877 resultados para Cheese authentication
Resumo:
Developing temperature fields in frozen cheese sauce undergoing microwave heating were simulated and measured. Two scenarios were investigated: a centric and offset placement on the rotating turntable. Numerical modeling was performed using a dedicated electromagnetic Finite Difference Time Domain (FDTD) module that was two-way coupled to the PHYSICA multiphysics package. Two meshes were used: the food material and container were meshed for the heat transfer and the microwave oven cavity and waveguide were meshed for the microwave field. Power densities obtained on the structured FDTD mesh were mapped onto the unstructured finite volume method mesh for each time-step/turntable position. On heating for each specified time-step the temperature field was mapped back onto the FDTD mesh and the electromagnetic properties were updated accordingly. Changes in thermal/electric properties associated with the phase transition were fully accounted for as well as heat losses from product to cavity. Detailed comparisons were carried out for the centric and offset placements, comparing experimental temperature profiles during microwave thawing with those obtained by numerical simulation.
Resumo:
A novel wireless local area network (WLAN) security processor is described in this paper. It is designed to offload security encapsulation processing from the host microprocessor in an IEEE 802.11i compliant medium access control layer to a programmable hardware accelerator. The unique design, which comprises dedicated cryptographic instructions and hardware coprocessors, is capable of performing wired equivalent privacy, temporal key integrity protocol, counter mode with cipher block chaining message authentication code protocol, and wireless robust authentication protocol. Existing solutions to wireless security have been implemented on hardware devices and target specific WLAN protocols whereas the programmable security processor proposed in this paper provides support for all WLAN protocols and thus, can offer backwards compatibility as well as future upgrade ability as standards evolve. It provides this additional functionality while still achieving equivalent throughput rates to existing architectures. © 2006 IEEE.
Resumo:
A total of 143 raw milk cheese samples (soft cheese, n = 9; semihard cheese, n = 133; hard cheese, n = 1), collected at the retail level throughout Switzerland, were tested for Mycobacterium avium ssp. paratuberculosis (MAP) by immunomagnetic capture plus culture on 7H10-PANTA medium and in supplemented BAC-TEC 12B medium, as well as by an F57-based real-time PCR system. Furthermore, pH and water activity values were determined for each sample. Although no viable MAP cells could be cultured, 4.2% of the raw milk cheese samples tested positive with the F57-based real-time PCR system, providing evidence for the presence of MAP in the raw material. As long as the link between MAP and Crohn’s disease in humans remains unclear, measures designed to minimize public exposure should also include a focus on milk products.
Resumo:
This paper reviews the use of plant extracts as vegetable coagulants for cheesemaking. It covers the plants used as sources of coagulants, with a historical overview and particular emphasis on Cynara species. The genus Cynara L., its composition, milk clotting and proteolytic enzymes (cardosins) and their specificity towards peptide linkages are also described. Cheeses produced in the Iberian Peninsula using Cynara L. as coagulant are documented. Cynara L. is still the most used vegetable coagulant in cheesemaking, and also the most investigated. However, much work remains to be done to understand its action during cheese maturation and further characterization.
Resumo:
The objective of this work was to study the textural properties of edible films made from sour (acid) whey for food wrapping application. Acid whey is often regarded as a waste product, obtained as a watery effluent in the manufacturing of cottage cheese. In general, owing to its high nutritional value, whey has gained importance as an additive in food manufacturing processes and in health drink formulations. In this work, fresh sour whey was used to make edible films. The proteins in the whey were concentrated by ultrafiltration to reduce the water content. Only natural ingredients such as acid whey and agar were used to form the film under controlled heating (650 W) in a microwave oven. The structural and surface characteristics of the films were tested by a texture analyser and scanning electron micrographs.
Resumo:
Continuing achievements in hardware technology are bringing ubiquitous computing closer to reality. The notion of a connected, interactive and autonomous environment is common to all sensor networks, biosystems and radio frequency identification (RFID) devices, and the emergence of significant deployments and sophisticated applications can be expected. However, as more information is collected and transmitted, security issues will become vital for such a fully connected environment. In this study the authors consider adding security features to low-cost devices such as RFID tags. In particular, the authors consider the implementation of a digital signature architecture that can be used for device authentication, to prevent tag cloning, and for data authentication to prevent transmission forgery. The scheme is built around the signature variant of the cryptoGPS identification scheme and the SHA-1 hash function. When implemented on 130 nm CMOS the full design uses 7494 gates and consumes 4.72 mu W of power, making it smaller and more power efficient than previous low-cost digital signature designs. The study also presents a low-cost SHA-1 hardware architecture which is the smallest standardised hash function design to date.
Resumo:
DeAuthentication Denial of Service attacks in Public Access WiFi operate by exploiting the lack of authentication of management frames in the 802.11 protocol. Detection of these attacks rely almost exclusively on the selection of appropriate thresholds. In this work the authors demonstrate that there are additional, previously unconsidered, metrics which also influence DoS detection performance. A method of systematically tuning these metrics to optimal values is proposed which ensures that parameter choices are repeatable and verifiable.
Resumo:
Physical Access Control Systems are commonly used to secure doors in buildings such as airports, hospitals, government buildings and offices. These systems are designed primarily to provide an authentication mechanism, but they also log each door access as a transaction in a database. Unsupervised learning techniques can be used to detect inconsistencies or anomalies in the mobility data, such as a cloned or forged Access Badge, or unusual behaviour by staff members. In this paper, we present an overview of our method of inferring directed graphs to represent a physical building network and the flows of mobility within it. We demonstrate how the graphs can be used for Visual Data Exploration, and outline how to apply algorithms based on Information Theory to the graph data in order to detect inconsistent or abnormal behaviour.
Resumo:
European Regulation 1169/2011 requires producers of foods that contain refined vegetable oils to label the oil types. A novel rapid and staged methodology has been developed for the first time to identify common oil species in oil blends. The qualitative method consists of a combination of a Fourier Transform Infrared (FTIR) spectroscopy to profile the oils and fatty acid chromatographic analysis to confirm the composition of the oils when required. Calibration models and specific classification criteria were developed and all data were fused into a simple decision-making system. The single lab validation of the method demonstrated the very good performance (96% correct classification, 100% specificity, 4% false positive rate). Only a small fraction of the samples needed to be confirmed with the majority of oils identified rapidly using only the spectroscopic procedure. The results demonstrate the huge potential of the methodology for a wide range of oil authenticity work.
Resumo:
Whey protein has been indicated to curb diet-induced obesity, glucose intolerance and delay the onset of type 2 diabetes mellitus. Here the effects of intact crude whey, intact individual whey proteins and beta-lactoglobulin hydrolysates on an enteroendocrine (EE) cell model were examined. STC-1 pGIP/neo cells were incubated with several concentrations of yogurt whey (YW), cheese whey (CW), beta-lactoglobulin (BLG), alpha-lactalbumin (ALA) and bovine serum albumin (BSA). The findings demonstrate that BLG stimulates EE cell proliferation, and also GLP-1 secretion (an effect which is lost following hydrolysis with chymotrypsin or trypsin). ALA is a highly potent GLP-1 secretagogue which also increases the intracellular levels of GLP-1. Conversely, whey proteins and hydrolysates had little impact on GIP secretion. This appears to be the first investigation of the effects of the three major proteins of YW and CW on EE cells. The anti-diabetic potential of whey proteins should be further investigated.
Resumo:
The present analysis aimed to investigate the changes in the reported portion sizes (PS) of foods and beverages commonly consumed by Irish adults (18-64 years) from the North South Ireland Food Consumption Survey (NSIFCS) (1997-2001) and the National Adult Nutrition Survey (NANS) (2008-10). Food PS, which are defined as the weight of food (g) consumed per eating occasion, were calculated for comparable foods and beverages in two nationally representative cross-sectional Irish food consumption surveys and were published in NSIFCS and NANS. Repeated measure mixed model analysis compared reported food PS at the total population level as well as subdivided by sex, age, BMI and social class. A total of thirteen commonly consumed foods were examined. The analysis demonstrated that PS significantly increased for five foods ('white sliced bread', 'brown/wholemeal breads', 'all meat, cooked', 'poultry, roasted' and 'milk'), significantly decreased for three ('potatoes', 'chips/wedges' and 'ham, sliced') and did not significantly change for five foods ('processed potato products', 'bacon/ham', 'cheese', 'yogurt' and 'butter/spreads') between the NSIFCS and the NANS. The present study demonstrates that there was considerable variation in the trends in reported food PS over this period.
Resumo:
Experiences from smart grid cyber-security incidents in the past decade have raised questions on the applicability and effectiveness of security measures and protection mechanisms applied to the grid. In this chapter we focus on the security measures applied under real circumstances in today’s smart grid systems. Beginning from real world example implementations, we first review cyber-security facts that affected the electrical grid, from US blackout incidents, to the Dragonfly cyber-espionage campaign currently focusing on US and European energy firms. Provided a real world setting, we give information related to energy management of a smart grid looking also in the optimization techniques that power control engineers perform into the grid components. We examine the application of various security tools in smart grid systems, such as intrusion detection systems, smart meter authentication and key management using Physical Unclonable Functions, security analytics and resilient control algorithms. Furthermore we present evaluation use cases of security tools applied on smart grid infrastructure test-beds that could be proved important prior to their application in the real grid, describing a smart grid intrusion detection system application and security analytics results. Anticipated experimental results from the use-cases and conclusions about the successful transitions of security measures to real world smart grid operations will be presented at the end of this chapter.
Resumo:
A Physical Unclonable Function (PUF) can be used to provide authentication of devices by producing die-unique responses. In PUFs based on ring oscillators (ROs) the responses are derived from the oscillation frequencies of the ROs. However, RO PUFs can be vulnerable to attack due to the frequency distribution characteristics of the RO arrays. In this letter, in order to improve the design of RO PUFs for FPGA devices, the frequencies of RO arrays implemented on a large number of FPGA chips are statistically analyzed. Three RO frequency distribution (ROFD) characteristics, which can be used to improve the design of RO PUFs are observed and discussed.
Resumo:
Physically Unclonable Functions (PUFs), exploit inherent manufacturing variations and present a promising solution for hardware security. They can be used for key storage, authentication and ID generations. Low power cryptographic design is also very important for security applications. However, research to date on digital PUF designs, such as Arbiter PUFs and RO PUFs, is not very efficient. These PUF designs are difficult to implement on Field Programmable Gate Arrays (FPGAs) or consume many FPGA hardware resources. In previous work, a new and efficient PUF identification generator was presented for FPGA. The PUF identification generator is designed to fit in a single slice per response bit by using a 1-bit PUF identification generator cell formed as a hard-macro. In this work, we propose an ultra-compact PUF identification generator design. It is implemented on ten low-cost Xilinx Spartan-6 FPGA LX9 microboards. The resource utilization is only 2.23%, which, to the best of the authors' knowledge, is the most compact and robust FPGA-based PUF identification generator design reported to date. This PUF identification generator delivers a stable range of uniqueness of around 50% and good reliability between 85% and 100%.
Resumo:
A Physical Unclonable Function (PUF) can be used to provide authentication of devices by producing die-unique responses. In PUFs based on ring oscillators (ROs), the responses are derived from the oscillation frequencies of the ROs. However, RO PUFs can be vulnerable to attack due to the frequency distribution characteristics of the RO arrays. In this paper, in order to improve the design of RO PUFs for FPGA devices, the frequencies of RO arrays implemented on a large number of FPGA chips are statistically analyzed. Three RO frequency distribution (ROFD) characteristics are observed and discussed. Based on these ROFD characteristics, two RO comparison strategies are proposed that can be used to improve the design of RO PUFs. It is found that the symmetrical RO comparison strategy has the highest entropy density.