR) phenotype known to occur in Austrian pine (Pinus nigra J.F. Arnold) in response to the tip blight and canker pathogen Diplodia pinea (Desm.) remains unclear. Specialized metabolites such as phenolics are considered to be an important component of plant defense, including SIR, but the antimicrobial activity of many of these putative defensive chemicals remains untested at realistic concentrations and in conjunction with each other. Here, we examined the anti-Diplodia activity of several previously identified Austrian pine phenolics associated with SIR by comparing the diameters of fungal colonies grown on media amended with ferulic acid, coumaric acid, taxifolin, pinosylvin, pinosylvin monomethyl ether and lignin. All of the compounds were tested both individually and as clusters (combinations) previously determined to occur in planta in a co-regulated fashion. Both the individual compounds and clusters were tested at constitutive concentrations and pathogen-induced concentrations linked to an SIR phenotype. Lignin possessed the strongest antifungal activity individually, and clusters at the SIR concentrations had the greatest antifungal effects, achieving fungistasis. This study exemplifies the value of evaluating potential biomarkers of resistance at in planta concentrations that are associated with the systemically resistant phenotype, and provides strong evidence that co-regulation of chemical defenses potentiates such a phenotype.

  1. The relevance and legibility of radio/TV weather reports to the Austrian public

    Science.gov (United States)

    Keul, A. G.; Holzer, A. M.

    2013-03-01

    The communicative quality of media weather reports, especially warnings, can be evaluated by user research. It is an interdisciplinary field, still uncoordinated after 35 years. The authors suggest to shift from a cognitive learning model to news processing, qualitative discourse and usability models as the media audience is in an edutainment situation where it acts highly selective. A series of field surveys 2008-2011 tested the relevance and legibility of Austrian radio and television weather reports on fair weather and in warning situations. 247 laypeople heard/saw original, mostly up-to-date radio/TV weather reports and recalled personally relevant data. Also, a questionnaire on weather knowledge was answered by 237 Austrians. Several research hypotheses were tested. The main results were (a) a relatively high level of meteorological knowledge of the general population, with interest and participation of German-speaking migrants, (b) a pluralistic media usage with TV, radio and internet as the leading media, (c) higher interest and attention (also for local weather) after warnings, but a risk of more false recalls after long warnings, (d) more recall problems with radio messages and a wish that the weather elements should always appear in the same order to faciliate processing for the audience. In their narrow time windows, radio/TV weather reports should concentrate on main features (synoptic situation, tomorrow's temperature and precipitation, possible warnings), keep a verbal “speed limit” and restrict show elements to serve the active, selective, multioptional, multicultural audience.

  2. The Austrian health reform 2013 is promising but requires continuous political ambition.

    Science.gov (United States)

    Hofmarcher, Maria M

    2014-10-01

    The Austrian health system is much more complex and fragmented than in other OECD countries. In 2013 legislation was adopted to enhance efficiency through better balancing care provision across providers by promoting new primary care models and better coordination of care. Reform objectives should be achieved by cooperative and unified decision making across key stakeholders and by adherence to a budget cap that prescribes fiscal containment on the order of 3.4 billion Euros until 2016. This is priced into the envisaged savings of the current consolidation program. Efforts have been made to bridge the accountability divide by establishing agreements and administrative layers to govern the health system by objectives. Yet, more could have been achieved. For example, cross-stakeholder pooling of funds for better contracting governance and effective purchasing across care settings could have been introduced. This would have required addressing over capacity and fragmentation within social security. At the same time, legal provisions for cooperative governance between Sickness Funds and the governments on the regional level should have been stipulated. The Austrian 2013 reform is interesting to other countries as it aims to ensure better-balanced care at a sustainable path by employing a public management approach to governance relations across key payers of care.

  3. Renal infarction as a presentation of Austrian syndrome: thromboembolic phenomenon of pneumococcal endocarditis.

    Science.gov (United States)

    Mankongpaisarnrung, Charoen; Soontrapa, Suthipong; Nantsupawat, Teerapat; Desai, Vipul; Nugent, Kenneth

    2012-09-01

    A 52-year-old unvaccinated and splenectomized man presented with fever, altered sensorium, bilateral flank pain and chest discomfort accompanied with paroxysmal atrial fibrillation with a rapid ventricular response. An abdominal computed tomography scan was performed, which revealed a right renal infarct and splenosis. Transthoracic echocardiography was performed, which demonstrated an echodense structure on the mitral valve with mitral regurgitation and a vegetation on the aortic valve with aortic regurgitation. Subsequently, he was found to have pneumococcal infective endocarditis, pneumococcal pneumonia and bacterial meningitis, namely Austrian syndrome. He underwent an early aortic valve and mitral valve repair but still had a poor clinical outcome. Renal infarction has a mortality of approximately 13.2%, which is strongly influenced by the underlying diseases and infectious complications. Medical and surgical treatment initiated in a timely manner is often inadequate. The authors report the first case of Austrian syndrome presenting with renal infarction as a clue to an embolic event associated with infective endocarditis in this study.

  4. Crowdsourcing Austrian data on decomposition with the help of citizen scientists

    Science.gov (United States)

    Sandén, Taru; Berthold, Helene; Schwarz, Michael; Baumgarten, Andreas; Spiegel, Heide

    2017-04-01

    Decay of organic material, decomposition, is a critical process for life on earth. Through decomposition, food becomes available for plants and soil organisms that they use in their growth and maintenance. When plant material decomposes, it loses weight and releases the greenhouse gas carbon dioxide (CO2) into the atmosphere. Terrestrial soils contain about three times more carbon than the atmosphere and, therefore, changes in the balance of soil carbon storage and release can significantly amplify or attenuate global warming. Many factors affecting the global carbon cycle are already known and mapped; however, an index for decomposition rate is still missing, even though it is needed for climate modelling. The Tea Bag Index (TBI) measures decomposition in a standardised, achievable, climate-relevant, and time-relevant way by burying commercial nylon tea bags in soils for three months (Keuskamp et al., 2013). In the summer of 2016, TBI (expressed as decomposition rate (k) and stabilisation index (S)) was measured with the help of Austrian citizen scientists at 7-8 cm soil depth in three different land uses (maize croplands, grasslands and forests). In total ca. 2700 tea bags were sent to the citizen scientists of which ca. 50% were returned. The data generated by the citizen scientists will be incorporated into an Austrian as well as a global soil map of decomposition. This map can be used as input to improve climate modelling in the future.

  5. High concentrations of anthocyanins in genuine cherry-juice of old local Austrian Prunus avium varieties.

    Science.gov (United States)

    Schüller, Elisabeth; Halbwirth, Heidi; Mikulic-Petkovsek, Maja; Slatnar, Ana; Veberic, Robert; Forneck, Astrid; Stich, Karl; Spornberger, Andreas

    2015-04-15

    Antioxidant activity and polyphenols were quantified in vapour-extracted juice of nine Austrian, partially endemic varieties of sweet cherry (Prunus avium): cv. 'Spätbraune von Purbach', cv. 'Early Rivers', cv. 'Joiser Einsiedekirsche', cv. 'Große Schwarze Knorpelkirsche' and four unidentified local varieties. Additionally the effect of storage was evaluated for six of the varieties. A variety showing the highest antioxidant capacity (9.64 μmol Trolox equivalents per mL), total polyphenols (2747 mg/L) and total cyanidins (1085 mg/L) was suitable for mechanical harvest and its juice did not show any losses of antioxidant capacity and total anthocyanin concentration during storage. The juice of cv. 'Große Schwarze Knorpelkirsche' had also high concentrations of total anthocyanins (873 mg/L), but showed substantial losses through storage. The local Austrian sweet cherry varieties from the Pannonian climate zone are particularly suitable for the production of processed products like cherry juice with high content of anthocyanins and polyphenols.

  6. Microbiological quality of rabbit meat.

    Science.gov (United States)

    Rodríguez-Calleja, Jose M; Santos, Jesús A; Otero, Andrés; García-López, María-Luisa

    2004-05-01

    World rabbit meat production is estimated to be over 1 million tons, and Spain is the third largest producer. Although rabbit meat is marketed and consumed worldwide, information on microbiological quality is very scarce. Here, we report indicator organisms, spoilage flora, sensory quality, and some physicochemical traits of 24 h postmortem chilled rabbit carcasses and prepackaged rabbit meat stored chilled in air for 0 to 3 days at the retail level. The mean total bacterial count (4.01 +/- 0.48 log CFU/g) for carcasses dressed at a small abattoir by a manual process was significantly lower (P Pseudomonas, lactic acid bacteria, and yeasts. These microorganisms and Brochothrix thermosphacta were dominant on carcasses from the large abattoir. On prepacked hind legs (pH 6.26 +/- 0.18) stored at -1 to +1 degree C (supermarket 1), mean aerobic mesophilic count was 5.87 +/- 1.03 log CFU/g, and the major microbial groups were Pseudomonas, yeasts, lactic acid bacteria, and B. thermosphacta. On prepacked whole carcasses (pH 6.37 +/- 0.18) displayed at -1 to +5 degrees C (supermarket 2), mean aerobic mesophilic count was 6.60 +/- 1.18 and the same microbial groups were dominant. Relative Escherichia coli incidence was supermarket 2 > large abattoir > supermarket 1 > small abattoir. Overall, low numbers of coliforms, Enterobacteriaceae, psychrotrophic clostridia, coagulase-positive staphylococci, and molds were found. Sensory scores, pH values, and L-lactic acid content differentiated fresh carcasses from retail samples. Data obtained suggest that the microflora of chilled rabbit meat are different from those found on the meat of other animals.

  7. Main Concerns of Pathogenic Microorganisms in Meat

    Science.gov (United States)

    Nørrung, Birgit; Andersen, Jens Kirk; Buncic, Sava

    Although various foods can serve as sources of foodborne illness, meat and meat products are important sources of human infections with a variety of foodborne pathogens, i.e. Salmonella spp., Campylobacter jejuni/coli, Yersinia enterocolitica, Verotoxigenic E. coli and, to some extent, Listeria monocytogenes. All these may be harboured in the gastrointestinal tract of food-producing animals. The most frequent chain of events leading to meat-borne illness involves food animals, which are healthy carriers of the pathogens that are subsequently transferred to humans through production, handling and consumption of meat and meat products. Occurrences of Salmonella spp., C. jejuni/coli, Y. enterocolitica and Verotoxigenic E. coli in fresh red meat vary relatively widely, although most often are between 1 and 10%, depending on a range of factors including the organism, geographical factors, farming and/or meat production practices.

  8. Meeting EFL Learners Halfway by Using Locally Relevant Authentic Materials

    Science.gov (United States)

    Thomas, Catherine

    2014-01-01

    The author defines and describes authentic materials and discusses their benefits--citing the Input Hypothesis and the Output Principle in support of such materials--as well as some challenges of using authentic materials. Five categories of authentic materials are presented, and sources for materials and ways to use them in the EFL classroom are…

  9. From Lessons to Life: Authentic Materials Bridge the Gap.

    Science.gov (United States)

    Spelleri, Maria

    2002-01-01

    Focuses on the use of authentic materials in teaching English as a Second Language. Issues addressed include students' interest in "real life" materials, the role of the teacher, and how to teach using authentic materials. Sample criteria for selecting authentic materials are included. (Author/VWL)

  10. Authentic Assessment for Student Learning: An Ontological Conceptualisation

    Science.gov (United States)

    Vu, Thuy T.; Dall'Alba, Gloria

    2014-01-01

    Authentic assessment has been proposed as having potential to enhance student learning for a changing world. Conventionally, assessment is seen to be authentic when the tasks are real-to-life or have real-life value. Drawing on Martin Heidegger's work, we challenge this conceptualisation as narrow and limited. We argue that authenticity need…

  11. Teachers' Development Model to Authentic Assessment by Empowerment Evaluation Approach

    Science.gov (United States)

    Charoenchai, Charin; Phuseeorn, Songsak; Phengsawat, Waro

    2015-01-01

    The purposes of this study were 1) Study teachers authentic assessment, teachers comprehension of authentic assessment and teachers needs for authentic assessment development. 2) To create teachers development model. 3) Experiment of teachers development model. 4) Evaluate effectiveness of teachers development model. The research is divided into 4…

  12. Quantum-secure authentication of a physical unclonable key

    NARCIS (Netherlands)

    Goorden, S.A.; Horstmann, M.; Mosk, A.P.; Skoric, B.; Pinkse, P.W.H.

    2014-01-01

    Authentication of persons and objects is a crucial aspect of security. We experimentally demonstrate quantumsecure authentication (QSA) of a classical multiplescattering key. The key is authenticated by illuminating it with a light pulse containing fewer photons than spatial degrees of freedom and v

  13. Toward Developing Authentic Leadership: Team-Based Simulations

    Science.gov (United States)

    Shapira-Lishchinsky, Orly

    2014-01-01

    Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…

  14. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  15. Robust authentication through stochastic femtosecond laser filament induced scattering surfaces

    Science.gov (United States)

    Zhang, Haisu; Tzortzakis, Stelios

    2016-05-01

    We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.

  16. Children's and Adolescents' Perception of the Authenticity of Smiles

    Science.gov (United States)

    Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula

    2009-01-01

    Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six…

  17. Claims-Based Authentication for a Web-Based Enterprise

    Science.gov (United States)

    2013-07-01

    Processing Standards Publication. “Entity Authentication Using Public Key Cryptography”, February 18, 1997 b. FIPS 197, Advanced Encryption Standard ( AES ...provided by a trusted entity and can be verified and validated. Of the many authentication protocols, including self-attestation, username/ password ...authentication and Active Entity B retrieving content from a passive entity. Figure 1 Communication between Active Entities III. CREDENTIALING IN THE

  18. Reconciling Divisions in the Field of Authentic Education

    Science.gov (United States)

    Sarid, Ariel

    2015-01-01

    The aim of this article is twofold: first, to identify and address three central divisions in the field of authentic education that introduce ambiguity and at times inconsistencies within the field of authentic education. These divisions concern a) the relationship between autonomy and authenticity; b) the division between the two basic attitudes…

  19. A Research on the Consequences of Authentic Leadership

    OpenAIRE

    Akif Tabak; Mustafa Polat; Serkan Cosar; Tolga Turkoz

    2013-01-01

    The present study examined the relationship between employees' authentic leadership perceptions and three relevant authentic leadership consequences, organizational trust, organizational commitment and organizational cynicism. With 371 employees in a Turkish firm, correlation analysis results showed that authentic leadership perceptions of employees were positively related to organizational trust and organizational commitment, but was negatively related with organizational cynicism. Moreover,...

  20. School Principals' Authentic Leadership and Teachers' Psychological Capital: Teachers' Perspectives

    Science.gov (United States)

    Feng, Feng-I

    2016-01-01

    This study examined teachers' perceptions of principals' authentic leadership and the relationship of authentic leadership to teachers' psychological capital in Taiwan. A total of 1,429 elementary and secondary school teachers were surveyed. The results showed that teachers perceived their principals' authentic leadership as moderate and that the…

  1. Water demand for ski resort development in the Austrian Alps: an Overview

    Science.gov (United States)

    Breiling, M.; Sokratov, S.

    2012-04-01

    Austria has the highest national added value from winter tourism in Europe, as well as worldwide. 15.7 million arrivals were counted in Austrian accommodation establishments in the 2010/11 winter season. There were more than 62 million overnight stays and 51.2 million skier-days were consumed. 588 million transports were carried out by more than 3000 lifts (cable cars, chair lifts and T-bars). Including indirect and induced effects, this resulted in more than 10 billion euros in added value being generated. The lack of snow in many Austrian skiing areas during the 2006/2007 winter season demonstrated the extent to which meteorological conditions influence operations. Declines in the number of skiers transported and total skier days were the result. The cable-car operators also had to struggle with little snow in the 2010/2011 winter. The Austrian Cable Car Operators' Association stated that the opening of 70-80% of all skiing areas outside of the peak season could only be assured through the use of snowmaking equipment. The central criterion for winter sports enthusiasts to make a trip is the guarantee that they will find snow at their destination and Austria's cable-car operators invest more than 100 million euros in the erection and improvement of snowmaking complexes every year to satisfy this deand. In the 2010/2011 season, this provided for 17,800 jobs. Cable car operators set up snowmaking equipment to become independent from meteorological conditions and improve the capacity utilisation of their expensive investments in transport systems in the early winter. Austria has a skiing area of around 25,400 hectares - around 17,000 hectares at altitudes between 600m and 3200m are currently suitable for snowmaking. As much as 70% of the snow is produced immediately before the start of the season. This recent trend is responsible that the irrigation pattern of Austrian land use changed significantly in the last decade. Previously maize fields and low lands in summer

  2. Identification of species origin of meat and meat products on the DNA basis: a review.

    Science.gov (United States)

    Kumar, Arun; Kumar, Rajiv Ranjan; Sharma, Brahm Deo; Gokulakrishnan, Palanisamy; Mendiratta, Sanjod Kumar; Sharma, Deepak

    2015-01-01

    The adulteration/substitution of meat has always been a concern for various reasons such as public health, religious factors, wholesomeness, and unhealthy competition in meat market. Consumer should be protected from these malicious practices of meat adulterations by quick, precise, and specific identification of meat animal species. Several analytical methodologies have been employed for meat speciation based on anatomical, histological, microscopic, organoleptic, chemical, electrophoretic, chromatographic, or immunological principles. However, by virtue of their inherent limitations, most of these techniques have been replaced by the recent DNA-based molecular techniques. In the last decades, several methods based on polymerase chain reaction have been proposed as useful means for identifying the species origin in meat and meat products, due to their high specificity and sensitivity, as well as rapid processing time and low cost. This review intends to provide an updated and extensive overview on the DNA-based methods for species identification in meat and meat products.

  3. Red meat and processed meat consumption and all-cause mortality: a meta-analysis.

    Science.gov (United States)

    Larsson, Susanna C; Orsini, Nicola

    2014-02-01

    High consumption of red meat and processed meat has been associated with increased risk of several chronic diseases. We conducted a meta-analysis to summarize the evidence from prospective studies on red meat and processed meat consumption in relationship to all-cause mortality. Pertinent studies were identified by searching PubMed through May 2013 and by reviewing the reference lists of retrieved articles. Prospective studies that reported relative risks with 95% confidence intervals for the association of red meat or processed meat consumption with all-cause mortality were eligible. Study-specific results were combined by using a random-effects model. Nine prospective studies were included in the meta-analysis. The summary relative risks of all-cause mortality for the highest versus the lowest category of consumption were 1.10 (95% confidence interval (CI): 0.98, 1.22; n = 6 studies) for unprocessed red meat, 1.23 (95% CI: 1.17, 1.28; n = 6 studies) for processed meat, and 1.29 (95% CI: 1.24, 1.35; n = 5 studies) for total red meat. In a dose-response meta-analysis, consumption of processed meat and total red meat, but not unprocessed red meat, was statistically significantly positively associated with all-cause mortality in a nonlinear fashion. These results indicate that high consumption of red meat, especially processed meat, may increase all-cause mortality.

  4. Comparison between Mt-DNA D-Loop and Cyt B primers for porcine DNA detection in meat products

    Science.gov (United States)

    Hamzah, Azhana; Mutalib, Sahilah Abd.; Babji, Abdul Salam

    2013-11-01

    This study was conducted to detect the presence of porcine DNA in meat products in the market using conventional polymerase chain reaction (PCR) and commercial PCR-southern hybridization analysis. Porcine DNA detection in meat products was tested due to some issues associated with the adulteration of food products in Malaysia. This is an important issue especially for Halal authentication which is required for some religious practices such as in Islam and Hinduisms. Many techniques have been developed for determining the Halal status of food products. In this paper, mt-DNA D-loop primer and cytochrome (cyt) b were used to detect the presence of porcine DNA in meat products. Positive and negative controls were always present for each batch of extraction. DNA of raw pork meat was used as a positive control while nucleus free water is used as negative control. A pair of oligonucleotide primer was used namely Pork1 and Pork2 which produced amplicon of 531 base pair (bp) in size. While, PCR-southern hybridization was conducted using primers readily supplied by commercial PCR-Southern hybridization and produced amplicon with 276 bp in size. In the present study, demonstrated that none of the samples were contaminated with porcine residuals but selected samples with pork meat were positive. The species-specific PCR amplification yielded excellent results for identification of pork derivatives in food products and it is a potentially reliable and suitable technique in routine food analysis for Halal certification.

  5. Analytical strategies to confirm Scotch whisky authenticity. Part II: Mobile brand authentication.

    Science.gov (United States)

    MacKenzie, W M; Aylott, R I

    2004-07-01

    Whilst the authentication of Scotch whisky brands using laboratory based gas chromatography is well established, there is a need for authentication methods for use under field test conditions. The UV/visible absorbance spectra of specific brands of Scotch whisky were found to produce consistent absorbance ranges which allowed the development of a faster, cheaper and more mobile test method. Test samples with spectra outside the acceptable ranges for genuine reference samples were therefore deemed suspect, enabling their authenticity to be later confirmed in the laboratory by GC. This novel application allowed brand authenticity analyses to be undertaken at remote sites where gas chromatography was unavailable and has also allowed the introduction of field testing using a small portable hand held spectrophotometer.

  6. Values, attitudes, and frequency of meat consumption. Predicting meat-reduced diet in Australians.

    Science.gov (United States)

    Hayley, Alexa; Zinkiewicz, Lucy; Hardiman, Kate

    2015-01-01

    Reduced consumption of meat, particularly red meat, is associated with numerous health benefits. While past research has examined demographic and cognitive correlates of meat-related diet identity and meat consumption behaviour, the predictive influence of personal values on meat-consumption attitudes and behaviour, as well as gender differences therein, has not been explicitly examined, nor has past research focusing on 'meat' generally addressed 'white meat' and 'fish/seafood' as distinct categories of interest. Two hundred and two Australians (59.9% female, 39.1% male, 1% unknown), aged 18 to 91 years (M = 31.42, SD = 16.18), completed an online questionnaire including the Schwartz Values Survey, and measures of diet identity, attitude towards reduced consumption of each of red meat, white meat, and fish/seafood, as well as self-reported estimates of frequency of consumption of each meat type. Results showed that higher valuing of Universalism predicted more positive attitudes towards reducing, and less frequent consumption of, each of red meat, white meat, and fish/seafood, while higher Power predicted less positive attitudes towards reducing, and more frequent consumption of, these meats. Higher Security predicted less positive attitudes towards reducing, and more frequent consumption, of white meat and fish/seafood, while Conformity produced this latter effect for fish/seafood only. Despite men valuing Power more highly than women, women valuing Universalism more highly than men, and men eating red meat more frequently than women, gender was not a significant moderator of the value-attitude-behaviour mediations described, suggesting that gender's effects on meat consumption may not be robust once entered into a multivariate model of MRD attitudes and behaviour. Results support past findings associating Universalism, Power, and Security values with meat-eating preferences, and extend these findings by articulating how these values relate specifically

  7. Speed Bumps for Authentic Listening Material

    Science.gov (United States)

    Meinardi, Marty

    2009-01-01

    This article investigates whether authentic native speaker (NS) to NS speech can be made available to the learner listener through the use of a novel slow-down tool. Results from various preliminary tests seem to indicate that the use of a slow-down algorithm in many cases, and in particular in samples with a higher speed rate and word count,…

  8. Elemental Scanning Devices Authenticate Works of Art

    Science.gov (United States)

    2013-01-01

    To better detect aluminum compounds, Marshall Space Flight Center partnered with KeyMaster Inc. (later acquired by Madison, Wisconsin-based Bruker AXS Inc.) to develop a vacuum pump system that could be attached to X-ray fluorescence (XRF) scanners. The resulting technology greatly expanded XRF scanner capabilities, and hundreds of museums now use them to authenticate artifacts and works of art.

  9. Community Engagement as Authentic Learning with Reflection

    Science.gov (United States)

    Power, Anne

    2010-01-01

    Authentic learning in teacher education is deeply connected with students' future professional practice. This paper describes coaching and mentoring strands of a unit in the preparation of pre-service teachers and critically evaluates reflections made in terms of Professional Teacher Standards. (Contains 1 table.)

  10. Towards an ethics of authentic practice.

    Science.gov (United States)

    Murray, Stuart J; Holmes, Dave; Perron, Amélie; Rail, Geneviève

    2008-10-01

    This essay asks how we might best elaborate an ethics of authentic practice. Will we be able to agree on a set of shared terms through which ethical practice will be understood? How will we define ethics and the subject's relation to authoritative structures of power and knowledge? We begin by further clarifying our critique of evidence-based medicine (EBM), reflecting on the intimate relation between theory and practice. We challenge the charge that our position amounts to no more than 'subjectivism' and 'antiauthoritarian' theory. We argue that an ethical practice ought to question the authority of EBM without falling into the trap of dogmatic antiauthoritarianism. In this, we take up the work of Hannah Arendt, who offers terms to help understand our difficult political relation to authority in an authentic ethical practice. We continue with a discussion of Michel Foucault's use of 'free speech' or parrhesia, which he adopts from Ancient Greek philosophy. Foucault demonstrates that authentic ethical practice demands that we 'speak truth to power.' We conclude with a consideration of recent biotechnologies, and suggest that these biomedical practices force us to re-evaluate our theoretical understanding of the ethical subject. We believe that we are at a crucial juncture: we must develop an ethics of authentic practice that will be commensurable with new and emergent biomedical subjectivities.

  11. Pathways to Authenticity in Operatic Interpretation

    DEFF Research Database (Denmark)

    Grund, Cynthia M.; Westney, WIlliam

    through physically interactive and expressive warm-up exercises that break down barriers at the start of the session, and through interactive and experimental techniques in response to the performances themselves. On this approach, physicality and interactivity provide pathways to authenticity on the part...

  12. Supporting Authentic Learning Contexts Beyond Classroom Walls

    Science.gov (United States)

    Herrington, Jan; Specht, Marcus; Brickell, Gwyn; Harper, Barry

    At the classroom level, contexts for learning are often limited in the experiential component. Teachers and trainers feel overwhelmed by the difficulty of inventing authentic learning contexts, and creating tasks that truly reflect the way knowledge would be used in the real world (Herrington et al. 2004). However, there are growing numbers of examples of how such authentic learning environments are being used in schools, higher education, and professional development in a variety of contexts and discipline areas, such as in literacy education (Ferry et al. 2006), in physical activity fitness and health (Rice et al. 1999), in Indigenous education (Marshall et al. 2001), in evaluation (Agostinho 2006), in multimedia and ICT (Bennett et al. 2001), in literature (Fitzsimmons 2006), and in business writing (Pennell et al. 1997). Teachers and trainers who subscribe to this approach to learning can be very inventive in developing learner perceptions of authentic contexts, but often financial, situational and time constraints limit the experiential elements of authentic learning settings.

  13. Rugged Practices: Embodying Authenticity in Outdoor Recreation

    Science.gov (United States)

    Senda-Cook, Samantha

    2012-01-01

    When people recreate outdoors, they value the quality of the experience. This study examines rhetorical practices that sustain or undermine perceived authentic outdoor recreation experiences. I conducted a rhetorical analysis of my fieldnotes gathered through participant observation and interview transcripts of online and in-person interviews. I…

  14. Authenticated hash tables

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Papamanthou, Charalampos; Tamassia, Roberto

    2008-01-01

    Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so that the client can save space or achieve load balancing. Authenticating the hash table functionality, i.e., verifying ...

  15. Authentic Scientific Inquiry and School Science

    Science.gov (United States)

    Hume, Anne

    2009-01-01

    Scientific literacy goals feature strongly in the rhetoric of most forward-looking science curricula. Many science educators believe that a key means of attaining these goals is through the engagement of students in "authentic scientific inquiry". For students to experience such learning it is critical that teachers understand and appreciate what…

  16. Disambiguating authenticity: Interpretations of value and appeal

    Science.gov (United States)

    O’Connor, Kieran; Carroll, Glenn R.; Kovács, Balázs

    2017-01-01

    While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity–type, moral, craft, and idiosyncratic–we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed to it through: (1) consumer value ratings, (2) willingness to pay, and (3) behavioral choice. We report empirical analyses from a research program of three multi-method studies using (1) archival data from voluntary consumer evaluations of restaurants in an online review system, (2) a university-based behavioral lab experiment, and (3) an online survey-based experiment. Evidence is consistent across the studies and suggests that perceptions of four distinct subtypes of socially constructed authenticity generate increased appeal and value even after controlling for option quality. Findings suggest additional directions for research on authenticity. PMID:28650997

  17. Simulation for Authentic Learning in Informal Education

    Science.gov (United States)

    Dupuis, Jason; Ludwig-Palit, DeDee

    2016-01-01

    In 2011, the Museum of Science and Industry in Chicago, Illinois embarked on the creation of a program that allows middle and high school students to explore community health issues using human patient simulation. MedLab was created to engage students in an authentic exploration of medical science, biology, and human anatomy, with a particular…

  18. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Qian; Veldhuis, Raymond

    2010-01-01

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information fu

  19. Semiotic and semantic implications of "authenticity".

    Science.gov (United States)

    Giannini, A James

    2010-04-01

    The concept of transgenerational authenticity was examined in a Japanese cohort by Ito, et al. Reviewing that study, it was noted the eldest generation was distinguished from succeeding ones as this group grew up under U.S. military occupation. The possibility of resultant semantic and semiotic disruptions was considered.

  20. In Search of Authentic Learning in Kazakhstan

    Science.gov (United States)

    Cua, Francisco Chia; Reames, Stephen A.

    2012-01-01

    The foreign faculty in Kazakhstan faced the challenge of designing a total authentic learning curricula for undergraduate students used to a traditional approach to learning. Students were asked to submit reflective learning journeys at the end of the spring 2011 semester. This study uses their stories as a springboard to explore their perspective…

  1. Using Rose and Compass for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2009-07-09

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  2. Secure Authentication in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Arjan Durresi

    2008-01-01

    Full Text Available The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user's location only to within a current cell and restrictions on accessing users' location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G – WLAN user authentication.

  3. Active Authentication Using Covert Cognitive Interrogation Games

    Science.gov (United States)

    2013-06-01

    cognitive fingerprint detection methods and could be used to help increase the overall accuracy of a system of combined biometric modalities. The technical...Authentication, Game Theory, Cognitive fingerprint detection 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES...contextual analysis or explicit communicative behavior. This approach complements many other cognitive fingerprint detection methods and could be

  4. Capturing Cognitive Processing Time for Active Authentication

    Science.gov (United States)

    2014-02-01

    Description Physical biometrics relies on physical characteristics, such as fingerprints or retinal patterns. The behavioral biometric of keystroke...cognitive fingerprint for continuous authentication. Its effectiveness has been verified through a campus-wide experiment at Iowa State University...typing rhythm (CTR), Support Vector Machine (SVM), Behavioral Biometrics 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF

  5. Smartphone Sensors for Stone Lithography Authentication

    Science.gov (United States)

    Schirripa Spagnolo, Giuseppe; Cozzella, Lorenzo; Papalillo, Donato

    2014-01-01

    Nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. These facilities open them to innovative uses, other than the classical telephonic communication one. Smartphones are a more sophisticated version of classic mobile phones, which have advanced computing power, memory and connectivity. Because fake lithographs are flooding the art market, in this work, we propose a smartphone as simple, robust and efficient sensor for lithograph authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to “authenticate” non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the “not original artwork” is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative method for the authentication of stone lithographs. We use the color spots distribution captured by means of a smartphone camera as a non-cloneable texture of the specific artworks and an information management system for verifying it in mobility stone lithography. PMID:24811077

  6. Existential Authenticity: A Foundational Value for Counseling.

    Science.gov (United States)

    Miars, Russell D.

    2002-01-01

    The author challenges the view that adopting an existential perspective in counseling is inapplicable or a luxury for most clients. The concept of existential authenticity is presented as an organizing ethic that can bring out the positive side of existentialism in counseling. Specific values and conditions are presented that can be adopted to…

  7. Vocation as the Quest for Authentic Existence.

    Science.gov (United States)

    Homan, Kenneth B.

    1986-01-01

    Examines the concept of vocation and demonstrates that vocation is the organizing, existential principle of the concept of work. Presents a critical examination of Green's (1968) delineation of job and work and asserts that vocation as the quest for authentic existence is the unifying concept that gives grounding to Green's notion of work. (NB)

  8. Handwritten Text Image Authentication using Back Propagation

    CERN Document Server

    Chakravarthy, A S N; Avadhani, P S

    2011-01-01

    Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle attacks), and is often wrapped up with authenticating identity. Literary can involve imitating the style of a famous author. If an original manuscript, typewritten text, or recording is available, then the medium itself (or its packaging - anything from a box to e-mail headers) can help prove or disprove the authenticity of the document. The use of digital images of handwritten historical documents has become more popular in recent years. Volunteers around the world now read thousands of these images as part of their indexing process. Handwritten text images of old documents are sometimes difficult to read or noisy du...

  9. Authenticating the writings of Julius Caesar

    NARCIS (Netherlands)

    Kestemont, Mike; Stover, Justin; Koppel, Moshe; Karsdorp, F.B.; Daelemans, Walter

    2016-01-01

    In this paper, we shed new light on the authenticity of the Corpus Caesarianum, a group of five commentaries describing the campaigns of Julius Caesar (100–44 BC), the founder of the Roman empire. While Caesar himself has authored at least part of these commentaries, the authorship of the rest of th

  10. Authenticating the writings of Julius Caesar

    NARCIS (Netherlands)

    Kestemont, Mike; Stover, Justin; Koppel, Moshe; Karsdorp, F.B.; Daelemans, Walter

    2016-01-01

    In this paper, we shed new light on the authenticity of the Corpus Caesarianum, a group of five commentaries describing the campaigns of Julius Caesar (100–44 BC), the founder of the Roman empire. While Caesar himself has authored at least part of these commentaries, the authorship of the rest of

  11. Two-Factor Cancelable Biometrics Authenticator

    Institute of Scientific and Technical Information of China (English)

    Ying-Han Pang; Andrew T. B. J; David N. C. L

    2007-01-01

    Biometrics-based authentication system offers advantages of providing high reliability and accuracy.However,the contemporary authentication system is impuissance to compromise.If a biometrics data is compromised, it cannot be replaced and rendered unusable.In this paper, a cancelable biometrics-based authenticator is proposed to solve this irrevocability issue.The proposed approach is a two-factor authentication system, which requires both of the random data and facial feature in order to access the system.In this system, tokenized pseudo-random data is coupled with moment-based facial feature via inner product algorithm.The output of the product is then discretized to generate a set of private binary code, coined as 2factor-Hashing code, which is acted as verification key.If this biometrics-based verification key is compromised, a new one can be issued by replacing a different set of random number via token replacement.Then, the compromised one is rendered completely useless.This feature offers an extra protection layer against biometrics fabrication since the verification code is replaceable.Experimental results demonstrate that the proposed system provides zero Equal Error Rate in which there is a clear separation in between the genuine and the imposter distribution populations.

  12. What Do You Mean by "Authentic"? A Comparative Review of the Literature on Conceptions of Authenticity in Teaching

    Science.gov (United States)

    Kreber, Carolin; Klampfleitner, Monika; McCune, Velda; Bayne, Sian; Knottenbelt, Miesbeth

    2007-01-01

    "Authenticity in teaching" has been recognized as an important yet under-researched phenomenon. To gain greater insight into the meaning of authenticity in teaching in adult and higher education settings, the authors delved into some of the philosophical and educational literature on authenticity, giving particular attention, but not confining…

  13. Politics of Food, the Culinary and Ethnicity in Ruth Ozeki’ My Year of Meat: An Ecocritical Reading

    Directory of Open Access Journals (Sweden)

    Saeed Kalejahi

    2012-05-01

    Full Text Available The Canadian-American-Japanese writer and filmmaker Ruth Ozeki’ My year of Meat is built around one major nutritional source—protein or meat or, more exactly, beef. Applying an ecocritical method, but at the same time trying to not fall into the trap of mere ideology, the present article explores the question of authenticity and representation of politics of food, culinary and ethnicity in the aforementioned novel. In the following essay I will argue that in her novels, Ruth Ozeki employs a three-step narrative strategy: invocation, subversion, and redefinition.  The problem Ozeki addresses in this novel is that of disclosing the invisible reality behind the visible surface of that which poses as the real. In doing so she moves the problem of authenticity beyond the realm of ethnic and culinary culture. Rather than examining it as a form of ethnic “self-exoticization” or treating it merely as a fiction about cultural purity, she presents the authentic as an indispensable attribute of an ecologically viable culture and as a marker of representational sincerity in a globalized media economy.

  14. Prospects for the development of the market of meat and meat products

    OpenAIRE

    Sidorchuk, Roman

    2010-01-01

    This is a brief overview of the market of meat and meat products in Russia. Food products account for a significant portion of the costs residents of Russia. In 2000, these costs amount to more than 50% of all household expenditure. In this case the cost of meat and meat products 14.6% of all household expenditures. This shows how important place is the market of meat and meat products and its development prospects. Since the mid- sixties, then in the Soviet Union saw an increase in consumpti...

  15. CONCENTRATION OF CADMIUM IN MEAT AND SELECTED MEATS PRODUCTS

    Directory of Open Access Journals (Sweden)

    Anetta Lukáčová

    2015-02-01

    Full Text Available The cadmium concentrations depend on the environmental conditions and food production methods. The monitoring of cadmium concentration in meat is important for human health. The concentrations of cadmium in meat and meat products collected from central Slovakia, in the central Europe region and from different countries of West Europe were assessed using by AA spectrometer with graphite furnace (PerkinElmer AAnalyst 80, MA, USA. Within starting materials we detected the highest values of cadmium in beef from foreign production (0.1101 ppm, followed by pork from foreign production (0.0901 ppm in Lovecka salama and pork thigh (0.0523 ppm in selected ham. In Lovecka salami we were found the highest concentration of cadmium in final samples from foreign starting materials, followed by homogenized samples from foreign starting materials, final samples from domestic starting materials and homogenized samples from domestic starting materials (0.3728, 0.3549, 0.2387, 0.2112 ppm, respectively. The highest concentration of cadmium in selected ham were found in final products from foreign starting materials, homogenized samples from foreign starting materials, final products from domestic starting materials and homogenized samples from domestic starting materials (0.1453, 0.1382,0.0810, 0.0734 ppm, respectively. The obtained results suggested that the concentrations of cadmium are higher in homogenized samples and final products in Lovecka salami and selected ham in comparison with to starting materials. Technological process of meat processing can create a potential source of heavy metals in final products.

  16. THE IMPORTANCE OF BACTERIOCINS IN MEAT AND MEAT PRODUCTS

    OpenAIRE

    Serdaroğlu, Meltem; Meltem SAPANCI ÖZSÜMER

    2000-01-01

    There is an increasing consumer demand for food products which are free of chemical additives, reduced in salt and processed as little as possible. These minimally processed foods require special application to assure their microbiological safety. The use of microorganisms and enzymes for food preservatives is called biopreservation. The most important group of microorganisms with antimicrobial effect used in the production of foods is the lactic acid bacteria. In meats although lactic acid b...

  17. Authenticity and integrity of digital mammography images.

    Science.gov (United States)

    Zhou, X Q; Huang, H K; Lou, S L

    2001-08-01

    Data security becomes more and more important in telemammography which uses a public high-speed wide area network connecting the examination site with the mammography expert center. Generally, security is characterized in terms of privacy, authenticity and integrity of digital data. Privacy is a network access issue and is not considered in this paper. We present a method, authenticity and integrity of digital mammography, here which can meet the requirements of authenticity and integrity for mammography image (IM) transmission. The authenticity and integrity for mammography (AIDM) consists of the following four modules. 1) Image preprocessing: To segment breast pixels from background and extract patient information from digital imaging and communication in medicine (DICOM) image header. 2) Image hashing: To compute an image hash value of the mammogram using the MD5 hash algorithm. 3) Data encryption: To produce a digital envelope containing the encrypted image hash value (digital signature) and corresponding patient information. 4) Data embedding: To embed the digital envelope into the image. This is done by replacing the least significant bit of a random pixel of the mammogram by one bit of the digital envelope bit stream and repeating for all bits in the bit stream. Experiments with digital IMs demonstrate the following. 1) In the expert center, only the user who knows the private key can open the digital envelope and read the patient information data and the digital signature of the mammogram transmitted from the examination site. 2) Data integrity can be verified by matching the image hash value decrypted from the digital signature with that computed from the transmitted image. 3) No visual quality degradation is detected in the embedded image compared with the original. Our preliminary results demonstrate that AIDM is an effective method for image authenticity and integrity in telemammography application.

  18. Watermarking-Based Digital Audio Data Authentication

    Directory of Open Access Journals (Sweden)

    Jana Dittmann

    2003-09-01

    Full Text Available Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing concepts address mainly image data. Depending on the necessary security level and the sensitivity to detect changes in the media, we differentiate between fragile, semifragile, and content-fragile watermarking approaches for media authentication. Furthermore, invertible watermarking schemes exist while each bit change can be recognized by the watermark which can be extracted and the original data can be reproduced for high-security applications. Later approaches can be extended with cryptographic approaches like digital signatures. As we see from the literature, only few audio approaches exist and the audio domain requires additional strategies for time flow protection and resynchronization. To allow different security levels, we have to identify relevant audio features that can be used to determine content manipulations. Furthermore, in the field of invertible schemes, there are a bunch of publications for image and video data but no approaches for digital audio to ensure data authentication for high-security applications. In this paper, we introduce and evaluate two watermarking algorithms for digital audio data, addressing content integrity protection. In our first approach, we discuss possible features for a content-fragile watermarking scheme to allow several postproduction modifications. The second approach is designed for high-security applications to detect each bit change and reconstruct the original audio by introducing an invertible audio watermarking concept. Based on the invertible audio scheme, we combine digital signature schemes and digital watermarking to provide a public verifiable data authentication and a reproduction of the original, protected with a secret key.

  19. "Gender-into-Teaching" at the Vienna University of Technology. Experiences and Reflections on an Austrian Project

    Science.gov (United States)

    Knoll, Bente; Ratzer, Brigitte

    2009-01-01

    "Gender-into-teaching" is the first Austrian project to develop strategies on how to implement gender topics at a technical university. This project can really be qualified as a model for other universities and as unique in Austria. Up to now, there are many more males in higher-level positions in the university hierarchies. The--very…

  20. What Does It Take to Be an Adult in Austria? Views of Adulthood in Austrian Adolescents, Emerging Adults, and Adults

    Science.gov (United States)

    Sirsch, Ulrike; Dreher, Eva; Mayr, Eva; Willinger, Ulrike

    2009-01-01

    The present study examined the defining features of emerging adulthood, subjects' conceptions of the transition to adulthood, and the perceived adult status in Austria. The sample consisted of 775 subjects (226 adolescents, 317 emerging adults, 232 adults). Results showed that most Austrian emerging adults feel themselves to be between adolescence…

  1. Authentication and Authorization in Server Systems for Bio-Informatics

    CERN Document Server

    Madhuri, K Lakshmi

    2010-01-01

    Authentication and authorization are two tightly coupled and interrelated concepts which are used to keep transactions secure and help in protecting confidential information. This paper proposes to evaluate the current techniques used for authentication and authorization also compares them with the best practices and universally accepted authentication and authorization methods. Authentication verifies user identity and provides reusable credentials while authorization services stores information about user access levels. These mechanisms by which a system checks what level of access a particular authenticated user should have to view secure resources is controlled by the system

  2. An Ancient Indian Board Game as a Tool for Authentication

    Directory of Open Access Journals (Sweden)

    Sreelatha Malempati

    2011-08-01

    Full Text Available User authentication is the first phase of information security. Users should remember their passwords and recall them for authentication. Text based passwords is the traditional method for authentication. Short and simple passwords are memorable and usable but not secure. Random and lengthy passwords are secure but not memorable and usable. Graphical password schemes are introduced as alternatives to text based schemes. Few grid based authentication techniques are also proposed. The purpose of this paper is to introduce a tool to enhance the memorability and security of passwords which also provides usability. The most popular ancient Indian board game “Snakes and Ladders” is used as a tool for authentication.

  3. Austrian visit

    CERN Multimedia

    2003-01-01

    Hans Hoffmann, Director for Technology Transfer and Scientific Computing, and Maria Rauch-Kallat, Minister of Health and Women's Issues, Austria, signing the visitors' book.Maria Rauch-Kallat, Minister of Health and Women's Issues, Austria, was welcomed by Hans Hoffmann, Director for Technology Transfer and Scientific Computing, on her visit to CERN on 19 May 2003. The theme of the visit was Technology Transfer and spin-offs from CERN for medical applications. Maria Rauch-Kallat toured also the installations of ATLAS.

  4. Concentrations of environmental organic contaminants in meat and meat products and human dietary exposure: A review.

    Science.gov (United States)

    Domingo, José L

    2017-09-01

    Meat and meat products is one of the most relevant food groups in an important number of human diets. Recently, the IARC, based on results of a number of epidemiological studies, classified the consumptions of red meat and processed meat as "probably carcinogenic to humans" and as "carcinogenic to humans", respectively. It was suggested that the substances responsible of the potential carcinogenicity would be mainly generated during meat processing, such as curing and smoking, or when meat is heated at high temperatures. However, the exposure to environmental pollutants through meat consumption was not discussed. The purpose of the present paper was to review recent studies reporting the concentrations of PCDD/Fs, DL-PCBs and PAHs in meat and meat products, as well as the human exposure to these pollutants through the diet. It is concluded that the health risks derived from exposure to carcinogenic environmental contaminants must be considered in the context of each specific diet, which besides meat and meat products, includes other foodstuffs containing also chemical pollutants, some of them with carcinogenic potential. Anyhow, meat and meat products are not the main food group responsible of the dietary exposure to carcinogenic (or probably carcinogenic) environmental organic pollutants. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Prevalence of Campylobacter spp. in poultry meat and meat products imported in Republic of Macedonia

    Directory of Open Access Journals (Sweden)

    Kostova Sandra

    2008-11-01

    Full Text Available Campylobacter spp. is leading bacterial cause of diarrhea in human population in all parts of the world. In most of the cases infection with Campylobacter spp. in humans originate from contaminated poultry meat and poultry meat products. This study was designed to estimate prevalence of Campylobacter spp. in meat and meat products imported in Republic of Macedonia. During the period of 8 months (January-August 2008 we tested 56 samples of meat and meat products (poultry meat, MDM, pork meat, beef meat and smoked beef. Samples were submitted to analysis for detection of thermo-tolerant Campylobacter spp. according to ISO 10272:1995. We determined among the analyzed samples highest prevalence of Campylobacter spp. in MDM with 84% positive samples, poultry meat with 81,8%, pork meat with 10%. We didn.t detect any positive samples in beef meat and smoked beef. Overall prevalence of Campylobacter spp. in all tested samples was 55,36%. This study shows that the high prevalence of Campylobacter spp. in tested samples and in correlation with severe symptoms in humans are reasons good enough for the producing and processing poultry meat industry and food business operators so they should take in consideration Campylobacter spp. in their risk assessment and preparation of HACCP plan.

  6. CPK-based grid authentication: a step forward

    Institute of Scientific and Technical Information of China (English)

    WANG Hai-yan; WANG Ru-chuan

    2007-01-01

    Effective grid authentication plays a critical role in grid security, which has been recognized as a key issue in the designing and extension of grid technologies. At present, public key infrastructure (PKI) has been widely applied for grid authentication, and this article proposes a novel grid authentication mechanism, which is based on combined public key (CPK) employing elliptic curve cryptography (ECC). The designing structure of the new grid authentication mechanism and its implementation procedure are described in details.Property analysis of the new mechanism is also made in comparison with that of the globus security infrastructure (GSI) authentication, which leads to the conclusion that CPK-based grid authentication, may be applied as an optimized approach towards efficient and effective grid authentication.

  7. Examining the relationship between authenticity and self-handicapping.

    Science.gov (United States)

    Akin, Ahmet; Akin, Umran

    2014-12-01

    Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.

  8. Vein matching using artificial neural network in vein authentication systems

    Science.gov (United States)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  9. Epidemiology of allergies in Austria. Results of the first Austrian allergy report.

    Science.gov (United States)

    Dorner, Thomas; Lawrence, Kitty; Rieder, Anita; Kunze, Michael

    2007-01-01

    The first Austrian Allergy Report is a compilation of all available epidemiological data relating to allergies in Austria. According to this report the cumulative prevalence of allergies in the Viennese population is 27.6% for men and 32.2% for women and the period prevalence in the year before questioning 19.6% and 22.4% respectively. 20.8% of men and 23.1% of women reported about allergies at health examinations. However, an allergy sensitivity to at least one inhalation allergen, verifiable by means of a prick test, is detectable in 50.8% of the general population and in 39.3% of those free from ailments. Analysis of the hospital discharge statistics of all Austrian hospitals shows that around 12,000 people per year were admitted on grounds of an allergy. In accordance with international studies some population sub groups are more often affected than others. Women suffer from allergies somewhat more frequently than men, although the sex difference is reversed among children. Allergies occur in all age groups, with most studies showing that people in their twenties are most frequently affected. People with higher levels of education, in more highly qualified jobs and living in urban areas are more commonly affected by allergies than people from lower socio-economic levels and rural communities. The internationally identified increase in trend can also be identified in Austria with a 2fold, 3.6fold, and 4.6fold increase in the prevalence of hay fever, asthma and atopic eczema respectively, determined from the military health examinations of all recruits for national service between 1986 and 2003/04, although a clear decline in allergy prevalence was registered between 2003/04 and 2005. Health reports like the first Austrian Allergy Report provide the basis for international comparison of basic data. These data also enable the evaluation of the impact of different diseases on the health system as well as the development of public health strategies.

  10. Endocrine disrupters in the aquatic environment: the Austrian approach--ARCEM.

    Science.gov (United States)

    Bursch, W; Fuerhacker, M; Gemeiner, M; Grillitsch, B; Jungbauer, A; Kreuzinger, N; Moestl, E; Scharf, S; Schmid, E; Skutan, S; Walter, I

    2004-01-01

    A consortium of Austrian scientists (ARCEM) carried out a multidisciplinary environmental study on Austrian surface and ground waters including chemical monitoring, bioindication, risk assessment and risk management for selected endocrine disrupters: 17beta-estradiol, estriol, estrone, 17alpha-ethinylestradiol, 4-nonylphenol, 4-nonylphenol ethoxylates (4-NP1EO, 4-NP2EO) and their degradation products, ocytlphenol, ocytlphenol ethoxylates (OP1EO, OP2EO) as well as bisphenol A. To obtain data representative for Austria, a material flow analysis served to select relevant compounds and water samples were collected monthly over one year at those sites routinely used in Austrian water quality control. The following results were obtained and conclusions drawn: 1. Chemical monitoring: As compared to other countries, relatively low levels of pollution with endocrine disrupters were detected. 2. Bioindication: In the surface waters under study, male fish showed significant signs of feminization and demasculinization (increased production of the egg-yolk protein and histological changes of the gonads. 3. Risk assessment: For humans, exposure via either drinking water abstraction (ground water) or fish consumption was considered. The exposure levels of the compounds under study were below those considered to result in human health risks. Likewise, for bisphenol A and octylphenols, there was no indication for risk posed upon the aquatic environment (fish). However, nonylphenol or 17alpha-ethinylestradiol exposure along with results of bioindication (2) suggest a borderline estrogenic activity in a considerable number of surface waters. Consequently the emissions of these substances into the surface waters affected have to be reduced. 4. Risk management: Waste water treatment experiments revealed a positive correlation between the removal rate of endocrine disrupters from the waste water and the sludge retention time in the treatment plants. These substances are removed to a

  11. A cohort mortality and nested case-control study of French and Austrian talc workers

    Science.gov (United States)

    Wild, P; Leodolter, K; Refregier, M; Schmidt, H; Zidek, T; Haidinger, G

    2002-01-01

    Objectives: To study whether the mortality from non-malignant and malignant respiratory diseases of workers employed in French and Austrian talc mines and mills is related to their long term occupational exposure. Methods: Two historical cohorts were set up comprising all male subjects who had been working continuously for at least 1 year in a series of talc producing companies in France and Austria. The French cohort consisted of those employed at a site in the French Pyrenees and working between 1 January 1945 and 31 December 1994. The Austrian cohort consisted of the workers employed between 1 January 1972 and 31 December 1995 in one of four industrial sites in the Austrian Alps. The mortality within the cohorts was compared with local death rates. Two nested case-control studies focusing on non-malignant and malignant respiratory diseases were set up to estimate possible dose-response relations with cumulative exposure to talc dust based on an industry specific job exposure matrix. Results: Mortality from lung cancer was in small excess in both cohorts (France, standardised mortality ratio (SMR) 1.23, 21 cases observed, 95% confidence interval (95% CI) 0.76 to 1.89; Austria, SMR 1.06, seven observed, 95% CI 0.43 to 2.19). A non-significant excess mortality was found for all non-malignant respiratory diseases in the French cohort due to a significant excess for pneumoconiosis (SMR 5.56, three observed, 95% CI 1.12 to 16.2). The case-control study of non-malignant respiratory disease showed an increased mortality in the highest exposure groups (odds ratio (OR) 2.5 for a cumulative exposure ≥800 y.mg/m3) with a significant trend (OR/100 y.mg/m3 1.08) with cumulative exposure to talc. On the contrary, no increasing trend could be found in the case-control study of lung cancer. This result must be interpreted considering the small cohort size. Adjustment on smoking and exposure to quartz did not influence these results to any extent. Conclusions: The mortality

  12. Assessment of climate change impact on SOM balance with the Austrian Carbon Calculator

    Science.gov (United States)

    Franko, Uwe; Gründling, Ralf; Sedy, Katrin; Zethner, Gerhard; Formayer, Herbert

    2015-04-01

    Soil organic matter (SOM) balance depends on climate and climate change due to the impact on SOM turnover conditions as well as on cropping and crop yields. The Austrian Carbon calculator (ACC) is a tool for the comparison of future land use scenarios with the current agriculture in order to identify opportunities to sustain the SOM balance. The ACC can be used in a regional mode as well as in local mode for the assessment of single farm fields. The assessment is based on the concept of Biologic Active Time (BAT). BAT is calculated based on soil data from the Austrian eBod map and climate data for past and future on a 1 km grid. The ACC was implemented for the regions Mühlviertel and Marchfeld. Crop yields are calculated based on statistics from the Austrian agricultural sub regions "Kleinproduktionsgebiet" for the most common crops. The regional scenarios consist of the abundance of crops, the part of nitrogen added as mineral fertilizer and the part of irrigation. The local soil management is calculated based on crop rotations with yields, organic amendments, irrigation and the tillage system (ploughed or not ploughed). The SOM balance is assessed with the reproduction index (REP_IX) that is calculated as the quotient from carbon reproduction (Carbon flux into SOM) and the BAT value. This way REP_IX includes the impact from management as well as from climate. If the future management will not change REP_IX the SOM balance will be the same as well. This methodology helps to adapt the management to future conditions to sustain the current SOM conditions without an absolute assessment if the current SOM state is optimal or not. The regional results of ACC will be made available as thematic maps on the project web site. For local applications farmer can use the tool to analyze their special site conditions and management plans to assess the management options under climate change conditions. The described concept can be improved if reliable information about the

  13. Projected Numbers of Ischemic Strokes Recorded in the Austrian Stroke-Unit Registry from 2012 to 2075

    Science.gov (United States)

    Trinka, Eugen; Seyfang, Leonard; Mutzenbach, Sebastian; Stadler, Katharina; Pikija, Slaven; Killer, Monika; Broussalis, Erasmia

    2016-01-01

    Background and Purpose This study analyzed the number of patients with ischemic strokes recorded in the Austrian Stroke-Unit Registry with the aim of projecting this number from 2012 to 2075 and to highlight that the Austrian health system will face a dramatic increase in older patients within the next few decades. Methods Current demographic information was obtained from EUROSTAT, and information on age- and sex-stratified 1-year incidence rates of ischemic stroke were obtained from the Austrian Stroke-Unit Registry. Sensitivity analysis was performed by analyzing the projections based on predicted ageing, main, and growth population scenarios, and with stratification by age and gender. Results The total number of ischemic strokes recorded in the Austrian Stroke-Unit Registry was 8,690 in 2012 and is expected to increase to 15,826, 15,626, or 18,134 in 2075 according to the ageing, main, and growth scenarios, respectively. The corresponding numbers of patients are projected to increase or decrease within different age strata as follows (100%=number of registered ischemic strokes in 2012): 0–40 years, 100%/99% (males/females); 40–50 years, 83%/83%; 50–60 years, 98%/97%; 60–70 years, 126%/119%; 70–80 years, 159%/139%; 80–90 years, 307%/199%; and 90+ years, 894%/413%. Conclusions The ageing population in Austria will result in the number of patients increasing considerably from 2012 to 2075, to 182%, 180%, or 208% (relative to 100% in 2012) according to the ageing, main, and growth scenarios, respectively; the corresponding value among those aged 80+ years is 315%, 290%, or 347%. These figures demonstrated the importance of improving primary preventive measures. The results of this study should provide a basis for discussions among health-care professionals and economists to face the future large financial burden of ischemic stroke on the Austrian health system.

  14. Kierkegaard and Sartre on God and Authenticity

    Directory of Open Access Journals (Sweden)

    Amirabbas Alizamani

    2014-09-01

    Full Text Available To evaluate and judge the notion of humanity, one has to use logic and logical criteria, since every notion's delimitation in logic requires an exact definition to be offered. And it is by definition that one can distinguish between one particular notion or extension and other notions and extensions. Different definitions have been suggested of the nature of humanity throughout the history of ideas every one of which casts light on an aspect of human existence. The intricate and deep nature of human being may have been the main obstacle in the way to an exact definition of human being. The past masters have defined man as a rational animal; i.e. man is inside the family of animals but an animal that have the power of thinking. Human rationality is not merely a matter of speaking, but rather it covers his all internal and external aspects. Since man is consisted of mind and body. Contemporary thinkers have left behind the traditional definition of man and approached him from different perspectives. In any case, what is important for us is human being's humanity.    On the other hand, the notion of humanity has always had an inseparable relationship with ethics. Needless to say, moral rules and maxims comprise a set of determinate oughts and ought-nots which should be adopted and followed by every human individual if s/he seeks to reach happiness. These moral rules are sometimes associated with religious and divine concepts which include a faith background and sometimes they go shoulder to shoulder with the rational rules where there is no occasion for extra-rational elements. One of the fundamental notions of ethics is authenticity, or to put it otherwise, how a man is authentic? What are the criteria of an authentic man? Authenticity can be verbally analyzed to the following notions: Authenticity in the sense of having a determinate family background. Authenticity in the sense of having a steady and impenetrable structure Authenticity in the

  15. Kierkegaard and Sartre on God and Authenticity

    Directory of Open Access Journals (Sweden)

    Alireza Faraji

    2014-08-01

    Full Text Available To evaluate and judge the notion of humanity, one has to use logic and logical criteria, since every notion's delimitation in logic requires an exact definition to be offered. And it is by definition that one can distinguish between one particular notion or extension and other notions and extensions. Different definitions have been suggested of the nature of humanity throughout the history of ideas every one of which casts light on an aspect of human existence. The intricate and deep nature of human being may have been the main obstacle in the way to an exact definition of human being. The past masters have defined man as a rational animal; i.e. man is inside the family of animals but an animal that have the power of thinking. Human rationality is not merely a matter of speaking, but rather it covers his all internal and external aspects. Since man is consisted of mind and body. Contemporary thinkers have left behind the traditional definition of man and approached him from different perspectives. In any case, what is important for us is human being's humanity.    On the other hand, the notion of humanity has always had an inseparable relationship with ethics. Needless to say, moral rules and maxims comprise a set of determinate oughts and ought-nots which should be adopted and followed by every human individual if s/he seeks to reach happiness. These moral rules are sometimes associated with religious and divine concepts which include a faith background and sometimes they go shoulder to shoulder with the rational rules where there is no occasion for extra-rational elements. One of the fundamental notions of ethics is authenticity, or to put it otherwise, how a man is authentic? What are the criteria of an authentic man? Authenticity can be verbally analyzed to the following notions: Authenticity in the sense of having a determinate family background. Authenticity in the sense of having a steady and impenetrable structure Authenticity in the

  16. Characterization of 12S rRNA gene for meat identification of common wild and domestic small herbivores as an aid to wildlife forensic

    Directory of Open Access Journals (Sweden)

    E. Joseph

    2013-10-01

    Full Text Available Aim: Chital and sambar are the common wild small herbivores, which are vulnerable to poaching for their meat. Many times poachers claim the wild meat to be that of goat or sheep. Hence, authentic evidences are required to stop such wildlife crime. The present investigation was carried out to study the species specific PCR-RFLP patterns for meat identification of chital and sambar and then differentiation from the meat of goat and sheep. Materials and Methods: Extracted DNA from meat samples were subjected to PCR using the universal primers of 12S rRNA gene. The PCR products were subjected to RFLP and sequencing. Results: The size of amplified PCR products was similar (440 bp in each species and sequence alignment showed more than 89 % similarities among these species. However, phylogenetic analysis revealed that Chital and Sambar are in one cluster while Goat and sheep are in other cluster. To differentiate between species, restriction digestion of the PCR products was carried out to produce characteristic PCR-RFLP patterns for each species. Restriction digestion with RsaI and AluI enzymes produced distinct PCR-RFLP patterns that differentiated the meat of wild species (chital-sambar from that of domestic species (goat-sheep. BsrI restriction digestion revealed unique PCR-RFLP pattern in chital differentiating it from the meat of other three species. Restriction digestion with DdeI enzyme led to the production of distinct PCR-RFLP patterns for chital and sambar to identify their meat individually. Conclusion: This study showed the effectiveness of 12S rRNA gene polymorphism in meat identification. The data can be used as evidence against the poachers to convict the wildlife crime in the court of law [Vet World 2013; 6(5.000: 254-259

  17. Meat-based enteral nutrition

    Science.gov (United States)

    Derevitskay, O. K.; Dydykin, A. S.

    2017-09-01

    Enteral nutrition is widely used in hospitals as a means of nutritional support and therapy for different diseases. Enteral nutrition must fulfil the energy needs of the body, be balanced by the nutrient composition and meet patient’s nutritional needs. Meat is a source of full-value animal protein, vitamins and minerals. On the basis of this research, recipes and technology for a meat-based enteral nutrition product were developed. The product is a ready-to-eat sterilised mixture in the form of a liquid homogeneous mass, which is of full value in terms of composition and enriched with vitamins and minerals, consists of particles with a size of not more than 0.3 mm and has the modified fat composition and rheological characteristics that are necessary for passage through enteral feeding tubes. The study presents experimental data on the content of the main macro- and micro-nutrients in the developed product. The new product is characterised by a balanced fatty acid composition, which plays an important role in correction of lipid metabolism disorders and protein-energy deficiency, and it is capable of satisfying patients’ daily requirements for vitamins and the main macro- and microelements when consuming 1500-2000 ml. Meat-based enteral nutrition can be used in diets as a standard mixture for effective correction of the energy and anabolic requirements of the body and support of the nutritional status of patients, including those with operated stomach syndrome.

  18. Recent Trends in the Use of Natural Antioxidants for Meat and Meat Products

    National Research Council Canada - National Science Library

    Kumar, Yogesh; Yadav, Deep Narayan; Ahmad, Tanbir; Narsaiah, Kairam

    2015-01-01

    .... Thus, the food industry now chooses natural products over synthetic ones. This review provides an overview of the current trends in the use of antioxidants from natural sources, for potential applications in meat and meat products...

  19. Introducing the new meat. Problems and prospects

    Directory of Open Access Journals (Sweden)

    Stellan Welin

    2013-05-01

    Full Text Available Cultured meat, or in vitro meat, is one of the ideas that are being proposed to help solve the problems associated with the ever-growing global meat consumption. The prospect may bring benefit for the environment, climate, and animal ethics, but has also generated doubts and criticism. A discussion of the possible environmental benefit and of animal ethics issues in relation to cultured meat production will be given. A perceived 'unnaturalness' of cultured meat may be one of the strongest barriers for public acceptance. This will be discussed and rejected. As to our relations with nature and animals, it is plausible that cultured meat will lead to improvement rather than to deterioration. The issue of public acceptance and some of the problems of introducing this new product on the market will also be discussed.http://dx.doi.org/10.5324/eip.v7i1.1788

  20. Chinese ethnic meat products: Continuity and development.

    Science.gov (United States)

    Zeng, Weicai; Wen, Wenting; Deng, Yue; Tian, Yuanyuan; Sun, Honghu; Sun, Qun

    2016-10-01

    With their distinctive sensory characterizations and unique processing technologies, Chinese ethnic meat products possess great potential for development and continuity in modern China's meat industry. Due to the greater demand for meat products and higher quality and safety concerns in economically fast growing China, the development and continuity of ethnic meat products face its own unique challenges. In this review, the classification of typical ethnic products and their characteristics, and the research progress on their quality and processing technologies are discussed. The application of innovative and green technologies to improve the safety and quality of ethnic meat products for greater industrialization and sustainable development is highlighted. Furthermore, the strategy for promoting the production of Chinese ethnic meat products during the next five years is presented. Copyright © 2016 Elsevier Ltd. All rights reserved.