WorldWideScience

Sample records for identity preservation trends

  1. 7 CFR 782.14 - Identity preservation.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Identity preservation. 782.14 Section 782.14 Agriculture Regulations of the Department of Agriculture (Continued) FARM SERVICE AGENCY, DEPARTMENT OF... § 782.14 Identity preservation. (a) The importer and all subsequent buyers of the imported wheat shall...

  2. Temporal trends of preservative allergy in Denmark (1985-2008).

    Science.gov (United States)

    Thyssen, Jacob P; Engkilde, Kåre; Lundov, Michael D; Carlsen, Berit C; Menné, Torkil; Johansen, Jeanne D

    2010-02-01

    Most cosmetics and industrial products contain preservatives. Preservative allergy is common and, historically, changing contact allergy epidemics caused by preservatives have been observed. In 1997, Alan Dillarstone predicted a stable development of preservative allergy following mandatory ingredient labelling on cosmetic products. To investigate the development in the prevalence of preservative allergy in Denmark over a 24-year period (1985-2008) and to challenge the prediction made by Dillarstone. A retrospective analysis of patch test data was performed (n = 18179). Comparisons were made using a chi(2) test. Logistic regression analyses were used to test for associations. The development of preservative allergy mirrored those of other European patch test centres. The development was not dependent on sex or age group. The prevalence was higher among women and those aged 41-60 years. Formaldehyde allergy was persistently prevalent over the study years. The overall prevalence of preservative allergy increased significantly (P(trend) = 0.001), mainly because of patch testing with additional preservatives in recent years. Dillarstone's prediction was confirmed as the prevalence of contact allergy to individual preservatives remained relatively stable. However, the overall burden of preservative allergy seemed to increase. Introduction of new preservatives may add to the burden of contact allergy.

  3. Temporal trends of preservative allergy in Denmark (1985-2008)

    DEFF Research Database (Denmark)

    Thyssen, Jacob P; Engkilde, Kåre; Lundov, Michael D

    2010-01-01

    Most cosmetics and industrial products contain preservatives. Preservative allergy is common and, historically, changing contact allergy epidemics caused by preservatives have been observed. In 1997, Alan Dillarstone predicted a stable development of preservative allergy following mandatory...

  4. Temporal trends of preservative allergy in Denmark (1985-2008)

    DEFF Research Database (Denmark)

    Thyssen, Jacob P; Engkilde, Kåre; Lundov, Michael D

    2010-01-01

    Most cosmetics and industrial products contain preservatives. Preservative allergy is common and, historically, changing contact allergy epidemics caused by preservatives have been observed. In 1997, Alan Dillarstone predicted a stable development of preservative allergy following mandatory...... ingredient labelling on cosmetic products....

  5. Repair of the threatened feminine identity: experience of women with cervical cancer undergoing fertility preservation surgery.

    Science.gov (United States)

    Komatsu, Hiroko; Yagasaki, Kaori; Shoda, Rie; Chung, Younghui; Iwata, Takashi; Sugiyama, Juri; Fujii, Takuma

    2014-01-01

    Fertility preservation is important for women of reproductive age with cervical cancer. The underlying reasons behind suboptimal reproductive results after successful fertility-preserving surgery have not yet been fully revealed. The objective of this study was to explore the experience of fertility preservation with radical trachelectomy from the perspective of women with cervical cancer. We conducted interviews with women with cervical cancer who underwent radical trachelectomy using a Grounded Theory methodology with a theoretical framework of symbolic interactionism. Our findings articulate a process in which feminine identity is first threatened by a diagnosis of cancer, then repaired by fertility preservation with radical trachelectomy, and finally reconstructed after the surgery, through interactions with self, others, and external events in women with cervical cancer. Feeling incomplete as a woman because of the loss of the uterus was a critical factor in the women's feeling that their feminine identity was threatened. Thus, fertility preservation was significant for these women. The meaning of fertility preservation varied among the women, and their life perspectives were therefore distinct after the surgery. Women with cervical cancer who undergo radical trachelectomy experience an identity transformation process, and child bearing is not the only expected outcome of fertility preservation. Nurses should coordinate care through the cancer trajectory. Understanding the identity transformation process helps nurses to assess patients' needs and provide appropriate individual care.

  6. Restoration and Preservation of the Identity of Historical Cultural Landscape

    OpenAIRE

    Ziemeļniece, Aija

    2012-01-01

    The flair of scale as well as proportion determines the attitude to local or regional expressions in art and architecture. We may conclude that the dehumanization of the urbanized environment has happened. An exaggerated scale and proportions destroy the historical spacial context of the building of the estates and their landscape. Little by little the national identity and intimacy of Latvian rural landscape having an essential role for attaching the tourism infrastructure to rural cultural ...

  7. The Last Kick of a Dying Horse: Preserving Ethnic Identity in ...

    African Journals Online (AJOL)

    The study revealed that ethno-linguistic groups, like Basukuma (Shisukuma speakers), have put in place a complex greeting system as a strategy to preserve their ethnonymic identity, embedded in their traditional clan system. This system has made it possible for the Shisukuma speakers to identify their origins and ...

  8. Holistic Privacy-Preserving Identity Management System for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jorge Bernal Bernabe

    2017-01-01

    Full Text Available Security and privacy concerns are becoming an important barrier for large scale adoption and deployment of the Internet of Things. To address this issue, the identity management system defined herein provides a novel holistic and privacy-preserving solution aiming to cope with heterogeneous scenarios that requires both traditional online access control and authentication, along with claim-based approach for M2M (machine to machine interactions required in IoT. It combines a cryptographic approach for claim-based authentication using the Idemix anonymous credential system, together with classic IdM mechanisms by relying on the FIWARE IdM (Keyrock. This symbiosis endows the IdM system with advanced features such as privacy-preserving, minimal disclosure, zero-knowledge proofs, unlikability, confidentiality, pseudonymity, strong authentication, user consent, and offline M2M transactions. The IdM system has been specially tailored for the Internet of Things bearing in mind the management of both users’ and smart objects’ identity. Moreover, the IdM system has been successfully implemented, deployed, and tested in the scope of SocIoTal European research project.

  9. Personal identity processes from adolescence through the late 20s : Age trends, functionality, and depressive symptoms

    NARCIS (Netherlands)

    Luyckx, K.; Klimstra, T.A.; Duriez, B.; van Petegem, S.; Beyers, W.

    2013-01-01

    Personal identity formation constitutes a crucial developmental task during the teens and 20s. Using a recently developed five-dimensional identity model, this cross-sectional study (N = 5834) investigated age trends from ages 14 to 30 for different commitment and exploration processes. As expected,

  10. On the Preservation of Cultural and Ethnic Identity of “Russian Germans”

    Directory of Open Access Journals (Sweden)

    Tatiana V. Govenko

    2016-09-01

    Full Text Available German settlements in Russia have been known since the ancient times, however larger settlements appeared only after the “Мanifesto” issued by Empress Catherine II. Settling in Volga Region, Novorossiya, Crimea, the Caucasus, and Siberia, German colonists preserved German language, customs, traditions, songs, tales, household items, musical instruments, costumes, and cuisine — all those identity and ethnic codes that tied them to their historical homeland and, at the same time, distinguished them from the neighboring nations. Autonomous and closed character of German settlements in Russia, their long-term isolation from their nation and its cultural and historical core as well as the impossibility of modernization in step with their historical motherland contributed to the preservation of language and elements of the immigrant traditional culture in the alien environment. Vegetation was carried out at the expense of inner resources and those of the neighboring nations leading to the transformation of “the national spirit and manners.” New sub-ethnic group of “Russian Germans” formed a considerable part of the pre-revolutionary Russian population but at the beginning of the 20th century, due to the unfavorable political and military circumstances, the state forced administrative sanctions on German population that led to further destruction of the ethnic area as well as of the cultural, social, and economic conditions necessary for its development. Later, this situation got worse due to the Stalin regime, Nazi attack on the Soviet Union, and general reluctance of the state to preserve this ethnic group in a favorable condition. In the 1990s, Russian Germans massively resettled in Germany. Over the past 20 years, the number of the settlers has decreased by seven times. In Germany, “Russian Germans” faced the question of self-identity. If until the beginning of the 20th century their heritage language had been one of the German

  11. REHABILITATION OF ORGAN FROM DECEASED DONORS. NEW PRESERVATION TREND OR NEW PARADIGM IN TRANSPLANTOLOGY?

    Directory of Open Access Journals (Sweden)

    S. F. Bagnenko

    2009-01-01

    Full Text Available The articleis is dedicated to the main problem of transplantology which is shortage of acceptable donors’ organs. The tendency of expanding the donor’s pool should include policy of prevention and reduction the ischemia- reperfusion trauma of donor’s organs. The crucial role of machine perfusion in pretransplantaion improving organs quality is highlighted. The large review of literature is listed in order to state several new approaches in modern preservation trend. The definition of organ preservation is given as well as new strategy in organ acceptance is grounded. 

  12. THE ROLE OF WOMEN IN PRESERVING THE ROMANIAN IDENTITY IN LOCAL ADVERTISING

    Directory of Open Access Journals (Sweden)

    MADALINA MORARU (BUGA

    2012-05-01

    Full Text Available The following paper intends to reveal the involvement of women into coining efficient communication campaigns for different product categories promoted on the Romanian market. Product consumption explicitly depends on target interests and social integration considering its division into two directions according to age groups (the old generation and the young, “new media generation” after the 1989 Revolution. Our main purpose consists in identifying female profiles in Romanian advertising starting from Geert Hofstede’s theory. He created a fivedimension model (power distance, individualism/collectivism, gender of nations, uncertainty avoidance, long/short-term orientation of national culture, by analyzing local and global brands, on the one hand, and different product categories (dairy, coffee and chocolate, drugs, banks and insurance, mobile phones, home appliances, on the other. This paper will apply the content analysis method, whose purpose is to reveal the Romanian identity promoted by the female characters of at least 50 TV commercials. In order to get a wealth of information, this study focuses on important aspects such as tradition, independence vs. involvement in family responsibilities, authority vs. subordination, living environment (city or countryside, as well as relationships with men and children. At the end of this research, we expect to reach two important goals. The first one is to establish a relationship between product categories, local identity, and the Romanian target, which is still in transition after the Anti- Communist Revolution. As for the second goal, we hope to discover some female patterns which are very well exploited in Romanian advertising based on cultural and social background. The hypothesis that strongly supports this research is that women have an essential role in preserving local identity, appealing to the Romanian consumer in commercials created especially for them.

  13. Fossilization processes in siliceous thermal springs: trends in preservation along thermal gradients

    Science.gov (United States)

    Cady, S. L.; Farmer, J. D.

    1996-01-01

    To enhance our ability to extract palaeobiological and palaeoenvironmental information from ancient thermal spring deposits, we have studied the processes responsible for the development and preservation of stromatolites in modern subaerial thermal spring systems in Yellowstone National Park (USA). We investigated specimens collected from silica-depositing thermal springs along the thermal gradient using petrographic techniques and scanning electron microscopy. Although it is known that thermophilic cyanobacteria control the morphogenesis of thermal spring stromatolites below 73 degrees C, we have found that biofilms which contain filamentous thermophiles contribute to the microstructural development of subaerial geyserites that occur along the inner rims of thermal spring pools and geyser effluents. Biofilms intermittently colonize the surfaces of subaerial geyserites and provide a favoured substrate for opaline silica precipitation. We have also found that the preservation of biotically produced microfabrics of thermal spring sinters reflects dynamic balances between rates of population growth, decomposition of organic matter, silica deposition and early diagenesis. Major trends in preservation of thermophilic organisms along the thermal gradient are defined by differences in the mode of fossilization, including replacement, encrustation and permineralization.

  14. Preserving Social Justice Identities: Learning from One Pre-Service Literacy Teacher

    Science.gov (United States)

    Ticknor, Anne Swenson

    2014-01-01

    Identities that include social justice stances are important for pre-service teachers to adopt in teacher education so they may meet the needs of "all" future students. However, maintaining a social justice identity can be difficult when pre-service teachers are confronted with an evaluator without a social justice stance. This article…

  15. Research Trends and Issues in the Study of Identity of Multi-ethnic Persons

    OpenAIRE

    TABA, Ayumi; TAKAI, Jiro

    2016-01-01

    In this article, concepts of identity are considered and surveyed researches of ego identity and group identity in social identity theory, self-categorization theory. It indicates ethnic identity is related to selfconcept, well-being, academic achievement, mental health, and so on. Furthermore, identity management theory reveals that cross- cultural communication occurs depending on management of cultural identity as group identity and relational identity as personal identity. However, there ...

  16. Review: Current trends in coral transplantation – an approach to preserve biodiversity

    Directory of Open Access Journals (Sweden)

    ABDELNABY ORABI

    2013-04-01

    Full Text Available Ammar MSA,El-Gammal F, Nassar M, Belal A, Farag W, El-Mesiry G, El-Haddad K, Orabi A, Abdelreheem A, Shaaban A. 2013. Review: Current trends in coral transplantation – an approach to preserve biodiversity. Biodiversitas 14: 43-53. The increasing rates of coral mortality associated with the rise in stress factors and the lack of adequate recovery worldwide have urged recent calls for actions by the scientific, conservation, and reef management communities. This work reviews the current trends in coral transplantation. Transplantation of coral colonies or fragments, whether from aqua-, mariculture or harvesting from a healthy colony, has been the most frequently recommended action for increasing coral abundance on damaged or degraded reefs and for conserving listed or “at-risk” species. Phytoplanktons are important for providing transplanted corals with complex organic compounds through photosynthesis. Artificial surfaces like concrete blocks, wrecks or other purpose-designed structures can be introduced for larval settlement. New surfaces can also be created through electrolysis. Molecular biological tools can be used to select sites for rehabilitation by asexual recruits. Surface chemistry and possible inputs of toxic leachate from artificial substrates are considered as important factors affecting natural recruitment. Transplants should be carefully maintained , revisited and reattached at least weekly in the first month and at least fortnightly in the next three months. Studies on survivorship and the reproductive ability of transplanted coral fragments are important for coral reef restoration. A coral nursery may be considered as a pool for local species that supplies reef-managers with unlimited coral colonies for sustainable management. Transplanting corals for making artificial reefs can be useful for increasing biodiversity, providing tourist diving, fishing and surfing; creating new artisanal and commercial fishing opportunities

  17. Balancing the Fair Treatment of Others While Preserving Group Identity and Autonomy.

    Science.gov (United States)

    Killen, Melanie; Elenbaas, Laura; Rutland, Adam

    2016-04-01

    Social exclusion and inclusion from groups, as well as the distribution of resources, are fundamental aspects of social life, and serve as sources of conflicts that bear on issues of fairness and equality, beginning in childhood. For the most part, research on social exclusion and allocation of resources has not focused on the issue of group membership. Yet, social exclusion from groups and the denial of resources reflect societal issues pertaining to social inequality and its counterpoint, fair treatment of others. Social inequality occurs when opportunities and resources are distributed unevenly in society, often through group norms about allocation that reflect socially defined categories of persons. This occurs at multiple levels of societal organization, from experiences of exclusion in childhood such as being left out of a play activity, to being denied access to resources as a member of a group. These situations extend to larger level experiences in the adult world concerning social exclusion from voting, for example, or participation in educational institutions. Thus, most decisions regarding social exclusion and the denial of resources involve considerations of group identity and group membership, implicitly or explicitly, which contribute to prejudice and bias, even though this has rarely been investigated in developmental science. Current research illustrating the role of group identity and autonomy regarding decision-making about social exclusion and the denial of resources is reviewed from the Social Reasoning Developmental model, one that integrates social domain theory and developmental social identity theories to investigate how children use moral, conventional, and psychological judgments to evaluate contexts reflecting group identity, group norms, and intergroup dynamics.

  18. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.

    Science.gov (United States)

    Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang

    2018-05-22

    With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  19. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-05-01

    Full Text Available With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  20. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    Science.gov (United States)

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  1. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching

    Directory of Open Access Journals (Sweden)

    Simon Fong

    2012-01-01

    Full Text Available Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user’s activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user’s medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user’s privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  2. Sustainable business conduct as business model or business identity : a stakeholder review of a potential trend towards a new normal

    OpenAIRE

    Kvarnström, Lovisa

    2016-01-01

    The objective of the thesis is to analyse how stakeholder influence has transformed sustainability work from being primarily risk management into becoming an integral part of business conduct and even business identities of today. To detect this trend I gather theoretical information that elaborate on the meaning and drivers of sustainable business conduct, sustainability as corporate identity, relevant stakeholders and ways of communicating to stakeholders. A case study of Ben & Jerry’s ...

  3. New Trends and Directions in Ethnic Identity among Internationally Transracially Adopted Persons: Summary of Special Issue

    Science.gov (United States)

    Rosnati, Rosa; Pinderhughes, Ellen E.; Baden, Amanda L.; Grotevant, Harold D.; Lee, Richard M.; Mohanty, Jayashree

    2015-01-01

    The collective findings of the six articles in this special issue highlight the importance of ethnic-racial socialization and ethnic identity among international transracial adoptees (ITRAs). A multidimensional developmental phenomenon, ethnic identity intersects with other identities, notably adoptive identity. Family, peers, community, and host…

  4. National Wilderness Preservation System database: key attributes and trends, 1964 through 1999

    Science.gov (United States)

    Peter Landres; Shannon Meyer

    2000-01-01

    The Wilderness Act of 1964 established a National Wilderness Preservation System, and this publication is a compilation of selected information about every wilderness within this System. For each wilderness, the following information is given: legally correct wilderness name; public law that established the wilderness; date the enabling law was signed by the President...

  5. Ovarian preservation in children for adenexal pathology, current trends in laparoscopic management and our experience

    Directory of Open Access Journals (Sweden)

    Preet Agarwal

    2014-01-01

    Full Text Available Aims: Primary cysts and tumors of the ovary alongwith torsion are often regarded as an indication for open oophorectomy because of the fear of leaving an ischemic organ inside and chances of recurrence. We wish to report our experience of both modalities of management where we initially removed adenexal torsion by either laparoscopic salpingo-oophorectomy or oophorectomy, but later followed a more conservative approach of adenexal lesion removal with ovarian preservation. Materials and Methods: Retrospective review of clinical records of patients with ovarian pathology who were managed laparoscopically. Results: 46 cases of pediatric ovarian pathology were managed between March 2006 and March 2013 in two centers by a team of surgeons. The age ranged from 1 days to 18 years (average 14.3 years and the pathology varied from 30 cases of a simple ovarian cyst with torsion, 3 cases of ovarian torsion without any cyst, 7 cases of a dermoid cyst with torsion in all, 1 case of secreting ovarian tumor and 5 cases of a paraovarian cyst with torsion. All patients had a normal tumor marker except 1 girl with a functional ovarian tumor who had elevated LDH and estrogen levels alongwith suppressed LH and FSH. In the initial period of our study we did 1 salpingo-oophorectomy for a suspected complex lesion and two oophorectomies for torsion with a simple cyst. In the later part of our study we performed laparoscopic cystectomy and ovarian preservation in 40 cases, including 7 cases of dermoid, where we performed laparoscopic detorsion with dermoid cystectomy and ovarian preservation in the same sitting. In three cases of chronic torsion who presented to us late, we could not preserve the ovary and had to resort to salpingo-ophorectomy. Histology showed a simple corpus luteal and follicular ovarian cyst in 31 cases, a paraovarian cyst in 5 cases with mature teratoma in 7 cases. Twenty-five patients with ovarian preservation following detorsion were subjected to

  6. Bio-preservative and therapeutic potential of pediocin: recent trends and future perspectives.

    Science.gov (United States)

    Mehta, Ridhi; Arya, Ridhima; Goyal, Karan; Singh, Mahipal; Sharma, Anil K

    2013-12-01

    Bacteriocins produced by lactic acid bacteria are of keen interest to the food industry for their bio-preservative potential and antimicrobial properties. The increasing demand for high quality 'safe' foods which are not extensively processed has created a niche for natural food preservatives. The bacteriocins (produced by bacteria) derived their name after the genera that produce them, hence bacteriocins produced by genus Pediococcus are known as Pediocin. Pediocins are antimicrobial peptides which show a strong activity against food spoilage and pathogenic bacteria, also are thermostable in nature as well as stable over a wide range of pH. Pediocin produced by Pediococcus acidilactici, has been generally recognized as safe (GRAS). The current review summarizes about the progress made on the Pediocin research from patent perspective along with the immense potential of these Pediococcus derived bacteriocins not only as antimicrobial, biopreservative and probiotic agents but also for the treatment of cancer, body odors and other health promoting actions. The relevant patents have been listed and briefly analyzed to upgrade and benefit food industries by prolonging the shelf life of various products.

  7. Growing trend of identity theft poses safety and billing loss threats.

    Science.gov (United States)

    2010-08-01

    Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.

  8. Gender and nation: Preservation (and construction of national identity through gender discriminative nationalistic politics: A case of Croatia

    Directory of Open Access Journals (Sweden)

    Topić Martina

    2009-01-01

    Full Text Available This paper analyses interconnection of gender, nation and national identity. Argumentation is based on the case study which is in this paper Croatia. At the beginning of its independence in the 90's Croatia faced with transition from totalitarian undemocratic system to a democratic one but also with a need for constructing the national identity which has not always been strongly incorporated in the society not obsessed with nationality and national identity, in a multinational state as Yugoslavia was. That construction of the national identity was made possible with so called return to the tradition where women were supposed to serve the country with theirs reproductive functions meant to enforce the nationalist politics of ethnical reproduction. In the past, Croatian political thought was not meant to be ethnical but civil, and therefore the nationalistic authorities wanted to nationalize the society and breast feed it with the idea of desire for independence that existed since ancient times, and gender played a crucial role in this politics. Only with political changes of 2000 a new era began but consequences of this radical nationalistic politics are still felt in the attitudes of the citizenship which still sees women in the traditional position and private sphere. .

  9. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  10. Ethnic affiliation, common memory and traditional culture of Macedonian Muslims in Albania: adaptating and preserving the identity (fieldworks of 2008-2010

    Directory of Open Access Journals (Sweden)

    Alexander Novik

    2015-09-01

    Full Text Available The paper is devoted to the question of ethnic affiliation of Macedonian Muslims in conditions of combined ethnical neighborhood. There are around ten settlements with Macedonian population in the Eastern part of the Republic of Albania (Mac. Golo Brdo, Alb. Golloborda. Five scientific researchers from St. Petersburg: Andrej Sobolev, Alexander Novik, Denis Ermolin, Maria Morozova and Alexandra Dugushina (Institute of Linguistic Studies of the Russian Academy of Sciences, Peter the Great Museum of Anthropology and Ethnography and St. Petersburg State University had organized fieldwork in the villages Trebisht, Klenje, Ostren etc. in 2008-2010. The author puts into academic context a new description of almost unexplored Macedonian community. The data have been obtained during the fieldworks in Eastern Albania. In conditions of long-term neighborhood with other languages and religious denominations, the adapting mechanisms have worked out specific approaches to preserving ethnical identity and traditional culture, perceiving their value and necessity of translating to descendants. Materials of fieldwork include data about identity, language, culture of Macedonian community in different periods of the state of Albania (Osmanli time, Royal Albania, Enver Hoxha monism period, post-communist transition, modern republic. These expedition materials are archived in the Kunstkamera (Museum of Anthropology and Ethnography of the Russian Academy of Sciences. The founds of the Museum have traditional clothes of Macedonian Muslims from Golo Brdo which are collected during the fieldworks 2008-2010

  11. Water Quality in Big Cypress National Preserve and Everglades National Park - Trends and Spatial Characteristics of Selected Constituents

    Science.gov (United States)

    Miller, Ronald L.; McPherson, Benjamin F.; Sobczak, Robert; Clark, Christine

    2004-01-01

    Seasonal changes in water levels and flows in Big Cypress National Preserve (BICY) and Everglades National Park (EVER) affect water quality. As water levels and flows decline during the dry season, physical, geochemical and biological processes increase the breakdown of organic materials and the build-up of organic waste, nutrients, and other constituents in the remaining surface water. For example, concentrations of total phosphorus in the marsh are less than 0.01 milligram per liter (mg/L) during much of the year. Concentrations can rise briefly above this value during the dry season and occasionally exceed 0.1 mg/L under drought conditions. Long-term changes in water levels, flows, water management, and upstream land use also affect water quality in BICY and EVER, based on analysis of available data (1959-2000). During the 1980's and early 1990's, specific conductance and concentrations of chloride increased in the Taylor Slough and Shark River Slough. Chloride concentrations more than doubled from 1960 to 1990, primarily due to greater canal transport of high dissolved solids into the sloughs. Some apparent long-term trends in sulfate and total phosphorus were likely attributable, at least in part, to high percentages of less-than and zero values and to changes in reporting levels over the period of record. High values in nutrient concentrations were evident during dry periods of the 1980's and were attributable either to increased canal inflows of nutrient-rich water, increased nutrient releases from breakdown of organic bottom sediment, or increased build-up of nutrient waste from concentrations of aquatic biota and wildlife in remaining ponds. Long-term changes in water quality over the period of record are less pronounced in the western Everglades and the Big Cypress Swamp; however, short-term seasonal and drought-related changes are evident. Water quality varies spatially across the region because of natural variations in geology, hydrology, and vegetation

  12. Privacy-preserving Identity Management

    OpenAIRE

    Milutinovic, Milica

    2015-01-01

    With the technological advances and the evolution of online services, user privacy is becoming a crucial issue in the modern day society. Privacy in the general sense refers to individuals’ ability to protect information about themselves and selectively present it to other entities. This concept is nowadays strongly affected by everyday practices that assume personal data disclosure, such as online shopping and participation in loyalty schemes. This makes it difficult for an individual to con...

  13. Analysis of water-quality trends at two discharge stations; one within Big Cypress National Preserve and one near Biscayne Bay; southern Florida, 1966-94

    Science.gov (United States)

    Lietz, A.C.

    2000-01-01

    An analysis of water-quality trends was made at two U.S. Geological Survey daily discharge stations in southern Florida. The ESTREND computer program was the principal tool used for the determination of water-quality trends at the Miami Canal station west of Biscayne Bay in Miami and the Tamiami Canal station along U.S. Highway 41 in the Big Cypress National Preserve in Collier County. Variability in water quality caused by both seasonality and streamflow was compensated for by applying the nonparametric Seasonal Kendall trend test to unadjusted concentrations or flow-adjusted concentrations (residuals) determined from linear regression analysis. Concentrations of selected major inorganic constituents and physical characteristics; pH and dissolved oxygen; suspended sediment; nitrogen, phosphorus, and carbon species; trace metals; and bacteriological and biological characteristics were determined at the Miami and Tamiami Canal stations. Median and maximum concentrations of selected constituents were compared to the Florida Class III freshwater standards for recreation, propagation, and maintenance of a healthy, well-balanced population of fish and wildlife. The median concentrations of the water-quality constituents and characteristics generally were higher at the Miami Canal station than at the Tamiami Canal station. The maximum value for specific conductance at the Miami Canal station exceeded the State standard. The median and maximum concentrations for ammonia at the Miami and Tamiami Canal stations exceeded the State standard, whereas median dissolved-oxygen concentrations at both stations were below the State standard. Trend results were indicative of either improvement or deterioration in water quality with time. Improvement in water quality at the Miami Canal station was reflected by downward trends in suspended sediment (1987-94), turbidity, (1970-78), total ammonia (1971-94), total phosphorus (1987-94), barium (1978-94), iron (1969-94), and fecal coliform

  14. Tracking the Role of Education in Preserving National Identity: Maritime Aspects in the History Subject at Senior High School in Indonesia

    Directory of Open Access Journals (Sweden)

    Singgih Tri Sulistiyono

    2017-07-01

    Full Text Available One of the most important objectives of this article is analyse wether or not the idea of the Indonesian identity as a maritime nation is instructed at school in the form of teaching materials. In this respect the history subject at senior high school bocomes the focus of the study. The history subject strategically can be benefitted as the medium of strengthening the Indonesian naitonal identity as a maritime nation. This matter is very important to be studied considering the fact that untill now the issue of national identity of Indonesian nation is still to be debated wether or not Indonesia will be developed to be maritime state or conversely to be agrarian state.  But many Indonesian believe that their ancestors were maritime people. And they confident that only the people who built the country based on thier identity could be a great nation. This article argues that although the maritime history of the great potential in the process of identity formation of Indonesia as a maritime nation and has the potential to strengthen national integration, but aspects of maritime history has not taught proportionally in Indonesian history textbooks.

  15. Contemporary use trends and survival outcomes in patients undergoing radical cystectomy or bladder-preservation therapy for muscle-invasive bladder cancer.

    Science.gov (United States)

    Cahn, David B; Handorf, Elizabeth A; Ghiraldi, Eric M; Ristau, Benjamin T; Geynisman, Daniel M; Churilla, Thomas M; Horwitz, Eric M; Sobczak, Mark L; Chen, David Y T; Viterbo, Rosalia; Greenberg, Richard E; Kutikov, Alexander; Uzzo, Robert G; Smaldone, Marc C

    2017-11-15

    The current study was performed to examine temporal trends and compare overall survival (OS) in patients undergoing radical cystectomy (RC) or bladder-preservation therapy (BPT) for muscle-invasive urothelial carcinoma of the bladder. The authors reviewed the National Cancer Data Base to identify patients with AJCC stage II to III urothelial carcinoma of the bladder from 2004 through 2013. Patients receiving BPT were stratified as having received any external-beam radiotherapy (any XRT), definitive XRT (50-80 grays), and definitive XRT with chemotherapy (CRT). Treatment trends and OS outcomes for the BPT and RC cohorts were evaluated using Cochran-Armitage tests, unadjusted Kaplan-Meier curves, adjusted Cox multivariate regression, and propensity score matching, using increasingly stringent selection criteria. A total of 32,300 patients met the inclusion criteria and were treated with RC (22,680 patients) or BPT (9620 patients). Of the patients treated with BPT, 26.4% (2540 patients) and 15.5% (1489 patients), respectively, were treated with definitive XRT and CRT. Improved OS was observed for RC in all groups. After adjustments with more rigorous statistical models controlling for confounders and with more restrictive BPT cohorts, the magnitude of the OS benefit became attenuated on multivariate (any XRT: hazard ratio [HR], 2.115 [95% confidence interval [95% CI], 2.045-2.188]; definitive XRT: HR, 1.870 [95% CI, 1.773-1.972]; and CRT: HR, 1.578 [95% CI, 1.474-1.691]) and propensity score (any XRT: HR, 2.008 [95% CI, 1.871-2.154]; definitive XRT: HR, 1.606 [95% CI, 1.453-1.776]; and CRT: HR, 1.406 [95% CI, 1.235-1.601]) analyses. In the National Cancer Data Base, receipt of BPT was associated with decreased OS compared with RC in patients with stage II to III urothelial carcinoma. Increasingly stringent definitions of BPT and more rigorous statistical methods adjusting for selection biases attenuated observed survival differences. Cancer 2017;123:4337-45. © 2017

  16. Hybrid Food Preservation Program Improves Food Preservation and Food Safety Knowledge

    Science.gov (United States)

    Francis, Sarah L.

    2014-01-01

    The growing trend in home food preservation raises concerns about whether the resulting food products will be safe to eat. The increased public demand for food preservation information led to the development of the comprehensive food preservation program, Preserve the Taste of Summer (PTTS). PTTS is a comprehensive hybrid food preservation program…

  17. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  18. Wood preservation

    Science.gov (United States)

    Kevin Archer; Stan Lebow

    2006-01-01

    Wood preservation can be interpreted to mean protection from fire, chemical degradation, mechanical wear, weathering, as well as biological attack. In this chapter, the term preservation is applied more restrictively to protection from biological hazards.

  19. Software preservation

    Directory of Open Access Journals (Sweden)

    Tadej Vodopivec

    2011-01-01

    Full Text Available Comtrade Ltd. covers a wide range of activities related to information and communication technologies; its deliverables include web applications, locally installed programs,system software, drivers, embedded software (used e.g. in medical devices, auto parts,communication switchboards. Also the extensive knowledge and practical experience about digital long-term preservation technologies have been acquired. This wide spectrum of activities puts us in the position to discuss the often overlooked aspect of the digital preservation - preservation of software programs. There are many resources dedicated to digital preservation of digital data, documents and multimedia records,but not so many about how to preserve the functionalities and features of computer programs. Exactly these functionalities - dynamic response to inputs - render the computer programs rich compared to documents or linear multimedia. The article opens the questions on the beginning of the way to the permanent digital preservation. The purpose is to find a way in the right direction, where all relevant aspects will be covered in proper balance. The following questions are asked: why at all to preserve computer programs permanently, who should do this and for whom, when we should think about permanent program preservation, what should be persevered (such as source code, screenshots, documentation, and social context of the program - e.g. media response to it ..., where and how? To illustrate the theoretic concepts given the idea of virtual national museum of electronic banking is also presented.

  20. Cryptographic Techniques for Privacy Preserving Identity

    Science.gov (United States)

    2011-05-13

    has been done to investigate the privacy implications of stylometry, however. Several researchers have considered whether the author of an academic ...Interface and Classification Society of North America, 2005. [66] H. Maurer, F. Kappe, and B. Zaka. Plagiarism —a survey. Journal of Universal Com- puter

  1. Digital preservation

    CERN Document Server

    Deegan, Marilyn

    2013-01-01

    Digital preservation is an issue of huge importance to the library and information profession right now. With the widescale adoption of the internet and the rise of the world wide web, the world has been overwhelmed by digital information. Digital data is being produced on a massive scale by individuals and institutions: some of it is born, lives and dies only in digital form, and it is the potential death of this data, with its impact on the preservation of culture, that is the concern of this book. So how can information professionals try to remedy this? Digital preservation is a complex iss

  2. Urine Preservative

    Science.gov (United States)

    Smith, Scott M. (Inventor); Nillen, Jeannie (Inventor)

    2001-01-01

    Disclosed is CPG, a combination of a chlorhexidine salt (such as chlorhexidine digluconate, chlorhexidine diacetate, or chlorhexidine dichloride) and n-propyl gallate that can be used at ambient temperatures as a urine preservative.

  3. Survival after Abdominoperineal and Sphincter-Preserving Resection in Nonmetastatic Rectal Cancer: A Population-Based Time-Trend and Propensity Score-Matched SEER Analysis

    Directory of Open Access Journals (Sweden)

    Rene Warschkow

    2017-01-01

    Full Text Available Background. Abdominoperineal resection (APR has been associated with impaired survival in nonmetastatic rectal cancer patients. It is unclear whether this adverse outcome is due to the surgical procedure itself or is a consequence of tumor-related characteristics. Study Design. Patients were identified from the Surveillance, Epidemiology, and End Results database. The impact of APR compared to coloanal anastomosis (CAA on survival was assessed by Cox regression and propensity-score matching. Results. In 36,488 patients with rectal cancer resection, the APR rate declined from 31.8% in 1998 to 19.2% in 2011, with a significant trend change in 2004 at 21.6% (P<0.001. To minimize a potential time-trend bias, survival analysis was limited to patients diagnosed after 2004. APR was associated with an increased risk of cancer-specific mortality after unadjusted analysis (HR = 1.61, 95% CI: 1.28–2.03, P<0.01 and multivariable adjustment (HR = 1.39, 95% CI: 1.10–1.76, P<0.01. After optimal adjustment of highly biased patient characteristics by propensity-score matching, APR was not identified as a risk factor for cancer-specific mortality (HR = 0.85, 95% CI: 0.56–1.29, P=0.456. Conclusions. The current propensity score-adjusted analysis provides evidence that worse oncological outcomes in patients undergoing APR compared to CAA are caused by different patient characteristics and not by the surgical procedure itself.

  4. Emittance preservation

    Energy Technology Data Exchange (ETDEWEB)

    Kain, V; Arduini, G; Goddard, B; Holzer, B J; Jowett, J M; Meddahi, M; Mertens, T; Roncarolo, F; Schaumann, M; Versteegen, R; Wenninger, J [European Organization for Nuclear Research, Geneva (Switzerland)

    2012-07-01

    Emittance measurements during the LHC proton run 2011 indicated a blow-up of 20 % to 30 % from LHC injection to collisions. This presentation will show the emittance preservation throughout the different parts of the LHC cycle and discuss the current limitations on emittance determination. An overview of emittance preservation through the injector complex as function of bunch intensity will also be given. Possible sources for the observed blow-up and required tests in 2012 will be presented. Possible improvements of emittance diagnostics and analysis tools for 2012 will be shown.

  5. Music, culture and identity

    Directory of Open Access Journals (Sweden)

    Ilir Ramadani

    2017-03-01

    Full Text Available At the time of globalization it is difficult to pretend avoiding music culture and identity from political, cultural and social developments. Thus, it is impossible for the music to be unshakable and to represent national identity by not taking and giving nothing to culture. The dynamics of life and the rapid development of technology make it impossible for the culture to remain unaffected in terms of sharing experiences social experiences. Culture represents our current course, both in terms of politics, also in the social and human aspects. Through the technology it is possible for our children to be equal with children of all other countries, to exchange information and to connect directly with all countries of the world. Musical education is one of the main factors of cultural development and preservation of national identity. Identity consists of everything we posses and reflect. We are those who distinguish from each other and have a common denominator compared to other nations.

  6. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  7. Usage Analysis for the Identification of Research Trends in Digital Libraries; Keepers of the Crumbling Culture: What Digital Preservation Can Learn from Library History; Patterns of Journal Use by Scientists through Three Evolutionary Phases; Developing a Content Management System-Based Web Site; Exploring Charging Models for Digital Cultural Heritage in Europe; Visions: The Academic Library in 2012.

    Science.gov (United States)

    Bollen, Johan; Vemulapalli, Soma Sekara; Xu, Weining; Luce, Rick; Marcum, Deanna; Friedlander, Amy; Tenopir, Carol; Grayson, Matt; Zhang, Yan; Ebuen, Mercy; King, Donald W.; Boyce, Peter; Rogers, Clare; Kirriemuir, John; Tanner, Simon; Deegan, Marilyn; Marcum, James W.

    2003-01-01

    Includes six articles that discuss use analysis and research trends in digital libraries; library history and digital preservation; journal use by scientists; a content management system-based Web site for higher education in the United Kingdom; cost studies for transitioning to digitized collections in European cultural institutions; and the…

  8. DNA preservation in silk.

    Science.gov (United States)

    Liu, Yawen; Zheng, Zhaozhu; Gong, He; Liu, Meng; Guo, Shaozhe; Li, Gang; Wang, Xiaoqin; Kaplan, David L

    2017-06-27

    The structure of DNA is susceptible to alterations at high temperature and on changing pH, irradiation and exposure to DNase. Options to protect and preserve DNA during storage are important for applications in genetic diagnosis, identity authentication, drug development and bioresearch. In the present study, the stability of total DNA purified from human dermal fibroblast cells, as well as that of plasmid DNA, was studied in silk protein materials. The DNA/silk mixtures were stabilized on filter paper (silk/DNA + filter) or filter paper pre-coated with silk and treated with methanol (silk/DNA + PT-filter) as a route to practical utility. After air-drying and water extraction, 50-70% of the DNA and silk could be retrieved and showed a single band on electrophoretic gels. 6% silk/DNA + PT-filter samples provided improved stability in comparison with 3% silk/DNA + filter samples and DNA + filter samples for DNA preservation, with ∼40% of the band intensity remaining at 37 °C after 40 days and ∼10% after exposure to UV light for 10 hours. Quantitative analysis using the PicoGreen assay confirmed the results. The use of Tris/borate/EDTA (TBE) buffer enhanced the preservation and/or extraction of the DNA. The DNA extracted after storage maintained integrity and function based on serving as a functional template for PCR amplification of the gene for zinc finger protein 750 (ZNF750) and for transgene expression of red fluorescence protein (dsRed) in HEK293 cells. The high molecular weight and high content of a crystalline beta-sheet structure formed on the coated surfaces likely accounted for the preservation effects observed for the silk/DNA + PT-filter samples. Although similar preservation effects were also obtained for lyophilized silk/DNA samples, the rapid and simple processing available with the silk-DNA-filter membrane system makes it appealing for future applications.

  9. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  10. Ternutator identities

    International Nuclear Information System (INIS)

    Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor

    2009-01-01

    The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.

  11. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  12. Preserving reptiles for research

    Science.gov (United States)

    Gotte, Steve W.; Jacobs, Jeremy F.; Zug, George R.; Dodd, C. Kenneth

    2016-01-01

    What are voucher specimens and why do we collect them? Voucher specimens are animals and/or their parts that are deposited in a research museum to document the occurrence of a taxon at a specific location in space and time (Pleijel et al., 2008; Reynolds and McDiarmid, 2012). For field biologists, vouchers are the repeatable element of a field study as they allow other biologists, now and in the future, to confirm the identity of species that were studied. The scientific importance of a voucher specimen or series of specimens is that other people are afforded the opportunity to examine the entire animal and confirm or correct identifications. A photographic record is somewhat useful for recording the occurrence of a species, but such records can be insufficient for reliable confirmation of specific identity. Even if a photo shows diagnostic characters of currently recognized taxa, it may not show characters that separate taxa that may be described in the future. Substantial cryptic biodiversity is being found in even relatively well-known herpetofaunas (Crawford et al., 2010), and specimens allow researchers to retroactively evaluate the true diversity in a study as understanding of taxonomy evolves. They enable biologists to study the systematic relationships of populations by quantifying variation in different traits. Specimens are also a source of biological data such as behaviour, ecology, epidemiology, and reproduction through examination of their anatomy, reproductive and digestive tracts, and parasites (Suarez and Tsutsui, 2004). Preserving reptiles as vouchers is not difficult, although doing it properly requires care, effort, and time. Poorly preserved vouchers can invalidate the results and conclusions of your study because of the inability to confirm the identity of your study animals. Good science requires repeatability of observations, and the absence of vouchers or poorly preserved ones prevents such confirmation. Due to space restrictions, we are

  13. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  14. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  15. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  16. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  17. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  18. 7 CFR 868.36 - Loss of identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Loss of identity. 868.36 Section 868.36 Agriculture... identity. (a) Lots. The identity of a packaged lot, bulk lot, or sublot of a commodity shall be considered... or location after the time of original inspection, unless the identity is preserved; or (2) More...

  19. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  20. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  1. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  2. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  3. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...

  4. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  5. Unemployment and readiness for empathy as predictors of national identity

    Directory of Open Access Journals (Sweden)

    Otašević Biljana

    2016-01-01

    Full Text Available In times of economic crisis and globalization trends, the question of national identity has acquired special significance. This paper examines the individual differences and demographic factors that contribute to its preservation and strengthening. This research was conducted in order to establish the role of employment status and readiness for empathy in predicting individual differences in identification with a national group. In a sample of 107 respondents (66.4% female, 69.2% the employed aged from 21 to 62 years, we applied the following instruments: Readiness for empathy questionnaire, National identity scale and a brief socio-demographic questionnaire. Hierarchical regression analysis was applied to investigate the prediction structure of national identity based on the employment status, and 4 dimensions of empathy: Empathy with positive emotional states, Empathy with negative emotional states, Emotional reactions provoked by empathy, and Empathy as a social role. The final model significantly explains 15 % of the variance of national identity. Employment and Empathy with negative emotional states were singled out as predictors of national identity as well as the Emotional reactions provoked by empathy, where a higher level is associated with less distinctive national identity. The results indicate the consequences of low socio-economic status of members of a nation on the level of their national identity, indicating the personal position of individuals in a group as the main source of identification with a national group. In other words, the identification of an individual with their national group depends on the degree to which it meets their basic needs. The factor which nevertheless contributes to identification with one's own nation and compatriots, regardless of personal economic status, is the ability to empathize with negative emotional states.

  6. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  7. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  8. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  9. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  10. LITERATURE AND IDENTITY

    Directory of Open Access Journals (Sweden)

    Dragana Litričin Dunić

    2015-04-01

    Full Text Available Literature can represent, on the one hand, the establishment of cultural and national identity, and, on the other hand, a constant indicator of the differences. Self-image and the image of the Other in literature is very important not only for understanding national character and preservation of cultural identity, but also for the release from ideological reading and stereotyping. Analyzing the image of the Other, research into the representation of the Balkans symbolically represents in the popular literature of the West, study of the cultural context and the processes that formed the writer’s perceptions that determine the establishment of stereotypes about Homo Balcanicus and many others, are all important tasks of imagological research, as well as the key research tasks conducted nowadays. In this paper we shall discuss some of these issues in the field of comparative literature.

  11. Spacing Identity

    DEFF Research Database (Denmark)

    Stang Våland, Marianne; Georg, Susse

    2018-01-01

    In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....

  12. Salvage Stories, Preserving Narratives, and Museum Ships

    OpenAIRE

    Andrew Sawyer

    2013-01-01

    Preserved ships and other vessels are associated with a historiography, in Europe at least, which is still marked by parochialism, antiquarianism, and celebratory narrative. Many evidence difficult histories, and they are also extremely expensive to preserve. Yet, they are clearly valued, as nations in Europe invest heavily in them. This survey examines a range of European examples as sites of cultural, political and national identity. An analytical framework foregrounding the role of narrati...

  13. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  14. Cultivating College Students' National Culture Identity Based on English Education

    Science.gov (United States)

    Yuan, Yang; Fang, Lu

    2016-01-01

    Our country is a multi-ethnic country with plentiful national culture achievements, and the development of the national culture shows a trend of diversity, so cultural identity construction is particularly important. Article analyzes the concept of national identity, the relation between cultural identity and ethnic identity, the present situation…

  15. Corporate identity: The concept, its measurement and management

    NARCIS (Netherlands)

    C.B.M. van Riel (Cees); J.M.T. Balmer (John)

    1997-01-01

    textabstractArticulates the main trends in the literature on corporate identity; defines corporate identity; explains the rationale for corporate identity management and describes the main methods used to reveal the desired and the actual corporate identity. Particular reference will be made to two

  16. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  17. Survivorship and discourses of identity.

    Science.gov (United States)

    Little, Miles; Paul, Kim; Jordens, Christopher F C; Sayers, Emma-Jane

    2002-01-01

    Personal identity is self-evidently important to us all. Identity is a philosophically complex subject, but there is some agreement that memory, embodiment and continuity are essential components. The sense of memory includes 'future memory', the kind of memory we would like to construct for ourselves as our lives proceed. While the sense of personal identity is internal to the individual, a sense of that person's identity exists in the minds of others. Extreme experiences threaten the element of continuity, because they may bring bodily changes as well as cognitive changes that challenge central values. Restoring or preserving continuity is a major task for survivors. The ways in which people experience discontinuity because of cancer illness, and the ways in which they manage this experience emerges from the narratives of the survivors of cancer and in the narratives of health care workers who look after them. People manage discontinuity by reference to stable 'anchor points' in their beliefs and values; by re-constructing versions of their pre-experience identities, drawing on past memory and finding ways to preserve a continuity between past memory, present experience and constructions of the future; by using the experience to develop established facets of identity; and by imbuing the experience with meaning and recognising the enlarged identity made possible by survival. Those who cannot achieve a sense of continuity may feel alienated from themselves, their friends and family. All these methods of management may be used by one person to negotiate the post-experience identity in its different social interactions. The experience of the survivor can be further understood by recognising the challenge posed by extreme experience to the sense of continuity of both embodied self and memory. A satisfactory discourse of survival has yet to enter the public domain. This lack adds to the burdens of survivors, including those who have survived cancer. Copyright 2002 John

  18. Identity Activities

    Science.gov (United States)

    2016-08-03

    in reaction to their environment. They reflect an individual’s internal or external, conscious or subconscious , overt or covert, voluntary or...identity activities under a range of legal authorities, policy constraints, transnational threats, regional concerns and biases , and most likely...Biography. A baseline and descriptive analytic product that supports the development of the behavioral influences analysis ( BIA ) individual behavioral

  19. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  20. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  1. Challenging Identities

    DEFF Research Database (Denmark)

    depends on the conceptual or ideological constellation in which it takes part. This volume on one hand demonstrates the role of notions of identity in a variety of European contexts, and on the other hand highlights how there may be reasons to challenge the use of the term and corresponding social...

  2. Sensor management for identity fusion on a mobile robot

    DEFF Research Database (Denmark)

    Larsen, Thomas Dall; Andersen, Nils Axel; Ravn, Ole

    1998-01-01

    This paper addresses the problem of identity fusion, i.e. the problem of selecting one of several identity hypotheses concerning an observed object. Two problems are considered. Firstly the problem of preserving the information in the representation and fusion of measurements relating to identity...

  3. Saving Face and Group Identity

    DEFF Research Database (Denmark)

    Eriksson, Tor; Mao, Lei; Villeval, Marie-Claire

    2015-01-01

    their self- but also other group members' image. This behavior is frequent even in the absence of group identity. When group identity is more salient, individuals help regardless of whether the least performer is an in-group or an out-group. This suggests that saving others' face is a strong social norm.......Are people willing to sacrifice resources to save one's and others' face? In a laboratory experiment, we study whether individuals forego resources to avoid the public exposure of the least performer in their group. We show that a majority of individuals are willing to pay to preserve not only...

  4. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    , as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  5. Mediating Identity

    DEFF Research Database (Denmark)

    Kjærgaard, Annemette Leonhardt; Morsing, Mette; Ravasi, Davide

    2011-01-01

    This paper reports a longitudinal field study on the effects of positive media coverage on the reconstruction of organizational identity. The study highlights how intense positive coverage – to the point of turning an organization into a ‘celebrity’– influences both the way members understand...... their organization (sensemaking effect) and the gratification they derive from its positive representation (self-enhancement effect). Our findings suggest that positive media representations foster members' alignment around an emergent new understanding of what their organization is. Over time, however, celebrity...

  6. Unravelling identities

    OpenAIRE

    2007-01-01

    Abstract The decision to go to war by the government of the day is assumed to be a decision taken on behalf of all citizens of the nation, conceived as a collective united by a harmony of interests. Yet in the case of the Iraq War, there is clearly no unified voice of support from the British people. There is division between the state and its citizens, and the latter also reflect the multilayered identities of an increasingly multicultural society. How do individuals displaying mu...

  7. Claiming identity

    DEFF Research Database (Denmark)

    Krag, Mo Michelsen Stochholm

    2016-01-01

    At the moment most of the countries in the western world are experiencing severe demographic changes. The population in the rural areas abandon their home villag-es and move into the cities. In Denmark, this social migration is mainly caused by a decline in employment in food production based...... on farming. While the major cities in Denmark experience population and economic growth, the villages in surrounding rural areas face abandonment and decay. Despite the good intentions, today’s widespread EU and state funds for demolition projects generally emphasize the fast eradication of cultural values...... prototypes were tested as present manifestations in rural villages as an alternative way to pre-serve and activate buildings as well as memories....

  8. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  9. Trends in radical prostatectomy.

    Science.gov (United States)

    Eastham, James; Tokuda, Yuji; Scardino, Peter

    2009-02-01

    The surgical treatment of prostate cancer ideally removes the entire cancer, avoids excessive blood loss or serious perioperative complications, and results in complete recovery of continence and potency. To achieve this, the surgeon must excise sufficient periprostatic tissue to cure the cancer while preserving the cavernosal nerves required for erectile function and the neuromusculature required for normal urinary and bowel function. Here we will examine recent trends in radical prostatectomy, focusing on surgical technique.

  10. Identical and shifted identical bands

    International Nuclear Information System (INIS)

    Dodder, R.S; Jones, E.F.; Hamilton, J.H.

    1997-01-01

    Spontaneous fission of 252 Cm was studied with 72 large Compton suppressed Ge detectors in Gamma sphere. New isotopes 160 Sm and 162 Gd were identified. Through X-ray-γ and γ-γ-γ) coincidence measurements, level energies were established to spins 14 + to 20 + in 152 , 154 156 60 Nd 92 94 96 , 156 , 158 , 160 62 Sm 94 , 96 , 98 , and 160 , 162 64 Gd 96 , 98 . These nuclei exhibit a remarkable variety of identical bands and bands where the energies and moments of inertia are shifted by the same constant amount for every spin state from 2 + to 12 + for various combinations of nuclei differing by 2n, 4n, 2p, 4p, and α

  11. Preserving Digital Materials

    CERN Document Server

    Harvey, Ross

    2011-01-01

    This book provides a single-volume introduction to the principles, strategies and practices currently applied by librarians and recordkeeping professionals to the critical issue of preservation of digital information. It incorporates practice from both the recordkeeping and the library communities, taking stock of current knowledge about digital preservation and describing recent and current research, to provide a framework for reflecting on the issues that digital preservation raises in professional practice.

  12. Preserving Russian Cultural Identity of Learners in Multicultural Learning Environment

    OpenAIRE

    Vasilyeva, Tatyana; Uskova, Olga; Kosheleva, Elena Yurievna; Dong Thi Lin Jang

    2015-01-01

    The purpose of this article is to move readers toward a deeper understanding of and wider respect for the issues of the modern system of bilingual education based on the principles of multiculturalism. Different conditions of learning are taken into account: the Russian language in restricted linguistic medium as well as Russian as a foreign language. The principles of multiculturalism determine the educational concepts used in teaching Russian to diverse categories of learners. The authors d...

  13. Environmental education on wood preservatives and preservative ...

    African Journals Online (AJOL)

    The development and use of wood preservatives in Nigeria should address not only the cost and demand functions but also the potential hazards in environmental equations. Forest products specialists are often asked about the perceived risks and environmental costs of treated wood products. Evidently, the civil society is ...

  14. Salvage Stories, Preserving Narratives, and Museum Ships

    Directory of Open Access Journals (Sweden)

    Andrew Sawyer

    2013-11-01

    Full Text Available Preserved ships and other vessels are associated with a historiography, in Europe at least, which is still marked by parochialism, antiquarianism, and celebratory narrative. Many evidence difficult histories, and they are also extremely expensive to preserve. Yet, they are clearly valued, as nations in Europe invest heavily in them. This survey examines a range of European examples as sites of cultural, political and national identity. An analytical framework foregrounding the role of narrative and story reveals three aspects to these exhibits: explicit stories connected with specific nations, often reinforcing broader, sometimes implicit, national narratives; and a teleological sequence of loss, recovery and preservation, influenced by nationality, but very similar in form across Europe

  15. Mass preserving image registration

    DEFF Research Database (Denmark)

    Gorbunova, Vladlena; Sporring, Jon; Lo, Pechin Chien Pau

    2010-01-01

    The paper presents results the mass preserving image registration method in the Evaluation of Methods for Pulmonary Image Registration 2010 (EMPIRE10) Challenge. The mass preserving image registration algorithm was applied to the 20 image pairs. Registration was evaluated using four different...

  16. Modes of fossil preservation

    Science.gov (United States)

    Schopf, J.M.

    1975-01-01

    The processes of geologic preservation are important for understanding the organisms represented by fossils. Some fossil differences are due to basic differences in organization of animals and plants, but the interpretation of fossils has also tended to be influenced by modes of preservation. Four modes of preservation generally can be distinguished: (1) Cellular permineralization ("petrifaction") preserves anatomical detail, and, occasionally, even cytologic structures. (2) Coalified compression, best illustrated by structures from coal but characteristic of many plant fossils in shale, preserves anatomical details in distorted form and produces surface replicas (impressions) on enclosing matrix. (3) Authigenic preservation replicates surface form or outline (molds and casts) prior to distortion by compression and, depending on cementation and timing, may intergrade with fossils that have been subject to compression. (4) Duripartic (hard part) preservation is characteristic of fossil skeletal remains, predominantly animal. Molds, pseudomorphs, or casts may form as bulk replacements following dissolution of the original fossil material, usually by leaching. Classification of the kinds of preservation in fossils will aid in identifying the processes responsible for modifying the fossil remains of both animals and plants. ?? 1975.

  17. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Labots, H.; Huis in 't Veld, G.J.P.; Verrips, C.T.

    1985-01-01

    After a review of several methods for the preservation of food and the routes of food infections, the following chapters are devoted to the preservation by irradiation. Applications and legal aspects of food irradiation are described. Special reference is made to the international situation. (Auth.)

  18. Self-preserving cosmetics.

    Science.gov (United States)

    Varvaresou, A; Papageorgiou, S; Tsirivas, E; Protopapa, E; Kintziou, H; Kefala, V; Demetzos, C

    2009-06-01

    Preservatives are added to products for two reasons: first, to prevent microbial spoilage and therefore to prolong the shelf life of the product; second, to protect the consumer from a potential infection. Although chemical preservatives prevent microbial growth, their safety is questioned by a growing segment of consumers. Therefore, there is a considerable interest in the development of preservative-free or self-preserving cosmetics. In these formulations traditional/chemical preservatives have been replaced by other cosmetic ingredients with antimicrobial properties that are not legislated as preservatives according to the Annex VI of the Commission Directive 76/768/EEC and the amending directives (2003/15/EC, 2007/17/EC and 2007/22/EC). 'Hurdle Technology', a technology that has been used for the control of product safety in the food industry since 1970s, has also been applied for the production of self-preserving cosmetics. 'Hurdle Technology' is a term used to describe the intelligent combination of different preservation factors or hurdles to deteriorate the growth of microorganisms. Adherence to current good manufacturing practice, appropriate packaging, careful choice of the form of the emulsion, low water activity and low or high pH values are significant variables for the control of microbial growth in cosmetic formulations. This paper describes the application of the basic principles of 'Hurdle Technology' in the production of self-preserving cosmetics. Multifunctional antimicrobial ingredients and plant-derived essential oils and extracts that are used as alternative or natural preservatives and are not listed in Annex VI of the Cosmetic Directive are also reported.

  19. Creation, Identity and Reflection

    Directory of Open Access Journals (Sweden)

    Alina Beatrice Cheşcă

    2015-05-01

    Full Text Available The paper “Creation, Identity and Reflection” approaches the identification in the “mirror” of reality with creation, in other words seeking the authors’ identity in the reflected images. Reflection means attempting to find oneself, the mirror being the main principle of creation. Many characters become interesting only when they step into the world beyond the mirror, when their faces are doubled by the other self or when their selves are returned by other characters. The narcissistic concept of the mirror, i.e. the reflection in the mirror and the representation of the mirror itself, is a recurrent one in literature, but the reflection of the self which is not the self (as it is a reflection does not necessarily appear in a mirror or in a photograph or portrait. Sometimes, the not-self is returned to the self by another person or character. As far as Oscar Wilde’s theories are concerned, the main idea is that people are interesting for their masks, not for their inner nature. What Wilde calls “inner nature” is the characters’ un-reflected self and the mask is the reflection, the self in the mirror. Some characters’ relationships develop within a fiction that they dramatically try to preserve and protect with the risk of suffering. They refuse to take off the masks which define them in the others’ minds and hearts; the narcissistic individuals (both artists and characters seek and love their own image which they project upon facts, thus creating a fictive realm.

  20. Globalization and Localization of Heritage Preservation in Taiwan - an Analysis Perspective under the Cultural Heritage Preservation Act

    Science.gov (United States)

    Chen, C.-C.; Fu, C.-C.

    2015-08-01

    The key contribution to the legislation of heritage preservation in Taiwan primarily derived from the historical monument movements in the 1970s. Specific legislation results include the establishment of Council for Cultural Affairs and the implementation of the Cultural Heritage Preservation Act in 1982. Although the Cultural Heritage Preservation Act is the first subjective cultural act, its lack of structure during the initial commencement stages made it un-conducive to heritage preservation and thus unable to meet the people's expectations. Therefore, throughout the 33 years after the implementation of the Cultural Heritage Preservation Act, the Act has been amended 6 times. These amendments reflect the degree of importance that the society has attached to heritage preservation, and the innovative system also showcases the progress in preservation concepts and methods. These innovative orientations, such as emphasizing on the authenticity and integrity of heritage preservation, intangible cultural heritage, and cultural diversity, conform to the international preservation trends. They are also local trends such as encouraging community participation, adaptive-reuse, or enhancing the local governments' powers to implement local cultural governance. This is particularly true for the fifth comprehensive revision in 2005, which has symbolic significance because its contents epitomized the heritage preservation work while moving Taiwan's heritage preservation system towards globalization and localization. Therefore, we analyzed the Cultural Heritage Preservation Act amendment and revision processes over the past 33 years to highlight the innovations in Taiwan's cultural heritage work and illustrate their globalization and localization features. Finally, we proposed recommendations for Taiwan's preservation work in the future as the Cultural Heritage Preservation Act is about to undergo its seventh amendment in 2015.

  1. Chronopolis Digital Preservation Network

    Directory of Open Access Journals (Sweden)

    David Minor

    2010-07-01

    Full Text Available The Chronopolis Digital Preservation Initiative, one of the Library of Congress’ latest efforts to collect and preserve at-risk digital information, has completed its first year of service as a multi-member partnership to meet the archival needs of a wide range of domains.Chronopolis is a digital preservation data grid framework developed by the San Diego Supercomputer Center (SDSC at UC San Diego, the UC San Diego Libraries (UCSDL, and their partners at the National Center for Atmospheric Research (NCAR in Colorado and the University of Maryland's Institute for Advanced Computer Studies (UMIACS.Chronopolis addresses a critical problem by providing a comprehensive model for the cyberinfrastructure of collection management, in which preserved intellectual capital is easily accessible, and research results, education material, and new knowledge can be incorporated smoothly over the long term. Integrating digital library, data grid, and persistent archive technologies, Chronopolis has created trusted environments that span academic institutions and research projects, with the goal of long-term digital preservation.A key goal of the Chronopolis project is to provide cross-domain collection sharing for long-term preservation. Using existing high-speed educational and research networks and mass-scale storage infrastructure investments, the partnership is leveraging the data storage capabilities at SDSC, NCAR, and UMIACS to provide a preservation data grid that emphasizes heterogeneous and highly redundant data storage systems.In this paper we will explore the major themes within Chronopolis, including:a The philosophy and theory behind a nationally federated data grid for preservation. b The core tools and technologies used in Chronopolis. c The metadata schema that is being developed within Chronopolis for all of the data elements. d Lessons learned from the first year of the project.e Next steps in digital preservation using Chronopolis: how we

  2. The chiral Ward-Takahashi identity in the ladder approximation

    International Nuclear Information System (INIS)

    Kugo, Taichiro; Mitchard, M.G.

    1992-01-01

    We show that the ladder approximation to the Schwinger-Dyson and Bethe-Salpeter equations preserves the Ward-Takahashi identity for the axial vector vertex if and only if we use the gluon momentum as the argument of the running coupling constant. However, in the usual Landau gauge this is inconsistent with the vector Ward identity. We propose a new method for making the ladder approximation scheme consistent with both vector and axial vector Ward identities. (orig.)

  3. Need of Reactor Dosimetry Preservation

    International Nuclear Information System (INIS)

    Ilieva, Krassimira

    2011-01-01

    The nuclear safety requirements and philosophy have changed by the development of new nuclear systems and this imposes special research and development activity. Reactor dosimetry which is applied for determination of neutron field parameters and neutron flux responses in different regions of the reactor system plays an important role in determining of radiation exposure on reactor system elements as reactor vessel, internals, shielding; dose determination for material damage study; for conditioning of irradiation; dose determination for medicine and industry application; induced activity determination for decommissioning purposes. The management of nuclear knowledge has emerged as a growing challenge in recent years. The need to preserve and transfer nuclear knowledge is compounded by recent trends such as ageing of the nuclear workforce, declining student numbers in nuclear related fields, and the threat of losing accumulated nuclear knowledge. (author)

  4. Optimization of preservation activities and preservation engineering (1)

    International Nuclear Information System (INIS)

    Aoki, Takayuki; Mimaki, Hidehito; Oda, Mitsuyuki

    2004-01-01

    In order to deal with the optimization of preservation activities and 'preservation engineering' which makes it possible, the relation between general society and preservation, the content and the structure of preservation activities, and the viewpoint and the approach of the optimization of the preventive preservation are described. The optimization of the preventive preservation is shown respectively in the four stages of planning, implementation, result evaluation and countermeasure. (K. Kato)

  5. VT Historic Preservation Grant

    Data.gov (United States)

    Vermont Center for Geographic Information — The State-funded Historic Preservation Grant Program helps municipalities and non-profit organizations rehabilitate the historic buildings that are a vital part of...

  6. Preservation of Built Environments

    DEFF Research Database (Denmark)

    Pilegaard, Marie Kirstine

    When built environments and recently also cultural environments are to be preserved, the historic and architectural values are identified as the key motivations. In Denmark the SAVE system is used as a tool to identify architectural values, but in recent years it has been criticized for having...... architectural value in preservation work as a matter of maintaining the buildings -as keeping them "alive" and allowing this to continue in the future. The predominantly aesthetic preservation approach will stop the buildings' life process, which is the same as - "letting them die". Finnebyen in Aarhus...... is an example of a residential area, where the planning authority currently has presented a preservational district plan, following guidelines from the SAVE method. The purpose is to protect the area's architectural values in the future. The predominantly aesthetic approach is here used coupled to the concept...

  7. Radiation preservation of maize

    International Nuclear Information System (INIS)

    Wasito.

    1980-01-01

    Radiation preservation of maize was carried out. Radiation doses and sources, shielding materials, packaging materials, chemical radiation effects, biological radiation effects, were discussed. Experimental methods, samples and accessories were also presented. (SMN)

  8. [The health preserving behavior in adolescents].

    Science.gov (United States)

    Al'bitskii, V Iu; Makeev, N I

    2010-01-01

    The article deals with the results of study of health preserving behavior of 310 students of senior classes of high schools of town of Jukovsky of Moskovskaya oblast. The higher level of prevalence of harmful habits among adolescents is revealed. It is emphasized that among girls the prevalence of harmful habits is not at large lower than among boys. The lower level of medical activities of respondents is explained by mistrusting physicians of curative preventive establishments, fear of queues, self-confidence in one's own knowledge and low level of medical awareness. The priority of physical culture and sport in the life of adolescents is reducing. The reorientation of trends in modern fashion to the behavior stereotypes with motional activities restriction occurs. The making of conditions to develop consistent health preserving behavior can become the most important reserve of preservation and enhancement of adolescents' health.

  9. Digital preservation for heritages

    CERN Document Server

    Lu, Dongming

    2011-01-01

    ""Digital Preservation for Heritages: Technologies and Applications"" provides a comprehensive and up-to-date coverage of digital technologies in the area of cultural heritage preservation, including digitalization, research aiding, conservation aiding, digital exhibition, and digital utilization. Processes, technical frameworks, key technologies, as well as typical systems and applications are discussed in the book. It is intended for researchers and students in the fields of computer science and technology, museology, and archaeology. Dr. Dongming Lu is a professor at College of Computer Sci

  10. Indiana Pavement Preservation Program

    OpenAIRE

    Ong, Ghim Ping (Raymond); Nantung, Tommy E.; Sinha, Kumares C.

    2010-01-01

    State highway agencies are facing immense pressure to maintain roads at acceptable levels amidst the challenging financial and economic situations. In recent years, pavement preservation has been sought as a potential alternative for managing the pavement assets, believing that it would provide a cost-effective solution in maintaining infrastructural conditions and meeting user expectations. This study explores the potential of pavement preservation concepts in managing the agency‘s pavement ...

  11. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  12. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  13. Training for Preservation Management

    Directory of Open Access Journals (Sweden)

    Mirjam M. Foot

    1999-05-01

    Full Text Available In August 1997 the first of a series of summer schools in Preservation Management was held at the Archivschule in Marburg (Germany. The school was organised by the ECPA, the LIBER Division on Preservation, ICA and the Archivschule itself and was aimed at archivists and librarians in management positions from European institutions. It dealt with managerial, organisational and financial aspects of preservation and required active participation by those attending. Apart from introductory sessions by the teaching staff at the Archivschule, a large part of the course took the form of working groups, discussions, assignments and role play, to which participants were expected to take their own experience and problems. The school was conducted in German. Topics, spread over five days, ranged from preservation in the context of the core activities of libraries and archives; planning of preservation projects; general management issues, such as resource management, budgeting, priority setting, communication and effecting change; to more detailed considerations of day-to-day issues, such as storage, disaster control, microfilming and digitising, mass conservation processes, and moulds and fungi.

  14. Identity and power in Ukraine

    Directory of Open Access Journals (Sweden)

    Karina V. Korostelina

    2013-01-01

    Full Text Available This paper analyzes the coercive and legitimate forms of power in Ukraine. It describes the crisis of legitimacy in Ukraine as a contradiction between a blatantly cruel system of capitalism dominated by a few oligarchs, and the lingering remnants of a Soviet mentality. Two strategies are used by the Government to stoke the crisis. First, increased identification with ethnic or regional groups are instrumentally used by the Government to take attention from economic and class issues. Second, the incorporation of a Soviet meaning of power into the new national identity and presentation of it as core norms, believes, and values of the people of Ukraine competes with alternative Ukrainian identity concepts. The paper analyzes five main features of the Soviet meanings of power – political, social, and economic paternalism, perception of power as source of profit and violence, and the dual reality of power with the gap between official narratives of power and a real life. The process of incorporation of the Soviet concept of power into national identity is facilitated by the process of national identity formation that helped to preserve the Soviet perception of power, because of the absence of a new ideology, a lack of critical assessment of the Soviet past, an absence of the vision of outcome, an embryonic culture of democracy, and contributions of all the presidents to the preservation of the Soviet meaning of power. People justify the system as legitimate and fair for many reasons: out of historic habit and deemed moral obligations, self-interests and/or a fear of sanctions, identification with the ruler, zones of indifference, an absence of will and self-confidence, desire to support a strong leader based on ambiguity intolerance, hierarchy – enhancing ideologies, and a general tolerance of injustice. The obedience of subjects is connected with the strength of will of the subjects and the social structures of the society. In Ukraine, the

  15. Cancer and fertility preservation

    DEFF Research Database (Denmark)

    Lambertini, Matteo; Del Mastro, Lucia; Pescio, Maria C

    2016-01-01

    In the last years, thanks to the improvement in the prognosis of cancer patients, a growing attention has been given to the fertility issues. International guidelines on fertility preservation in cancer patients recommend that physicians discuss, as early as possible, with all patients...... of reproductive age their risk of infertility from the disease and/or treatment and their interest in having children after cancer, and help with informed fertility preservation decisions. As recommended by the American Society of Clinical Oncology and the European Society for Medical Oncology, sperm...... data have become available, and several issues in this field are still controversial and should be addressed by both patients and their treating physicians.In April 2015, physicians with expertise in the field of fertility preservation in cancer patients from several European countries were invited...

  16. Optimization of preservation activities and preservation engineering (2)

    International Nuclear Information System (INIS)

    Aoki, Takayuki; Mimaki, Hidehito; Oda, Mitsuyuki

    2004-01-01

    In order to deal with the optimization of preservation activities and 'preservation engineering' which makes it possible, the viewpoint and the approach of the optimization of the ex post facto preservation and the content to be possessed in 'preservation engineering' are described. The optimization of the ex post facto preservation is shown respectively in the four stages of planning, implementation, result evaluation and countermeasure. (K. Kato)

  17. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  18. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  19. Advanced Digital Preservation

    CERN Document Server

    Giaretta, David

    2011-01-01

    There is growing recognition of the need to address the fragility of digital information, on which our society heavily depends for smooth operation in all aspects of daily life. This has been discussed in many books and articles on digital preservation, so why is there a need for yet one more? Because, for the most part, those other publications focus on documents, images and webpages -- objects that are normally rendered to be simply displayed by software to a human viewer. Yet there are clearly many more types of digital objects that may need to be preserved, such as databases, scientific da

  20. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  1. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  2. Economics of Historic Preservation: Dollars and Sense

    Directory of Open Access Journals (Sweden)

    April D. ALLEN

    2012-12-01

    Full Text Available The built environment expresses diversity, identity, individuality, and differentiation. In economics, it is the differentiated product that commands a monetary premium. Historic preservation protects our diverse building stock while creating more construction jobs, returning under-utilized buildings to the tax rolls, attracting heritage tourists, and maximizing the use of existing infrastructure. It has been said that the greenest building is the one that is already built. Four out of five existing buildings will be renovated over the next generation while two new buildings are added. With an overwhelming vastness of existing building stock, this becomes the elephant in the room. We cannot build our way to sustainability but must conserve our way to it. Economically, this makes good sense. Historic preservation, sustainability and conservation go hand in hand to protect our built environment while providing healthy, aesthetically pleasing buildings in which to live, work, and play, thus growing the local economy.

  3. Trend analysis

    International Nuclear Information System (INIS)

    Smith, M.; Jones, D.R.

    1991-01-01

    The goal of exploration is to find reserves that will earn an adequate rate of return on the capital invested. Neither exploration nor economics is an exact science. The authors must therefore explore in those trends (plays) that have the highest probability of achieving this goal. Trend analysis is a technique for organizing the available data to make these strategic exploration decisions objectively and is in conformance with their goals and risk attitudes. Trend analysis differs from resource estimation in its purpose. It seeks to determine the probability of economic success for an exploration program, not the ultimate results of the total industry effort. Thus the recent past is assumed to be the best estimate of the exploration probabilities for the near future. This information is combined with economic forecasts. The computer software tools necessary for trend analysis are (1) Information data base - requirements and sources. (2) Data conditioning program - assignment to trends, correction of errors, and conversion into usable form. (3) Statistical processing program - calculation of probability of success and discovery size probability distribution. (4) Analytical processing - Monte Carlo simulation to develop the probability distribution of the economic return/investment ratio for a trend. Limited capital (short-run) effects are analyzed using the Gambler's Ruin concept in the Monte Carlo simulation and by a short-cut method. Multiple trend analysis is concerned with comparing and ranking trends, allocating funds among acceptable trends, and characterizing program risk by using risk profiles. In summary, trend analysis is a reality check for long-range exploration planning

  4. Integral-preserving integrators

    International Nuclear Information System (INIS)

    McLaren, D I; Quispel, G R W

    2004-01-01

    Ordinary differential equations having a first integral may be solved numerically using one of several methods, with the integral preserved to machine accuracy. One such method is the discrete gradient method. It is shown here that the order of the method can be bootstrapped repeatedly to higher orders of accuracy. The method is illustrated using the Henon-Heiles system. (letter to the editor)

  5. Foodstuffs preservation by ionization

    International Nuclear Information System (INIS)

    1991-12-01

    This document contains all the papers presented at the meeting on foodstuffs preservation by ionization. These papers deal especially with the food ionization process, its development and the view of the food industry on ionization. Refs and figs (F.M.)

  6. Preserving food with radiation

    International Nuclear Information System (INIS)

    Thomas, A.C

    1978-01-01

    Food irradiation is becoming an increasingly more important method of food preservataion. The irradiation process and its advangages are briefly described, and its use in the preservation of poultry and various kinds of fruits is discussed. Fruit export is hampered by restrictions due to infestation. Radiation disinfestation will therefore be of great advantage and may lead to a growth in export markets

  7. Preserve America News

    Science.gov (United States)

    phone number. Whether or not you're able to let us know ahead of time, however, we hope you can join us Amache Preservation Society in Colorado and the Friends of Mount Hope Cemetery in New York. This brings Places: Breathing New Life into Our Communities." Read about this informative session. National

  8. POLARISATION PRESERVING OPTICAL FIBRE

    DEFF Research Database (Denmark)

    2000-01-01

    . This cladding structure provides polarisation preserving properties to the optical fibre. Optical fibres using this technology may have claddings with elements placed non-periodically as well as in a two-dimensional periodic lattice - such as cladding providing Photonic Band Gap (PBG) effects....

  9. Wood preservative testing

    Science.gov (United States)

    Rebecca Ibach; Stan T. Lebow

    2012-01-01

    Most wood species used in commercial and residential construction have little natural biological durability and will suffer from biodeterioration when exposed to moisture. Historically, this problem has been overcome by treating wood for outdoor use with toxic wood preservatives. As societal acceptance of chemical use changes, there is continual pressure to develop and...

  10. Preservation in New Buildings

    Directory of Open Access Journals (Sweden)

    Christopher Kitching

    2000-06-01

    Full Text Available In the United Kingdom (as in many other countries increasing attention is being paid to the importance of each library and archive having a written preservation strategy endorsed by its governing body. So increasingly we are asking: where does „preservation“ begin and what are its top priorities? Some would say preservation begins with the definition of collecting policies to ensure that only relevant items are acquired in the first place, and therefore that no unnecessary costs are incurred on the long-term care of unwanted and unconsulted items. Others might argue that the first priority must be the careful appraisal of existing holdings to determine their preservation and conservation requirements and to prioritise their treatment. Or should preservation begin with damage-limitation: restricting the physical handling of books and documents, on the one hand by providing whenever possible surrogate copies in digital formats or microform, and on the other hand by offering at least basic protection through appropriate boxing and packaging? This, surely, goes hand-in-hand with the education of staff and readers about the importance of treating rare or unique materials with proper respect.

  11. Preserving the Seminar Experience

    Science.gov (United States)

    Ramsey, David; Evans, Jocelyn; Levy, Meyer

    2016-01-01

    This article presents a new approach to online graduate education. With hopes of recruiting a larger cohort in order to preserve a graduate program struggling with low enrollment, we began offering a limited number of seats to students who would attend class in real time but from remote locations, using a videoconferencing platform. Unlike…

  12. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  13. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  14. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  15. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  16. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  17. Being Tolerant about Identity?

    NARCIS (Netherlands)

    van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.

    2014-01-01

    Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is

  18. Reflections on trends in the identification and preservation of digital ...

    African Journals Online (AJOL)

    Lori Ashley

    Analysis and Historical Research,2 which was an introduction to ... Information Technologies: The Impact of Information. Technologies .... business functions rather than on the content of the records. Another major advancement came with the.

  19. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Oztasiran, I.

    1984-01-01

    Irradiation is a physical process for treating food and as such it is comparable to other processing techniques such as heating or freezing foods for preservation. The energy level used in food irradiation is always below that producing radioactivity in the treated food, hence this aspect can be totally excluded in wholesomeness evaluations. Water is readily ionized and may be the primary source of ionization in foods with secondary effects on other molecules, possibly more a result of water ionization than of direct hits. In the presence of oxygen, highly reactive compounds may be produced, such as H, H 3 0+ and H 2 O 2 . Radiation at the energy flux levels used for food (<2 MeV) does not induce radioactivity. Food irradiation applications are already technically and economically feasible and that food so treated is suitable for consumption. Food irradiation techniques can play an important role for an improved preservation, storage and distribution of food products. (author)

  20. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Kooij, J. van

    1981-01-01

    Twenty-five years of development work on the preservation of food by irradiation have shown that this technology has the potential to reduce post-harvest losses and to produce safe foods. The technological feasibility has been established but general acceptance of food irradiation by national regulatory bodies and consumers requires attention. The positive aspects of food preservation by irradiation include: the food keeps its freshness and its physical state, agents which cause spoilage (bacteria, etc.) are eliminated, recontamination does not take place, provided packaging materials are impermeable to bacteria and insects. It inhibits sprouting of root crops, kills insects and parasites, inactivates bacteria, spores and moulds, delays ripening of fruit, improves the technological properties of food. It makes foods biologically safe, allows the production of shelf-stable foods and is excellent for quarantine treatment, and generally improves food hygiene. The dose ranges needed for effective treatment are given

  1. How to preserve foods

    International Nuclear Information System (INIS)

    Balek, V.; Vadassova, J.

    1979-01-01

    The use of gamma and fast electron radiations for food preservation is described. Examples are given of the application of ionizing radiation for retarding potato germination, onion growth, and fruit ripening, for limiting the action of microorganisms, and removing salmonella from meat products. The method has remarkable prospects although it may not be considered to be a general-purpose method. Geographic and economic conditions should always be taken into consideration. (J.P.)

  2. Preservation and gamma irradiation

    International Nuclear Information System (INIS)

    Ramiere, R.

    1991-01-01

    The paper reviews briefly the application of gamma radiation to preservation of cultural objects for disinsectization, disinfection and strengthening of materials such as wood or stone by impregnation with a liquid resin and in situ polymerization. As heavy equipment is required two facilities are specialized a 1000 T Bq cobalt 60 source at Grenoble (France) and 100 T Bq one at Rostoky (Czechoslovakia). Examples of treated objects are given [fr

  3. Beneficial bread without preservatives

    OpenAIRE

    Denkova, Zapryana; Denkova, Rositsa

    2014-01-01

    Besides their inherent nutritional value functional foods contain substances that have beneficial impact on the functioning of organs and systems in the human body and reduce the risk of disease. Bread and bakery goods are basic foods in the diet of contemporary people. Preservatives are added to the composition of foods in order to ensure their microbiological safety, but these substances affect directly the balance of microflora in the tract. A great problem is mold and bacterial spoilage (...

  4. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  5. Fertility preservation 2

    Science.gov (United States)

    De Vos, Michel; Smitz, Johan; Woodruff, Teresa K

    2014-01-01

    Enhanced long-term survival rates of young women with cancer and advances in reproductive medicine and cryobiology have culminated in an increased interest in fertility preservation methods in girls and young women with cancer. Present data suggest that young patients with cancer should be referred for fertility preservation counselling quickly to help with their coping process. Although the clinical application of novel developments, including oocyte vitrification and oocyte maturation in vitro, has resulted in reasonable success rates in assisted reproduction programmes, experience with these techniques in the setting of fertility preservation is in its infancy. It is hoped that these and other approaches, some of which are still regarded as experimental (eg, ovarian tissue cryopreservation, pharmacological protection against gonadotoxic agents, in-vitro follicle growth, and follicle transplantation) will be optimised and become established within the next decade. Unravelling the complex mechanisms of activation and suppression of follicle growth will not only expand the care of thousands of women diagnosed with cancer, but also inform the care of millions of women confronted with reduced reproductive fitness because of ageing. PMID:25283571

  6. Grain preservation in SSSR

    International Nuclear Information System (INIS)

    Trisviatski, L.A.

    1973-01-01

    First the importance of cereals collected in the S.S.S.R., the reason why the government had to put in practice a storage chain, composed of large capacity store houses (200 000 metric tonnes, or more) is reminded. When climatic conditions result in wet harvested grains, cereals are dried either in state enterprise dryers (32 to 50 tonnes/hour) or in kolkhozes' dryers (2 to 16 tonnes/hour). A new type of drying with recycling, has been developped, economizing 10 to 15 p. 100. Then the possibilities offered by the technique of partial drying of very wet grains are studied and the preservation processes using fresh ventilation, or hot ventilation with drying effect are described. The question of silage of wet grains destined to animal consumption is then examined as well as preservation by sodium pyrosulfide; the use of propionic acid, little developped in SSSR, is studied now, just as storage with inert gas. The struggle technics against insects, either with chemical agents, or with irradiation are described. Finally the modalities of technicians formation, specialized in preservation, are discussed [fr

  7. New trends in food processing.

    Science.gov (United States)

    Señorans, Javier; Ibáñez, Elena; Cifuentes, Alejandro

    2003-01-01

    In this work some of the newest trends in food processing are reviewed. This revision intends to provide an updated overview (including works published until February 2001) on the newest food processes, including food manufacturing, preservation, and control. Modern processes for food and food ingredients manufacturing based on membrane technology, super-critical fluid technology, and some applications of biotechnology are presented, mainly applied to obtain functional foods, "all-natural" enriched foods, probiotics and prebiotics. Also included is a critical assessment concerning non-thermal preservation techniques used for food preservation, such as high hydrostatic pressure, pulsed electric fields, ultrasound, pulsed light, hurdle systems, etc. Finally, a group of new analytical techniques (i.e., molecular techniques such as Polymerase Chain Reaction (PCR), food image analysis, and biosensors) and their use for food and process control is reviewed.

  8. Some exact identities connecting one- and two-particle Green's functions in spin-orbit coupling systems

    International Nuclear Information System (INIS)

    Yang Huatong

    2007-01-01

    Some exact identities connecting one- and two-particle Green's functions in the presence of spin-orbit coupling have been derived. These identities are similar to the Ward identity in usual quantum transport theory of electrons. A satisfying approximate calculation of the spin transport in spin-orbit coupling system should also preserve these identities, just as the Ward identities should be remained in the usual electronic transport theory

  9. Training development for pavement preservation.

    Science.gov (United States)

    2013-05-01

    This research project strives to help the Iowa Department of Transportation (DOT) fully achieve the full benefits of pavement : preservation through training on proper selection, design, and application of pavement preservation treatments. In some ca...

  10. ACHP | Tribal Historic Preservation Officers

    Science.gov (United States)

    preservation of significant historic properties. Those functions include identifying and maintaining Working with Section 106 Federal, State, & Tribal Programs Training & Education Publications Search skip specific nav links Home arrow Historic Preservation Programs & Officers arrow THPOs

  11. Preservative treatments for building components

    Science.gov (United States)

    Stan Lebow

    2007-01-01

    The wood species most commonly used in construction have little natural durability Thus, they are treated with preservatives when used in conditions that favor biodeterioration. The type of preservative used varies with the type of wood product, exposure condition, and specific agent of deterioration. This paper discusses the characteristics of several preservative...

  12. Preserving the Manhattan Project

    Science.gov (United States)

    Kelly, Cynthia

    2014-03-01

    When future generations look back on the 20th century, few events will rival the harnessing of nuclear energy as a turning point in world history, science and society. Yet, the Department of Energy has not always embraced its Manhattan Project origins. The presentation will focus on the progress made over the last 20 years to preserve the properties and first-hand accounts that for decades have been threatened with demolition and indifference. Since the mid-1950s, most remaining Manhattan Project properties at the Los Alamos National Laboratory had been abandoned. Among them was a cluster of wooden buildings called the ``V Site.'' This is where scientists assembled the ``Gadget,'' the world's first atomic device tested on July 16, 1945. Regardless of its significance, the ``V Site'' buildings like all the rest were slated for demolition. The Advisory Council on Historic Preservation (ACHP) toured the properties in November 1998. Most could not believe that the world's first atomic bomb was designed in such humble structures. The properties were declared to be ``monumental in their lack of monumentality.'' A Save America's Treasures grant for 700,000 was awarded to restore the properties. To raise the required matching funds, I left the Federal government and soon founded the Atomic Heritage Foundation. The presentation will trace the progress made over the last decade to generate interest and support nationwide to preserve the Manhattan Project heritage. Saving both the physical properties and first-hand accounts of the men and women have been a priority. Perhaps our most significant achievement may be legislation now under consideration by Congress to create a Manhattan Project National Historical Park. Seventy years later, the Manhattan Project is finally getting the recognition it deserves.

  13. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  14. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  15. Fertility Preservation in Girls

    Directory of Open Access Journals (Sweden)

    Jennia Michaeli

    2012-01-01

    Full Text Available Children that undergo treatment for cancer are at risk of suffering from subfertility or hormonal dysfunction due to the detrimental effects of radiotherapy and chemotherapeutic agents on the gonads. Cryopreservation of ovarian tissue prior to treatment offers the possibility of restoring gonadal function after resumption of therapy. Effective counseling and management of pediatric patients is crucial for preserving their future reproductive potential. The purpose of this article is to review recent literature and to revise recommendations we made in a 2007 article. Pediatric hemato-oncology, reproductive endocrinology, surgery, anesthesia and bioethics perspectives are discussed and integrated to propose guidelines for offering ovarian cryopreservation to premenarcheal girls with cancer.

  16. Radiation preservation of spices

    International Nuclear Information System (INIS)

    Badshah, A.; Tasnim, A.; Khan, M.; Sattar, A.; Khan, I.

    1989-01-01

    The use of gamma irradiation for preservation of red hot pepper has been explained in report, as it can kill the harmful organisms without altering the organolpetic properties. The sample were dried and reduced to pass through 20 mesh. The samples were irradiated at different dose levels of 0, 2.5, 5.0, 7.5 and 10.0 KGy and results have been shown after different time intervals. Radiation and packaging treatments resulted normaly no effect on the color of dry fruits. (A.B)

  17. Preserving Transactional Data

    OpenAIRE

    Sara Day Thomson

    2017-01-01

    This paper is an adaptation of a longer report commissioned by the UK Data Service. The longer report contributes to on-going support for the Big Data Network – a programme funded by the Economic and Social Research Council (ESRC). The longer report can be found at doi:10.7207/twr16-02. This paper discusses requirements for preserving transactional data and the accompanying challenges facing the companies and institutions who aim to re-use these data for analysis or research. It present...

  18. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  19. Geometrical formulation of the conformal Ward identity

    International Nuclear Information System (INIS)

    Kachkachi, M.

    2002-08-01

    In this paper we use deep ideas in complex geometry that proved to be very powerful in unveiling the Polyakov measure on the moduli space of Riemann surfaces and lead to obtain the partition function of perturbative string theory for 2, 3, 4 loops. Indeed, a geometrical interpretation of the conformal Ward identity in two dimensional conformal field theory is proposed: the conformal anomaly is interpreted as a deformation of the complex structure of the basic Riemann surface. This point of view is in line with the modern trend of geometric quantizations that are based on deformations of classical structures. Then, we solve the conformal Ward identity by using this geometrical formalism. (author)

  20. Skiing trends

    Science.gov (United States)

    Charles R. Goeldner; Stacy Standley

    1980-01-01

    A brief historical overview of skiing is presented, followed by a review of factors such as energy, population trends, income, sex, occupation and attitudes which affect the future of skiing. A. C. Neilson's Sports Participation Surveys show that skiing is the second fastest growing sport in the country. Skiing Magazine's study indicates there are...

  1. Billing Trends

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Billing Trends. Internet access: Bandwidth becoming analogous to electric power. Only maximum capacity (load) is fixed; Charges based on usage (units). Leased line bandwidth: Billing analogous to phone calls. But bandwidth is variable.

  2. Food Trends.

    Science.gov (United States)

    Schwenk, Nancy E.

    1991-01-01

    An overall perspective on trends in food consumption is presented. Nutrition awareness is at an all-time high; consumption is influenced by changes in disposable income, availability of convenience foods, smaller household size, and an increasing proportion of ethnic minorities in the population. (18 references) (LB)

  3. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  4. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...

  5. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  6. Mutual preservation of entanglement

    International Nuclear Information System (INIS)

    Veitia, Andrzej; Jing, Jun; Yu, Ting; Wong, Chee Wei

    2012-01-01

    We study a generalized double Jaynes–Cummings (JC) model where two entangled pairs of two-level atoms interact indirectly. We show that there exist initial states of the qubit system so that two entangled pairs are available at all times. In particular, the minimum entanglement in the pairs as a function of the initial state is studied. Finally, we extend our findings to a model consisting of multi-mode atom–cavity interactions. We use a non-Markovian quantum state diffusion (QSD) equation to obtain the steady-state density matrix for the qubits. We show that the multi-mode model also displays dynamical preservation of entanglement. -- Highlights: ► Entanglement dynamics is studied in a generalized double Jaynes–Cummings model. ► We show that for certain initial states, the atoms remain entangled at all times. ► We extend the results to the case of multi-mode atom–cavity interactions. ► The model suggest that indirect interaction may help to preserve entanglement.

  7. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  8. (Re)scaling identities

    DEFF Research Database (Denmark)

    Koefoed, Lasse Martin; Simonsen, Kirsten

    2012-01-01

    of Pakistani origin, the study employs theoretical ideas of estrangement, identification and recognition in order to obtain a thorough understanding of the complexity and the contradictory character of their spatial identities and affiliations. A turning point in the double processes of estrangement...... of identity....

  9. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  10. Self and social identity

    NARCIS (Netherlands)

    Ellemers, N; Spears, R; Doosje, B

    2002-01-01

    In this chapter, we examine the self and identity by considering the different conditions under which these are affected by the groups to which people belong. From a social identity perspective we argue that group commitment, on the one hand, and features of the social context, on the other hand,

  11. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  12. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  13. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  14. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  15. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  16. Industry trends

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    This section discusses the US energy supply and demand situation including projections for energy use, the clean coal industry (constraints of regulation on investment in new technologies, technology trends, and current pollution control efficiency), opportunities in clean coal technology (Phase 2 requirements of Title 4 of the Clean Air Act, scrubber demand for lime and limestone, and demand for low sulfur coal), and the international market of clean coal technologies

  17. Creating a Framework for Applying OAIS to Distributed Digital Preservation

    DEFF Research Database (Denmark)

    Zierau, Eld; Schultz, Matt; Skinner, Katherine

    apparatuses in order to achieve the reliable persistence of digital content. Although the use of distribution is common within the preservation field, there is not yet an accepted definition for “distributed digital preservation”. As the preservation field has matured, the term “distributed digital...... preservation” has been applied to myriad preservation approaches. In the white paper we define DDP as the use of replication, independence, and coordination to address the known threats to digital content through time to ensure their accessibility. The preservation field relies heavily upon an international......, delineating the various trends and practices that compel an elaboration upon OAIS, identifying the challenges ahead for advancing this endeavor, and putting forward a series of recommendations for making progress toward developing a formal framework for a DDP environment....

  18. Multicultural identity processes.

    Science.gov (United States)

    Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica

    2016-04-01

    The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  20. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  1. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  2. CURRENT TRENDS IN HOSPITALITY INDUSTRY

    Directory of Open Access Journals (Sweden)

    Ivica Batinić

    2013-10-01

    Full Text Available Hospitality industry is a complex product-service economic activity which besides accommodation, food and beverages offers a variety of complementary and ancillary services in order to meet modern needs, demands and desires of tourists consumers. Contemporary needs, demands and desires of tourists consumers (increased need for security and preservation of health; emphasis on ecology and healthy food; pure nature stay; growing demand for adventure activities and excitement; convention facilities and incentive offerings; visits to towns, big sports, cultural, religious, business events; new travel motivation have led to the emergence of new trends in hospitality offering design. Wellness and spa hotels, boutique hotels, all inclusive hotels, slow-food restaurants, and wine and lounge bars are just some of the main trends, and successful hoteliers and caterers will examine each of the trends and devise development politics in accordance with the new requirements and global market needs.

  3. Food preservation by irradiation

    International Nuclear Information System (INIS)

    Gottschalk, M.

    1978-01-01

    In November, 1977, an International Symposium on Food Preservation by Irradiation was held at Wageningen, the Netherlands. About 200 participants attended the Symposium which was organised by the International Atomic Energy Agency, the Food and Agriculture Organization of the United Nations and the World Health Organization; a reflection of the active interest which is being shown in food irradiation processing, particularly among developing countries. The 75 papers presented provided an excellent review of the current status of food irradiation on a wide range of different topics, and the Symposium also afforded the valuable opportunity for informal discussion among the participants and for developing personal contacts. A brief survey of the salient aspects discussed during the course of the meeting are reported on. (orig.) [de

  4. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Provider Pocket Guides Provider Guides Fertility Preservation for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed ... Patient Pocket Guides Patient Guides Fertility Preservation for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed ...

  5. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed with Cancer Fertility Preservation for Children Diagnosed ... for Women Diagnosed with Cancer Fertility Preservation for Men Diagnosed with Cancer Fertility Preservation for Children Diagnosed ...

  6. Preserving Employee Privacy in Wellness.

    Science.gov (United States)

    Terry, Paul E

    2017-07-01

    The proposed "Preserving Employee Wellness Programs Act" states that the collection of information about the manifested disease or disorder of a family member shall not be considered an unlawful acquisition of genetic information. The bill recognizes employee privacy protections that are already in place and includes specific language relating to nondiscrimination based on illness. Why did legislation expressly intending to "preserve wellness programs" generate such antipathy about wellness among journalists? This article argues that those who are committed to preserving employee wellness must be equally committed to preserving employee privacy. Related to this, we should better parse between discussions and rules about commonplace health screenings versus much less common genetic testing.

  7. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  8. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  9. Privacy-preserving security solution for cloud services

    OpenAIRE

    L. Malina; J. Hajny; P. Dzurenda; V. Zeman

    2015-01-01

    We propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their...

  10. Organic farming brand identity : meeting trends, building trust

    Directory of Open Access Journals (Sweden)

    Anna Maria Nikodemska-Wolowik

    2009-06-01

    Full Text Available The Organic Farming (OF concept plays a significant role in contemporary market competition in European and other economies. This issue is the main target of the paper. The OF certification mark is dealt with as a specific brand and its meaning is presented from different points of view. The author puts special emphasis on creating customer benefits and trust due to the OF certification mark. The mark can become an effective tool of building strong relationship between supply and demand sides of the market.El concepto de Agricultura Ecológica (AE tiene un papel importante en la competencia del mercado contemporáneo tanto en la economía europea como en la de otros países. Este aspecto es el objetivo principal de este artículo. La certificación de AE se considera como marca específica y su significado se presenta desde diferentes perspectivas. El autor centra su atención en la creación del beneficio del consumidor y confianza debido a la certificación de marca de AL Ésta puede convertirse en una herramienta efectiva para la creación de una estrecha relación entre la oferta y la demanda del mercado.

  11. Nuclear knowledge preservation

    International Nuclear Information System (INIS)

    Bettencourt, Marcia Pires da Luz

    2009-01-01

    The nuclear technology has encouraged the world development and brought a number of benefits to society. These benefits occurred in important social sectors such as Agriculture, Industry, Health Sciences, Environmental Sciences and the production of energy. The research in the nuclear area is justified, accordingly, as an important factor for science development, technology and innovation. Despite the importance of nuclear energy, there is a collapse in the generation, transmission and sharing of nuclear knowledge. The threat of regression in this area is evidenced by the difficulty of generating new knowledge and practices regarding the maintenance of some critical areas. This project focuses its attention on studying, specifically, the lack of young engineers and technical professionals to replace the older, considered this, an alarming situation. Therefore, it is necessary to identify and record the key skills of experienced workers, through a set of tools to elicitation (capture) this knowledge, as expertise is mainly with people, and is lost when they leave the organization. Against, the Knowledge Management provides methodologies for the process of stimulating the creation, collection and knowledge dissemination process, in order to achieve strategic objectives. This study aims to contribute to the building of a model for the Brazilian nuclear knowledge preservation and, therefore, contributes to the maintenance and innovation of activities in this area. (author)

  12. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  13. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals...

  14. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    In our times, literary criticism, as well as larger political and cultural developments, is characterized by identity politics, meaning that our discourses are structured around the notion of different socially identifiable populations in society. In relation to literature, this results in our...... viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss......, in relation to Frye’s works, the idea that the primary identities of characters in literature were and, to a considerable extent, continue to be those of family-member identities. As such, literature should not be appropriated to a political context too readily. Whereas viewing characters in terms of...

  15. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how...... different groups have distinctive conditions for meeting the obligation of forming a proactive learner identity and engage in lifelong learning prevalent in both national and transnational policies on lifelong learning....

  16. Introduction: Discourses of Identity

    DEFF Research Database (Denmark)

    Madsen, Peter

    2016-01-01

    Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages.......Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages....

  17. Developing Identity for Lawyers

    OpenAIRE

    Høedt-Rasmussen, Inger

    2014-01-01

    The role of the lawyer is in transition and the formerly predominantly homogeneous profes-sion has become a heterogeneous group of lawyers with diverging perceptions of the lawyer’s identity and of the main characteristics of the profession. The European Union has extended the perception of democracy and the fundamental rights to include more collective rights, social concerns, global responsibility and sustainability. The dissertation’s main question is: How can the identity and competen...

  18. Why the concern about irradiation as a food preservation technique?

    International Nuclear Information System (INIS)

    Anon

    2001-01-01

    Full text: Irradiation is a food preservation process that like the more traditional and alternative methods is intended to keep food safe to eat by delaying the natural decomposition processes that result from bacterial action. Preservation of foods by irradiation, although still not available in Australia, is readily accepted in some 44 countries, including France. This project is set up to examine if a sample of fresh fruits and vegetables, when irradiated to the recommended 'preservation' dose level, becomes 'radioactive'. By placing the 'irradiated' sample, together with an identical 'control' sample of the same fresh fruit and vegetables, in an x-radiography cassette in a shielded 'cave', differences in film 'blackening' over the exposure period would indicate relative radioactivity from within the respective samples. Also, using simultaneous daily photographs of both the 'irradiated' and non-irradiated 'control' samples, the delay of onset of visible decay of both can be determined

  19. User Experience and Heritage Preservation

    Science.gov (United States)

    Orfield, Steven J.; Chapman, J. Wesley; Davis, Nathan

    2011-01-01

    In considering the heritage preservation of higher education campus buildings, much of the attention gravitates toward issues of selection, cost, accuracy, and value, but the model for most preservation projects does not have a clear method of achieving the best solutions for meeting these targets. Instead, it simply relies on the design team and…

  20. Contact dermatitis caused by preservatives.

    Science.gov (United States)

    Yim, Elizabeth; Baquerizo Nole, Katherine L; Tosti, Antonella

    2014-01-01

    Preservatives are biocidal chemicals added to food, cosmetics, and industrial products to prevent the growth of microorganisms. They are usually nontoxic and inexpensive and have a long shelf life. Unfortunately, they commonly cause contact dermatitis. This article reviews the most important classes of preservatives physicians are most likely to encounter in their daily practice, specifically isothiazolinones, formaldehyde and formaldehyde-releasers, iodopropynyl butylcarbamate, methyldibromoglutaronitrile, and parabens. For each preservative mentioned, the prevalence of sensitization, clinical presentation of contact dermatitis, patch testing concentrations, cross reactions, and related legislation will be discussed. Mandatory labeling of preservatives is required in some countries, but not required in others. Until policies are made, physicians and patients must be proactive in identifying potential sensitizers and removing their use. We hope that this article will serve as a guide for policy makers in creating legislation and future regulations on the use and concentration of certain preservatives in cosmetics and industrial products.

  1. Toward Privacy-Preserving Personalized Recommendation Services

    Directory of Open Access Journals (Sweden)

    Cong Wang

    2018-02-01

    Full Text Available Recommendation systems are crucially important for the delivery of personalized services to users. With personalized recommendation services, users can enjoy a variety of targeted recommendations such as movies, books, ads, restaurants, and more. In addition, personalized recommendation services have become extremely effective revenue drivers for online business. Despite the great benefits, deploying personalized recommendation services typically requires the collection of users’ personal data for processing and analytics, which undesirably makes users susceptible to serious privacy violation issues. Therefore, it is of paramount importance to develop practical privacy-preserving techniques to maintain the intelligence of personalized recommendation services while respecting user privacy. In this paper, we provide a comprehensive survey of the literature related to personalized recommendation services with privacy protection. We present the general architecture of personalized recommendation systems, the privacy issues therein, and existing works that focus on privacy-preserving personalized recommendation services. We classify the existing works according to their underlying techniques for personalized recommendation and privacy protection, and thoroughly discuss and compare their merits and demerits, especially in terms of privacy and recommendation accuracy. We also identity some future research directions. Keywords: Privacy protection, Personalized recommendation services, Targeted delivery, Collaborative filtering, Machine learning

  2. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  3. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  4. Food preservation by irradiation

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1978-02-15

    As shortages of food and energy still continue to constitute the major threats to the well-being of the human race, all actions aiming at overcoming these problems must be assigned vital importance. Of the two complementary ways of solving the food problem (i.e., increasing the production of food and decreasing the spoilage of food) a novel method designed to contribute to the latter purpose has been discussed at this symposium hosted by The Netherlands and held under the aegis of the Food and Agriculture Organization of the United Nations, the International Atomic Energy Agency and the World Health Organization. Progress made since the last symposium of this kind (Bombay, India, 1972) was reviewed from the technological, economic and wholesomeness points of view by participants from 39 countries (60% of the latter were of the developing world). From the reports presented on the use of radiations to control physiological changes in plants, feasibility of radiation preservation of potatoes, onions, garlic, as well as of some tropical and subtropical fruits (mangoes, papayas, litchis and avocado) was confirmed. For potatoes, onions and mangoes, optimal conditions of treatment and storage were established on a larger scale, combined with sizeable consumer trials. Combinations of ionizing radiation with chemicals (salycilic acid, for potatoes), and physical agents (ultraviolet rays, for papayas) have been reported to be successful against the incidence of rot. A considerable number of papers dealt with the control of microbiological spoilage of foods. Work since 1972 has shown that radurization of fruits and vegetables (bananas, mangoes, dried dates, endive, chickory, onions, soup-greens), meat, poultry, marine products (mackerel, cod and plaice fillets, shrimps), decontamination of food ingredients and food technology aids (enzyme preparations, proteins, starch, spices), radappertization of meat and animal feedstuffs as well as combination treatments with salt, heat

  5. Food preservation by irradiation

    International Nuclear Information System (INIS)

    1978-01-01

    As shortages of food and energy still continue to constitute the major threats to the well-being of the human race, all actions aiming at overcoming these problems must be assigned vital importance. Of the two complementary ways of solving the food problem (i.e., increasing the production of food and decreasing the spoilage of food) a novel method designed to contribute to the latter purpose has been discussed at this symposium hosted by The Netherlands and held under the aegis of the Food and Agriculture Organization of the United Nations, the International Atomic Energy Agency and the World Health Organization. Progress made since the last symposium of this kind (Bombay, India, 1972) was reviewed from the technological, economic and wholesomeness points of view by participants from 39 countries (60% of the latter were of the developing world). From the reports presented on the use of radiations to control physiological changes in plants, feasibility of radiation preservation of potatoes, onions, garlic, as well as of some tropical and subtropical fruits (mangoes, papayas, litchis and avocado) was confirmed. For potatoes, onions and mangoes, optimal conditions of treatment and storage were established on a larger scale, combined with sizeable consumer trials. Combinations of ionizing radiation with chemicals (salycilic acid, for potatoes), and physical agents (ultraviolet rays, for papayas) have been reported to be successful against the incidence of rot. A considerable number of papers dealt with the control of microbiological spoilage of foods. Work since 1972 has shown that radurization of fruits and vegetables (bananas, mangoes, dried dates, endive, chickory, onions, soup-greens), meat, poultry, marine products (mackerel, cod and plaice fillets, shrimps), decontamination of food ingredients and food technology aids (enzyme preparations, proteins, starch, spices), radappertization of meat and animal feedstuffs as well as combination treatments with salt, heat

  6. Contamination versus preservation of cosmetics

    DEFF Research Database (Denmark)

    Lundov, Michael Dyrgaard; Moesby, Lise; Zachariae, Claus

    2009-01-01

    Cosmetics with high water content are at a risk of being contaminated by micro-organisms that can alter the composition of the product or pose a health risk to the consumer. Pathogenic micro-organisms such as Staphylococcus aureus and Pseudomonas aeruginosa are frequently found in contaminated...... cosmetics. In order to avoid contamination of cosmetics, the manufacturers add preservatives to their products. In the EU and the USA, cosmetics are under legislation and all preservatives must be safety evaluated by committees. There are several different preservatives available but the cosmetic market...

  7. Identity Expansion and Transcendence

    Directory of Open Access Journals (Sweden)

    William Sims Bainbridge

    2014-05-01

    Full Text Available Emerging developments in communications and computing technology may transform the nature of human identity, in the process rendering obsolete the traditional philosophical and scientific frameworks for understanding the nature of individuals and groups.  Progress toward an evaluation of this possibility and an appropriate conceptual basis for analyzing it may be derived from two very different but ultimately connected social movements that promote this radical change. One is the governmentally supported exploration of Converging Technologies, based in the unification of nanoscience, biology, information science and cognitive science (NBIC. The other is the Transhumanist movement, which has been criticized as excessively radical yet is primarily conducted as a dignified intellectual discussion within a new school of philosophy about human enhancement.  Together, NBIC and Transhumanism suggest the immense transformative power of today’s technologies, through which individuals may explore multiple identities by means of online avatars, semi-autonomous intelligent agents, and other identity expansions.

  8. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  9. Identity negotiations in meetings

    DEFF Research Database (Denmark)

    Asmuß, Birte; Oshima, Sae

    of the company, and all members know (and display) that he holds some information that the rest don’t have access to. Our analysis shows that the participants evoke various identities of the manager, sometimes orienting to the structure of the organization, and other times orienting to wider social categories......Meetings are places, where identity negotiation is a central activity and where members’ local practices recurrently inform and are informed by larger categories (Antaki and Widdicombe 1998). Correspondingly, the approach to understanding organization (macro) by way of identity work (micro) has...... company, and in the data recorded over 10 days, the employees frequently complain about the many changes that have taken place. Our focus lies in a unique occasion where one of the managers makes an unusual appearance at the lunchroom. In this situation, he is the only one that is on the business side...

  10. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...... of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity...

  11. Reactor dosimetry knowledge preservation and development

    International Nuclear Information System (INIS)

    Ilieva, K.D.; Belousov, S.I.; Mitev, M.R.

    2010-01-01

    The nuclear safety requirements and philosophy have changed by the development of new nuclear systems and this imposes special research and development activity. Reactor dosimetry which is applied for determination of neutron field parameters and neutron flux responses in different regions of the reactor system plays an important role in determining of radiation exposure on reactor system elements as reactor vessel, internals, shielding; dose determination for material damage study; in dose determination and conditioning of irradiation for medicine and industry application as well as in induced activity determination for decommissioning purposes. The management of nuclear knowledge has emerged as a growing challenge in recent years. The need to preserve and transfer nuclear knowledge is compounded by recent trends such as ageing of the nuclear workforce, declining student numbers in nuclear related fields, and the threat of losing accumulated nuclear knowledge. (authors)

  12. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  13. Women’s Identity in Christianity

    Directory of Open Access Journals (Sweden)

    Jassent Salibi

    2006-03-01

    Full Text Available In the modern era, identity and identity-finding are influenced by three trends: modernism, post modernism and trans-post modernism. In each trend, a specific approach towards the issue of identity is seen. This article first deals with each of the three trends as well as their impact on the issue of identity, particularly women’s identity and then reviews the picture presented from women’s identity and rights in the Bible (the Old Testament and the New Testament. در دوران معاصر، هويت و هويت‌يابي تحت‌تأثير سه جريان مدرنيسم، پست‌مدرنيسم و فرا پست‌مدرنيسم قرار دارد. در دل هر يك از اين سه جريان، رويكرد خاصي به مسئلة هويت را شاهديم. در اين مقاله، نخست به هر يك از جريان‌هاي فكري مذكور و تأثير آنها بر مسئلة هويت، به‌ويژه هويت زنان، مي‌پردازيم. پس از اين مقدمه، تصوير ارائه شده از هويت و حقوق زن در كتاب مقدس (عهد عتيق و عهد جديد بازكاوي مي‌شود.

  14. Splitting Ward identity

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Mahmoud [Institute for Research in Fundamental Sciences (IPM), School of Particles and Accelerators, P.O. Box 19395-5531, Tehran (Iran, Islamic Republic of)

    2016-04-15

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  15. Social identities and risk

    DEFF Research Database (Denmark)

    Blok, Anders; Jensen, Mette; Kaltoft, Pernille

    2008-01-01

    Expert-based environmental and health risk regulation is widely believed to suffer from a lack of public understanding and legitimacy. On controversial issues such as genetically modified organisms and food-related chemicals, a "lay-expert discrepancy" in the assessment of risks is clearly visible...... of social identities. On the basis of qualitative interviews with citizens and experts, respectively, we focus on the multiple ways in which identities come to be employed in actors' risk accounts. Empirically, we identify salient characteristics of "typical" imagined experts and lay-people, while arguing...

  16. Splitting Ward identity

    International Nuclear Information System (INIS)

    Safari, Mahmoud

    2016-01-01

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  17. Law and Identity

    DEFF Research Database (Denmark)

    Schmidt, Garbi

    2011-01-01

    processes of social integration. Within media-based and political debates, transnational marriages are frequently described as practices destructive both to individual freedom and to Danish national identity. Nonetheless, it is a practice in which both minority and majority citizens engage, one that frames...... both their family lives and their lives as citizens. This article analyses the dynamic relationship between public discourse and practices of transnational marriage. The first part describes how political and legislative perceptions of transnational (arranged) marriages are situated within a discussion......' expressions of autonomy and choice and their adaptations of such concepts to understandings of social belonging, inclusion and identity formation vis--vis the Danish nation-state....

  18. Editorial: Negotiating Gamer Identities

    Directory of Open Access Journals (Sweden)

    Matthew Barr

    2016-07-01

    Full Text Available The term ‘gamer identity’ is hotly contested, and certainly not understood as a broadly accepted term. From the outdated stereotype of white, heterosexual, teenage boys playing Nintendo in their parents’ basement to the equally contested proclamation that “‘gamers’ are over”, the current game culture climate is such that movements as divisive and controversial as #gamergate can flourish. For this latest special issue of Press Start, we invited submissions regarding the recent controversies surrounding the notion of player identities, with the aim of receiving papers from different viewpoints on gamer identity and culture.

  19. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT.

    Science.gov (United States)

    Yan, Hongyang; Li, Xuan; Wang, Yu; Jia, Chunfu

    2018-06-04

    In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users' personal information, the privacy protection of users' information becomes a challenge. As the channels, like the wireless channels between the terminals and the cloud servers in IoT, are public and the cloud servers are not fully trusted, data have to be encrypted before being uploaded to the cloud. However, encryption makes the performance of deduplication by the cloud server difficult because the ciphertext will be different even if the underlying plaintext is identical. In this paper, we build a centralized privacy-preserving duplicate removal storage system, which supports both file-level and block-level deduplication. In order to avoid the leakage of statistical information of data, Intel Software Guard Extensions (SGX) technology is utilized to protect the deduplication process on the cloud server. The results of the experimental analysis demonstrate that the new scheme can significantly improve the deduplication efficiency and enhance the security. It is envisioned that the duplicated removal system with privacy preservation will be of great use in the centralized storage environment of IoT.

  20. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT

    Directory of Open Access Journals (Sweden)

    Hongyang Yan

    2018-06-01

    Full Text Available In recent years, the Internet of Things (IoT has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users’ personal information, the privacy protection of users’ information becomes a challenge. As the channels, like the wireless channels between the terminals and the cloud servers in IoT, are public and the cloud servers are not fully trusted, data have to be encrypted before being uploaded to the cloud. However, encryption makes the performance of deduplication by the cloud server difficult because the ciphertext will be different even if the underlying plaintext is identical. In this paper, we build a centralized privacy-preserving duplicate removal storage system, which supports both file-level and block-level deduplication. In order to avoid the leakage of statistical information of data, Intel Software Guard Extensions (SGX technology is utilized to protect the deduplication process on the cloud server. The results of the experimental analysis demonstrate that the new scheme can significantly improve the deduplication efficiency and enhance the security. It is envisioned that the duplicated removal system with privacy preservation will be of great use in the centralized storage environment of IoT.

  1. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...

  2. Federal Support for Preserve America

    Science.gov (United States)

    Mississippi's Heritage Tourism Industry Post Hurricane Katrina also received a $150,000 Preserve America Grant Arkansas Delta, one for music, one for African-American history, and one for agriculture. The project will

  3. Cultural Preservation Program for Alaska

    Science.gov (United States)

    Barbaran, Francisco Ramon

    2011-01-01

    In this technical report, an innovative cultural preservation program for implementation in Athabascan villages is presented. The parameters for success in implementing such a project is discussed based on a workshop with Athabascan elders.

  4. Preserving and Archiving Astronomical Photographic Plates

    Science.gov (United States)

    Castelaz, M. W.; Cline, J. D.

    2005-05-01

    Astronomical objects change with time. New observations complement past observations recorded on photographic plates. Analyses of changes provide essential routes to information about an object's formation, constitution and evolution. Preserving a century of photographic plate observations is thus of paramount importance. Plate collections are presently widely dispersed; plates may be stored in poor conditions, and are effectively inaccessible to both researchers and historians. We describe a planned project at Pisgah Astronomical Research Institute to preserve the collections of astronomical plates in the United States by gathering them into a single storage location. Collections will be sorted, cleaned, and cataloged on-line so as to provide access to researchers. Full scientific and historic use of the material then requires the observations themselves to be accessible digitally. The project's goal will be the availability of these data as a unique, fully-maintained scientific and educational resource. The new archive will support trans-disciplinary research such as the chemistry of the Earth's atmosphere, library information science, trends in local weather patterns, and impacts of urbanization on telescope use, while the hand-written observatory logs will be a valuable resource for science historians and biographers.

  5. TRENDS IN ROMANIAN TOURISM

    Directory of Open Access Journals (Sweden)

    Pirjol Florentina

    2011-12-01

    Full Text Available Tourism is an industry of the future, having the potential to provide significant revenues, and an industry of 'beauty', because it will protect, preserve and contribute to arranging the environment affected by other human activities. This is why it is very important to know the evolution of this underdeveloped field in our country. This paper is intended as a study on current trends in Romanian tourism without any claim of being an exhaustive research on the industry, describing the main indices of tourist traffic and their influence on Romanian tourism. Nowadays, we witness three main trends in Romanian tourism: sustainability, ecotourism and the increasing presence of cultural tourism. Ecotourism, as a form of tourism, has emerged from people's need to withdraw in nature, to visit and learn about the natural areas which have or have not a national or international protection status. Cultural tourism appears as a type of tourism clearly differentiated from other forms or types of tourism, particularly through motivation. It can be defined as a form of tourist mobility whose primary goal is broadening the horizon of knowledge by uncovering its architectural and artistic heritage and the areas in which it originates. Sustainability for tourism, as for other industries, has three independent aspects: economic, socio-cultural and environmental. Sustainability implies permanence, which means that sustainable tourism requires the optimal use of resources, minimizing the negative economic, socio-cultural and ecological impact, maximizing the benefits upon local communities, national economies and conservation of nature. Regarding statistical data, in what quantity is concerned, there is an increase in Romanian tourism, but in what quality is concerned there is a setback for tourism in the last years. This aspect should make public authorities take concern in improving the infrastructure and the quality of the touristical activity and in diversifying

  6. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... options further? Fertility Preservation - Where Does It Fit? Options for Fertility Preservation The following diagram gives a brief description of fertility preservation options available to children diagnosed with cancer before and ...

  7. Hereditary History Preserving Bisimilarity Is Undecidable

    DEFF Research Database (Denmark)

    Jurdzinski, Marcin; Nielsen, Mogens

    2000-01-01

    History preserving bisimilarity (hp-bisimilarity) and hereditary history preserving bisimilarity (hhp-bisimilarity) are behavioural equivalences taking into account causal relationships between events of concurrent systems. Their prominent feature is being preserved under action refinement...

  8. Fertility Preservation for Children Diagnosed with Cancer

    Science.gov (United States)

    ... Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open menu ... with Cancer You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for ...

  9. Language, Identity, and Exile

    Science.gov (United States)

    Erdinast-Vulcan, Daphna

    2010-01-01

    The exilic mode of being, a living on boundary-lines, produces a constant relativization of one's home, one's culture, one's language, and one's self, through the acknowledgement of otherness. It is a homesickness without nostalgia, without the desire to return to the same, to be identical to oneself. The encounter with the other which produces a…

  10. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons....... (This is the prevailing view today.) These theories are placed in relation to the difficulties an immigrant encounters....

  11. Language and Identity Explored

    Directory of Open Access Journals (Sweden)

    Thomas Rozanov

    2016-06-01

    Full Text Available The relationship between language and identity is widely discussed in applied linguistics, sociology, communications and other related scholarly fields. Furthermore, many researchers have focused on the post-Soviet region, which given its unique historical context allows for testing of this relationship. The widespread bilingualism as a result of historical russification and the linguistic transformations that occurred after the collapse of the Soviet Union make the region a ‘sociolinguistic playground’. Recent events in Ukraine have given grounds to further explore this relationship, now in attempt to link language and identity as potential forces for geopolitical change in the region. This paper presents an overview of existing research, theories, and opposing perspectives related to the relationship between language and identity, and considers complications such as historical russification, religious influence, socioeconomic factors, and education with regards to the Ukrainian and post-Soviet context.  I aim to illustrate the significance of language and its effects on socio-political change in the case of Ukraine, by presenting arguments and complications in support of the relationship between language and identity.

  12. Shifting Design Consultancy Identities

    DEFF Research Database (Denmark)

    Larsen, Henry; Huijboom, Nina; Holm Nielsen, Anne

    2014-01-01

    and identities that resonate more with freelancing and portfolio careers than with the intention of creating firms that are intended to expand. We recognized a pattern where freelancers build up their work as a portfolio by moving from one engagement to another, a process that we will call sequential freelancing...

  13. Migration, Narration, Identity

    DEFF Research Database (Denmark)

    Leese, Peter

    three consecutive summers from 2010 to 2012. The articles focus on various aspects of the migrant experience and try to answer questions about migrant identity and its representations in literature and the media. The book closes with an original play by Carlos Morton, the Chicano playwright working...

  14. The Visual Identity Project

    Science.gov (United States)

    Tennant-Gadd, Laurie; Sansone, Kristina Lamour

    2008-01-01

    Identity is the focus of the middle-school visual arts program at Cambridge Friends School (CFS) in Cambridge, Massachusetts. Sixth graders enter the middle school and design a personal logo as their first major project in the art studio. The logo becomes a way for students to introduce themselves to their teachers and to represent who they are…

  15. Work and Female Identity.

    Science.gov (United States)

    Reohr, Janet R.

    In climbing an organizational ladder dominated by males, the professional woman encounters obstacles to the more traditional feminine behaviors and mannerisms to which she may be accustomed. These obstacles may erode her sense of identity, creating difficulties both inside and outside of her work environment. Traditional distinctions between…

  16. Positioning health professional identity

    DEFF Research Database (Denmark)

    Lund, Ole; Krogh Christensen, Mette; Mørcke, Anne Mette

    2017-01-01

    Drawing on positioning theory, the purpose of this paper is to characterize the activities and positions of students and supervisors at workplaces and on-campus skills training sites across the higher health professional educations of medicine, sports science, and nursing. Furthermore, the study ...... explored the impact of work-based learning (WBL) and skills training on students’ personal professional identity development....

  17. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  18. Spatial Identity in Gagauzia

    Directory of Open Access Journals (Sweden)

    A. V. Salavatova

    2015-01-01

    Full Text Available Historically the gagauz developed a self-perception based on their difference from Moldova as well as the ‘Turkish world’. The article argues that this fact has determined their pro-Russian political orientation as the only possible way of maintaining their identity

  19. Body Integrity Identity Disorder

    NARCIS (Netherlands)

    Blom, Rianne M.; Hennekam, Raoul C.; Denys, Damiaan

    2012-01-01

    Introduction: Body Integrity Identity Disorder (BIID) is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal

  20. Fluidity, Identity, and Organizationality

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    2015-01-01

    that the organizationality of a social collective is accomplished through “identity claims”—i.e., speech acts that concern what the social collective is or does—and negotiations on whether or not these claims have been made on the collective's behalf. We empirically examine the case of the hacker collective Anonymous...

  1. Professions and their Identities

    DEFF Research Database (Denmark)

    Krejsler, John

    2005-01-01

    analytical strategies can frame in sufficiently complex ways what it means to be a professional today. It is assumed that at least four main issues must be dealt with in order to conduct a satisfactory analysis of professions and their identities. Firstly, it is of fundamental strategic importance that one...

  2. Regional identity and family

    Directory of Open Access Journals (Sweden)

    Tripković Gordana D.

    2003-01-01

    Full Text Available This paper is a continuation of a study on regionalisation and family, within the project named Sociological Aspects of Multiculturality and Regionalisation and their influence on the development of AP Vojvodina and the Republic of Serbia. The author focuses her attention to operationalisation of the theoretical and methodological premises that were developed in the previous paper (Tripković, 2002: 111-127, which means that it represents the results of the second phase of the research plan. This phase includes adjusting of theoretical concepts to the fieldwork displaying the results of the research and the analysis of the findings that put a family in the context of confronting different identities, above all national and regional. As possible "identity difference" was emphasized in the research, theoretical and methodological apparatus was adjusted to this goal. That is why in this paper the replies of interviewees that can suggest or reject the assumption that their national identity can influence significantly the evaluation of identity specificities are presented and analyzed, concerning more or less visible aspects of family life, like welfare status, relations between spouses, respect to the elder, family harmony, number of children, connections with relatives, etc.

  3. Imagining Geographies, Mapping Identities

    Directory of Open Access Journals (Sweden)

    Matthew Graves

    2015-03-01

    Full Text Available The ambition of this issue of Portal is to reach across the methodological boundaries of history, politics, literature and geography to apply their complementary perspectives to the study of identity and its relation to space and place, an aim that involves attempting to identify the many different ways the notoriously slippery concepts of identity and geography may intersect. For this issue we have selected articles that cast a fresh perspective on two areas where identity and geography intersect: the construction of identity through the imaginative recreation of place in literature: Mapping Literary Spaces; and the study of the shifting relationships of centre and periphery, exclusion and inclusion in urban settings and geopolitical confrontations: Social and Political Peripheries. Gerard Toal has written that geography is not a noun but a verb: it does not describe what space is but studies what we do with space, imaginatively and politically. The articles in this issue illustrate the exercise of the literary and political imagination and the role of materiality and memory in the creation of geographic representation. They show too a new awareness of the centrality of space in the constitution of identities, and the need for a new geocritical reading of its discourse, as the interrelations of place and community are played out on the many scales of social and political life, from the local to the global.   The special issue is organised thus: Introduction Matthew Graves (Aix-Marseille University & Liz Rechniewski (Sydney University: “Imagining Geographies, Mapping Identities.” I. Mapping Literary Spaces - Isabelle Avila (University of Paris XIII, "Les Cartes de l'Afrique au XIXe siècle et Joseph Conrad : Perceptions d'une Révolution Cartographique." - Daniela Rogobete (University of Craiova, "Global vs Glocal: Dimensions of the post-1981 Indian English Novel." II. Social and Political Peripheries - Elizabeth Rechniewski (Sydney

  4. Rights of Identity

    Directory of Open Access Journals (Sweden)

    Daniel Kofman

    2017-01-01

    Full Text Available A person’s identity is their sense of who and what they are, of who stands in significant relations to them, and of what is valuable to them. This is inevitably very broad, an immediate implication of which is that the concept of identity taken alone cannot do significant normative work. In some cases a person’s identity is bound up with the evil that they do or wish to do, and cannot thereby give them any right to do it. In other cases very powerful elements of a person’s identity – such as their attachment to loved ones – is certainly related to important rights, but it is not entirely clear that one needs the concept of identity to explicate or justify these rights; the deep involvement of their identity is arguably a byproduct of other important values in these cases (such as love, and those values can do the grounding work of the rights by themselves and more simply and clearly. Nevertheless, when suitably qualified, a person’s identity is central to accounting for important political rights. These ranges from rights to participate in cultural practices of one’s group, which sometimes implies duties on governments to support minorities threatened with extinction, to – at the outer limit – rights to arrange political administration. These rights are connected to both autonomy and fairness. Cultural rights are often taken either to be opposed to autonomy, or at best instrumental to personal autonomy (by providing ‘options’, but in fact, the ideal of autonomy, expressed by Mill as being the author of one’s life, requires that one be in control of significant aspects of one’s identity. Significant aspects of one’s identity are collectively determined within a culture. Cultures are not static, and their development is particularly affected by political boundaries. A fundamental right of autonomy implies, therefore, that groups be allowed, within reasonable constraints of general feasibility and stability, to arrange

  5. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for Children Diagnosed with Cancer Ask Your Doctor Information for ...

  6. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for Children Diagnosed with Cancer Ask Your Doctor Information for Patients Many adult ...

  7. Future trends in reprocessing

    International Nuclear Information System (INIS)

    Rouyer, H.

    1994-01-01

    This paper about future trends in reprocessing essentially reflects French experience and points of view as an example of countries which, like England and Japan, consider that reprocessing is the best solution for the back end of the fuel cycle. In order to know what the future will be, it is necessary to look back at the past and try to find what have been the main reasons for evolution in that period. For reprocessing, it appears that these motivations have been 'safety and economics'. They will remain the motivations for the future. In addition, new motivations for development are starting to appear which are still imprecise but can be expressed as follows: 'which guarantees will public opinion require in order to be convinced that solutions for waste management, proposed by specialists shall ensure that a healthy environment is preserved for the use of future generations'. Consequently the paper examines successively the evolution of reprocessing in the recent past, what the immediate future could be and finally what should be necessary in the long term. (Author)

  8. EUROPEAN CULTURE: A REASSESSMENT OF THE IDENTITY

    Directory of Open Access Journals (Sweden)

    LAZĂR LUDMILA

    2017-12-01

    Full Text Available Massive migration to the EU, violent challenges in European capitals and internal conflicts raise not only political, but also cultural issues. The values of the European civilization are challenged by the new communication and informational technologies, at the EU level, as well as at the national and individual level. Europe is deeply marked by the globalization phenomenon and its consequences require to be addressed from a new perspective. West European vulnerabilities appear in the foreground and some people try to doubt the fundamental identity marks of the European society. In fact, as far back as the end of the last century, Edgar Morin proposed the dialogic principle to conceive Europe, merely because the dialogic ‘is at the heart of European identity, and not one or another of its elements or moments’. Under the current conditions, the European identity becomes fluid, ever-changing, whilst preserving the ‘hard core’ of values centred on the cultural dimension, characterized by diversity and openness for intercultural dialogue.

  9. Regularizations: different recipes for identical situations

    International Nuclear Information System (INIS)

    Gambin, E.; Lobo, C.O.; Battistel, O.A.

    2004-03-01

    We present a discussion where the choice of the regularization procedure and the routing for the internal lines momenta are put at the same level of arbitrariness in the analysis of Ward identities involving simple and well-known problems in QFT. They are the complex self-interacting scalar field and two simple models where the SVV and AVV process are pertinent. We show that, in all these problems, the conditions to symmetry relations preservation are put in terms of the same combination of divergent Feynman integrals, which are evaluated in the context of a very general calculational strategy, concerning the manipulations and calculations involving divergences. Within the adopted strategy, all the arbitrariness intrinsic to the problem are still maintained in the final results and, consequently, a perfect map can be obtained with the corresponding results of the traditional regularization techniques. We show that, when we require an universal interpretation for the arbitrariness involved, in order to get consistency with all stated physical constraints, a strong condition is imposed for regularizations which automatically eliminates the ambiguities associated to the routing of the internal lines momenta of loops. The conclusion is clean and sound: the association between ambiguities and unavoidable symmetry violations in Ward identities cannot be maintained if an unique recipe is required for identical situations in the evaluation of divergent physical amplitudes. (author)

  10. Preserving Stability and Rights Protection: Conflict or Coherence?

    Directory of Open Access Journals (Sweden)

    Chongyi Feng

    2013-01-01

    Full Text Available The creation of a new administrative institution known as the “Stability Preservation Office” at the central level, which is overseen by the Chinese Communist Party (CCP Central Committee and has branches at every local level, from streets and townships to enterprises, and has extraordinary powers to override other regular institutions and branches of government, is a clear indication that the Chinese government’s efforts to preserve stability are not limited to the conventional business of crime control or public security. This paper traces the origin of the discourse and practice of preserving stability and the rights defence movement in China, investigating the interplay or interaction between the two. It examines the end and the means of stability preservation, explores whether the measures taken by the government to preserve stability or the rights protection actions taken by citizens are the root cause of social unrest, and whether the suppression of discontent or the improvement of human rights and social justice is the better way to achieve social stability in contemporary China. It contributes to our understanding of emerging state-society relations and the latest social and political trends in China.

  11. Bacteriocins as food preservatives: Challenges and emerging horizons.

    Science.gov (United States)

    Johnson, Eldin Maliyakkal; Jung, Dr Yong-Gyun; Jin, Dr Ying-Yu; Jayabalan, Dr Rasu; Yang, Dr Seung Hwan; Suh, Joo Won

    2017-09-07

    The increasing demand for fresh-like food products and the potential health hazards of chemically preserved and processed food products have led to the advent of alternative technologies for the preservation and maintenance of the freshness of the food products. One such preservation strategy is the usage of bacteriocins or bacteriocins producing starter cultures for the preservation of the intended food matrixes. Bacteriocins are ribosomally synthesized smaller polypeptide molecules that exert antagonistic activity against closely related and unrelated group of bacteria. This review is aimed at bringing to lime light the various class of bacteriocins mainly from gram positive bacteria. The desirable characteristics of the bacteriocins which earn them a place in food preservation technology, the success story of the same in various food systems, the various challenges and the strategies employed to put them to work efficiently in various food systems has been discussed in this review. From the industrial point of view various aspects like the improvement of the producer strains, downstream processing and purification of the bacteriocins and recent trends in engineered bacteriocins has also been briefly discussed in this review.

  12. Constructing nurses' professional identity through social identity theory.

    Science.gov (United States)

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  13. Fertility preservation in Turner syndrome.

    Science.gov (United States)

    Grynberg, Michaël; Bidet, Maud; Benard, Julie; Poulain, Marine; Sonigo, Charlotte; Cédrin-Durnerin, Isabelle; Polak, Michel

    2016-01-01

    Premature ovarian insufficiency is a relatively rare condition that can appear early in life. In a non-negligible number of cases the ovarian dysfunction results from genetic diseases. Turner syndrome (TS), the most common sex chromosome abnormality in females, is associated with an inevitable premature exhaustion of the follicular stockpile. The possible or probable infertility is a major concern for TS patients and their parents, and physicians are often asked about possible options to preserve fertility. Unfortunately, there are no recommendations on fertility preservation in this group. The severely reduced follicle pool even during prepubertal life represents the major limit for fertility preservation and is the root of numerous questions regarding the competence of gametes or ovarian tissue crybanked. In addition, patients suffering from TS show higher than usual rates of spontaneous abortion, fetal anomaly, and maternal morbidity and mortality, which should be considered at the time of fertility preservation and before reutilization of the cryopreserved gametes. Apart from fulfillment of the desire of becoming genetic parents, TS patients may be potential candidates for egg donation, gestational surrogacy, and adoption. The present review discusses the different options for preserving female fertility in TS and the ethical questions raised by these approaches. Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  14. Scripting Professional Identities

    DEFF Research Database (Denmark)

    Bévort, Frans; Suddaby, Roy

    2016-01-01

    on a longitudinal ethnography of professionals in a Big Four accounting firm we analyse the process by which individual professionals make sense of their new roles and integrate the conflicting demands of professional and managerial logics. We find that individuals are active authors of their own identity scripts......This article examines how individual accountants subjectively interpret competing logics of professionalism as they transform from practicing accountants to managerial roles and as their organizations transform from traditional professional partnerships to more corporate organizational forms. Based....... We further observe considerable interpretive variation in how identity scripts are reproduced and enacted. We contribute to the emerging understanding of institutions as ‘inhabited’ by individuals and extend this literature by demonstrating that the institutional work of reinterpreting competing...

  15. A general integral identity

    Energy Technology Data Exchange (ETDEWEB)

    Glasser, M L, E-mail: laryg@clarkson.edu [Department of Physics, Clarkson University, Potsdam, NY 13699-5820 (United States); Departamento de Fisica Teorica, Atomica y Optica, Universidad de Valladolid, Valladolid 470071 (Spain)

    2011-06-03

    The identity {integral}{sub 0}{sup {pi}/2}d{Phi}{integral}{sub 0}{sup {pi}/2}d{Theta} sin{Phi} F(x sn{Phi} sin{Phi})={pi}/2 {integral}{sub 0}{sup 1}F(xt)dt, where F is any function, is derived. Several extensions are given and a few examples of physical interest are described.

  16. Identity, History, Tolerance

    Directory of Open Access Journals (Sweden)

    Surovtsev V.A.

    2016-01-01

    Full Text Available The article discusses the role of historical narratives in the formation of identity. Rüsen’s thesis on the contradiction of traditional historical identities that suggest an ethnocentric position with the processes of intercultural communication is analyzed. The potential of historical narratives in overcoming (or restricting ethnocentrism is considered. It is shown that ethnocentrism is constituted by kinds of the configuration of historical writing rather than by a subjective position of historical narrative authors. The types of stories suggest a the way of making history using only the criteria of success and failure in the interpretation of the past; b interpretation of history as teleological continuity; c merely the necessity to justify (to substantiate claims or to discredit something. It is alleged that the realization that the form of historical knowledge constructs, not discovers, can facilitate liberation from referential fallacy on the whole and enslavement by certain kinds of stories in particular. It is concluded that the recognition of the constitutive nature of historical narratives allows being independent from the traditional forms of historical knowledge and traditional ideas about their cultural value. In particular, it allows reconsidering the need to apply historical knowledge when constructing identity.

  17. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  18. Genetics and human rights: Two histories: restoring genetic identity after forced disappearance and identity suppression in Argentina and after compulsory isolation for leprosy in Brazil

    OpenAIRE

    Penchaszadeh, Victor B.; Schuler-Faccini, Lavinia

    2014-01-01

    Over the past three decades, there has been an accelerated development of genetic technology, leading to its use in human genetic identification for many purposes. Additionally, it has been made explicit that identity is a fundamental human right. A number of historical circumstances have connected these developments. Personal identity is increasingly associated with the preservation and defense of human rights and is a tool to repair the violation of these rights, particularly the right to i...

  19. Preservation theorems on finite structures

    International Nuclear Information System (INIS)

    Hebert, M.

    1994-09-01

    This paper concerns classical Preservation results applied to finite structures. We consider binary relations for which a strong form of preservation theorem (called strong interpolation) exists in the usual case. This includes most classical cases: embeddings, extensions, homomorphisms into and onto, sandwiches, etc. We establish necessary and sufficient syntactic conditions for the preservation theorems for sentences and for theories to hold in the restricted context of finite structures. We deduce that for all relations above, the restricted theorem for theories hold provided the language is finite. For the sentences the restricted version fails in most cases; in fact the ''homomorphism into'' case seems to be the only possible one, but the efforts to show that have failed. We hope our results may help to solve this frustrating problem; in the meantime, they are used to put a lower bound on the level of complexity of potential counterexamples. (author). 8 refs

  20. Blogs as Objects of Preservation

    DEFF Research Database (Denmark)

    Stepanyan, Karen; Gkotsis, George; Kalb, Hendrik

    2012-01-01

    challenge for the digital preservation community. While the methodological frameworks for selecting these properties provide a good foundation, a continued discussion is necessary for further clarifying and improving the available methods. This paper advances earlier work by building on the exist......challenge for the digital preservation community. While the methodological frameworks for selecting these properties provide a good foundation, a continued discussion is necessary for further clarifying and improving the available methods. This paper advances earlier work by building...... analysis) and, subsequently, improve the final reformulation of the properties. To demonstrate the applicability of the modified framework, the paper presents a use case of a blog preservation initiative that is informed by stakeholder interviews and evaluation of structural and technological foundations...

  1. Online Marketing Trends

    OpenAIRE

    Horecká, Ivana

    2015-01-01

    This thesis deals with online marketing trends. Its main goal is to define the latest online marketing trends, create a website with the free online marketing trends, and analyse their effectiveness. The theoretical part brings a thorough description of the latest online marketing trends. Moreover, it provides an insight into the latest trends in the website development. The chosen online marketing trends defined in the theoretical part are subsequently applied on a newly created website. All...

  2. Active preservation - otherwise no archives

    International Nuclear Information System (INIS)

    Norberg, E.

    1996-01-01

    The role and history of national and regional archives in Sweden is discussed. It is noted that large portions of our cultural heritage can not be set aside for long-term preservation due to several facts: Some events are never documented, Important records are never set aside, Important information is stored on media that are not suitable for long-term preservation, Information can not be accessed due to inadequate search aids, Eliminations are made due to lack of space. Strategies for an action plan to save valuable material are briefly outlined, and the importance of international cooperation is stressed

  3. Yeasts preservation: alternatives for lyophilisation

    OpenAIRE

    Nyanga, Loveness K.; Nout, Martinus J. R.; Smid, Eddy J.; Boekhout, Teun; Zwietering, Marcel H.

    2012-01-01

    The aim of the study was to compare the effect of two low-cost, low technology traditional methods for drying starter cultures with standard lyophilisation. Lyophilised yeast cultures and yeast cultures preserved in dry rice cakes and dry plant fibre strands were examined for viable cell counts during 6 months storage at 4 and 25 °C. None of the yeast cultures showed a significant loss in viable cell count during 6 months of storage at 4 °C upon lyophilisation and preservation in dry rice cak...

  4. Polarization-preserving holey fibers

    DEFF Research Database (Denmark)

    Broeng, Jes; Mogilevtsev, Dmitri; Libori, Stig E. Barkou

    2001-01-01

    In this work we suggest and discuss a microstructure of air capillaries with elliptical cross-section in a tread of glass that gives opportunity for Creation of polarization-preserving fiber with very small beat length between the fundamental modes of different polarization......In this work we suggest and discuss a microstructure of air capillaries with elliptical cross-section in a tread of glass that gives opportunity for Creation of polarization-preserving fiber with very small beat length between the fundamental modes of different polarization...

  5. Active preservation - otherwise no archives

    Energy Technology Data Exchange (ETDEWEB)

    Norberg, E [National Swedish Archives, Stockholm (Sweden)

    1996-12-01

    The role and history of national and regional archives in Sweden is discussed. It is noted that large portions of our cultural heritage can not be set aside for long-term preservation due to several facts: Some events are never documented, Important records are never set aside, Important information is stored on media that are not suitable for long-term preservation, Information can not be accessed due to inadequate search aids, Eliminations are made due to lack of space. Strategies for an action plan to save valuable material are briefly outlined, and the importance of international cooperation is stressed.

  6. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...... and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises...

  7. 36 CFR 910.32 - Historic preservation.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Historic preservation. 910.32... DEVELOPMENT AREA Standards Uniformly Applicable to the Development Area § 910.32 Historic preservation... Preservation Plan of the Corporation, are specified for preservation, shall be acomplished (a) in accordance...

  8. ACHP | Summary of the Preserve America Initiative

    Science.gov (United States)

    Initiative Preserve America: Explore and Enjoy Our Heritage (logo) Summary of the Preserve America Initiative Preserve America is a White House initiative that encourages and supports community efforts to preserve and enjoy our priceless cultural and natural heritage. The goals of the initiative include a greater shared

  9. Comparison of Tissue Preservation using Formalin and Ethanol as Preservative Formula

    OpenAIRE

    See Woan Shian; Arifin Soenggono; Sawkar Vijay Pramod

    2016-01-01

    Background: Tissue preservation can be performed through embalming, by providing the chemical embalming fluid to the human remains. Formalin’s preservative formula is the foundation for modern methods of embalming. Unfortunately, this preservative formula has several disadvantages. While Ethanol’s preservative formula is a considerable agent to replace formalin’s preservative formula. The aim of this study was to compare the tissue preservation using formalin and ethanol as preservative formu...

  10. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    This paper examines the concept of identity in relation to youth practices on social network sites (SNS). The paper illustrates how writing “I love you” or other emotional statements on each other’s profiles on SNS is not only a common way for Danish teenagers to communicate and practice friendship...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  11. Social Identity and Group Contests

    OpenAIRE

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social identity increases investments in group contests. We show theoretically that increased social identity with the own group implies higher investments in Tullock contests. Empirically we find that induce...

  12. Social identity process within organizations

    OpenAIRE

    Bazarov, Takhir; Kuzmina, Maria

    2005-01-01

    Expanding and complex social realities cause new types of identity. Variety in organizations and workgroups (where people are involved), implies a special kind of social identity which can be defined as professional, organizational or managerial. The study of the social identity processes in organizations is a new interdisciplinary sphere that is presented especially commonly in European Social Psychology. The result of its theoretical comprehension is Social Identity Theory. In the article l...

  13. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  14. John Locke on Personal Identity**

    OpenAIRE

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  15. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  16. Queering Black Racial Identity Development

    Science.gov (United States)

    Johnson, Alandis A.; Quaye, Stephen John

    2017-01-01

    We used queer theory to encourage readers to think differently about previous theories about Black racial identity development. Queer theory facilitates new and deeper understandings of how Black people develop their racial identities, prompting more fluidity and nuance. Specifically, we present a queered model of Black racial identity development…

  17. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  18. Survey of analysis results from preservation tests on condensation water

    Energy Technology Data Exchange (ETDEWEB)

    Hall, Bjoern (Bjoern Hall, Miljoe och Foerbraenningskemi, Onsala (Sweden))

    2010-03-15

    Avfall Sverige - Swedish Waste Management has together with seven waste incineration plants made a study with the purpose of examining the necessity of preservatives when analyzing process water from wet flue gas treatment. The analyzed water in this study is not water leaving the plant, but process water that has yet not undergone any water treatment. The analysis after two weeks showed that a statistically proven difference between the preserved and non-preserved samples was obtained only from mercury samples at one plant (Plant 1) and from lead samples at another (Plant 2). The difference between the values of the lead samples was, however, so small that it was easily covered by the margin of error for the analysis, and could be considered as coincidental. The differences between the values for other metals were either very small or had values that fell below the detection limit. The analysis made after six weeks also showed that there was a considerable difference between the preserved and non-preserved samples of mercury from plant 1, which confirms the trend seen in the 2 week analysis. Other samples, which were analyzed after six weeks, show that another plant (Plant 4) stands out, in that the preserved samples for most metals had considerably higher levels compared to the non-preserved samples. Plant 4 is different from other plants also when comparing 2-week samples and 6-week samples. For most metals, levels were higher in the 2-week sample. The levels of the samples were very high, in general, at this plant. Other than this there was no statistically clear difference in levels between the preserved and non-preserved samples. This test series showed that the difference between preserved and non-preserved samples was very small for most metals and at most plants. For mercury, there is a statistical and experimental difference between the preserved and non-preserved samples from plant 1. However, the difference between samples preserved in nitric acid and

  19. Social identity change: shifts in social identity during adolescence.

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  20. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  1. The mode coupling theory in the FDR-preserving field theory of interacting Brownian particles

    International Nuclear Information System (INIS)

    Kim, Bongsoo; Kawasaki, Kyozi

    2007-01-01

    We develop a renormalized perturbation theory for the dynamics of interacting Brownian particles, which preserves the fluctuation-dissipation relation order by order. We then show that the resulting one-loop theory gives a closed equation for the density correlation function, which is identical with that in the standard mode coupling theory. (fast track communication)

  2. THE PECULIARITIES OF NATIONAL IDENTITY OF AUSTRALIAN UKRAINIANS IN THE WORKS OF L. BOHUSLAVETS

    Directory of Open Access Journals (Sweden)

    Galyna Gandzilevska

    2014-04-01

    Full Text Available After a period of continuous troubles that Ukraine has witnessed over a period of its history, the issue of national identity today appears to be more acute than ever before. It is explained by various reasons that are not under consideration in this research. However, the notion of national identity, its factors and modern perspectives are of a great scientific importance. Amid the principles of identity there is one that refers to the existential feeling of belonging and the desire to unite in factions with those who share similar interests. Besides, national identity is viewed as the factor that affects the preservation and development of the Ukrainian nation. The paper presents the research with aim to define the national identity and its integral parts that are essential for identity preservation. National identity is understood as a collective structure that illustrates how similar or different the elements of society are. Five factors of national identity that are considered in the paper are the collective identification that is realized in religious and cultural beliefs, common history and the feeling of belonging, active social life, which is illustrated by one’s participation in cultural activities, geographical belonging and national character that is a set of cultural believes followed by the representatives of a particular national group. The literary work of Lesia Bohuslavets, a Ukrainian immigrant who lives in Australia, is under consideration in this paper. She was defined as a writer under analysis as she is viewed as an example of those conscientious Ukrainians who feel responsible for cultural and national preservation. The literary work “My Australian kuma” of Lesia Bohuslavets was analysed by means of content analysis which is a statistic means of language evaluation. The result of content analysis proved that national character and active social life categories were marked with the highest variables. It means that

  3. Local quantum channels preserving classical correlations

    International Nuclear Information System (INIS)

    Guo Zhihua; Cao Huaixin

    2013-01-01

    The aim of this paper is to discuss local quantum channels that preserve classical correlations. First, we give two equivalent characterizations of classical correlated states. Then we obtain the relationships among classical correlation-preserving local quantum channels, commutativity-preserving local quantum channels and commutativity-preserving quantum channels on each subsystem. Furthermore, for a two-qubit system, we show the general form of classical correlation-preserving local quantum channels. (paper)

  4. Personal identity processes and self-esteem : Temporal sequences in high school and college students

    NARCIS (Netherlands)

    Luyckx, K.; Klimstra, T.A.; Duriez, B.; Van Petegem, S.; Beyers, W.; Teppers, E.; Goossens, L.

    2013-01-01

    Personal identity formation constitutes a crucial developmental task during the teens and 20s. Using a recently developed five-dimensional identity model, this cross-sectional study (N = 5834) investigated age trends from ages 14 to 30 for different commitment and exploration processes. As expected,

  5. A revolution in food preservation

    International Nuclear Information System (INIS)

    1986-01-01

    A brief consumer guide to food irradiation is presented. Aspects covered include some of the advantages of food irradiation compared to other methods of food preservation, the type of radiation used, the mechanism of action, some practical applications, safety and future benefits. (UK)

  6. Hardcore Heritage: imagination for preservation

    NARCIS (Netherlands)

    Rietveld, E.; Rietveld, R.

    2017-01-01

    Should the practice of the historic preservation of built and landscape heritage necessarily be based on conservation? Monuments, listed buildings, landscapes, and other forms of built heritage, are typically regarded as immutable and untouchable—objects to be “conserved”—and as a result tend to

  7. 2007 Preserve America Presidential Awards

    Science.gov (United States)

    aviation history museum that emphasizes people and culture as well as technology and events. With a the Private Preservation category, the two winners are: The History Channel, Save Our History Save Our History were Abbe Raven, president and CEO, A&E Television Networks; and Nancy Dubuc

  8. Yeasts preservation: alternatives for lyophilisation

    NARCIS (Netherlands)

    Nyanga, L.K.; Nout, M.J.R.; Smid, E.J.; Boekhout, T.; Zwietering, M.H.

    2012-01-01

    The aim of the study was to compare the effect of two low-cost, low technology traditional methods for drying starter cultures with standard lyophilisation. Lyophilised yeast cultures and yeast cultures preserved in dry rice cakes and dry plant fibre strands were examined for viable cell counts

  9. Beyond the Scope of Preservation?

    DEFF Research Database (Denmark)

    Rikke, Stenbro,; Riesto, Svava

    2014-01-01

    Why are some parts of the built environment protected as national heritage and others not? Listing is the most restrictive tool of Norwegian and Danish preservation in the built environment and creates a specific version of the past told through buildings and sites. The heritage authorities in both...

  10. Preserving cultural assets of others: Jewish heritage sites in Macedonian cities

    OpenAIRE

    Petrevska, Biljana; Krakover, Shaul; Collins-Kreiner, Noga

    2017-01-01

    Issues arise when trying to understand the motivation of policymakers to preserve the assets of cultures that do not belong to the mainstream population. Tunbridge and Ashworth’s seminal study on ‘Dissonant Heritage’ and Bennett’s developmental model of intercultural sensitivity (DMIS model) provide a basis to evaluate both the motivations and the existence of a cultural dissonance. As there is a growing worldwide trend towards preserving and developing Jewish heritage tourism (JHT) this stud...

  11. Place attachment, place identity and aesthetic appraisal of urban landscape

    Directory of Open Access Journals (Sweden)

    Jaśkiewicz Michał

    2015-12-01

    Full Text Available As the aesthetic of the Polish cities became a topic of wider discussions, it is important to detect the potential role of human-place relations. Two studies (N = 185 & N = 196 were conducted to explore the relationship between place attachment, place identity and appraisal of urban landscape. Satisfaction with urban aesthetic was predicted by two dimensions of place attachment (place inherited and place discovered, local identity (on the trend level and national-conservative identity. Place discovered and European identity were also predictors of visual pollution sensitivity. Place discovered is considered as more active type of attachment that permits both a positive bias concerning the aesthetics of one’s city, and a stronger criticism of the elements that can potentially violate the place’s landscape.

  12. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  13. Identities at Odds

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2015-01-01

    This study offers an interaction analytic account of how linguistic identities in internationalized workplaces in Denmark are indexed against members’ institutional positions in particular interactional settings. Where language policy may not be explicitly articulated between members, it is still....... The study uses recordings of naturally occurring interaction in different international workplace settings, and argues for greater attention to be paid to the actual language-policy practices in international workplace settings, as a entry point into developing a more nuanced understanding of the practices...

  14. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  15. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  16. Identities in Migration

    Directory of Open Access Journals (Sweden)

    Montserrat Clua i Fainé

    2017-08-01

    Full Text Available Young Catalans in London build their identity as immigrants in a close dialectic between their own imaginary about immigration in their country of origin and British perceptions of them. Given the negative stigma attached to the category of «immigrant», not all recognise themselves as such. Some simply refuse to acknowledge they belong to this category, while others use the projection of prejudices on immigrants towards Spaniards as a strategy from which they distance themselves by establishing a distinction between Catalans and Spaniards.

  17. New tool in food preservation

    International Nuclear Information System (INIS)

    Rainey, Humphrey.

    1982-01-01

    A review of current trends in the processing of food by irradiation is presented. The history and development, techniques and effects of irradiation are outlined. Applications for New Zealand, in the light of overseas experience and facilities available, are discussed

  18. Alternative Design for Visual Identity of Yayasan Batik Indonesia

    Directory of Open Access Journals (Sweden)

    Puspita Putri Nugroho

    2015-01-01

    Full Text Available The research objective is to create a logo as the main visual identity. It is together with the graphic elements to support the overall visual identity of the organization and also apply the corporate identity to various applications to effectively foster the professional and trustworthy image of the organization as the foundation in Indonesia aiming for preserving and advancing Batik as the national asset. The writer used qualitative and quantitative method. Qualitative method included Face-to-face interview with the vice secretary of YBI, e-mail interview with the previous logo designer and direct survey to Textile Museum Jakarta and Batik Gallery; and Quantitative method through online survey. The result of the project is a new visual identity for Yayasan Batik Indonesia, which portrays its vision and mission. Design is the core in attaining an advantageous visual identity that could portray the image of the respected organization. When a consistency is applied through the whole visual identity, professional character of the organization is achieved. 

  19. Identity style and coping strategies.

    Science.gov (United States)

    Berzonsky, M D

    1992-12-01

    This study examined the relationship between identity style and strategies used to cope with stressors that potentially threaten one's sense of identity. Identity style refers to differences in the way individuals construct and revise or maintain their sense of identity. An informational style involves actively seeking out, evaluating, and utilizing self-relevant information. A normative style highlights the expectations and standards of significant others. A diffuse/avoidant style is characterized by procrastination and situation-specific reactions. Late-adolescent college subjects were administered measures of identity style, ways of coping with academic stressors, and test anxiety. Within this self-as-student context, subjects with diffuse and normative identity styles employed avoidant-oriented coping strategies (wishful thinking, distancing, and tension reduction). An informational style was associated with deliberate, problem-focused coping. Findings are discussed in terms of a process model of identity development.

  20. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    The paper discusses the concept of identity in relation to management. We take our starting point in Wittgenstein’s concept language games. We argue that identity is a question of using linguistic tools to construct reality. Two elements of the language game metaphor are central here: rules...... and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...... points for constructing identities. Managing identity has become more important because the rules-of-the-game have become more unstable. Managing identity is important if the bonds between individuals and organizations are to be sustained. But this task is contradictory and paradoxical of its very nature...

  1. Preservation of the metaproteome: variability of protein preservation in ancient dental calculus.

    Science.gov (United States)

    Mackie, Meaghan; Hendy, Jessica; Lowe, Abigail D; Sperduti, Alessandra; Holst, Malin; Collins, Matthew J; Speller, Camilla F

    2017-01-01

    Proteomic analysis of dental calculus is emerging as a powerful tool for disease and dietary characterisation of archaeological populations. To better understand the variability in protein results from dental calculus, we analysed 21 samples from three Roman-period populations to compare: 1) the quantity of extracted protein; 2) the number of mass spectral queries; and 3) the number of peptide spectral matches and protein identifications. We found little correlation between the quantity of calculus analysed and total protein identifications, as well as no systematic trends between site location and protein preservation. We identified a wide range of individual variability, which may be associated with the mechanisms of calculus formation and/or post-depositional contamination, in addition to taphonomic factors. Our results suggest dental calculus is indeed a stable, long-term reservoir of proteins as previously reported, but further systematic studies are needed to identify mechanisms associated with protein entrapment and survival in dental calculus.

  2. Religious Differences in Modernization of the Family: Family Demographics Trends in Ghana

    Science.gov (United States)

    Heaton, Tim B.; Darkwah, Akosua

    2011-01-01

    This research examines trends in a broad set of reproductive and marital behaviors in Ghana, focusing on religious group differences. These comparisons provide evidence of how family trends are constrained by religious identity in a less developed country. Three waves of the Ghana Demographic and Health Surveys are used to track trends in the age…

  3. The information profesional and the fundamental principles of preservation management in the digital world

    Directory of Open Access Journals (Sweden)

    Bárbara Muñoz de Solano y Palacios

    2006-01-01

    Full Text Available Preservation in the digital world is one of the central leadership issues of our day. It is the responsibility of many people in many institutions fulfilling many roles. An understanding of the impact of this role differentiation on digital preservation action is crucial to identifying which of the many facets of digital technology we can control, which trends we may only influence, and which aspects we must relinquish any vain expectation for either control or influence. This technical article suggests a framework for understanding preservation in the digital context by creating a bridge from the five core principles of traditional preservation practice: longevity, choice, quality, integrity, and access. Explores the concept of digital information preservation and the efforts made to save a record of our cultural heritage over the past

  4. Low-level efficacy of cosmetic preservatives

    DEFF Research Database (Denmark)

    Lundov, M D; Johansen, J D; Zachariae, C

    2011-01-01

    Preservation using combinations of preservatives has several advantages. This study shows that the concentration of some of the most frequently used allergenic preservatives can be markedly lowered when they are combined with phenoxyethanol. The antimicrobial efficacy of cosmetic preservatives...... of the preservatives indicated additive effects against the microorganisms. No combination of preservatives showed any inhibitory action on each other. Challenge tests with different concentrations and combinations were performed in a cosmetic cream. Diazolidinyl urea and MCI/MI alone were ineffective against C....... albicans in a challenge test at concentrations up to 16 times higher than the observed MIC values. When combining phenoxyethanol with either one of the allergenic preservatives diazolidinyl urea, MCI/MI or MI, the cosmetic cream was adequately preserved at concentrations well below the preservatives' MIC values as well...

  5. Identity politics: implications for gender analysis policy and training.

    Science.gov (United States)

    Erturk, Y

    1997-01-01

    As attention has shifted from a concern for citizenship, equality, and welfare to ideas of empowerment, equity, and governance, the locus of competition over power has rested with "identity politics," a recognition of cultural diversity that claims the legitimate right to produce alternative definitions and symbols of identity in public space. The change in identity formation from universal/national to fractured/tribalizing has implications for gender relations in contexts where patriarchal power controls production and reproduction. Except for feminism, all discourses in the current competition over identity politics are patriarchal. A look at the forces of change that shifted the process of modernization to a process of globalization reveals that, while modernization tends to standardize, globalization embraces the contradictory forces of universalizing and diversifying trends. Issues of identity and inequality were not problematic until the modern and the traditional subsumed each other and, thus, revealed the inherent contradictions of modernization. The diversifying forces that jeopardize the transnationalization of identity into membership in a "human society" include 1) language differences among the working classes, 2) growing global inequalities, and 3) collective memories of antagonistic histories. An analysis of gender based on identity politics can be conducted on a macro-level to understand the reluctance of central governments to initiate certain interventions, competing needs, new contradictions, changing gender roles, and the importance of promoting a global social contract.

  6. Methods for preservation and extension of shelf life.

    Science.gov (United States)

    Gould, G W

    1996-11-01

    There is potential for spoilage of all foods at some rate or other following harvest, slaughter or manufacture and spoilage may occur at any of the stages between the acquisition of raw materials and the eventual consumption of a food product. These stages include processing, packaging, distribution, retail display, transport, storage and use by the consumer. They are under varying degrees of control that aim to deliver a satisfactory shelf life, to ensure that the finally-consumed product is of high quality and to ensure that it is safe. Spoilage may be caused by a wide range of reactions including some that are essentially physical, some that are chemical, some enzymic and some microbiological. The various forms of microbiological spoilage are preventable to a large degree by a wide range of preservation techniques, most of which act by preventing or inhibiting microbial growth (e.g., chilling, freezing, drying, curing, conserving, vacuum packing, modified atmosphere packing, acidifying, fermenting and adding preservatives). A smaller number of techniques act by inactivating microorganisms (e.g., pasteurization, sterilization and irradiation). Additional techniques restrict the access of microorganisms to products (e.g., aseptic processing and packaging. A major trend is that new and emerging preservation techniques which are coming into use or are under development include more that act by inactivation (e.g., ultrahigh pressure, electroporation, manothermosonication and addition of bacteriolytic enzymes). A further trend is towards the use of procedures that deliver products that are less heavily preserved, have higher quality, are more natural, freer from additives and nutritionally healthier. Less severe preservation procedures are therefore being developed that make use of preservative factors in combinations to deliver (a) less damage to product quality (hurdle technologies); (b) new methods of heating that are better controlled and therefore deliver milder

  7. Immigrant associations and ethnic identity among Japanese immigrants and their descendants in Argentina

    Directory of Open Access Journals (Sweden)

    Silvina Gómez

    2014-11-01

    Full Text Available Japanese migration to Argentina started in the early Twentieth Century, with the arrival of Japanese men from other Latin American countries and did not stop until the 60’s even though as time passed the composition of the immigrant group changed and so did their objectives. Japanese immigrants soon created voluntary associations where they gathered, a trend that still survives to these days. The different kind of associations they created, their aims and later development as well as their relationship to the Japanese government, are broached in this paper. It focuses on the changes Japanese associations have suffered along the process, a as support devices for young men that arrived as dekaseguis in early times, and whose stay was extended indefinitely, b during the Second World War crisis c with the arrival of Japanese newcomers during the postwar period, d attending to the cases of Japanese migrants arriving from the Dominican Republic, Paraguay and Bolivia; and, finally, dealing with the dilemma aroused by the decision to settle definitively versus the desire to preserve Japanese traditions and identity

  8. Orbital preservation in a maxillectomy

    Energy Technology Data Exchange (ETDEWEB)

    Tanaka, Katsuhiko; Nishikawa, Hitomi; Kumagai, Masahiko; Dosaka, Yoshihiro; Kuroda, Toru; Atago, Yoshihiro; Nishio, Masamichi [Sapporo National Hospital (Japan)

    1999-07-01

    In the past 9 years, 38 patients of the maxillary cancer were treated by a combination of radiation and surgery. Sixteen patients showed the orbital involvement as confirmed by a CT scan and/or MRI. An orbital excenteration was necessary in 6 patients, due mainly to deep intraorbital invasion, while in 10, the orbital contents were preserved despite the involvement of the orbital capsule. The local rate of the orbital region in the latter patients evaluated at 48 months after the initial surgery was 44%. For the treatment of the recurrence at the orbital capsule. The application of gold grain (Au{sup 198}) thus appeared to be a useful tool for further preserving the eye. (author)

  9. Orbital preservation in a maxillectomy

    International Nuclear Information System (INIS)

    Tanaka, Katsuhiko; Nishikawa, Hitomi; Kumagai, Masahiko; Dosaka, Yoshihiro; Kuroda, Toru; Atago, Yoshihiro; Nishio, Masamichi

    1999-01-01

    In the past 9 years, 38 patients of the maxillary cancer were treated by a combination of radiation and surgery. Sixteen patients showed the orbital involvement as confirmed by a CT scan and/or MRI. An orbital excenteration was necessary in 6 patients, due mainly to deep intraorbital invasion, while in 10, the orbital contents were preserved despite the involvement of the orbital capsule. The local rate of the orbital region in the latter patients evaluated at 48 months after the initial surgery was 44%. For the treatment of the recurrence at the orbital capsule. The application of gold grain (Au 198 ) thus appeared to be a useful tool for further preserving the eye. (author)

  10. INCORRECT PRESERVATION OF AMPUTATED DIGITS

    Directory of Open Access Journals (Sweden)

    Uroš Ahčan

    2004-09-01

    Full Text Available Background. A decision to replant is critically dependent on the condition of the amputated digit and the way it was preserved during transport. The most common error is exposing the amputated digit to very low temperatures. Preservation directly on ice, on cooling devices in portable refrigerators, or on top of packets of frozen meat often result in a frozen and therefore unusable body digit.Methods. An inquiry questionnaire on correct methods of preservation of amputated digits was conducted on a sample of 30 lay persons, 30 medical students, and 15 physicians.Three simulations of most frequently used methods of preservation of amputated digit were conducted (the correct method; directly on ice; on cooling devices of portable refrigerators. Environment temperature of the (simulated amputated digits stored was measured.In a retrospective study, hospital records of patients treated at the Clinical department of plastic surgery and burns in Ljubljana between 1998 and 2002 were examined. We determined the number of replantations performed, gender of the patients, their age, the mechanism of the injury, the success rate of the replantation, and the duration of hospitalisation. In five case described in detail, we present an inadequate treatment of the amputated digits.Results. The results of the questionnaire survey show that no less than 86.7% of lay person respondents would have treated the injuries in an incorrect way; same holds for 43.4% students of medicine, and 33.3% of practicing physicians.The temperature of the simulated amputated digit remained above 5°C throughout the simulated correct treatment. When preserved directly on ice on or coolant bodies, the temperature dropped below the freezing point and never climbed above 0°C throughout the duration of the simulation (150 minutes.Between years 1998 and 2002, Clinical department of plastic surgery and burns at the University clinical centre Ljubljana admitted 124 injured persons with

  11. Nuclear Knowledge Preservation in Croatia

    International Nuclear Information System (INIS)

    Pleslic, S.; Novosel, N.

    2006-01-01

    Since the International Atomic Energy Agency (IAEA, Vienna, Austria) was founded in 1957 as an autonomous intergovernmental organization, it was authorized for exchange of technical and scientific information on peaceful uses of atomic energy. 35 years ago the International Nuclear Information System (INIS) was established from IAEA as an international bibliographic database in the nuclear field and in nuclear related areas. INIS as an instrument for a comprehensive and systematic dissemination of all information and knowledge becomes a big technological and science information system with 134 Members (114 countries and 20 international organizations). In INIS Membership Arrangements all Members are responsible for the collection, selection, description of information and providing the Agency with the full text of each item of non-conventional literature. Participation of each Member is important because decentralized information management is an operational philosophy of INIS. During all these years status of nuclear power changed significantly in the world. Some developing countries started to develop nuclear power programme and some developed countries showed tendency to decrease use of nuclear power. Anyway, expert knowledge accumulated over decades and the achievements in the field of nuclear science and technology have to be preserved and later transferred to future generations. It became obvious that the INIS is practically a pioneer in the area of nuclear knowledge preservation with well defined goals of knowledge preservation: selection of the most valuable information to convey to the future, ensuring that it remains accessible, readable and understandable and management of technological change. Main components of knowledge preservation are: selection of information for preservation including evaluation and prioritisation by value, use and risk, information capture (purchasing, copy, digitise, web links), describing, classifying, store and access

  12. Preserved entropy and fragile magnetism.

    Science.gov (United States)

    Canfield, Paul C; Bud'ko, Sergey L

    2016-08-01

    A large swath of quantum critical and strongly correlated electron systems can be associated with the phenomena of preserved entropy and fragile magnetism. In this overview we present our thoughts and plans for the discovery and development of lanthanide and transition metal based, strongly correlated systems that are revealed by suppressed, fragile magnetism, quantum criticality, or grow out of preserved entropy. We will present and discuss current examples such as YbBiPt, YbAgGe, YbFe2Zn20, PrAg2In, BaFe2As2, CaFe2As2, LaCrSb3 and LaCrGe3 as part of our motivation and to provide illustrative examples.

  13. Preservation of food and radiation

    International Nuclear Information System (INIS)

    Kasamatsu, Tomomichi

    1975-01-01

    In the application of radiation to preservation of food, there are some methods; sterilization, elimination of noxious insects, prevention of germination and control of maturation. The former two utilize the lethal effect of radiation to the living things and the latter two utilize the injurious effect on the metabolism of the living things. At present, irradiation to potato is most widely permitted for the purpose of prevention of germination, and the irradiation with 15 Krad (maximum) is allowed to preserve potato for 8 months in Japan. In the other hand, a large quantity of doses, such as 4.5 to 5.6 Mrad, is necessary to sterilize completely for industrial use, degeneration of food component and high cost come into question. In addition, food is directly taken into the mouth of human being, therefore, wholesomeness, legal permission and determination of dose must be examined. (Tsukamoto, Y.)

  14. Food Preservation by Irradiation (Rev.)

    Energy Technology Data Exchange (ETDEWEB)

    Urrows, Grace M.

    1968-01-01

    Up to 30% of food harvests are lost in some parts of the world because of animal pests and microorganisms. Nuclear techniques can help reduce and extend the shelf life of these foods. Around 55 countries now have food irradiation programs. The use of radiation is the most recent step in man's attempts to preserve some of his harvest for the lean part of the year.

  15. Technical Information/Website Preservation

    Science.gov (United States)

    PintoRey, Christian R.

    2010-01-01

    This document reviews the work of the author in NASA's Motivating Undergraduates in Science and Technology (MUST) internship. The intern worked on the Space Shuttles hydraulic systems (i.e., Auxiliary Power Units (APU's) and Hydraulic Pump Units (HPU's)), and website preservation of the hydraulic technology captured in websites relating to the coming.the Space Shuttle Retirement. Several figures and pictures show an overview of the orbiter's hydraulic systems

  16. New method of preserving food

    Energy Technology Data Exchange (ETDEWEB)

    Carrard, G. (Australian Atomic Energy Commission Research Establishment, Lucas Heights)

    1983-07-01

    The use of gamma radiation for food preservation is discussed. Investigations at the AAEC include: the eradication of fruit-fly larvae in oranges, tomatoes and avocadoes; treatment of shrimps; extending the shelf life of mushrooms and potatoes; treatment of imported beans to prevent germination; killing of bacterial spores with a combination of pressure and gamma radiation; and the treatment of beehives containing honey-bee larvae with foulbrood.

  17. New method of preserving food

    International Nuclear Information System (INIS)

    Carrard, G.

    1983-01-01

    The use of gamma radiation for food preservation is discussed. Investigations at the AAEC include: the eradication of fruit-fly larvae in oranges, tomatoes and avocadoes; treatment of shrimps; extending the shelf life of mushrooms and potatoes; treatment of imported beans to prevent germination; killing of bacterial spores with a combination of pressure and gamma radiation; and the treatment of beehives containing honey-bee larvae with foulbrood

  18. ULTRAVIOLET TECHNOLOGY FOR FOOD PRESERVATION

    OpenAIRE

    Guedes, AMM; Novello, D; Mendes, GMD; Cristianini, M

    2009-01-01

    ULTRAVIOLET TECHNOLOGY FOR FOOD PRESERVATION This literature review article had as objective to gather information about ultraviolet (UV) technology utilization on the food industry, its effects and potential application. Aspects as the origin, concept and applications of the technology on the equipment industry and running mechanisms were approached. The application of UV radiation on food decontamination is still little used due its low penetration, but it is known that it can be easily app...

  19. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  20. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  1. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  2. Balanced identity in the minimal groups paradigm.

    Directory of Open Access Journals (Sweden)

    Yarrow Dunham

    Full Text Available Balanced Identity Theory [1] formalizes a set of relationships between group attitude, group identification, and self-esteem. While these relationships have been demonstrated for familiar and highly salient social categories, questions remain regarding the generality of the balance phenomenon and its causal versus descriptive status. Supporting the generality and rapidity of cognitive balance, four studies demonstrate that the central predictions of balance are supported even for previously unfamiliar "minimal" social groups to which participants have just been randomly assigned. Further, supporting a causal as opposed to merely descriptive interpretation, manipulating any one component of the balance model (group attitude, group identification, or self-esteem affects at least one of the related components. Interestingly, the broader pattern of cognitive balance was preserved across such manipulations only when the manipulation strengthens as opposes to weakens the manipulated construct. Taken together, these findings indicate that Balanced Identity Theory has promise as a general theory of intergroup attitudes, and that it may be able to shed light on prior inconsistencies concerning the relationship between self-esteem and intergroup bias.

  3. Balanced identity in the minimal groups paradigm.

    Science.gov (United States)

    Dunham, Yarrow

    2013-01-01

    Balanced Identity Theory [1] formalizes a set of relationships between group attitude, group identification, and self-esteem. While these relationships have been demonstrated for familiar and highly salient social categories, questions remain regarding the generality of the balance phenomenon and its causal versus descriptive status. Supporting the generality and rapidity of cognitive balance, four studies demonstrate that the central predictions of balance are supported even for previously unfamiliar "minimal" social groups to which participants have just been randomly assigned. Further, supporting a causal as opposed to merely descriptive interpretation, manipulating any one component of the balance model (group attitude, group identification, or self-esteem) affects at least one of the related components. Interestingly, the broader pattern of cognitive balance was preserved across such manipulations only when the manipulation strengthens as opposes to weakens the manipulated construct. Taken together, these findings indicate that Balanced Identity Theory has promise as a general theory of intergroup attitudes, and that it may be able to shed light on prior inconsistencies concerning the relationship between self-esteem and intergroup bias.

  4. The ZEUS data preservation project

    International Nuclear Information System (INIS)

    Malka, Janusz; Wichmann, Katarzyna

    2012-01-01

    A project to allow long term access and physics analysis of ZEUS data (ZEUS data preservation) has been established in collaboration with the DESY-IT group. In the ZEUS approach the analysis model is based on the Common Ntuple project, under development since 2006. The real data and all presently available Monte Carlo samples are being preserved in a flat ROOT ntuple format. There is ongoing work to provide the ability to simulate new, additional Monte Carlo samples also in the future. The validation framework of such a scheme using virtualisation techniques is being explored. The goal is to validate the frozen ZEUS software against future changes in hardware and operating system. A cooperation between ZEUS, DESY-IT and the library was established for document digitisation and long-term preservation of collaboration web pages. Part of the ZEUS internal documentation has already been stored within the HEP documentation system INSPIRE. Existing digital documentation, needed to perform physics analysis also in the future, is being centralised and completed.

  5. Phase-preserved optical elevator.

    Science.gov (United States)

    Luo, Yuan; Zhang, Baile; Han, Tiancheng; Chen, Zhi; Duan, Yubo; Chu, Chia-Wei; Barbastathis, George; Qiu, Cheng Wei

    2013-03-25

    The unique superiority of transformation optics devices designed from coordinate transformation is their capability of recovering both ray trajectory and optical path length in light manipulation. However, very few experiments have been done so far to verify this dual-recovery property from viewpoints of both ray trajectory and optical path length simultaneously. The experimental difficulties arise from the fact that most previous optical transformation optics devices only work at the nano-scale; the lack of intercomparison between data from both optical path length and ray trajectory measurement in these experiments obscured the fact that the ray path was subject to a subwavelength lateral shift that was otherwise not easily perceivable and, instead, was pointed out theoretically [B. Zhang et al. Phys. Rev. Lett. 104, 233903, 2010]. Here, we use a simple macroscopic transformation optics device of phase-preserved optical elevator, which is a typical birefringent optical phenomenon that can virtually lift an optical image by a macroscopic distance, to demonstrate decisively the unique optical path length preservation property of transformation optics. The recovery of ray trajectory is first determined with no lateral shift in the reflected ray. The phase preservation is then verified with incoherent white-light interferometry without ambiguity and phase unwrapping.

  6. Nostalgia and lost identity.

    Science.gov (United States)

    Pourtova, Elena

    2013-02-01

    Nostalgia for the Soviet Union is a major social phenomenon in Russia today due to the irrevocable losses of the recent past in which Soviet citizens involuntarily became immigrants in their own country. With reference to discussions of nostalgia in philosophical and psychoanalytic literature, I suggest that nostalgia may represent either a defensive regression to the past or a progressive striving for wholeness through re-connecting with what has been lost in the service of a greater integration. I compare this with the processes of adaptation seen in immigrants and provide a clinical illustration of a young man coming to terms with loss and change in the post-Soviet era. When nostalgia is recognized as a legitimate emotional experience it may facilitate mourning and enable the integration of the past with the present and the development of a new identity. © 2013, The Society of Analytical Psychology.

  7. Forging a Black identity

    Directory of Open Access Journals (Sweden)

    Barry Chevannes

    1992-07-01

    Full Text Available [First paragraph] The Rastafarians: sounds of cultural dissonance [revised and updated editionj. LEONARD E. BARRETT, SR. Boston: Beacon Press, 1988. xviii + 302 pp. (Paper US$ 11.95 Rasta and resistance: from Marcus Garvey to Walter Rodney. HORACE CAMPBELL. Trenton NJ: Africa World Press, 1987. xiii + 236 pp. (Cloth US$32.95, Paper US$ 10.95 Garvey's children: the legacy of Marcus Garvey. TONY SEWELL. London: Macmillan Caribbean, 1990. 128 pp. (Paper £ 17.95 The central theme linking these three titles is the evolution of a black identity among English-speaking Caribbean peoples, in particular Jamaicans. Consequently all three authors cover the two most important historical phenomena in Caribbean black nationalism, namely Garveyism and Rastafari, one focusing on the former and the other two focusing on the latter.

  8. National and Transnational Identities

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    within the Turkish minority in the three countries with special attention to the influence of transnational social transformation. Social communities and organisations such as trade unions, political parties or religious and cultural association have usually been ascribed the capability to enhance...... relations between individuals and to extend trust, values, identity and social belonging. Whether we focus on the individual and the value of face to face contact or we focus on the role of the organisation as an intervening institution between the state, the political system and the citizen...... in prolongation of the previous development. Conversely do the analyses of the Danish and German case show that models are not static. Denmark followed Sweden shortly after in introducing local voting rights for non-citizens and generally non-citizens enjoy considerable political, social and civic rights...

  9. Institutionalisation of Japan Identity Construction Policy

    Directory of Open Access Journals (Sweden)

    Zadvornaya Elena S.

    2016-09-01

    Full Text Available The article is devoted to the development of the modern politics of identity construction in Japan, which actively refers to the practice of designing self-image in international relations. This trend dates back to the 19th century, when there was the end of Sakoku (Japan’s policy of isolation. It is now possible to talk about the institutionalization of the identity construction policy to organized structures and regulations. Enhanced efforts in the field of Japanese traditional and popular culture, education and creative content has led to a number of institutions appearance (like Japan Foundation Fund, Japan Creative Agency, Japan Culture Fund, Agency for Cultural Affairs, Cool Japan Fund, Japan brand Fund and changing idea about the role of culture in foreign policy realization (it is fixed the documents of the Japanese Ministry of Foreign Affairs, the Ministry of Land, Infrastructure, Transport and Tourism, the Ministry of Education, Culture, Sports, Science and Technology, the Ministry of Economy, Trade and Industry, as well as a number of projects (Cool Japan, Visit Japan, Japan Culture Power, Japan Manga Awards, Kawaii Ambassadors, Cosplay International Fest and etc.. These efforts are aimed at forming Japan identity abroad to solve a number of foreign policy challenges of the future and the development of economic cooperation. The Japanese government nearest plans is to increase funding in order to create a positive image of Japan in the region of East Asia. All of these allows us to speak about the policy of the Japanese construction of identity as an institutionalized process in which there was clearance of organizations and regulatory activities.

  10. Identity Formation in Adulthood: A Longitudinal Study from Age 27 to 50

    Science.gov (United States)

    Fadjukoff, Päivi; Pulkkinen, Lea; Kokko, Katja

    2016-01-01

    ABSTRACT Longitudinal patterns of identity formation were analyzed in a representative cohort group of Finnish men and women born in 1959 across ages 27, 36, 42, and 50. The data were drawn from the Jyväskylä Longitudinal Study of Personality. Identity status (diffused, moratorium, foreclosed, achieved) from all four ages was available for 172 participants (54% females). Marcia’s Identity Status Interview used in this research included five domains: religious beliefs, political identity, occupational career, intimate relationships, and lifestyle. The findings indicated great variability in identity status across domains at each age level, and the identity trajectories fluctuated from age 27 to 50. The developmental trend from age 27 to 50 was moderately progressive (toward achievement) for the five domains and for overall identity, with the exception of a slightly regressive trend in male religious identity. Remaining stable in the same status category across the four measurements was rare and emerged only for diffusion in the ideological domains. Women generally outnumbered men in identity achievement at earlier ages, but the gender differences diminished in most domains at age 50, except in religious identity. In women overall diffusion decreased over time, but in men it remained at about 20% at ages 42 and 50. PMID:27019650

  11. Perancangan Corporate Identity Brotherwood Decoration

    OpenAIRE

    Ciputra, Ongky Permana; Bangsa, Petrus Gogor; Christianna, Aniendya

    2015-01-01

    Sebagai Perusahaan interior di Surabaya, “BROTHERWOOD” sedang membangun citra positif melalui penguatan corporate identity secara menyeluruh.Oleh karena itu “Brotherwood” memerlukan corporate identity dan mengaplikasikannya pada media promosi dan informasi yang sesuai dengan karakter dari target audience dan target market-nya.Dengan menggunakan corporate identity diharapkan “Brotherwood” menjadi lebih dikenal oleh target audience dan target market-nya sehingga membuat market “Brotherwood” men...

  12. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  13. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... fertility preservation is important. These key points can help start the conversation: Cancer and cancer treatment may ... several resources listed on the reverse that can help you locate a fertility preservation specialist to discuss ...

  14. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... fertility preservation center closest to you Visit the Pediatric Oncofertility Research Foundation Visit the Patient Navigator Website ... Ginsberg JP. New advances in fertility preservation for pediatric cancer patients. Curr Opin Pediatr. 2010;23:9- ...

  15. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Cancer Ask Your Doctor Information for Patients Many adult survivors of childhood cancer feel fertility preservation and ... Fertility preservation and adolescent cancer patients: lessons from adult survivors of childhood cancer and their parents. Cancer ...

  16. 76 FR 60754 - Preserving the Open Internet

    Science.gov (United States)

    2011-09-30

    ...-201] Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION: Final rule..., 2011, a document establishing rules to preserve the open Internet. Inadvertently the wrong paragraph... alleging violations of the open Internet rules. Federal Communications Commission. Matt Warner, Attorney...

  17. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... available and having your child see a reproductive specialist in a timely manner can improve their future ... Can you refer us to a fertility preservation specialist to discuss my child’s options further? Fertility Preservation - ...

  18. A Holistic Approach to Bit Preservation

    DEFF Research Database (Denmark)

    Zierau, Eld Maj-Britt Olmütz

    2011-01-01

    This thesis presents three main results for a holistic approach to bit preservation, where the ultimate goal is to find the optimal bit preservation strategy for specific digital material that must be digitally preserved. Digital material consists of sequences of bits, where a bit is a binary digit...... which can have the value 0 or 1. Bit preservation must ensure that the bits remain intact and readable in the future, but bit preservation is not concerned with how bits can be interpreted as e.g. an image. A holistic approach to bit preservation includes aspects that influence the final choice of a bit...... a holistic approach and include aspects of digital representation, confidentiality, availability, bit safety and costs when defining requirements for the bit preservation. Analysis of such requirements and choice of the final bit preservation solution can be supported by the three main results presented...

  19. Prolonged platelet preservation by transient metabolic suppression

    NARCIS (Netherlands)

    Badlou, Bahram Alamdary

    2006-01-01

    Introduction: Different clinical studies have shown that transfusion of stored platelets results in better haemostasis in patients with thrombocytopenia with and without a platelet function defect. Objectives: Current preservation procedures aim to optimally preserve the metabolic status of

  20. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... JP, Kolon TF. Fertility Preservation in Children and Adolescents With Cancer . Urology. 2016;91:190-6. Loren ... 10. Nieman CL, et al. Fertility preservation and adolescent cancer patients: lessons from adult survivors of childhood ...

  1. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... be fertility preservation options available and having your child see a reproductive specialist in a timely manner ... there are options for preserving fertility in your child diagnosed with cancer. You may be focused on ...

  2. Discount cosmetic surgery: industry trends and strategies for success.

    Science.gov (United States)

    Krieger, Lloyd M

    2002-08-01

    Discount cosmetic surgery is a topic of interest to plastic surgeons. To understand this trend and its effects on plastic surgeons, it is necessary to review the economics of cosmetic surgery, plastic surgery's practice environment, and the broader business principles of service industries. Recent work looked at the economics of the plastic surgery market. This analysis demonstrated that increased local density of plastic surgeons was associated with lower adjusted fees for cosmetic procedures. A survey of plastic surgeons about their practice environment revealed that 93 percent categorized the majority of their patients as very or moderately price-sensitive. Fully 98 percent described their business climate as very or moderately competitive and most plastic surgeons thought they lost a sizable number of cosmetic patients within the last year for reasons of price.A standard industry analysis, when applied to cosmetic surgery, reveals the following: an increased number of surgeons leads to lower fees (reducing their bargaining power as suppliers), patients are price-sensitive (increasing their bargaining power as buyers), and there are few barriers to entry among providers (allowing potential new entrants into the market). Such a situation is conducive to discounting taking hold-and even becoming the industry norm. In this environment, business strategy dictates there are three protocols for success: discounting, differentiation, and focus. Discounting joins the trend toward cutting fees. Success comes from increasing volume and efficiency and thus preserving profits. Differentiation creates an industrywide perception of uniqueness; this requires broadly positioning plastic surgeons as holders of a distinct brand identity separate from other "cosmetic surgeons." The final strategy is to focus on a particular buyer group to develop a market niche, such as establishing a "Park Avenue" practice catering to patients who demand a prestigious surgeon, although this is

  3. Elevate and Uterine Preservation: Two-Year Results.

    Science.gov (United States)

    Stanford, Edward J; Moore, Robert D; Roovers, Jan-Paul W R; VanDrie, Douglas M; Giudice, Thomas P; Lukban, James C; Bataller, Eduardo; Sutherland, Suzette E

    2015-01-01

    To evaluate efficacy of the Elevate Anterior and Apical (EAA) in the repair of pelvic organ prolapse (POP) when performed after previous hysterectomy and with or without uterine preservation during POP surgery. One hundred forty-two women with anterior vaginal prolapse and/or apical descent ≥ stage II were enrolled. The primary outcome was treatment failure defined as > stage II POP-Q during follow-up using the Last observed Failure Carried Forward method. Three sub-groups were analysed: baseline previous hysterectomy (N = 61); concomitant hysterectomy (N = 29), and preserved uterus/no hysterectomy (N = 51). Demographics, primary and secondary outcomes, and extrusion were compared between the groups. A P value less than 0.05 was considered statistically significant. Anatomic success shows significant and durable improvement at 24 months. The success for the apical compartment ranged between 93.8% and 100%. Success was slightly lower for the anterior compartment (70.8-89.1%). No statistically significant difference between the 3 subgroups. Age was the only patient characteristic to be found different between the 3 subgroups. In addition, there was no difference in overall intraoperative complications (P = 0.263). Mesh extrusion was found in all groups: 3 of 61 (4.9%) had previous hysterectomy; 4 of 29 (13.8%) had concomitant hysterectomy; and 1 of 51 (2.0%) had uterus preserved (P = 0.094). There appears to be a trend toward higher extrusion when a hysterectomy was performed with the EAA. Anatomic success and complications for the EAA do not appear to be significantly impacted when the uterus is removed before or during surgery or preserved. There may be a trend toward increased mesh extrusion when a hysterectomy is performed. However, larger cohort studies are needed to determine if concomitant hysterectomy impact extrusion.

  4. Constructing leadership identities through stories

    DEFF Research Database (Denmark)

    Frimann, Søren; Hersted, Lone

    2016-01-01

    This article analyzes the construction of leadership identities through stories found in four narrative interviews from a qualitative study and leadership development project based on social constructionism and action learning. We argue that leadership development and the construction of leadership...... that the concept of coauthoring is useful in developing leadership and leadership identities through reflexive dialogs and emerging stories....... identities in a postmodern paradigm are based on the negotiation and co-construction of meanings, relationships, and stories. The following questions are investigated: What happens when a group of leaders from different organizations construct, deconstruct, and reconstruct their identity as leaders through...

  5. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  6. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  7. Creating preservation metadata from XML-metadata profiles

    Science.gov (United States)

    Ulbricht, Damian; Bertelmann, Roland; Gebauer, Petra; Hasler, Tim; Klump, Jens; Kirchner, Ingo; Peters-Kottig, Wolfgang; Mettig, Nora; Rusch, Beate

    2014-05-01

    Registration of dataset DOIs at DataCite makes research data citable and comes with the obligation to keep data accessible in the future. In addition, many universities and research institutions measure data that is unique and not repeatable like the data produced by an observational network and they want to keep these data for future generations. In consequence, such data should be ingested in preservation systems, that automatically care for file format changes. Open source preservation software that is developed along the definitions of the ISO OAIS reference model is available but during ingest of data and metadata there are still problems to be solved. File format validation is difficult, because format validators are not only remarkably slow - due to variety in file formats different validators return conflicting identification profiles for identical data. These conflicts are hard to resolve. Preservation systems have a deficit in the support of custom metadata. Furthermore, data producers are sometimes not aware that quality metadata is a key issue for the re-use of data. In the project EWIG an university institute and a research institute work together with Zuse-Institute Berlin, that is acting as an infrastructure facility, to generate exemplary workflows for research data into OAIS compliant archives with emphasis on the geosciences. The Institute for Meteorology provides timeseries data from an urban monitoring network whereas GFZ Potsdam delivers file based data from research projects. To identify problems in existing preservation workflows the technical work is complemented by interviews with data practitioners. Policies for handling data and metadata are developed. Furthermore, university teaching material is created to raise the future scientists awareness of research data management. As a testbed for ingest workflows the digital preservation system Archivematica [1] is used. During the ingest process metadata is generated that is compliant to the

  8. Preservation management for libraries, archives and museums

    CERN Document Server

    Gorman, G E

    2006-01-01

    Memory institutions such as libraries, archives, galleries and museums all share pressing concerns about preserving heritage. This book charts the diversity of preservation management in the contemporary information landscape, and offers guidance on preservation methods for the sustainability of collections from a range of international experts.

  9. Orthogonality preserving infinite dimensional quadratic stochastic operators

    International Nuclear Information System (INIS)

    Akın, Hasan; Mukhamedov, Farrukh

    2015-01-01

    In the present paper, we consider a notion of orthogonal preserving nonlinear operators. We introduce π-Volterra quadratic operators finite and infinite dimensional settings. It is proved that any orthogonal preserving quadratic operator on finite dimensional simplex is π-Volterra quadratic operator. In infinite dimensional setting, we describe all π-Volterra operators in terms orthogonal preserving operators

  10. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... website. Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open ... Diagnosed with Cancer You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation ...

  11. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open menu ... with Cancer You are here Home » Patients Fertility Preservation for Children Diagnosed with Cancer Fertility Preservation for ...

  12. 32 CFR 174.18 - Historic preservation.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Historic preservation. 174.18 Section 174.18... Historic preservation. (a) The transfer, lease, or sale of National Register-eligible historic property to... the regulations implementing the National Historic Preservation Act (36 CFR 800.5(a)(2)(vii)). One way...

  13. 76 FR 74721 - Preserving the Open Internet

    Science.gov (United States)

    2011-12-01

    ...; Report No. 2936] Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION: Final... for broadband service to preserve and reinforce Internet freedom and openness. DATES: Oppositions to... applicability. Subject: In the Matter of Preserving the Open Internet, Broadband Industry Practices, published...

  14. Comprehensive preserving technique for Chinese chestnut storage

    International Nuclear Information System (INIS)

    Chen Yuntang; Yang Baoan; Zhang Jianwei; Li Qiufang

    2003-01-01

    Chinese chestnut can be preserved for a long time by using a comprehensive preserving technique, which consists of casing, irradiating, treating with preserving agent and controlling environment conditions. The shelftime of the treated chestnuts reaches 11 months keeping no insects, no germination and good quality for eating with the good fruit ratio of 97.5% and water losing ratio of 3.8%

  15. A holistic approach to bit preservation

    DEFF Research Database (Denmark)

    Zierau, Eld

    2012-01-01

    Purpose: The purpose of this paper is to point out the importance of taking a holistic approach to bit preservation when setting out to find an optimal bit preservation solution for specific digital materials. In the last decade there has been an increasing awareness that bit preservation, which ...

  16. Conference Trends in Logic XI

    CERN Document Server

    Wansing, Heinrich; Willkommen, Caroline; Recent Trends in Philosophical Logic

    2014-01-01

    This volume presents recent advances in philosophical logic with chapters focusing on non-classical logics, including paraconsistent logics, substructural logics, modal logics of agency and other modal logics. The authors cover themes such as the knowability paradox, tableaux and sequent calculi, natural deduction, definite descriptions, identity, truth, dialetheism, and possible worlds semantics.   The developments presented here focus on challenging problems in the specification of fundamental philosophical notions, as well as presenting new techniques and tools, thereby contributing to the development of the field. Each chapter contains a bibliography, to assist the reader in making connections in the specific areas covered. Thus this work provides both a starting point for further investigations into philosophical logic and an update on advances, techniques and applications in a dynamic field.   The chapters originate from papers presented during the Trends in Logic XI conference at the Ruhr University ...

  17. Trends in Education.

    Science.gov (United States)

    School Planning & Management, 2002

    2002-01-01

    Several architects, planners, administrators, and contractors answer questions about trends related to school construction, interior design, business, security, and technology. Trends concern funding issues, specialized designs, planning for safety, technological integration, and equity in services. (EV)

  18. Marketing Trends to Watch

    Science.gov (United States)

    Circle, Alison

    2009-01-01

    This article identifies 13 cultural trends that libraries can turn into opportunites to reach patrons. These trends include: Twitter, online reputation management, value added content, mobile marketing, and emotional connection.

  19. Lung Cancer Trends

    Science.gov (United States)

    ... the Biggest Cancer Killer in Both Men and Women” Stay Informed Trends for Other Kinds of Cancer Breast Cervical Colorectal (Colon) Ovarian Prostate Skin Cancer Home Lung Cancer Trends Language: English Español (Spanish) Recommend ...

  20. Radiation preservation of cooked foods

    International Nuclear Information System (INIS)

    Aurangzeb; Bibi, N.; Badshah, A.; Khan, I.

    1989-01-01

    The preservation of irradiated cooked food has been explained in this report under vacuum conditions. The samples were irradiated at dose levels of 7.5 and 10.0 LGy. Measurement of fungal count was carried immediately after irradiation and after each 15 days of storage life upto 60 days of time interval. The samples were evaluated organolepticaly as well. It has been observed that no significance difference was observed among samples of irradiated and vacuum packed controls during storage for 45 days. (A.B.)

  1. Polarization preservation in the AGS

    International Nuclear Information System (INIS)

    Ratner, L.G.

    1983-01-01

    The successful operation of a high energy polarized beam at the Argonne Zero Gradient Synchrotron (ZGS) with the concommitant development of depolarizing resonance correction techniques has led to the present project of commissioning such a beam at the Brookhaven Alternating Gradient Synchrotron (AGS). A description of the project was presented at the 1981 National Accelerator Conference. I would like to now present a more detailed description of how we plan to preserve the polarization during acceleration, and to present our game plan for tuning through some 50 resonances and reaching our goal of a 26 GeV polarized proton beam with greater than 60% polarization

  2. Tensor Train Neighborhood Preserving Embedding

    Science.gov (United States)

    Wang, Wenqi; Aggarwal, Vaneet; Aeron, Shuchin

    2018-05-01

    In this paper, we propose a Tensor Train Neighborhood Preserving Embedding (TTNPE) to embed multi-dimensional tensor data into low dimensional tensor subspace. Novel approaches to solve the optimization problem in TTNPE are proposed. For this embedding, we evaluate novel trade-off gain among classification, computation, and dimensionality reduction (storage) for supervised learning. It is shown that compared to the state-of-the-arts tensor embedding methods, TTNPE achieves superior trade-off in classification, computation, and dimensionality reduction in MNIST handwritten digits and Weizmann face datasets.

  3. Towards a Standard for Provenance and Context for Preservation of Data for Earth System Science

    Science.gov (United States)

    Ramaprian, Hampapuram K.; Moses, John F.

    2011-01-01

    Long-term data sets with data from many missions are needed to study trends and validate model results that are typical in Earth System Science research. Data and derived products originate from multiple missions (spaceborne, airborne and/or in situ) and from multiple organizations. During the missions as well as well past their termination, it is essential to preserve the data and products to support future studies. Key aspects of preservation are: preserving bits and ensuring data are uncorrupted, preserving understandability with appropriate documentation, and preserving reproducibility of science with appropriate documentation and other artifacts. Computer technology provides adequate standards to ensure that, with proper engineering, bits are preserved as hardware evolves. However, to ensure understandability and reproducibility, it is essential to plan ahead to preserve all the relevant data and information. There are currently no standards to identify the content that needs to be preserved, leading to non-uniformity in content and users not being sure of whether preserved content is comprehensive. Each project, program or agency can specify the items to be preserved as a part of its data management requirements. However, broader community consensus that cuts across organizational or national boundaries would be needed to ensure comprehensiveness, uniformity and long-term utility of archived data. The Federation of Earth Science Information Partners (ESIP), a diverse network of scientists, data stewards and technology developers, has a forum for ESIP members to collaborate on data preservation issues. During early 2011, members discussed the importance of developing a Provenance and Context Content Standard (PCCS) and developed an initial list of content items. This list is based on the outcome of a NASA and NOAA meeting held in 1998 under the auspices of the USGCRP, documentation requirements from NOAA and our experience with some of the NASA Earth science

  4. Head Transplants and Personal Identity: A Philosophical and Literary Survey.

    Science.gov (United States)

    Mori, Giuliano

    2016-04-01

    The criterion of personal identity is clearly called into question by the project to perform a human head transplant. Is identity provided by psychological continuity alone, or does it depend on bodily continuity as well? And how do these different perspectives interface with our notion of mind and mind-body relationship? The reader will be provided with a discussion concerning these problems, together with a philosophical and literary survey about the conception of body-mind relationship from the Greek thought to contemporary philosophy. The analysis will conclude with a discussion concerning the possibility to consider the issue of personal identity from a statistic point of view, which privileges the general perception of identity, so as it has been shaped by the cultural trends of the last four centuries. It could hence be argued that personal identity is not something which can be defined once and for all. On the contrary, the general perception of identity is subject to significant alterations resulting from one's cultural environment. However, the cultural environment itself can be changed by particularly notable events, such as, hypothetically, the successful outcome of a human head transplant. © 2016 John Wiley & Sons Ltd.

  5. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  6. Play Memories and Place Identity.

    Science.gov (United States)

    Sandberg, Anette

    2003-01-01

    This retrospective study examined play memories from childhood to adulthood of 478 university students between ages 20 and 62 as exhibited in drawings of play memories and questionnaire responses. The study focused on the role of the physical environment and place identity in play memories and individual identity development. Findings showed that…

  7. Social Identity and Group Contests

    NARCIS (Netherlands)

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social

  8. Identity development in deaf adolescents

    NARCIS (Netherlands)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in 11 deaf adolescents who attend a school for deaf children in the highest level of regular secondary education (age between 14 and 19 years). Identity development is conceptualized by the processes of exploration and commitment formation, as

  9. Exploring Leader Identity and Development.

    Science.gov (United States)

    Priest, Kerry L; Middleton, Eric

    2016-01-01

    Taking on a leader identity can be a motivating force for pursuing leader development. This chapter explores the reciprocal and recursive nature of identity development and leader development, emphasizing how shifting views of self influence one's motivation to develop as a leader. © 2016 Wiley Periodicals, Inc., A Wiley Company.

  10. Gender identity development in adolescence.

    Science.gov (United States)

    Steensma, Thomas D; Kreukels, Baudewijntje P C; de Vries, Annelou L C; Cohen-Kettenis, Peggy T

    2013-07-01

    This article is part of a Special Issue "Puberty and Adolescence".This article aims to provide an outline of what is currently known on trajectories, and contributing factors to gender identity development in adolescence. We give a historical overview of the concept of gender identity, and describe general identity development in adolescence, gender identity development in the general population and in gender variant youth. Possible psychosocial (such as child and parental characteristics) and biological factors (such as the effects of prenatal exposure to gonadal hormones and the role of genetics) contributing to a gender variant identity are discussed. Studies focusing on a number of psychosocial and biological factors separately, indicate that each of these factors influence gender identity formation, but little is known about the complex interplay between the factors, nor about the way individuals themselves contribute to the process. Research into normative and gender variant identity development of adolescents is clearly lagging behind. However, studies on persons with gender dysphoria and disorders of sex development, show that the period of adolescence, with its changing social environment and the onset of physical puberty, seems to be crucial for the development of a non-normative gender identity. Copyright © 2013 Elsevier Inc. All rights reserved.

  11. Generalized Cherednik-Macdonald identities

    NARCIS (Netherlands)

    Stokman, J.V.

    2008-01-01

    We derive generalizations of the Cherednik-Macdonald constant term identities associated to root systems which depend, besides on the usual Multiplicity function, symmetrically on two additional parameters omega +/-. They are natural analogues of the Cherednik-Macdonald constant term q-identities in

  12. Ward identities at finite temperature

    International Nuclear Information System (INIS)

    DOlivo, J.C.; Torres, M.; Tututi, E.

    1996-01-01

    The Ward identities for QED at finite temperature are derived using the functional real-time formalism. They are verified by an explicit one-loop calculation. An effective causal vertex is constructed which satisfy the Ward identity with the associated retarded self-energy. copyright 1996 American Institute of Physics

  13. Modelling the Costs of Preserving Digital Assets

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2012-01-01

    Information is increasingly being produced in digital form, and some of it must be preserved for the longterm. Digital preservation includes a series of actively managed activities that require on-going funding. To obtain sufficient resources, there is a need for assessing the costs...... and the benefits accrued by preserving the assets. Cost data is also needed for optimizing activities and comparing the costs of different preservation alternatives. The purpose of this study is to analyse generic requirements for modelling the cost of preserving digital assets. The analysis was based...

  14. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  15. Ethnic Identities of University Students

    Directory of Open Access Journals (Sweden)

    Gözde Özdikmenli-Demir

    2014-06-01

    Full Text Available The aim of this article is to understand the relationship between ethnic identity, victimization/witnessing community violence, ethnic discrimination, and aggression in a sample of university students living in the South East Region of Turkey. The participants were 263 university students of predominantly Kurdish ethnic origin. The results showed that males had higher levels of ethnic identity in the dimensions of exploration and commitment. Males also presented higher scores for witnessing community violence and lifetime exposure to ethnic discrimination. The most important predictor of participants’ ethnic identity was witnessing community violence. Participants who witnessed violent acts in their social environment had higher ethnic identity levels. Although the predictor variables could not explain an important part of the participants’ aggression levels, only perceived ethnic discrimination was positively related to aggressive behavior. The role of native language efficiency in ethnic identity is also discussed.

  16. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-09-01

    Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work. Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context. Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data. Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance. Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity. Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work.

  17. OAIS and Distributed Digital Preservation in Practice

    DEFF Research Database (Denmark)

    Zierau, Eld

    The aim of the paper is to illustrate how the distributed aspects of digital preservation can be aligned in practice, with the concepts and principles of the Open Archival Information System (OAIS) Reference Model. There has been a growing awareness within the digital preservation community...... of the need for cooperation between organizations to address digital preservation requirements. One common example is that replicas of preservation copies of digital objects need to be independently preserved (e.g., stored, managed, monitored, documented) to ensure that at least one correct replica...... will survive for as long as needed. Such independence can be achieved through distributed digital preservation that relies upon specific agreements between participating and contributing organizations. The OAIS Reference Model does not address the challenges of distributed digital preservation in detail...

  18. Preservation of forest wood chips

    Energy Technology Data Exchange (ETDEWEB)

    Kofman, P.D.; Thomsen, I.M.; Ohlsson, C.; Leer, E.; Ravn Schmidt, E.; Soerensen, M.; Knudsen, P.

    1999-01-01

    As part of the Danish Energy Research Programme on biomass utilisation for energy production (EFP), this project concerns problems connected to the handling and storing of wood chips. In this project, the possibility of preserving wood chips of the Norway Spruce (Picea Abies) is addressed, and the potential improvements by anaerobic storage are tested. Preservation of wood chips aims at reducing dry matter losses from extensive heating during storage and to reduce production of fungal spores. Fungal spores pose a health hazards to workers handling the chips. Further the producers of wood chips are interested in such a method since it would enable them to give a guarantee for the delivery of homogeneous wood chips also during the winter period. Three different types of wood chips were stored airtight and further one of these was stored in accordance with normal practise and use as reference. The results showed that airtight storage had a beneficial impact on the quality of the chips: no redistribution of moisture, low dry matter losses, unfavourable conditions for microbial activity of most fungi, and the promotion of yeasts instead of fungi with airborne spores. Likewise the firing tests showed that no combustion problems, and no increased risk to the environment or to the health of staff is caused by anaerobic storage of wood chips. In all, the tests of the anaerobic storage method of forest wood chips were a success and a large-scale test of the method will be carried out in 1999. (au)

  19. Preserving information in neural transmission.

    Science.gov (United States)

    Sincich, Lawrence C; Horton, Jonathan C; Sharpee, Tatyana O

    2009-05-13

    Along most neural pathways, the spike trains transmitted from one neuron to the next are altered. In the process, neurons can either achieve a more efficient stimulus representation, or extract some biologically important stimulus parameter, or succeed at both. We recorded the inputs from single retinal ganglion cells and the outputs from connected lateral geniculate neurons in the macaque to examine how visual signals are relayed from retina to cortex. We found that geniculate neurons re-encoded multiple temporal stimulus features to yield output spikes that carried more information about stimuli than was available in each input spike. The coding transformation of some relay neurons occurred with no decrement in information rate, despite output spike rates that averaged half the input spike rates. This preservation of transmitted information was achieved by the short-term summation of inputs that geniculate neurons require to spike. A reduced model of the retinal and geniculate visual responses, based on two stimulus features and their associated nonlinearities, could account for >85% of the total information available in the spike trains and the preserved information transmission. These results apply to neurons operating on a single time-varying input, suggesting that synaptic temporal integration can alter the temporal receptive field properties to create a more efficient representation of visual signals in the thalamus than the retina.

  20. Towards Interoperable Preservation Repositories: TIPR

    Directory of Open Access Journals (Sweden)

    Priscilla Caplan

    2010-07-01

    Full Text Available Towards Interoperable Preservation Repositories (TIPR is a project funded by the Institute of Museum and Library Services to create and test a Repository eXchange Package (RXP. The package will make it possible to transfer complex digital objects between dissimilar preservation repositories.  For reasons of redundancy, succession planning and software migration, repositories must be able to exchange copies of archival information packages with each other. Every different repository application, however, describes and structures its archival packages differently. Therefore each system produces dissemination packages that are rarely understandable or usable as submission packages by other repositories. The RXP is an answer to that mismatch. Other solutions for transferring packages between repositories focus either on transfers between repositories of the same type, such as DSpace-to-DSpace transfers, or on processes that rely on central translation services.  Rather than build translators between many dissimilar repository types, the TIPR project has defined a standards-based package of metadata files that can act as an intermediary information package, the RXP, a lingua franca all repositories can read and write.

  1. Brief concept of hip preservation

    Directory of Open Access Journals (Sweden)

    Sanjeev S. Madan

    2017-12-01

    Full Text Available Restoration of the anatomy of the hip joint and biomechanics across it, carry the immense importance to prevent future osteoarthritis of the joint. The aim of this review is to provide the brief concept of the methods to preserve the hip, especially in young adults. Attempts to preserve the hips start with the intense preoperative planning of the corrective procedure. Different parameters regarding the femur and acetabulum in all 3 dimensions need to be assessed. Especially, measurement of the anteversion of the femur and acetabulum is a significant step to avoid osteoarthritis. In addition, the suprapelvic and infrapelvic (spine and lower limb lengths alignment needs to be considered in the planning. Correction of the femoral side of the hip needs the understanding of the blood supply of the proximal femur which carries the risk of avascular necrosis more so with intracapsular osteotomies. Acetabular reorientation, to re-distribute the forces over the weight bearing part, can be carried out with re-directional osteotomy such as periacetabular osteotomy. It needs the understanding of the acetabular anatomy and the force distribution in it. To conclude, correction of both femoral and acetabular side parameters need to be considered in decision making depending on the alterations due to various etiologies causing the hip disorders.

  2. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  3. Nuclear knowledge - Managing for preservation and growth

    International Nuclear Information System (INIS)

    Chidambaram, R.

    2002-01-01

    Full text: The attitude to nuclear energy development in any country is governed by its energy needs, nuclear fuel and human resource access, and its political inclinations and affiliations. Some countries with an already high level of electricity consumption based on fossil fuels or hydro resources and existing nuclear plants (either in their own country or in a neighbouring country), accompanied by a stable or even decreasing population, have not felt for some time the need for new nuclear plants, though this trend appears to be reversing. On the other hand, many developing countries including India consider the growth of nuclear power as essential and inevitable to satisfy their future energy needs. Nuclear reactors and the accompanying fuel cycle facilities constitute a complex technology ensemble, which cannot be handled on a stop-go basis. Also, some large nuclear-developed countries can perhaps get along on a self-reliant basis, but international cooperation is valuable for sharing of knowledge and resources. There is also the political aspect. Genuine proliferation concerns must be addressed but coercive guidelines for nuclear cooperation , which go beyond these concerns, are harmful for the preservation and growth of nuclear knowledge. There are nuclear reactor and fuel cycle technologies which have been around for some time but they still need continuous upgradation, in terms of improved performance or increased safety, and there are emerging advanced nuclear reactor designs, which require new technology generation and transfer to industry. Both of them require continuous inputs from R and D laboratories and these have to come from government-sponsored research because private sector industry generally tends to shy away from R and D with long-range pay-offs. There is another aspect. If nuclear industry is seen in a country to be stagnating - fortunately it is not happening in Asia - attraction to youth in a research career in nuclear technology in that

  4. Supervision of nuclear safety - IAEA requirements, accepted solutions, trends

    International Nuclear Information System (INIS)

    Jurkowski, M.

    2007-01-01

    Ten principles of the nuclear safety, based on the IAEA's standards are presented. Convention on Nuclear Safety recommends for nuclear safety landscape, the control transparency, culture safety, legal framework and knowledge preservation. Examples of solutions accepted in France, Finland, and Czech Republic are discussed. New trends in safety fundamentals and Integration Regulatory Review are presented

  5. Gender identity disorder.

    LENUS (Irish Health Repository)

    De Gascun, C

    2006-05-01

    Gender Identity Disorder (GID) is a relatively rare condition of atypical gender development in which there is a psychological perception of self as masculine or feminine which is incongruent with ones phenotype. GID replaced the term Transsexualism in DSM-IV in 1994. The demographics of GID in Ireland have not been established. Since 2000 we have received 52 referrals of individuals with confirmed GID to our endocrine service for consideration for hormonal treatment (HT). Of the 52 patients 45 have male to female (MTF) GID (mean age 38.9 years) and 7 have female to male (FTM) GID (mean age 30.7 years). The age at presentation in this group is approximately 9 years older than in international series for both MTF (39 years v 30yrs) and FTM (31 yrs v 22yrs). The karyotype where analysed has been normal for their phenotypic sex. Twenty-three of the patients had received HT prior to attending our clinic that in only one case had been prescribed by a specialist. A number of patients had obtained HT via the internet or from overseas sources without medical review. Eighteen of the patients have been or are married and 14 of the group have children. The scale of referrals confirms that GID exists in the Irish population to a significant degree. Thus an appropriate care pathway for people with the condition needs to be established. This will facilitate optimum medical management of the patient group and a coherent approach to the many difficult social issues faced individuals with this disorder.

  6. Body integrity identity disorder.

    Science.gov (United States)

    Blom, Rianne M; Hennekam, Raoul C; Denys, Damiaan

    2012-01-01

    Body Integrity Identity Disorder (BIID) is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation) were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  7. Body integrity identity disorder.

    Directory of Open Access Journals (Sweden)

    Rianne M Blom

    Full Text Available INTRODUCTION: Body Integrity Identity Disorder (BIID is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. METHODS: Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. RESULTS: Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. CONCLUSIONS: The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  8. Is my network module preserved and reproducible?

    Directory of Open Access Journals (Sweden)

    Peter Langfelder

    2011-01-01

    Full Text Available In many applications, one is interested in determining which of the properties of a network module change across conditions. For example, to validate the existence of a module, it is desirable to show that it is reproducible (or preserved in an independent test network. Here we study several types of network preservation statistics that do not require a module assignment in the test network. We distinguish network preservation statistics by the type of the underlying network. Some preservation statistics are defined for a general network (defined by an adjacency matrix while others are only defined for a correlation network (constructed on the basis of pairwise correlations between numeric variables. Our applications show that the correlation structure facilitates the definition of particularly powerful module preservation statistics. We illustrate that evaluating module preservation is in general different from evaluating cluster preservation. We find that it is advantageous to aggregate multiple preservation statistics into summary preservation statistics. We illustrate the use of these methods in six gene co-expression network applications including 1 preservation of cholesterol biosynthesis pathway in mouse tissues, 2 comparison of human and chimpanzee brain networks, 3 preservation of selected KEGG pathways between human and chimpanzee brain networks, 4 sex differences in human cortical networks, 5 sex differences in mouse liver networks. While we find no evidence for sex specific modules in human cortical networks, we find that several human cortical modules are less preserved in chimpanzees. In particular, apoptosis genes are differentially co-expressed between humans and chimpanzees. Our simulation studies and applications show that module preservation statistics are useful for studying differences between the modular structure of networks. Data, R software and accompanying tutorials can be downloaded from the following webpage: http

  9. Ethnocultural identity and induced abortion in Kazakstan.

    Science.gov (United States)

    Agadjanian, V; Qian, Z

    1997-12-01

    This study analyzes ethnic differences in induced abortion among ever-married women in Kazakstan, drawing on data from the 1995 Kazakstan Demographic and Health Survey. Instead of conventional ethnic markers, such as "Kazak" or "Russian," it focuses on more complex ethnocultural identities that combine ascribed ethnicity with language use. Because of the history of russification in Kazakstan, three ethnocultural groups are defined and compared--Kazak women who chose to be interviewed in Kazak, Kazak women who chose to be interviewed in Russian, and women of European background interviewed in Russian. Whereas women of European origin were the most likely to undergo induced abortion, the Russian-interviewed Kazaks had higher abortion ratios and were more likely to terminate their pregnancies than were the Kazak-interviewed Kazaks, net of other characteristics. The implications of the results for induced abortion trends and family planning policy in Kazakstan are discussed in addition to other findings.

  10. Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire.

    Science.gov (United States)

    Scherrer, Kristin S

    2008-10-01

    Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities.

  11. Islamic Identity and Competitive Identities (Global, National and Ethnic Identity; A Case Study of Shiraz University Students

    Directory of Open Access Journals (Sweden)

    Mohammadtaghi Iman

    2013-06-01

    Full Text Available The verse of holy Koran "verily the most honored of you in the sight of Allah is [he who is] the most virtuous of you" directly shows that in god's willing there is no superiority of a man or a group than others except those who have piety to god. In fact, the Islamic identity focuses on the superiority of piety among humans and does not focus on superiority of a man or a group that causes Islamic identity theoretically be against other competitive identities such as ethnic, global and national identity. Therefore, this research aims to study the relationship between Islamic identity and competitive identities (ethnic, national and global. In this way based on Sheldon Stryker theory and survey method, 431 students have elected and have analyzed. The results have shown that there was positive significant relationship between Islamic identity, national and ethnic identity, and negative significant relationship between Islamic identity and global identity. In addition, multivariate regression results have shown that the variables national and global identities have explained 45 percent of the variation of Islamic identity variable. The results shows that national and ethnic identity amplify the Islamic identity and they have positive relationship with it and in fact they are not a competitive identity for Islamic identity but global identity has negative relationship with Islamic identity and therefore it is a competitive identity for Islamic identity.

  12. Invertibility-preserving maps of C∗-algebras with real rank zero

    Directory of Open Access Journals (Sweden)

    Istvan Kovacs

    2005-01-01

    Full Text Available In 1996, Harris and Kadison posed the following problem: show that a linear bijection between C∗-algebras that preserves the identity and the set of invertible elements is a Jordan isomorphism. In this paper, we show that if A and B are semisimple Banach algebras and Φ:A→B is a linear map onto B that preserves the spectrum of elements, then Φ is a Jordan isomorphism if either A or B is a C∗-algebra of real rank zero. We also generalize a theorem of Russo.

  13. New Perspectives of Corporate Identity in Sports Organizations

    Directory of Open Access Journals (Sweden)

    Josef Voráček

    2015-08-01

    Full Text Available This paper deals with the topic of corporate identity in sports. The main objective of this paper is to present new views, trends and tools in building a desirable image for sports organizations using corporate identity tools, including some selected areas relating to the brand. The main points of this paper include corporate design, communication, culture and sports organizations’ product. These tools are all linked and transformed into the creation of a cool brand for a new generation of athletes and consumers – the so-called Generation Y of sports. This group is becoming a new economically important group for many companies in sports, as well as many sports organizations. The Sports industry is heavily dependent on the new generation of athletes in all performance levels, and sport fans. Therefore, it is necessary to constantly be innovating new corporate identity tools with a focus on the sports area.

  14. Identical high- K three-quasiparticle rotational bands

    Energy Technology Data Exchange (ETDEWEB)

    Kaur, Harjeet; Singh, Pardeep [Guru Nanak Dev University, Department of Physics, Amritsar (India)

    2016-12-15

    A comprehensive study of high-K three-quasiparticle rotational bands in odd-A nuclei indicates the similarity in γ-ray energies and dynamic moment of inertia I{sup (2)}. The extent of the identicality between the rotational bands is evaluated by using the energy factor method. For nuclei pairs exhibiting identical bands, the average relative change in the dynamic moment of inertia I{sup (2)} is also determined. The identical behaviour shown by these bands is attributed to the interplay of nuclear structure parameters: deformation and the pairing correlations. Also, experimental trend of the I(ℎ) vs. ℎω (MeV) plot for these nuclei pairs is shown to be in agreement with Tilted-Axis Cranking (TAC) model calculations. (orig.)

  15. Social identity continuity and mental health among Syrian refugees in Turkey.

    Science.gov (United States)

    Smeekes, Anouk; Verkuyten, Maykel; Çelebi, Elif; Acartürk, Ceren; Onkun, Samed

    2017-10-01

    Building upon social psychological work on social identity and mental health, this study among Syrian refugees in Turkey examined the importance of multiple group memberships and identity continuity for mental health and well-being. A survey study was conducted among the very difficult to reach population of Syrian refugees (N = 361). With path analysis in AMOS the associations were examined between multiple group memberships, social identity continuity and mental health and psychological well-being. Indicate that belonging to multiple groups before migration was related to a higher likelihood of having preserved group memberships after migration (i.e., sense of social identity continuity), which, in turn, predicted greater life satisfaction and lower levels of depression. Multiple group membership, however, was also directly related to higher depression. Findings are discussed in relation to the importance of multiple group membership and feelings of identity continuity for refugees.

  16. integrated identity and integrated identity and access management

    African Journals Online (AJOL)

    eobe

    Management System (T-IAMS) is a fingerprint biometric database that centrally manages students' identity, course a fingerprint ... registration, library and medical services information. .... based application and a web-based application.

  17. Dynamics of Ethnocultural and Civil Identity of Graduates of the Russian Higher Education Institutions Abroad

    Directory of Open Access Journals (Sweden)

    Dergunova Nina Vladimirovna

    2015-12-01

    Full Text Available Emigration of graduates of the Russian higher education institutions abroad has become the constant phenomenon of modern life. Creation of the social mobility conditions by the higher school emphasizes the problem of preserving ethnocultural identity by emigrants and their positive attitude to Russia. The paper shows the results of the field sociological studies (internet poll and focus group on the graduates of the Russian higher education institutions who currently live in Germany. The objective of these studies has been to investigate the tendencies of a change of the sociocultural and civil identity of the Russian-speaking youth abroad. The wave-like nature of the dynamics of the ethnocultural identification of the 8-year residence abroad is found, and four different models of the behavior of young migrants concerning the sociocultural adaptation and the preservation of ethnocultural identity are described. Two characteristics are used as the criteria for the models’ identification: “success” and “not success” in the adaptation to the sociocultural life in Germany and a strategy of the preservation of enthocultural identity. Based on them, first, the small group of young migrants who experience problems in the intercultural communication and adaptation and who feel their Russianness, home-sickness is separated. Other three different models of behavior are typical for the young Russian-speaking migrants successful from a standpoint of adaptation but they demonstrate diverse forms of the preservation of enthocultural identity. One of these three groups additionally reveals a negative civil identity to Russia. The studies also reveal the negative attitude of the Russian-speaking youth to collective forms of preservation of cultural identity and to the Russian diaspora aged over 50 years old. The forms of the preservation of ethnocultural identity of the youth to a greater extent have individual character with use of modern

  18. Perancangan Corporate Identity Astro Rent Car Surabaya

    OpenAIRE

    Gunardi, Yohanes Calvin; Negara, I Nengah Sudika; Aryanto, Hendro

    2017-01-01

    Corporate Identity merupakan hal yang krusial dalam perkembangan sebuah Perusahaan dalam segi internal maupun eksternal. Dalam membuat perancangan Corporate identity yang efektif, perancangan ini menampilkan segala teori dan ilmu yang berhubungan dengan Corporate identity. Dengan adanya perancangan ini diharapkan para pembaca mengerti betapa pentingnya peran sebuah corporate identity yang tepat dan mengena.Kata kunci: corporate identity, Astro, logo.

  19. The challenge of plural identity

    Directory of Open Access Journals (Sweden)

    Jovanović Bojan

    2005-01-01

    Full Text Available The complexity of collective existence is expressed through an awareness of its real identity, which then entails an appropriate attitude towards its own negativity. Within the hierarchically structured identity, different levels of its generality make it possible to consider them as factors of a plural reality. If negativity is raised to consciousness, then its dark side is dismantled. Thus, instead of being a factor of conflict, negativity becomes an element of complementariness and a factor in the construction of a shared identity at a higher level of generality.

  20. Identity In and Around Organisations

    DEFF Research Database (Denmark)

    Schultz, Majken; Maguire, Steve

    2013-01-01

    concept may not be the best way of approaching and managing your organisation. Rather, Majken Schultz and Steve Maguire argue that organisations would benefit from adopting a process-based view of identity, which integrates history, ongoing change and market instability into its definition.......At the heart of any successful organisation lies a powerful conception of identity: the coherent way in which it presents itself to its stakeholders and employees, containing its purpose, goals and key characteristics. However, the traditional idea of identity as a stable, solid and reliable...

  1. Correlation-Preserving Photo Collage.

    Science.gov (United States)

    Liu, Lingjie; Zhang, Hongjie; Jing, Guangmei; Guo, Yanwen; Chen, Zhonggui; Wang, Wenping

    2017-05-12

    A new method is presented for producing photo collages that preserve content correlation of photos. We use deep learning techniques to find correlation among given photos to facilitate their embedding on the canvas, and develop an efficient combinatorial optimization technique to make correlated photos stay close to each other. To make efficient use of canvas space, our method first extracts salient regions of photos and packs only these salient regions. We allow the salient regions to have arbitrary shapes, therefore yielding informative, yet more compact collages than by other similar collage methods based on salient regions. We present extensive experimental results, user study results, and comparisons against the state-of-the-art methods to show the superiority of our method.

  2. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...... data is anonymized in the system using data cloaking and data swapping techniques. Finally, the paper empirically demonstrates that the proposed system is effective and feasible....

  3. Radiations to preserve world heritage

    International Nuclear Information System (INIS)

    Hurel, T.

    2017-01-01

    This article details the use of radiation to preserve the archaeological and artistic heritage. Gamma radiations are used to kill living organisms (insects, fungi and moulds) and to solidify styren-polyester resins that may be injected in wood items to reinforce them. Neutron irradiations are used to reveal the structure of an item and to get information on the materials the item is made of. Both irradiations are non-destructive. Carbon 14 dating is efficient to age items but beyond 50.000 years the method becomes ineffective and other methods like thermoluminescence take over. For instance it is the thermoluminescence method applied on flints found on the Jebel Irhoud site (Morocco) that has allowed to push back the age of the first Homo Sapiens by 100.000 years to reach 300.000 years. (A.C.)

  4. [Chemotherapy and women fertility preservation].

    Science.gov (United States)

    Gauthier, Tristan; Piver, Pascal; Durand, Lise-Marie; Donadel, Lorène; Pech, Jean-Christophe; Roux, Christophe; Aubard, Yves

    2010-01-01

    Agressive chemotherapy can lead to premature ovarian failure and loss of fertility in women and children. Embryo cryopreservation is an established clinical procedure of fertility preservation but with several limitations. Others options are available. Cryopreservation ovarian cortex tissu have to be suggested in case of high gonadotoxic treatment. It doesn't require puberty and delay in initiation of chemotherapy. The first birth in France after orthotopic graft of ovarian tissu thawed have been recently described with a promising process. Oocyte cryopreservation is available for women without partner but the experience is limited. Gonadotrophin-releasing hormone (GnRH) agonist therapy as ovarian protectants seem interesting. Follicular growth and maturation in vitro are still experimental. Copyright 2010 Elsevier Masson SAS. All rights reserved.

  5. Saliva Preservative for Diagnostic Purposes

    Science.gov (United States)

    Pierson, Duane L.; Mehta, Satish K.

    2012-01-01

    Saliva is an important body fluid for diagnostic purposes. Glycoproteins, glucose, steroids, DNA, and other molecules of diagnostic value are found in saliva. It is easier to collect as compared to blood or urine. Unfortunately, saliva also contains large numbers of bacteria that can release enzymes, which can degrade proteins and nucleic acids. These degradative enzymes destroy or reduce saliva s diagnostic value. This innovation describes the formulation of a chemical preservative that prevents microbial growth and inactivates the degradative enzymes. This extends the time that saliva can be stored or transported without losing its diagnostic value. Multiple samples of saliva can be collected if needed without causing discomfort to the subject and it does not require any special facilities to handle after it is collected.

  6. Preserving experience through expert systems

    International Nuclear Information System (INIS)

    Jelinek, J.B.; Weidman, S.H.

    1989-01-01

    Expert systems technology, one of the branches in the field of computerized artificial intelligence, has existed for >30 yr but only recently has been made available on commercially standard hardware and software platforms. An expert system can be defined as any method of encoding knowledge by representing that knowledge as a collection of facts or objects. Decisions are made by the expert program by obtaining data about the problem or situation and correlating encoded facts (knowledge) to the data until a conclusion can be reached. Such conclusions can be relayed to the end user as expert advice. Realizing the potential of this technology, General Electric (GE) Nuclear Energy (GENE) has initiated a development program in expert systems applications; this technology offers the potential for packaging, distributing, and preserving nuclear experience in a software form. The paper discusses application fields, effective applications, and knowledge acquisition and knowledge verification

  7. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    with any other entity, including the service provider. Such privacy concerns lead to trust issues between entities, which clearly damages the functioning of the service and even blocks cooperation between entities with similar data sets. To enable joint efforts with private data, we propose a protocol......, or in some cases, information from different databases is pooled to enrich the data so that the merged database can improve the clustering effort. However, in either case, the content of the database may be privacy sensitive and/or commercially valuable such that the owners may not want to share their data...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  8. SMART PACKAGING FOR FOOD PRESERVATION

    Directory of Open Access Journals (Sweden)

    Raquel Rodríguez-Sauceda

    2014-07-01

    Full Text Available One of the biggest challenges of the food industry is the preservation of its products, that is, to prevent them from being attacked by microorganisms that decompose them hauling economic losses and severe health damage to the consumer. Today, competition in the food industry is very high and any company that does not offer the quality products is doomed to fail. Consumers demand more and the industry still stands offering what is asked: quality, security and safety. The package, in addition to fulfilling its core functions is becoming a means of sophisticated interactions with content and a record of relevant information for both the end consumer and intermediate players in the value chain and concepts are born of active and intelligent packaging. A smart container is defined as a system that monitors the condition of the packaged product, being able to register and provide information about product quality or condition of the container, showing the possible "abnormal" practices that have suffered the product or the container during the entire supply chain, such as transportation or storage. These systems monitor the mechanisms of altered food due to physiological, chemical and biological processes that respond and communicate changes in the status of the product as time-temperature, Oxygen, Carbon dioxide, microbial growth, etc. There are different types of smart packaging such as time-temperature indicators, color indicators, indicators of pathogens and indicators of leaks, to name a few. Through literature review, arguments that demonstrate the usefulness and necessity of the use of smart packaging to preserve the quality and safety of the product it contains, from manufacturing to the time it is used by consumers were found, as these besides communicating or providing information about their state, acting as a marketing tool.

  9. Preserving the collective memory and re-creating identity through animation

    DEFF Research Database (Denmark)

    Carpe Pérez, Inmaculada Concepción; Pedersen, Hanne

    of the autobiographic memory and documentary through animation techniques. When we produce an animated film, we can appreciate how the creation of characters and scenarios are transformed into visual metaphors, making possible the re-creation of past moments or the simulation of possible ones. We experience, thanks...

  10. ALEKSANDRA PODHORECKA - A GREAT ACTIVIST IN PRESERVING NATIONAL IDENTITY OF YOUNG POLES’ GENERATION ABROAD

    Directory of Open Access Journals (Sweden)

    Olga Zamecka-Zalas

    2017-04-01

    Full Text Available Bringing up the generation of young Poles, who were born and educated in free democratic world in the spirit of patriotism, who were aware of their roots, who spoke Polish and knew the Polish culture, was a very difficult task to undertake by the Polish community in exile after the Second World War. This task was tackled by many Polish people residing in Great Britain with Aleksandra Podhorecka among them. As the title implies the article describes the issue of upbringing of young Poles abroad which is still relevant. The aim of the article is to introduce Aleksandra Podhorecka as an educator, a teacher, and a journalist, who has been involved and still plays an important role in the educating Polish children and young people in the UK. The article outlines the main facts of Aleksandra Podhorecka’s life and activities. She was a teacher, an education activist and a long-standing headmistress of Polish School Motherland, an organization which ran schools of mother tongue for Polish emigrants’ children. In addition, she was a journalist for a number of magazines for children such as “Dziatwa” (“Children” and “Razem Młodzi Przyjaciele” (“Together Young Friends”. She also published curriculums, textbooks, journals, information bulletins, methodological tutorials for teachers and parents. She tried to make young people closer to each other so that they could be proud of being Poles. The main task of PSM was to bring up young Poles on the principles of Christianity and it has been unchangeable for many years. PSM works in different branches which include Polish Saturday School, meetings and competitions, a bookshop in POSK in London. Thanks to Aleksandra Podhorecka the popularity of PSM increased. Every year about twenty thousand of Polish children are born in the UK. Due to Aleksandra Podhorecka’s activities they have an opportunity to learn the Polish language and take an active part in the life of their native country.

  11. 37 CFR 10.112 - Preserving identity of funds and property of client.

    Science.gov (United States)

    2010-07-01

    ... and property of client. 10.112 Section 10.112 Patents, Trademarks, and Copyrights UNITED STATES PATENT... funds and property of client. (a) All funds of clients paid to a practitioner or a practitioner's firm... therein. (2) Funds belonging in part to a client and in part presently or potentially to the practitioner...

  12. On the Nature of Trends

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    2010-01-01

    A consolidation of the field Trend Studies through mapping, updating and developing trend theory.......A consolidation of the field Trend Studies through mapping, updating and developing trend theory....

  13. Energy Trends 2012; Energie Trends 2012

    Energy Technology Data Exchange (ETDEWEB)

    Van Dril, T. (ed.); Gerdes, J. (ed.) [ECN Beleidsstudies, Petten (Netherlands); Marbus, S. (ed.) [Energie-Nederland, Den Haag (Netherlands); Boelhouwer, M. (ed.) [Netbeheer Nederland, Arnhem (Netherlands)

    2012-11-15

    In Energy Trends 2012, all figures and developments in the field of energy in the Netherlands are presented in conjunction. The book provides information on energy use by consumers and businesses, provides insight into the international energy trade, energy production and development of energy networks [Dutch] In Energie Trends 2012 staan alle cijfers en ontwikkelingen op het gebied van energie in Nederland in samenhang gepresenteerd. Het boek biedt informatie over energiegebruik door consumenten en bedrijven, geeft inzage in de internationale energiehandel en energieproductie en biedt inzicht in de ontwikkeling van de energienetten.

  14. Towards Building a Blog Preservation Platform

    CERN Document Server

    Kasioumis, Nikos; Kalb, Hendrik

    2014-01-01

    Social media content and user participation has increased dramatically since the advent of Web 2.0. Blogs have become relevant to every aspect of business and personal life. Nevertheless, we do not have the right tools to aggregate and preserve blog content correctly, as well as to manage blog archives effectively. Given the rising importance of blogs, it is crucial to build systems to facilitate blog preservation, safeguarding an essential part of our heritage that will prove valuable for current and future generations. In this paper, we present our work in progress towards building a novel blog preservation platform featuring robust digital preservation, management and dissemination facilities for blogs. This work is part of the BlogForever project which is aiming to make an impact to the theory and practice of blog preservation by creating guidelines and software that any individual or organization could use to preserve their blogs.

  15. Preservation Copying Endangered Historic Negative Collections

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad

    2008-01-01

    This article discusses preservation copying of unstable B&W nitrate and acetate still photographic negatives. It focuses on evaluating two different strategies for preserving the copies from a point of view of quality and cost-effectiveness. The evaluated strategies are preservation of the master...... by describing essential characteristics of negatives, which must be passed on to the copies, and the required metadata and technical imaging specifications. Next the paper discusses strategies for preservation and makes an analysis with the LIFE2 Costing Model. The paper concludes that the most beneficial...... and cost-effective preservation solution for large format negatives is to keep the preservation copies as digital files. However, it also acknowledges that it is important to revisit such strategies regularly to monitor changes in user expectations, technologies and costs....

  16. Common Law, Mountain Music, and the Construction of Community Identity

    DEFF Research Database (Denmark)

    Jenkins, Christopher David

    2010-01-01

    preserve a backward-looking, cultural memory at the same time as they accommodate gradual changes in social conditions. Thus, this comparison argues that these essentially unwritten legal and musical traditions similarly transcend geographical and temporal distances, reflect and influence normative...... attitudes, and rely upon relatively open communicative processes in transmitting their core information. As living traditions, then, the common law and Appalachian folk music open small but important spaces for pluralistic discourse, where social conflicts can be reconciled over time and new identities...

  17. Conceptual Paper: Digital Preservation Strategies in Archival Institution

    OpenAIRE

    Ismail Adila; Bullah Affandy Habee

    2018-01-01

    In this paper, the overall overview of concept of preservation regardless if it is preservation of physical records/archives or digital records/archives is discussed. The concept of the preservation discussed includes preventive preservation, restorative preservation, and content preservation. Then the concept of digital preservation. Furthermore, this paper highlighted the strategies and methods used in implementing the preservation of digital records/archives. The issues those are involved ...

  18. Unhealthy Paradoxes of Healthy Identities

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2003-01-01

    textabstractComparative cross-cultural studies and identity research in social psychology focused on national and organizational differences, clashes and dimensions (Hofstede, Barsoux & Schneider, Jackson, Ward, Bochner & Furnham, Capoza & Brown). Mapping cultural software of individuals and

  19. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  20. Unskilled Work and Learner Identity

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2014-01-01

    . The main argument is that participation research must abandon the notion of motivation as an individual attribute and apply a dialectic concept of learner identity acknowledging work-life as a pivotal space for learning and formation of identity. I outline how a work-life-historical approach combining......The paper examines how unskilled work forms conditions for meeting the obligation to position oneself as an educable subject and engage in formal learning activities. Sensitivity to peoples’ work-life-experiences is necessary to understand their orientation toward different learning activities...... a critical theoretical approach inspired by Salling-Olesen’s and Archer’s concepts of identity and concerns can contribute to an understanding of the relationship between work and learner identity. Through narrative work-life interviews I examine how engagement in unskilled work in small and medium sized...

  1. Culture, Identity and the Curriculum.

    Science.gov (United States)

    Burtonwood, Neil

    1996-01-01

    Critiques recent versions of pluralism by examining the concepts of culture and identity underlying them. Proposes a model of education that rejects cultural transmission in favor of a transformational curriculum that goes beyond culture. (SK)

  2. Human Rights and Cultural Identity

    Directory of Open Access Journals (Sweden)

    John-Stewart Gordon

    2015-12-01

    Full Text Available Universal human rights and particular cultural identities, which are relativistic by nature, seem to stand in conflict with each other. It is commonly suggested that the relativistic natures of cultural identities undermine universal human rights and that human rights might compromise particular cultural identities in a globalised world. This article examines this supposed clash and suggests that it is possible to frame a human rights approach in such a way that it becomes the starting point and constraining framework for all non-deficient cultural identities. In other words, it is possible to depict human rights in a culturally sensitive way so that universal human rights can meet the demands of a moderate version of meta-ethical relativism which acknowledges a small universal core of objectively true or false moral statements and avers that, beyond that small core, all other moral statements are neither objectively true nor false.

  3. Science Identity in Informal Education

    Science.gov (United States)

    Schon, Jennifer A.

    The national drive to increase the number of students pursuing Science Technology, Engineering, and Math (STEM) careers has brought science identity into focus for educators, with the need to determine what encourages students to pursue and persist in STEM careers. Science identity, the degree to which students think someone like them could be a scientist is a potential indicator of students pursuing and persisting in STEM related fields. Science identity, as defined by Carlone and Johnson (2007) consists of three constructs: competence, performance, and recognition. Students need to feel like they are good at science, can perform it well, and that others recognize them for these achievements in order to develop a science identity. These constructs can be bolstered by student visitation to informal education centers. Informal education centers, such as outdoor science schools, museums, and various learning centers can have a positive impact on how students view themselves as scientists by exposing them to novel and unique learning opportunities unavailable in their school. Specifically, the University of Idaho's McCall Outdoor Science School (MOSS) focuses on providing K-12 students with the opportunity to learn about science with a place-based, hands-on, inquiry-based curriculum that hopes to foster science identity development. To understand the constructs that lead to science identity formation and the impact the MOSS program has on science identity development, several questions were explored examining how students define the constructs and if the MOSS program impacted how they rate themselves within each construct. A mixed-method research approach was used consisting of focus group interviews with students and pre, post, one-month posttests for visiting students to look at change in science identity over time. Results from confirmatory factor analysis indicate that the instrument created is a good fit for examining science identity and the associated

  4. Privacy Preservation in Distributed Subgradient Optimization Algorithms

    OpenAIRE

    Lou, Youcheng; Yu, Lean; Wang, Shouyang

    2015-01-01

    Privacy preservation is becoming an increasingly important issue in data mining and machine learning. In this paper, we consider the privacy preserving features of distributed subgradient optimization algorithms. We first show that a well-known distributed subgradient synchronous optimization algorithm, in which all agents make their optimization updates simultaneously at all times, is not privacy preserving in the sense that the malicious agent can learn other agents' subgradients asymptotic...

  5. Knowledge preservation strategies for nuclear power plants

    International Nuclear Information System (INIS)

    Koruna, S.; Bachmann, H.

    2004-01-01

    The nuclear industry is currently facing several challenges. An internal threat to the safety and operations of nuclear power plants is the loss of those employees who hold knowledge that is either critical to operations or safety. This report discusses the possibilities to preserve knowledge in nuclear power plants. Dependent on the degree of tacitness two different knowledge preservation strategies can be discerned: personalization and codification. The knowledge preservation activities discussed are valued according to the criteria: cost, immediacy of availability and completeness

  6. Ward identities for conformal models

    International Nuclear Information System (INIS)

    Lazzarini, S.; Stora, R.

    1988-01-01

    Ward identities which express the symmetry of conformal models are treated. Diffeomorphism invariance or locally holomorphic coordinate transformations are used. Diffeomorphism invariance is then understood in terms of Riemannian geometry. Two different sets of Ward identities expressing diffeomorphism invariance in a conformally invariant way are found for the free bosonic string. Using a geometrical argument, the correct invariance for a large class of conformal models is given

  7. Understanding American Identity: An Introduction

    Science.gov (United States)

    2017-12-01

    this leads to is, how can we begin this transformation ? D. HOW TO GET THERE: PATRIOTIC BUILDING BLOCKS 1. Civic Education Many have argued that civic... transformation of the U.S. public education system and writes, “High schools brought young people together into an adolescent world that helped to obscure...Revamped civic education and national service programs can serve to form those cross-cutting ties. 14. SUBJECT TERMS American identity, national identity

  8. The ambiguous identity of auditing

    DEFF Research Database (Denmark)

    Lindeberg, Tobias

    2007-01-01

    This paper analyses the identity of auditing by comparing performance auditing to financial auditing and programme evaluation. Based on an analysis of textbooks, it is concluded that these evaluative practices are situated on a continuum. This implies that studies that rely on ‘audit’ as a label...... to attribute identity to a distinct evaluative practice become insensitive to issues concerning the relevance of their results to evaluative practices in general and their relation to specific characteristic of certain evaluative practices...

  9. Computer architecture technology trends

    CERN Document Server

    1991-01-01

    Please note this is a Short Discount publication. This year's edition of Computer Architecture Technology Trends analyses the trends which are taking place in the architecture of computing systems today. Due to the sheer number of different applications to which computers are being applied, there seems no end to the different adoptions which proliferate. There are, however, some underlying trends which appear. Decision makers should be aware of these trends when specifying architectures, particularly for future applications. This report is fully revised and updated and provides insight in

  10. ACHP | Sustainability and Historic Preservation Links

    Science.gov (United States)

    Preservation) Solar Panels Incorporating Solar Panels in a Rehabilitation Project (National Park Service ) Installing Solar Panels on Historic Buildings: A Survey of the Regulatory Environment (Department of Energy

  11. Cosmetic preservative labelling on the Thai market.

    Science.gov (United States)

    Bunyavaree, Monthathip; Kasemsarn, Pranee; Boonchai, Waranya

    2016-04-01

    Preservatives are added to cosmetics and other consumer products to prevent microbial growth and product degradation. Many cosmetic preservatives are skin sensitizers and frequent causes of contact dermatitis. The use of preservatives may vary by country and/or region, according to legislation, and may be reflected in differences in the prevalence rates of preservative allergy worldwide. To examine the type and frequency of preservative use in cosmetics sold in Thai markets in metropolitan Bangkok, Thailand. Preservatives contained in 1000 different cosmetics sold in Thai markets were documented and analysed, based on the labelling of ingredients. Most of the cosmetic and skincare products sold in Thai markets were international brands, with only a small proportion of cosmetic products being produced in Thailand. International brand cosmetics were more likely to contain non-formaldehyde-releasing preservatives than domestically produced brands. Isothiazolinone-based preservatives, which are responsible for the current increase in the prevalence of contact allergy, were found at a significant frequency in domestically produced, leave-on cosmetic products. Preservatives in cosmetics were significantly different according to source of production and type of cosmetics. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  12. Flexible Bit Preservation on a National Basis

    DEFF Research Database (Denmark)

    Jurik, Bolette; Nielsen, Anders Bo; Zierau, Eld

    2012-01-01

    In this paper we present the results from The Danish National Bit Repository project. The project aim was establishment of a system that can offer flexible and sustainable bit preservation solutions to Danish cultural heritage institutions. Here the bit preservation solutions must include support...... of bit safety as well as other requirements like e.g. confidentiality and availability. The Danish National Bit Repository is motivated by the need to investigate and handle bit preservation for digital cultural heritage. Digital preservation relies on the integrity of the bits which digital material...

  13. A privacy-preserving framework for outsourcing location-based services to the cloud

    OpenAIRE

    Zhu, Xiaojie; Ayday, Erman; Vitenberg, Roman

    2018-01-01

    Thanks to the popularity of mobile devices a large number of location-based services (LBS) have emerged. While a large number of privacy-preserving solutions for LBS have been proposed, most of these solutions do not consider the fact that LBS are typically cloud-based nowadays. Outsourcing data and computation to the cloud raises a number of significant challenges related to data confidentiality, user identity and query privacy, fine-grain access control, and query expressiveness. In this wo...

  14. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    Science.gov (United States)

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Identity Presentation: The Construction of Identity in Asynchronous Discussion

    Directory of Open Access Journals (Sweden)

    Brian Morgan

    2008-08-01

    Full Text Available This study examines the use of e-mail as a tool for long term discussion between teachers and grade six students. E-mail messages between grade six students and teachers were collected over the course of one academic year. Methods of conversation analysis within a framework of social practice are used to examine the data. While identity is more readily constructed and more fully developed in contexts which allow for physical embodiment such as face-to-face discussion, this analysis found that identity can be constructed in a context that does not provide for the physical embodiment of identity: Identity was constructed using the social, cultural, and technological tools provided and supported by e-mail to develop social practices germane to the e-mail discussion. This study has implications for further understanding the relation between identity, goals, constraints and affordances, and the collaborative creation of social practices in asynchronous computer mediated communication. URN: urn:nbn:de:0114-fqs0803185

  16. VOICES-POSITIONS IN DISCOURSES: HOW IS IDENTITY POSSIBLE?

    Directory of Open Access Journals (Sweden)

    T. V. Podolska

    2017-06-01

    Full Text Available The article is devoted to the question of identity of a modern man which constantly emerges as a powerful wave and is brought up to date with new force. Thus, continuing scientific research on identity and individual identity are being held, but from a different point of view, i.e. by using modernized methodology. The purpose of the research is to substantiate scientific approaches, epistemological coordinate changes, and critical trends in the issue of identity that would allow solving the problems of nature of a modern person being. In this respect the narrative approach is considered to be up-to-date. Methodology. Interdisciplinary research perspective allowed using a comprehensive methodology where, complementing each other, there are phenomenological, cultural, anthropological, hermeneutic, systematic, historical and genetic methods and method historical-philosophical and socio-cultural comparative studies. Originality. Personal being occurs in time, and it’s the narrative method, the main feature of which is its temporality and extension, that can involve all of us to self-understanding on the basis of certain turning points in our history. The compliance with relevant ethical standards in dealing with other people, and requirements of certain supra-individual structures properly correlates with our least resistant inner world view and outlook. As the narrative identity exists in the subjective sense of time, experience and understanding of the events of life, thus, despite the ontogenetic secondary of the personal identity with respect to the social one, the domination of the former one is more probable. Conclusions. The adoption of such an understanding of identity by everyone signifies a high degree of responsibility for self-constructing, which implicitly assumes not just to say “I”, but first of all to define your being as a certain social debt: to another person, to society, its history and everyday life through which we get a

  17. Culture heritage and identity - some cases in Taiwan on the protection of cultural heritage

    Science.gov (United States)

    Wang, R. W.-C.

    2015-09-01

    The protection of cultural heritage relates to an issue of identity. How a nation or a state tries to face to its history is often revealed on the protection of cultural heritage. Taiwan is as a country with complex history, especially the period after World War II. This article will work on some significant cases, regarded as ideological representation of identity. This article works on the cultural identity by observing and analyzing different cases of classified Historic Monuments. In different political periods, we see how the government tries to fabricate on the identity issue by working on Historic Monuments preservation. During the presidency of Chiang Kai-shek and his son Chiang Ching-kuo, the classification of Historic Monuments tried to focus on those make by former Chinese migrants. They tried hard to establish and reaffirm the ever existing "fact" of people in Taiwan. Whereas after the late 1980s and 1990s, after Chiang's reign, local conscience has been awaken. Political ambience turned to a new era. This freedom of speech of post-Chiang's reign encourages people to seek on their identity. The complex political situation of Taiwan makes this seeking cultural identity related to the seeking of independence of Taiwan. The respect to the aboriginal people also reoriented to include the preservation of their tribes and villages.

  18. Culture heritage and identity – some cases in Taiwan on the protection of cultural heritage

    Directory of Open Access Journals (Sweden)

    R. W.-C. Wang

    2015-09-01

    Full Text Available The protection of cultural heritage relates to an issue of identity. How a nation or a state tries to face to its history is often revealed on the protection of cultural heritage. Taiwan is as a country with complex history, especially the period after World War II. This article will work on some significant cases, regarded as ideological representation of identity. This article works on the cultural identity by observing and analyzing different cases of classified Historic Monuments. In different political periods, we see how the government tries to fabricate on the identity issue by working on Historic Monuments preservation. During the presidency of Chiang Kai-shek and his son Chiang Ching-kuo, the classification of Historic Monuments tried to focus on those make by former Chinese migrants. They tried hard to establish and reaffirm the ever existing “fact” of people in Taiwan. Whereas after the late 1980s and 1990s, after Chiang’s reign, local conscience has been awaken. Political ambience turned to a new era. This freedom of speech of post-Chiang’s reign encourages people to seek on their identity. The complex political situation of Taiwan makes this seeking cultural identity related to the seeking of independence of Taiwan. The respect to the aboriginal people also reoriented to include the preservation of their tribes and villages.

  19. Ethical, legal and social issues in restoring genetic identity after forced disappearance and suppression of identity in Argentina.

    Science.gov (United States)

    Penchaszadeh, Victor B

    2015-07-01

    Human genetic identification has been increasingly associated with the preservation, defence and reparation of human rights, in particular the right to genetic identity. The Argentinian military dictatorship of 1976-1983 engaged in a savage repression and egregious violations of human rights, including forced disappearance, torture, assassination and appropriation of children of the disappeared with suppression of their identity. The ethical, legal and social nuances in the use of forensic genetics to support the right to identity in Argentina included issues such as the best interest of children being raised by criminals, the right to learn the truth of one's origin and identity, rights of their biological families, the issue of voluntary versus compulsory testing of victims, as well as the duty of the state to investigate crimes against humanity, punish perpetrators and provide justice and reparation to the victims. In the 30 years following the return to democracy in 1984, the search, localization and DNA testing of disappeared children and young adults has led, so far, to the genetic identification of 116 persons who had been abducted as babies. The high value placed on DNA testing to identify victims of identity suppression did not conflict with the social consensus that personal identity is a complex and dynamic concept, attained by the interaction of genetics with historical, social, emotional, educational, cultural and other important environmental factors. The use of genetic identification as a tool to redress and repair human rights violations is a novel application of human genetics within a developing set of ethical and political circumstances.

  20. Fertility Preservation for Transgender Adolescents.

    Science.gov (United States)

    Chen, Diane; Simons, Lisa; Johnson, Emilie K; Lockart, Barbara A; Finlayson, Courtney

    2017-07-01

    To describe fertility preservation (FP) utilization by transgender adolescents within a pediatric gender clinic between July 2013 and July 2016. A retrospective chart review was conducted to abstract demographic and clinical information among adolescents initiating gender-affirming hormones, including patient age at initial FP consultation, birth-assigned sex, race/ethnicity, and outcome of FP consultation. In our sample of 105 transgender adolescents, a total of 13 (seven transgender men and six transgender women) between the age of 14.2 and 20.6 years were seen in formal consultation for FP before initiating hormones. Of these adolescents, four completed sperm cryopreservation and one completed oocyte cryopreservation. Rates of FP utilization among transgender youth were low, which is consistent with a recently published report of FP utilization among transgender youth at another pediatric institution. Identified barriers to FP in our sample included cost, invasiveness of procedures, and desire not to delay medical transition. Copyright © 2017 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  1. Preserving Data for Renewable Energy

    Science.gov (United States)

    Macduff, M.; Sivaraman, C.

    2017-12-01

    The EERE Atmosphere to Electrons (A2e) program established the Data Archive and Portal (DAP) to ensure the long-term preservation and access to A2e research data. The DAP has been operated by PNNL for 2 years with data from more than a dozen projects and 1PB of data and hundreds of datasets expected to be stored this year. The data are a diverse mix of model runs, observational data, and dervived products. While most of the data is public, the DAP has securely stored many proprietary data sets provided by energy producers that are critical to the research goals of the A2e program. The DAP uses Amazon Web Services (AWS) and PNNL resources to provide long-term archival and access to the data with appropriate access controls. As a key element of the DAP, metadata are collected for each dataset to assist with data discovery and usefulness of the data. Further, the DAP has begun a process of standardizing observation data into NetCDF, which allows users to focus on the data instead of parsing the many formats. Creating a central repository that is in tune with the unique needs of the A2e research community is helping active tasks today as well as making many future research efforts possible. In this presentation, we provide an overview the DAP capabilities and benefits to the renewable energy community.

  2. Food preservation by ionising radiation

    International Nuclear Information System (INIS)

    Andrade, M. E.

    1996-01-01

    The process of food preservation by ionising radiation is an alternative, or a complement, to the traditional methods of heating, refrigerating, freezing or using chemical additives. The study and development of this technique has started on the beginning of the fifties but it is based on the radiation killing effect on micro-organisms discovered by the end of last century. Foodstuffs are treated in appropriate plants: isotopic facilities (gamma radiation) and accelerated electron beams produced by machines called accelerators. The FAO and WHO in close cooperation with the IAEA have played an important role on the development of the process and on the increment of the industrial application of food irradiation. Over the world there are about 37 countries trading foods treated by ionising radiation. However, governments have been slow to clear the utilization of this process. The main reason of this attitude is in general due to the fact that the advantages of the technique are not clearly understood. Therefore, the dissemination of the information could on one hand clarify who has to take decisions and on the other hand support the choice of those foods by the consumers. This is the unique way to dynamize the application of this process

  3. Endothelial cell preservation at hypothermic to normothermic conditions using clinical and experimental organ preservation solutions

    NARCIS (Netherlands)

    Post, Ivo C. J. H.; de Boon, Wadim M. I.; Heger, Michal; van Wijk, Albert C. W. A.; Kroon, Jeffrey; van Buul, Jaap D.; van Gulik, Thomas M.

    2013-01-01

    Endothelial barrier function is pivotal for the outcome of organ transplantation. Since hypothermic preservation (gold standard) is associated with cold-induced endothelial damage, endothelial barrier function may benefit from organ preservation at warmer temperatures. We therefore assessed

  4. Trend Monitoring and Forecasting

    Science.gov (United States)

    2015-03-11

    including breaking news, meme , and commemorative day, on the context patterns. Table 2 shows the example pattern of classifying context pattern feature...used the following rule to find the ‘ meme ’. If the trending topic contains ‘#’ AND ‘subject+verb’, then trending topic is ‘ Meme ’. Table 2 Context

  5. Exploring the identity and "sense of identity" of organisations

    Directory of Open Access Journals (Sweden)

    C L Van Tonder

    2006-04-01

    Full Text Available During the past two decades a steady increase in scholarly contributions in the area of organisation identity have been observed – to the point that the phenomenon is now the subject of a sustainable discourse in several disciplines. Many theoretical and conceptual dilemmas however remain, largely as a result of the low incidence of empirical research in the area. This study reports the results of an exploratory investigation that adapted Schley and Wagenfield’s (1979 concept of identity for use in an organisational setting. Interviews were conducted with 152 top managers representing 10 companies. The results indicate that organisational responses to the question “who am I?�? elicit distinctive organisational self-descriptions and some awareness of identity issues.

  6. World trends from 2017

    Directory of Open Access Journals (Sweden)

    Janković Slobodan

    2016-01-01

    Full Text Available Issue of prognosis, analyses of future trends is companion to statecraft, political, economic and military planning. How we plan, what does IR says about scientific prognosis. Jankovic starts with this set of issues in order to pass into prognosis itself based on observable world trends. He claims that European Union has entered its climax comparing it foreign policy situation with that of war situation of Third Reich in 1943. Article is divided in five parts. After presenting and criticizing Anglo-American approach in prognosis, he starts with analysis of the world order changes, of EU trends, Middle, Far East and some trends regarding Africa. Author presents macro trends in North - West Pacific, in Israel-Palestine, in Syria, Iraq, in Europe.

  7. Identity Memory Constructs - Transition of Dance Body Idioms

    Directory of Open Access Journals (Sweden)

    Sonja Zdravkova Djeparoska

    2014-11-01

    Full Text Available Memory, in particular collective memory, is a process of recording historical events, social changes, as well as identity features of a nation. Memory gets its definition with dance, too. These memory composites are most commonly created with the purpose of highlighting a distinct feature, especially when talking about national memory. Although kinesthetic composition, unlike verbal, is more complex to formulate, standardize and interpret, it has yet created impressive representatives in the field of national culture. One of the most significant and most commonly used symbols of Macedonian identity in the years following establishment of Socialist Republic Macedonia, is the folk dance Teshkoto. It has been used as a repeated emblem in art (literature, painting, sculpturing, music, thus becoming famous countrywide and turning into an idiom of identity. Teshkoto is an example where the very title, as well as the manner of performance, establishes a matrix that is identified with presentation of various historical stages and processes, the Macedonians’ hardships and struggle throughout the centuries. Unlike this example, we have recently been witnessing a process of stressing the Macedonians’ historical antique background, a process that is characterized with taking new direction towards different national memory constructs. These new ways highlight a completely new aspect of the identity composite, and that is the extraordinary heroism of the heroes presented, i.e. the representatives of Macedonian national history. This trend of introduction of new traits of the nation started with a majority of sculptures, dances, which were erected at the most frequented parts of the capital of Macedonia. The new trend is presented with figures that feature warlike and victorious spirit. This new way of looking at these things was gradually transmitted to dance as well. There are already a few dance pieces inspired by the great Macedonian warrior, Alexander

  8. Anuran artifacts of preservation: 27 years later

    Directory of Open Access Journals (Sweden)

    Jessica L. Deichmann

    2009-07-01

    Full Text Available Measurements made on preserved anuran specimens are often used in studies of systematics, ecology and evolution. Here, we examine the effect of preservation on one of the most common measurement of frogs, snout-urostyle length (SUL. Preservation had significanteffects on the SUL of 13 of the 14 species of North American frogs included in this study, with all species decreasing in SUL by 0.31-5.62%. Smaller frog species did not shrink proportionally more or less than larger species. Absolute shrinkage was correlated with SUL and was greater in larger species. Within species, percent shrinkage was not significantly correlated with SUL in 10 species, but significantly greater for larger individuals in 3 species, and decreased with size in 1 species. Absolute shrinkage was statistically greater for larger individuals in 4 species. Our results agree with studies of morphological permutations in fish which show that most preservation-related changes take place within the first few months after initial preservation. We suggest that the potential consequences of using preserved specimens in research must be considered and that future studies continue to examine preservation effects, not only on frogs, but on all preserved specimens used in scientific investigations.

  9. Film sound in preservation and presentation

    NARCIS (Netherlands)

    Campanini, S.

    2014-01-01

    What is the nature of film sound? How does it change through time? How can film sound be conceptually defined? To address these issues, this work assumes the perspective of film preservation and presentation practices, describing the preservation of early sound systems, as well as the presentation

  10. Corn, alfalfa and grass silage preservation principles

    Science.gov (United States)

    Ensiling is the primary means of preserving moist forages for feeding livestock. In ensiling, the crop is stored anaerobically, and sugars in the crop are fermented by lactic acid bacteria naturally on the crop. The crop is preserved by the combination of the acids produced by the lactic acid bacter...

  11. Survey of postharvest handling, preservation and processing ...

    African Journals Online (AJOL)

    Survey of postharvest handling, preservation and processing practices along the camel milk chain in Isiolo district, Kenya. ... Despite the important contribution of camel milk to food security for pastoralists in Kenya, little is known about the postharvest handling, preservation and processing practices. In this study, existing ...

  12. 20 CFR 638.304 - Historical preservation.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Historical preservation. 638.304 Section 638.304 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR JOB CORPS PROGRAM... § 638.304 Historical preservation. The Job Corps Director shall review the “National Register of...

  13. Home Food Preservation Training for Extension Educators

    Science.gov (United States)

    Goard, Linnette Mizer; Hill, Melinda; Shumaker, Katharine; Warrix, Marisa

    2013-01-01

    During times of economic downturn, there has been an increased interest in home food preservation. As the primary resource for current research-based recommendations, a team of Extension Family and Consumer Sciences educators with specialization in food safety and food preservation responded to this demand by developing a standardized food…

  14. Historic Preservation Vocabulary, Designations, and Resources

    Science.gov (United States)

    Williams, Stacy D.

    2011-01-01

    Preservationists use a common language that had its beginnings in the National Historic Preservation Act of 1966. This act created the Secretary of the Interior's Standards for the Treatment of Historic Properties, which defined the terms and treatments that have become the standard for preservation projects and plans. These terms have been used…

  15. Emerging concepts in liver graft preservation

    Science.gov (United States)

    Bejaoui, Mohamed; Pantazi, Eirini; Folch-Puy, Emma; Baptista, Pedro M; García-Gil, Agustín; Adam, René; Roselló-Catafau, Joan

    2015-01-01

    The urgent need to expand the donor pool in order to attend to the growing demand for liver transplantation has obliged physicians to consider the use of suboptimal liver grafts and also to redefine the preservation strategies. This review examines the different methods of liver graft preservation, focusing on the latest advances in both static cold storage and machine perfusion (MP). The new strategies for static cold storage are mainly designed to increase the fatty liver graft preservation via the supplementation of commercial organ preservation solutions with additives. In this paper we stress the importance of carrying out effective graft washout after static cold preservation, and present a detailed discussion of the future perspectives for dynamic graft preservation using MP at different temperatures (hypothermia at 4 °C, normothermia at 37 °C and subnormothermia at 20 °C-25 °C). Finally, we highlight some emerging applications of regenerative medicine in liver graft preservation. In conclusion, this review discusses the “state of the art” and future perspectives in static and dynamic liver graft preservation in order to improve graft viability. PMID:25593455

  16. Whale Preservation. Grades Five to Nine.

    Science.gov (United States)

    Racicot, Darlene

    Dedicated to the conservation and preservation of whales, dolphins, and porpoises through public education, this instructional unit for grades 5-9 provides current (1993) facts, lesson plans, activities, and conservation and preservation techniques. Interdisciplinary activities involve students in debates, critical thinking, research, and…

  17. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers Open menu Reprotopia_Main_Menu ... Cancer Fertility Preservation for Children Diagnosed with Cancer Patient Pocket Guides Patient Pocket Guides Patient Guides Fertility ...

  18. Knowledge preservation in the nuclear industry

    International Nuclear Information System (INIS)

    Yanev, Y.

    2004-01-01

    The paper presents examples of knowledge loss in different areas related to attrition, retirements or layoff as well as the consequences of the loss of knowledge. The nature of the so called tacit knowledge and its role as a barrier to knowledge preservation is discussed. Strategies for knowledge preservation in the nuclear industry are presented

  19. Fertility Preservation for Children Diagnosed with Cancer

    Medline Plus

    Full Text Available ... this website. Skip to main content SaveMyFertility An Online Fertility Preservation Toolkit for Patients and Their Providers ... Visit the Oncofertility Consortium Web site Use the online Clinic/Center Finder to find the fertility preservation ...

  20. Effect of basic alkali-pickling conditions on the production of lysinoalanine in preserved eggs.

    Science.gov (United States)

    Zhao, Yan; Luo, Xuying; Li, Jianke; Xu, Mingsheng; Tu, Yonggang

    2015-09-01

    During the pickling process, strong alkali causes significant lysinoalanine (LAL) formation in preserved eggs, which may reduce the nutritional value of the proteins and result in a potential hazard to human health. In this study, the impacts of the alkali treatment conditions on the production of LAL in preserved eggs were investigated. Preserved eggs were prepared using different times and temperatures, and alkali-pickling solutions with different types and concentrations of alkali and metal salts, and the corresponding LAL contents were measured. The results showed the following: during the pickling period of the preserved egg, the content of LAL in the egg white first rapidly increased and then slowly increased; the content of LAL in the egg yolk continued to increase significantly. During the aging period, the levels of LAL in both egg white and egg yolk slowly increased. The amounts of LAL in the preserved eggs were not significantly different at temperatures between 20 and 25ºC. At higher pickling temperatures, the LAL content in the preserved eggs increased. With the increase of alkali concentration in the alkali-pickling solution, the LAL content in the egg white and egg yolk showed an overall trend of an initial increase followed by a slight decrease. The content of LAL produced in preserved eggs treated with KOH was lower than in those treated with NaOH. NaCl and KCl produced no significant effects on the production of LAL in the preserved eggs. With increasing amounts of heavy metal salts, the LAL content in the preserved eggs first decreased and then increased. The LAL content generated in the CuSO4 group was lower than that in either the ZnSO4 or PbO groups. © 2015 Poultry Science Association Inc.

  1. Preservation in the Age of Google: Digitization, Digital Preservation, and Dilemmas

    Science.gov (United States)

    Conway, Paul

    2010-01-01

    The cultural heritage preservation community now functions largely within the environment of digital technologies. This article begins by juxtaposing definitions of the terms "digitization for preservation" and "digital preservation" within a sociotechnical environment for which Google serves as a relevant metaphor. It then reviews two reports…

  2. Hierarchy of modular graph identities

    International Nuclear Information System (INIS)

    D’Hoker, Eric; Kaidi, Justin

    2016-01-01

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  3. Hierarchy of modular graph identities

    Energy Technology Data Exchange (ETDEWEB)

    D’Hoker, Eric; Kaidi, Justin [Mani L. Bhaumik Institute for Theoretical Physics, Department of Physics and Astronomy,University of California,Los Angeles, CA 90095 (United States)

    2016-11-09

    The low energy expansion of Type II superstring amplitudes at genus one is organized in terms of modular graph functions associated with Feynman graphs of a conformal scalar field on the torus. In earlier work, surprising identities between two-loop graphs at all weights, and between higher-loop graphs of weights four and five were constructed. In the present paper, these results are generalized in two complementary directions. First, all identities at weight six and all dihedral identities at weight seven are obtained and proven. Whenever the Laurent polynomial at the cusp is available, the form of these identities confirms the pattern by which the vanishing of the Laurent polynomial governs the full modular identity. Second, the family of modular graph functions is extended to include all graphs with derivative couplings and worldsheet fermions. These extended families of modular graph functions are shown to obey a hierarchy of inhomogeneous Laplace eigenvalue equations. The eigenvalues are calculated analytically for the simplest infinite sub-families and obtained by Maple for successively more complicated sub-families. The spectrum is shown to consist solely of eigenvalues s(s−1) for positive integers s bounded by the weight, with multiplicities which exhibit rich representation-theoretic patterns.

  4. PERSONAL IDENTITY IN DEAF ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Joanna KOSSEWSKA

    2008-06-01

    Full Text Available The purpose of this study was to investigate the factors influencing the identity deaf adolescents. The study involved 67 deaf adolescents (38 boys and 29 girls aged 16 to 19 students of secondary school. Ninety-three hearing children constituted a comparison group. The structure of identity was explored on the basis of identification references given by the subjects who were to reply in writing, 20 times running, to the question: „Who Am I?” the test, adapted from M. H. Kuhn and T. S. McPartland by Martines and Silvestre (1995 given in written and signed mode.Results showed that the hearing status as well as mode of communication influence the description of personal identity. It was found that deaf adoles­cents used more descriptions especially in the fol­lowing categories: Civil Status, Body and Physical Appearance, Tastes and Activities, Friendship and Relationships, Personal and Social Situation, Negative Personal Traits, and Neutral Personality Traits. Although this study could demonstrate im­pact independent variables on identity, the data raise the need for further, preferably longitudinal, research. This complex phenomenon has to be examined more closely.Combined self-descriptive processes lead to the development of an organized, learned and dynamic identity, and subjective description of an individ­ual has strong emotional consequences for the in­dividual in question.

  5. Quantum entanglement of identical particles

    International Nuclear Information System (INIS)

    Shi Yu

    2003-01-01

    We consider entanglement in a system with a fixed number of identical particles. Since any operation should be symmetrized over all the identical particles and there is the precondition that the spatial wave functions overlap, the meaning of identical-particle entanglement is fundamentally different from that of distinguishable particles. The identical-particle counterpart of the Schmidt basis is shown to be the single-particle basis in which the one-particle reduced density matrix is diagonal. But it does not play a special role in the issue of entanglement, which depends on the single-particle basis chosen. The nonfactorization due to (anti)symmetrization is naturally excluded by using the (anti)symmetrized basis or, equivalently, the particle number representation. The natural degrees of freedom in quantifying the identical-particle entanglement in a chosen single-particle basis are occupation numbers of different single-particle basis states. The entanglement between effectively distinguishable spins is shown to be a special case of the occupation-number entanglement

  6. Leisure Time and Social Identity

    Directory of Open Access Journals (Sweden)

    Rasoul Rabbani

    2010-01-01

    Full Text Available How could patterns of leisure represent social identity? Whether they are sub-ordinate to the class identity or in the contemporary context of consumption and the post-modern cultural transformations, they could represent some other different social identities based on the patterns of consumption? Considering “leisure time” as a part of “style of life”, the present study attempts to explore social identity. There are two parts in methodology; first the qualitative one, carried through deep interview technique; and the other, surveying through questionnaire. Results distinguish the determining role “social class”, and the combination of “gender” and social class play in modeling distinctions in leisure patterns. In other words, leisure –as the arena for individual choice- is restricted to the social class and gender –as the structural and contextual variables. The strong correlation identity has with the social class and gender denies the post-modern interpretations which emphasis on consumption as the cause of social differentiations.

  7. Package Formats for Preserved Digital Material

    DEFF Research Database (Denmark)

    Zierau, Eld

    2012-01-01

    This paper presents an investigation of the best suitable package formats for long term digital preservation. The choice of a package format for preservation is crucial for future access, thus a thorough analysis of choice is important. The investigation presented here covers setting up requireme......This paper presents an investigation of the best suitable package formats for long term digital preservation. The choice of a package format for preservation is crucial for future access, thus a thorough analysis of choice is important. The investigation presented here covers setting up...... requirements for package formats used for long term preserved digital material, and using these requirements as the basis for analysing a range of package formats. The result of the concrete investigation is that the WARC format is the package format best suited for the listed requirements. Fulfilling...

  8. Effects of nonthermal preservation technologies on antioxidant activity of fruits and vegetables: A review.

    Science.gov (United States)

    Xue, Zhaohui; Li, Jiaomei; Yu, Wancong; Lu, Xiaotong; Kou, Xiaohong

    2015-10-05

    Consumer demand for safe and nutritious fruits and vegetables has given rise to the development of a number of nonthermal food preservation techniques. Recent studies have highlighted that antioxidant activity of fruits and vegetables plays an important role in human health. In this paper, the influences of nonthermal preservation technologies, including pulsed electric field, radiation processing, dense phase carbon dioxide, ozone processing, and edible coatings, on the antioxidant capacity and related compounds in fruits and vegetables are reviewed. The proposed mechanisms and future trends are also discussed to accelerate the further commercialization and exploration of these novel technologies, which will, in turn, help to promote human health. © The Author(s) 2015.

  9. Irradiation's potential for preserving food

    International Nuclear Information System (INIS)

    Morrison, R.M.

    1986-01-01

    The first experimental studies on the use of ionizing radiation for the preservation of foods were published over thirty years ago (1, 2) . After a period of high expectations and perhaps exaggerated optimism a series of disappointments occurred in the late '60s .The first company specifically created to operate a food irradiation plant, Newfield Products Inc, ran into financial difficulties and had to close its potato irradiation facility in 1966. The irradiator, designed to process 15,000t of potatoes per month for inhibition of sprouting, was in operation during one season only. In 1968 the US Food an Drug Administration refused approval for radiation-sterilisation of ham and withdrew the approval it had granted in 1963 for irradiated bacon. An International Project on the Irradiation of Fruit and Fruit juices, created in 1965 at Seibersdorf, Austria, with the collaboration or 9 countries, ended with general disappointment after three years. The first commercial grain irradiator, built in the Turkish harbour town of Iskenderun by the International Atomic Energy Agency with funds from the United Nations Development Program, never received the necessary operating licence from the Turkish Government and had to be dismantled in 1968. The US Atomic Energy Commission terminated its financial support to all research programmes on food irradiation in 1970. For a number of years, little chance seemed to remain that the new process would ever be practically used. However, research and development work was continued in a number of laboratories all over the world, and it appears that the temporary setbacks now have been overcome. Growing quantities of irradiated foods are being marketed in several countries and indications are that irradiated foods will eventually be as generally accepted as are frozen, dried or heatsterilised foods

  10. Preservation of the Rotorua geysers

    International Nuclear Information System (INIS)

    Allia, R.G.; Lumb, T.

    1990-01-01

    This paper reports on the preservation of the Rotorua Geysers the geothermal activity at Rotorua, New Zealand, which has always been noted for its special cultural, tourist, and scientific values. A gradual increase in the drawoff of geothermal fluid through wells since the 1950s raised national concerns in the early 1980s when spring and geyser activity significantly declined. A government-funded monitoring program began in 1982 to establish the rate and cause of the decline in activity, as well as the magnitude of the drawoff. No new wells were permitted within 1.5 km of the geyser area. By late 1985, the monitoring program confirmed that drawdown of the geothermal field was linked to the drawoff by geothermal wells. It recommended that the drawoff could be reduced by 75% by well sharing and efficiency increases. The link between well discharges and the activity of thermal decline was disputed by the Rotorua Geothermal Users Association. By late 1986, the continuing decline in field pressure was considered to be serious, so the Government recommended compulsory closure of wells within 1.5 km of the geysers, and imposed a charging policy for geothermal usage elsewhere in Rotorua. The closures were battled in the High Court, and subsequently there was also considerable local resistance and publicity to the forced entry onto private land by authorities trying to cement up wells. The combination of enforced well closures, and what was considered by some to be punitive charges for geothermal usage, resulted in an 80% reduction in geothermal well discharges by late 1989. Some of hot spring activity has returned, and geyser activity is more intense. Recently, some residents have been concerned that cooled former thermal areas near houses may be heating up again, and that the well closures have also caused a dangerous build up in gas pressure near surface. This claim is presently being investigated

  11. The Optimal PEG for Kidney Preservation: A Preclinical Porcine Study

    Directory of Open Access Journals (Sweden)

    Sebastien Giraud

    2018-02-01

    Full Text Available University of Wisconsin (UW solution is not optimal for preservation of marginal organs. Polyethylene glycol (PEG could improve protection. Similarly formulated solutions containing either 15 or 20 g/L PEG 20 kDa or 5, 15 and 30 g/L PEG 35 kDa were tested in vitro on kidney endothelial cells, ex vivo on preserved kidneys, and in vivo in a pig kidney autograft model. In vitro, all PEGs provided superior preservation than UW in terms of cell survival, adenosine triphosphate (ATP production, and activation of survival pathways. Ex vivo, tissue injury was lower with PEG 20 kDa compared to UW or PEG 35 kDa. In vivo, function recovery was identical between UW and PEG 35 kDa groups, while PEG 20 kDa displayed swifter recovery. At three months, PEG 35 kDa 15 and 30 g/L animals had worse outcomes than UW, while 5 g/L PEG 35 kDa was similar. PEG 20 kDa was superior to both UW and PEG 35 kDa in terms of function and fibrosis development, with low activation of damage pathways. PEG 20 kDa at 15 g/L was superior to 20 g/L. While in vitro models did not discriminate between PEGs, in large animal models of transplantation we showed that PEG 20 kDa offers a higher level of protection than UW and that longer chains such as PEG 35 kDa must be used at low doses, such as found in Institut George Lopez (IGL1, 1g/L.

  12. IDENTITY AND THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Abrudan Cristina

    2008-05-01

    Full Text Available The purpose of this article is to throw some light on the question of identity in the European Union. The challenge is to understand how identity formation takes place in the contemporary world. The European integration has to be understood both as a process of socio-economic convergence among European states but also as a process of co-operation on different other levels, too. It seems that cultures, traditions and interests are more and more interconnected as societies become increasingly multicultural. This is the reason why people are concerned with the concept of identity and the recognition of their uniqueness in terms of traditions, values and ways of lives.

  13. Identity, Diversity and Diversity Management

    DEFF Research Database (Denmark)

    Holck, Lotte; Muhr, Sara Louise; Villeseche, Florence

    2016-01-01

    – The work can encourage policy makers, diversity and HR managers to question their own practices and assumptions leading to more theoretical informed diversity management practices. Originality/value – The theoretical connections between identity and diversity literature have so far not been reviewed......The purpose of this paper is to examine the relationship between the identity and diversity literatures and discuss how a better understanding of the theoretical connections between the two informs both diversity research and diversity management practices. Design/methodology/approach – Literature...... and limitations – is crucial for successful diversity management research and practice. Research limitations/implications – The authors argue for a better understanding of differences, overlaps and limits of different identity perspectives, and for a stronger engagement with practice. Practical implications...

  14. National identity in multicultural environment

    Directory of Open Access Journals (Sweden)

    Milena Öbrink Hobzová

    2017-11-01

    Full Text Available In today's globalized world, it is important to find a relationship to our own culture as well as to the other cultures which we encounter due to migration. This goal should be met in multicultural education. As a result of the so-called migration crisis, effectiveness of multicultural education was discussed on social networks and in media. At the same time, national interests and security began to appear in the programmes of political parties. It seems that, due to the fear of refugees, national identity started becoming more important. The situation is reflected in the research presented below. It aimed to determine whether there was a link between the sense of national identity and attitudes to foreigners. The investigation was carried out in 2015 on a sample of 245 respondents. The results showed that the growing sense of national identity deepened the negative attitude to foreigners. It is necessary to work with this fact in multicultural education at schools.

  15. CORPORATE IDENTITY SEJARAH DAN APLIKASINYA

    Directory of Open Access Journals (Sweden)

    Christine Suharto Cenadi

    1999-01-01

    Full Text Available In the recent globalization era%2C and the developed market%2C many companies compete to attract consumers to buy their products. One of the keys to compete and survive in this developing market is by creating an image and graphic identity. This paper will discuss about corporate identity%2C image%2C its purpose and applications. Abstract in Bahasa Indonesia : Dalam era globalisasi dewasa ini%2C dan dengan berkembangnya pasar (market%2C banyak perusahaan bersaing untuk menarik perhatian konsumen untuk membeli produknya. Salah satu cara untuk bersaing dan dapat bertahan di dalam pasar yang terus berkembang ini adalah dengan menciptakan suatu image dan identitas graphic. Tulisan ini akan membahas tentang corporate identity%2C image%2C fungsi dan aplikasinya

  16. Privacy preservation and authentication on secure geographical routing in VANET

    Science.gov (United States)

    Punitha, A.; Manickam, J. Martin Leo

    2017-05-01

    Vehicular Ad hoc Networks (VANETs) play an important role in vehicle-to-vehicle communication as it offers a high level of safety and convenience to drivers. In order to increase the level of security and safety in VANETs, in this paper, we propose a Privacy Preservation and Authentication on Secure Geographical Routing Protocol (PPASGR) for VANET. It provides security by detecting and preventing malicious nodes through two directional antennas such as forward (f-antenna) and backward (b-antenna). The malicious nodes are detected by direction detection, consistency detection and conflict detection. The location of the trusted neighbour is identified using TNT-based location verification scheme after the implementation of the Vehicle Tamper Proof Device (VTPD), Trusted Authority (TA) is generated that produces the anonymous credentials. Finally, VTPD generates pseudo-identity using TA which retrieves the real identity of the sender. Through this approach, the authentication, integrity and confidentiality for routing packets can be achieved. The simulation results show that the proposed approach reduces the packet drop due to attack and improves the packet delivery ratio.

  17. Preserving community in health care.

    Science.gov (United States)

    Emanuel, E J; Emanuel, L L

    1997-02-01

    There are two prominent trends in health care today: first, increasing demands for accountabilty, and second, increasing provision of care through managed care organizations. These trends promote the question: What form of account-ability is appropriate to managed care plans? Accountability is the process by which a party justifies its actions and policies. Components of accountability include parties that can be held or hold others accountable, domains and content areas being assessed, and procedures of assessment. Traditionally, the professional model of accountability has operated in medical care. In this model, physicians establish the standards of accountability and hold each other accountable through professional organizations. This form of accountability seems outdated and inapplicable to managed care plans. The alternatives are the economic and the political models of accountability. In the economic model, medicine becomes more like a commodity, and "exit" (consumers changing providers for reasons of cost and quality) is the dominant procedure of accountability. In the political model, medicine becomes more like a community good, and "voice" (citizens communicating their views in public forums or on policy committees, or in elections for representatives) is the dominant procedure of accountability. The economic model's advantages affirm American individualism, make minimal demands on consumers, and use a powerful incentive, money. Its disadvantages undermine health care as a nonmarket good, undermine individual autonomy, undermine good medical practice, impose significant demands on consumers to be informed, sustain differentials of power, and use indirect procedures of accountability. The political model's advantages affirm health care as a matter of justice, permit selecting domains other than price and quality for accountability, reinforce good medical practice, and equalize power between patients and physicians. Its disadvantages include inefficiency in

  18. Theta function identities associated with Ramanujan's modular ...

    Indian Academy of Sciences (India)

    In Chapter 20 of his second notebook [6], Ramanujan recorded several theta function identities associated with modular equations of composite degree 15. These identities have previously been proved by Berndt in [3]. But he proved most of these theta function identities using modular equations. These identities can also ...

  19. On an extension of a combinatorial identity

    Indian Academy of Sciences (India)

    to an infinite family of 4-way combinatorial identities. In some particular cases we get even 5-way combinatorial identities which give us four new combinatorial versions of. Göllnitz–Gordon identities. Keywords. n-Color partitions; lattice paths; Frobenius partitions; Göllnitz–Gordon identities; combinatorial interpretations. 1.

  20. Exploring Japanese university English teachers' professional identity

    CERN Document Server

    Nagatomo, Diane Hawley

    2012-01-01

    This book examines the professional identities of Japanese university English teachers. It focuses on how relatively new teachers develop their professional identities, how gender impacts the professional identities of female professors, and how teaching practices and beliefs reflect personal and professional identity.

  1. 7 CFR 52.771 - Identity.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Identity. 52.771 Section 52.771 Agriculture... United States Standards for Grades of Canned Red Tart Pitted Cherries 1 Identity and Grades § 52.771 Identity. Canned red tart pitted cherries is the product represented as defined in the standard of identity...

  2. Teacher Identity Work in Mathematics Teacher Education

    Science.gov (United States)

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  3. Identity and Diversity in Today's World

    Science.gov (United States)

    Gee, James Paul

    2017-01-01

    This paper develops a thesis about identity and diversity. I first look at activity-based identities, identities like being a gardener, birder, citizen scientist or fan-fiction writer. These are freely chosen identities and they are proliferating at a great rate today thanks to participatory culture, the Maker Movement and digital and social…

  4. Integrating Identities: Ethnic and Academic Identities among Diverse College Students

    Science.gov (United States)

    Walker, Lovey H. M.; Syed, Moin

    2013-01-01

    Background/Context: Students of Color continue to be underrepresented at the undergraduate level. Recent research has demonstrated the importance of non-academic psychosocial factors for understanding college experiences. One factor, identity, is a broad, multidimensional construct that comprises numerous distinct domains, including political,…

  5. Blended Identities: Identity Work, Equity and Marginalization in Blended Learning

    Science.gov (United States)

    Heikoop, Will

    2013-01-01

    This article is a theoretical study of the self-presentation strategies employed by higher education students online; it examines student identity work via profile information and avatars in a blended learning environment delivered through social networking sites and virtual worlds. It argues that students are faced with difficult choices when…

  6. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  7. Layering spatial identities: the identity discourses of new regions

    NARCIS (Netherlands)

    Terlouw, K.; van Gorp, B.H.

    2014-01-01

    The number and importance of regions are increasing at the same time as traditional regional identities are undermined through processes like globalisation and individualisation. Local and other administrations increasingly cooperate and create new regions which are too changeable for a distinct

  8. Contested identities: Identity constructions in a youth recreational drug culture

    DEFF Research Database (Denmark)

    Ravn, Signe

    2012-01-01

    as responsible drug users. The article studies this recreational drug culture and its internal distinctions, conceptions and norms as they are expressed discursively. The analysis identifies six dimensions of the identity as a responsible, recreational drug user: drug practice, general drug knowledge, context...

  9. Status of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.

    1985-01-01

    Identity verification devices based on the interrogation of six different human biometric features or actions now exist and in general have been in development for about ten years. The capability of these devices to meet the cost and operational requirements of speed, accuracy, ease of use and reliability has generally increased although the verifier industry is still immature. Sandia Laboratories makes a continuing effort to stay abreast of identity verifier developments and to assess the capabilities and improvements of each device. Operating environment and procedures more typical of field use can often reveal performance results substantially different from laboratory tests. An evaluation of several recently available verifiers is herein reported

  10. Trends in Food Packaging.

    Science.gov (United States)

    Ott, Dana B.

    1988-01-01

    This article discusses developments in food packaging, processing, and preservation techniques in terms of packaging materials, technologies, consumer benefits, and current and potential food product applications. Covers implications due to consumer life-style changes, cost-effectiveness of packaging materials, and the ecological impact of…

  11. Boundaries of American Identity: Relations between Ethnic Group Prototypicality and Policy Attitudes.

    Science.gov (United States)

    Huynh, Que-Lam; Devos, Thierry; Altman, Hannah R

    2015-08-01

    We sought to document that the extent to which different ethnic groups are perceived as embodying the American identity is more strongly linked to anti-minority policy attitudes and acculturation ideologies among majority group members (European Americans) than among minority group members (Asian Americans or Latino/as). Participants rated 13 attributes of the American identity as they pertain to different ethnic groups, and reported their endorsement of policy attitudes and acculturation ideologies. We found a relative consensus across ethnic groups regarding defining components of the American identity. However, European Americans were perceived as more prototypical of this American identity than ethnic minorities, especially by European American raters. Moreover, for European Americans but not for ethnic minorities, relative ingroup prototypicality was related to anti-minority policy attitudes and acculturation ideologies. These findings suggest that for European Americans, perceptions of ethnic group prototypicality fulfill an instrumental function linked to preserving their group interests and limiting the rights afforded to ethnic minorities.

  12. Ego identity formation in middle adolescence.

    Science.gov (United States)

    Lavoie, J C

    1976-12-01

    Assumed determinants of ego identity were investigated in this study using sophomore, junior, and senior high school males and females. Subjects were administered the Marcia Ego Identity Status Scale and measures of sex-role identification, personality development, psychological functioning, self-concept, and parental socialization practices. Data analyses, using a median split on identity score, showed that high-identity adolescents obtained more positive scores on sex-role identification, personality development, psychological adjustment, and self-concept than low-identity adolescents. Socialization practices also differed for the two groups. The sex differences which emerged were congruent with the identity literature. Overall, the data supported Erikson's theory of ego identity development.

  13. Identity-based estimation of greenhouse gas emissions from crop production

    DEFF Research Database (Denmark)

    Bennetzen, Eskild Hohlmann; Smith, Pete; Soussana, Jean-Francois

    2012-01-01

    reduction of emissions i.e. reducing emissions per unit of agricultural product rather than the absolute emissions per se. Hence the system productivity must be included in the same analysis. This paper presents the Kaya- Porter identity, derived from the Kaya identity, as a new way to calculate GHG...... (ha). These separate elements in the identity can be targeted in emissions reduction and mitigation policies and are useful to analyse past and current trends in emissions and to explore future scenarios. Using the Kaya-Porter identity we have performed a case study on Danish crop production and find...... emissions to have been reduced by 12% from 1992 to 2008, whilst yields per unit area have remained constant. Both land-based emissions and energy-based emissions have decreased, mainly due to a 41% reduction in nitrogen fertilizer use. The initial identity based analysis for crop production presented here...

  14. Women (Do Not) Belong Here: Gender-Work Identity Conflict among Female Police Officers

    Science.gov (United States)

    Veldman, Jenny; Meeussen, Loes; Van Laar, Colette; Phalet, Karen

    2017-01-01

    The current paper examines antecedents and consequences of perceiving conflict between gender and work identities in male-dominated professions. In a study among 657 employees working in 85 teams in the police force, we investigated the effect of being different from team members in terms of gender on employees’ perception that their team members see their gender identity as conflicting with their work identity. As expected in the police force as a male-dominated field, the results showed that gender-dissimilarity in the team was related to perceived gender-work identity conflict for women, and not for men. In turn, perceiving gender-work identity conflict was related to lower team identification for men and women. Although lowering team identification might enable employees to cope with conflicting social identities and hence protect the self, this may also have its costs, as lower team identification predicted higher turnover intentions, more burn-out symptoms, less extra role behavior, lower job satisfaction, lower work motivation, and lower perceived performance. Additionally, for women, experiencing support from their team members and team leader showed a trend to mitigate the relationship between gender-dissimilarity and perceived gender-work identity conflict, and a positive diversity climate was marginally related to less perceived gender-work identity conflict. The results show the importance of the team context in shaping a climate of (in)compatible identities for numerically underrepresented and historically undervalued social group members in order to hinder or protect their work outcomes. PMID:28220097

  15. Women (Do Not) Belong Here: Gender-Work Identity Conflict among Female Police Officers.

    Science.gov (United States)

    Veldman, Jenny; Meeussen, Loes; Van Laar, Colette; Phalet, Karen

    2017-01-01

    The current paper examines antecedents and consequences of perceiving conflict between gender and work identities in male-dominated professions. In a study among 657 employees working in 85 teams in the police force, we investigated the effect of being different from team members in terms of gender on employees' perception that their team members see their gender identity as conflicting with their work identity. As expected in the police force as a male-dominated field, the results showed that gender-dissimilarity in the team was related to perceived gender-work identity conflict for women, and not for men. In turn, perceiving gender-work identity conflict was related to lower team identification for men and women. Although lowering team identification might enable employees to cope with conflicting social identities and hence protect the self, this may also have its costs, as lower team identification predicted higher turnover intentions, more burn-out symptoms, less extra role behavior, lower job satisfaction, lower work motivation, and lower perceived performance. Additionally, for women, experiencing support from their team members and team leader showed a trend to mitigate the relationship between gender-dissimilarity and perceived gender-work identity conflict, and a positive diversity climate was marginally related to less perceived gender-work identity conflict. The results show the importance of the team context in shaping a climate of (in)compatible identities for numerically underrepresented and historically undervalued social group members in order to hinder or protect their work outcomes.

  16. Women (Do Not Belong Here: Gender-Work Identity Conflict among Female Police Officers

    Directory of Open Access Journals (Sweden)

    Jenny Veldman

    2017-02-01

    Full Text Available The current paper examines antecedents and consequences of perceiving conflict between gender and work identities in male-dominated professions. In a study among 657 employees working in 85 teams in the police force, we investigated the effect of being different from team members in terms of gender on employees’ perception that their team members see their gender identity as conflicting with their work identity. As expected in the police force as a male-dominated field, the results showed that gender-dissimilarity in the team was related to perceived gender-work identity conflict for women, and not for men. In turn, perceiving gender-work identity conflict was related to lower team identification for men and women. Although lowering team identification might enable employees to cope with conflicting social identities and hence protect the self, this may also have its costs, as lower team identification predicted higher turnover intentions, more burn-out symptoms, less extra role behavior, lower job satisfaction, lower work motivation, and lower perceived performance. Additionally, for women, experiencing support from their team members and team leader showed a trend to mitigate the relationship between gender-dissimilarity and perceived gender-work identity conflict, and a positive diversity climate was marginally related to less perceived gender-work identity conflict. The results show the importance of the team context in shaping a climate of (incompatible identities for numerically underrepresented and historically undervalued social group members in order to hinder or protect their work outcomes.

  17. Personal identity narratives of therapeutic songwriting participants following Spinal Cord Injury: A case series analysis.

    Science.gov (United States)

    Roddy, Chantal; Rickard, Nikki; Tamplin, Jeanette; Baker, Felicity Anne

    2018-07-01

    Spinal Cord Injury (SCI) patients face unique identity challenges associated with physical limitations, higher comorbid depression, increased suicidality and reduced subjective well-being. Post-injury identity is often unaddressed in subacute rehabilitation environments where critical physical and functional rehabilitation goals are prioritized. Therapeutic songwriting has demonstrated prior efficacy in promoting healthy adjustment and as a means of expression for post-injury narratives. The current study sought to examine the identity narratives of therapeutic songwriting participants. Case-series analysis of the individual identity trajectories of eight individuals. Subacute rehabilitation facility, Victoria, Australia. Eight individuals with an SCI; 7 males and 1 female. Six-week therapeutic songwriting intervention facilitated by a music therapist to promote identity rehabilitation. Identity, subjective well-being and distress, emotional state. Three participants demonstrated positive trajectories and a further three showed negative trajectories; remaining participants were ambiguous in their response. Injury severity differentiated those with positive trajectories from those with negative trajectories, with greater injury severity apparent for those showing negative trends. Self-concept also improved more in those with positive trajectories. Core demographic variables did not however meaningfully predict the direction of change in core identity or wellbeing indices. Identity-focused songwriting holds promise as a means of promoting healthy identity reintegration. Further research on benefits for those with less severe spinal injuries is warranted.

  18. The Risky Path to a Followership Identity

    DEFF Research Database (Denmark)

    Larsson, Magnus; Nielsen, Mie Femø

    2017-01-01

    Followership research has increased recently, but little attention has been paid to the complexities and challenges of creating a followership identity. Researchers typically portray followership as a safe alternative to leadership identity, but we challenge this assumption by using naturally...... occurring workplace interactions to identify active contributions as well as risks associated with a follower identity. In this study, we use conversation analysis to examine how people collaboratively construct identities, and how identity development shapes and organizes interactions between people...

  19. Lift of dilogarithm to partition identities

    International Nuclear Information System (INIS)

    Terhoeven, M.

    1992-11-01

    For the whole set of dilogarithm identities found recently using the thermodynamic Bethe-Ansatz for the ADET series of purely elastic scattering theories we give partition identities which involve characters of those conformal field theories which correspond to the UV-limits of the scattering theories. These partition identities in turn allow to derive the dilogarithm identities using modular invariance and a saddle point approximation. We conjecture on possible generalizations of this correspondance, namely, a lift from dilogarithm to partition identities. (orig.)

  20. Healthy food trends -- flaxseeds

    Science.gov (United States)

    ... seeds; Healthy food trends - linseeds; Healthy snacks - flaxseeds; Healthy diet - flaxseeds; Wellness - flaxseeds ... of nutrition and dietetics: dietary fatty acids for healthy adults. J Acad Nutr Diet . 2014;114(1):136-153. PMID: 24342605 www. ...