995 resultados para Identity Products
Resumo:
Raman spectroscopy has become an attractive tool for the analysis of pharmaceutical solid dosage forms. In the present study it is used to ensure the identity of tablets. The two main applications of this method are release of final products in quality control and detection of counterfeits. Twenty-five product families of tablets have been included in the spectral library and a non-linear classification method, the Support Vector Machines (SVMs), has been employed. Two calibrations have been developed in cascade: the first one identifies the product family while the second one specifies the formulation. A product family comprises different formulations that have the same active pharmaceutical ingredient (API) but in a different amount. Once the tablets have been classified by the SVM model, API peaks detection and correlation are applied in order to have a specific method for the identification and allow in the future to discriminate counterfeits from genuine products. This calibration strategy enables the identification of 25 product families without error and in the absence of prior information about the sample. Raman spectroscopy coupled with chemometrics is therefore a fast and accurate tool for the identification of pharmaceutical tablets.
Resumo:
In this article we review first some of the possibilities in which the notions of Fo lner sequences and quasidiagonality have been applied to spectral approximation problems. We construct then a canonical Fo lner sequence for the crossed product of a concrete C* -algebra and a discrete amenable group. We apply our results to the rotation algebra (which contains interesting operators like almost Mathieu operators or periodic magnetic Schrödinger operators on graphs) and the C* -algebra generated by bounded Jacobi operators.
Resumo:
This study examined whether the antidermatophytic activity of essential oils (EOs) can be used as an indicator for the discovery of active natural products against Leishmania amazonensis. The aerial parts of seven plants were hydrodistilled. Using broth microdilution techniques, the obtained EOs were tested against three strains of dermatophytes (Trichophyton mentagrophytes, Microsporum gypseum and Microsporum canis). To compare the EOs antifungal and antiparasitic effects, the EOs activities against axenic amastigotes of L. amazonensis were concurrently evaluated. For the most promising EOs, their antileishmanial activities against parasites infecting peritoneal macrophages of BALB/c mice were measured. The most interesting antifungal candidates were the EOs from Cymbopogon citratus, Otacanthus azureus and Protium heptaphyllum, whereas O. azureus, Piper hispidum and P. heptaphyllum EOs exhibited the lowest 50% inhibitory concentration (IC50) values against axenic amastigotes, thus revealing a certain correspondence between both activities. The P. hispidum EO was identified as the most promising product in the results from the infected macrophages model (IC50: 4.7 µg/mL, safety index: 8). The most abundant compounds found in this EO were sesquiterpenes, notably curzerene and furanodiene. Eventually, the evaluation of the antidermatophytic activity of EOs appears to be an efficient method for identifying new potential drugs for the treatment of L. amazonensis.
Resumo:
Tumor-specific gene products, such as cancer/testis (CT) antigens, constitute promising targets for the development of T cell vaccines. Whereas CT antigens are frequently expressed in melanoma, their expression in colorectal cancers (CRC) remains poorly characterized. Here, we have studied the expression of the CT antigens MAGE-A3, MAGE-A4, MAGE-A10, NY-ESO-1 and SSX2 in CRC because of the presence of well-described HLA-A2-restricted epitopes in their sequences. Our analyses of 41 primary CRC and 14 metastatic liver lesions confirmed the low frequency of expression of these CT antigens. No increased expression frequencies were observed in metastatic tumors compared to primary tumors. Histological analyses of CRC samples revealed heterogeneous expression of individual CT antigens. Finally, evidence of a naturally acquired CT antigen-specific CD8(+) T cell response could be demonstrated. These results show that the expression of CT antigens in a subset of CRC patients induces readily detectable T cell responses.
Resumo:
A forensic intelligence process was conducted over cross-border seizures of false identity documents whose sources were partly known to be the same. Visual features of 300 counterfeit Portuguese and French identity cards seized in France and Switzerland were observed and integrated in a structured database developed to detect and analyze forensic links. Based on a few batches of documents known to come from common sources, the forensic profiling method could be validated and its performance evaluated. The method also proved efficient and complementary to conventional means of detecting connections between cases. Cross-border links were detected, highlighting the need for more collaboration. Forensic intelligence could be produced, uncovering the structure of counterfeits' illegal trade, the concentration of their sources and the evolution of their quality over time. In addition, two case examples illustrated how forensic profiling may support specific investigations. The forensic intelligence process and its results will underline the need to develop such approaches to support the fight against fraudulent documents and organized crime.
Resumo:
The important inflow of foreign population to western countries has boosted the study of acculturation processes among scholars in the last decades. By using the case of Catalonia, a receiver region of international and national migration since the fifties, this paper seeks to intersect a classic acculturation model and a newly reemerging literature in political science on contextual determinants on individual behavior. Does the context matters for understanding individual’s subjective national identity and, therefore, its voting behavior? Multilevel models show that environment matters. Percentage of Spain-born population in the town is statistically significant to account for variance in the subjective national identity and nationalist vote, even after controlling for age, sex, origin, language and left – right orientation and other contextual factors. This conclusion invites researchers not to underestimate the direct effect of the environment on individual outcomes such as feelings of belonging and vote orientation in contexts of rival identities.
Resumo:
Some people cannot buy products without first touching them, believing that doing so will create more assurance and information and reduce uncertainty. The international consumer marketing literature suggests an instrument to measure consumers' necessity for pohysical contact, called Need for Touch (NFT). This paper analyzes whether the Need for Touch structure is empirically consistent. Based on a literature review, we suggest six hypotheses in order to assess the nomological, convergent, and discriminant validity of the phenomenon. Departing from these, data supported four assumptions in the predicted direction. Need for Touch was associated with Need for Input and with Need for Cognition. Need for Touch was not associated with traditional marketing channels. The results also showed the dual characterization of Need for Touch as a bi-dimensional construct. The moderator effect indicated that when the consumer has a higher (vs. lower) Need for Touch autotelic score, the experiential motivation for shopping played a more (vs. less) important role in impulsive motivation. Our Study 3 supports the NFT structure and shows new associations with the need for unique products and dependent decisions.
Resumo:
En aquesta memòria s'explica com, per la implantació de SAP en l'Hospital Universitari Arnau de Vilanova s'ha de realitzar una adequació tant de xarxa, com de parc d'ordinadors i impressores, instal·lació d'un nou cpd. Es fa un anàlisi previ de la situació i s'expliqen quins canvis es fan i perquè.
Resumo:
L'objectiu principal del projecte és l'estudi, la implementació d'algoritmes i protocols amb criptografia basada en la identitat. Aquesta o Identity Based Encryption (IBE) s'utilitza per simplificar el procés de comunicacions segures, com per exemple el correu electrònic. IBE permet a les polítiques de seguretat ser codificades directament sense la necessitat d'usar certificats. Aquests esquemes van ser proposats inicialment per A. Shamir a l'any 1984 i han estat objecte d'estudi per D. Boneh, S. Galbraith, etc. En aquest farem l'estudi dels emparellaments de Werl i Tate a través de l'algorisme de Miller, que ens permetrà implementar aquests emparellaments sobre corbes el·líptiques supersingulars.
Resumo:
Items purchased from Iowa Prison Industries for Iowa Departation of Transportation
Resumo:
The development of forensic intelligence relies on the expression of suitable models that better represent the contribution of forensic intelligence in relation to the criminal justice system, policing and security. Such models assist in comparing and evaluating methods and new technologies, provide transparency and foster the development of new applications. Interestingly, strong similarities between two separate projects focusing on specific forensic science areas were recently observed. These observations have led to the induction of a general model (Part I) that could guide the use of any forensic science case data in an intelligence perspective. The present article builds upon this general approach by focusing on decisional and organisational issues. The article investigates the comparison process and evaluation system that lay at the heart of the forensic intelligence framework, advocating scientific decision criteria and a structured but flexible and dynamic architecture. These building blocks are crucial and clearly lay within the expertise of forensic scientists. However, it is only part of the problem. Forensic intelligence includes other blocks with their respective interactions, decision points and tensions (e.g. regarding how to guide detection and how to integrate forensic information with other information). Formalising these blocks identifies many questions and potential answers. Addressing these questions is essential for the progress of the discipline. Such a process requires clarifying the role and place of the forensic scientist within the whole process and their relationship to other stakeholders.