846 resultados para Categories of bases
Resumo:
The hydroformylation reaction represents one of the most important C1-chemistry area in the chemical industry. This catalytic process, which has been developed up to now mainly to the production of commodities chemicals, has shown a remarkable potential for the preparation of several categories of specialty chemicals and in particular pharmaceutical compounds. Arylpropanoic acids, various amines containing aryl groups, and intermediates for the preparation of vitamins, carbocyclic and heterocyclic compounds and many other classes of organic molecules endowed with pharmacological activity are currently accessible in good-to-high yields through hydroformylation of selected olefinic substrates. The asymmetric hydroformylation is going to reach the stage of maturity and hence to contribute in solving many troublesome synthetic problems connected with the preparation of pharmacologically active compounds with very high enantiomeric purity. The present survey emphasizes the usefulness of synthesis gas as a starting material in fine chemistry, which is expected to be important for industry.
Resumo:
The basic goal of this study is to extend old and propose new ways to generate knapsack sets suitable for use in public key cryptography. The knapsack problem and its cryptographic use are reviewed in the introductory chapter. Terminology is based on common cryptographic vocabulary. For example, solving the knapsack problem (which is here a subset sum problem) is termed decipherment. Chapter 1 also reviews the most famous knapsack cryptosystem, the Merkle Hellman system. It is based on a superincreasing knapsack and uses modular multiplication as a trapdoor transformation. The insecurity caused by these two properties exemplifies the two general categories of attacks against knapsack systems. These categories provide the motivation for Chapters 2 and 4. Chapter 2 discusses the density of a knapsack and the dangers of having a low density. Chapter 3 interrupts for a while the more abstract treatment by showing examples of small injective knapsacks and extrapolating conjectures on some characteristics of knapsacks of larger size, especially their density and number. The most common trapdoor technique, modular multiplication, is likely to cause insecurity, but as argued in Chapter 4, it is difficult to find any other simple trapdoor techniques. This discussion also provides a basis for the introduction of various categories of non injectivity in Chapter 5. Besides general ideas of non injectivity of knapsack systems, Chapter 5 introduces and evaluates several ways to construct such systems, most notably the "exceptional blocks" in superincreasing knapsacks and the usage of "too small" a modulus in the modular multiplication as a trapdoor technique. The author believes that non injectivity is the most promising direction for development of knapsack cryptosystema. Chapter 6 modifies two well known knapsack schemes, the Merkle Hellman multiplicative trapdoor knapsack and the Graham Shamir knapsack. The main interest is in aspects other than non injectivity, although that is also exploited. In the end of the chapter, constructions proposed by Desmedt et. al. are presented to serve as a comparison for the developments of the subsequent three chapters. Chapter 7 provides a general framework for the iterative construction of injective knapsacks from smaller knapsacks, together with a simple example, the "three elements" system. In Chapters 8 and 9 the general framework is put into practice in two different ways. Modularly injective small knapsacks are used in Chapter 9 to construct a large knapsack, which is called the congruential knapsack. The addends of a subset sum can be found by decrementing the sum iteratively by using each of the small knapsacks and their moduli in turn. The construction is also generalized to the non injective case, which can lead to especially good results in the density, without complicating the deciphering process too much. Chapter 9 presents three related ways to realize the general framework of Chapter 7. The main idea is to join iteratively small knapsacks, each element of which would satisfy the superincreasing condition. As a whole, none of these systems need become superincreasing, though the development of density is not better than that. The new knapsack systems are injective but they can be deciphered with the same searching method as the non injective knapsacks with the "exceptional blocks" in Chapter 5. The final Chapter 10 first reviews the Chor Rivest knapsack system, which has withstood all cryptanalytic attacks. A couple of modifications to the use of this system are presented in order to further increase the security or make the construction easier. The latter goal is attempted by reducing the size of the Chor Rivest knapsack embedded in the modified system. '
Resumo:
In this paper we propose an approach to homotopical algebra where the basic ingredient is a category with two classes of distinguished morphisms: strong and weak equivalences. These data determine the cofibrant objects by an extension property analogous to the classical lifting property of projective modules. We define a Cartan-Eilenberg category as a category with strong and weak equivalences such that there is an equivalence of categories between its localisation with respect to weak equivalences and the relative localisation of the subcategory of cofibrant objects with respect to strong equivalences. This equivalence of categories allows us to extend the classical theory of derived additive functors to this non additive setting. The main examples include Quillen model categories and categories of functors defined on a category endowed with a cotriple (comonad) and taking values on a category of complexes of an abelian category. In the latter case there are examples in which the class of strong equivalences is not determined by a homotopy relation. Among other applications of our theory, we establish a very general acyclic models theorem.
Resumo:
This paper presents results of a content analysis of the formative professional profile of undergraduates within the context of Brazil's expansion of its federal education system and implementing of teacher training policies. The analysis focuses on the conceptions of undergraduates regarding elements of their initial training and professional perspectives, as recorded in narratives, interviews, and questionnaires. Based on the relationships identified between the recorded content and the Educational Course Project, we identified three categories of analysis that point to tensions generated during the professional development of chemistry teachers: 1) The relationship between pedagogical knowledge and chemical knowledge; 2) the conceptual aspects of science education, as represented by the different ways that students understand the "ionization process"; and 3) teaching identity, including the elements indicative of the identity construction of future teachers. The results indicate that the educational and professional profile of undergraduates is marked by a particular tension between chemical content knowledge and pedagogical content, as well as a lack of objectivity and focus on the course's original intent. This situation has produced a multifaceted training context in which there is confusion regarding aspects relating to the licensing, teaching modalities, and preparation of the chemistry education professional.
Curriculum innovation in teacher education : exploring conceptions among Tanzanian teacher educators
Resumo:
The focus of the study is to understand curriculum innovation from the perspective of Tanzanian teacher educators. It is argued that the deterioration of quality of education in schools is partly to be attributed to the way in which teachers are educated. Curriculum innovation is considered as an essential strategy for bringing about improvement in teacher education. Therefore, in 2000 a new curriculum was introduced; however, right from the inception the curriculum was criticised by teacher educators. The overall aim of the study is to investigate teacher educators’ conceptions of curriculum innovation. In the theoretical framework the main focus is on discussion about different curriculum approaches for teacher education and innovation. In order to achieve the aim of the study, a phenomenographic approach is employed. This approach is used in order to identify similarities and variation in educators’ conceptions of curriculum innovation. The empirical basis of the study consists of interviews with thirty teacher educators working in eight teachers’ colleges situated in various parts of Tanzania. The findings, in brief, reveal variation in teacher educators’ conceptions of the dominant domains of innovation. Two broad conceptions of teaching with six aspects are identified. Conceptions of educational studies are presented in four broad categories of description with four aspects. Similarly, in methodology subjects two conceptions are described with four aspects. On the integration of subject matter studies and subject methods, two broad conceptions are presented with six aspects. Conceptions of textbook prescription policy are characterised in two broad categories of description with four aspects. With the use of modules two broad conceptions are identified with six aspects. In addition, the study identifies four broad conceptions of future curriculum approaches with eight aspects. Looking across the categories of description, the results indicate that educators cope with innovation individually. Three character types of teacher educators are presented: loyal, creative and critical. Furthermore, four types of phenomena suggesting critical areas about teacher educators’ conceptions of innovation are described: educators’ prior educational background, technical factors, student teachers’ factors and shifting from teaching to learning. On the whole, educators express a number of frame factors in the process of change towards the aim of curriculum innovation. This indicates that the new curriculum (2000) is not implemented as intended by curriculum developers. Constraints to the implementation are presented and discussed in detail. From these findings, two models of educators’ stance towards curriculum innovation are presented and can be used as a framework for planning successful curriculum innovations and analysing practice in teachers’ colleges.
Resumo:
The objective of this study was to verify the potential of SNAP III (Scheduling and Network Analysis Program) as a support tool for harvesting and wood transport planning in Brazil harvesting subsystem definition and establishment of a compatible route were assessed. Initially, machine operational and production costs were determined in seven subsystems for the study area, and quality indexes, construction and maintenance costs of forest roads were obtained and used as SNAP III program input data. The results showed, that three categories of forest road occurrence were observed in the study area: main, secondary and tertiary which, based on quality index, allowed a medium vehicle speed of about 41, 30 and 24 km/hours and a construction cost of about US$ 5,084.30, US$ 2,275.28 and US$ 1,650.00/km, respectively. The SNAP III program used as a support tool for the planning, was found to have a high potential tool in the harvesting and wood transport planning. The program was capable of defining efficiently, the harvesting subsystem on technical and economical basis, the best wood transport route and the forest road to be used in each period of the horizon planning.
Resumo:
Visual data mining (VDM) tools employ information visualization techniques in order to represent large amounts of high-dimensional data graphically and to involve the user in exploring data at different levels of detail. The users are looking for outliers, patterns and models – in the form of clusters, classes, trends, and relationships – in different categories of data, i.e., financial, business information, etc. The focus of this thesis is the evaluation of multidimensional visualization techniques, especially from the business user’s perspective. We address three research problems. The first problem is the evaluation of projection-based visualizations with respect to their effectiveness in preserving the original distances between data points and the clustering structure of the data. In this respect, we propose the use of existing clustering validity measures. We illustrate their usefulness in evaluating five visualization techniques: Principal Components Analysis (PCA), Sammon’s Mapping, Self-Organizing Map (SOM), Radial Coordinate Visualization and Star Coordinates. The second problem is concerned with evaluating different visualization techniques as to their effectiveness in visual data mining of business data. For this purpose, we propose an inquiry evaluation technique and conduct the evaluation of nine visualization techniques. The visualizations under evaluation are Multiple Line Graphs, Permutation Matrix, Survey Plot, Scatter Plot Matrix, Parallel Coordinates, Treemap, PCA, Sammon’s Mapping and the SOM. The third problem is the evaluation of quality of use of VDM tools. We provide a conceptual framework for evaluating the quality of use of VDM tools and apply it to the evaluation of the SOM. In the evaluation, we use an inquiry technique for which we developed a questionnaire based on the proposed framework. The contributions of the thesis consist of three new evaluation techniques and the results obtained by applying these evaluation techniques. The thesis provides a systematic approach to evaluation of various visualization techniques. In this respect, first, we performed and described the evaluations in a systematic way, highlighting the evaluation activities, and their inputs and outputs. Secondly, we integrated the evaluation studies in the broad framework of usability evaluation. The results of the evaluations are intended to help developers and researchers of visualization systems to select appropriate visualization techniques in specific situations. The results of the evaluations also contribute to the understanding of the strengths and limitations of the visualization techniques evaluated and further to the improvement of these techniques.
Resumo:
Työ käsittelee ulkoistettujen logistiikkapalveluiden kustannusrakennetta sekä niiden mahdollista säästöpotentiaalia. Asetettu säästötavoite on kymmenen prosenttia. Logistiikkakustannukset muodostuvat pääpiirteissään ostorahdista, myyntirahdista, varastojen ja tuotantolaitoksen välisistä rahdeista sekä ulkopuolisilta toimijoilta vuokratuista varastoista. Työn teettävän yrityksen logistiikkakustannusten kustannusjakaumat tulee selvittää tekijöittäin perinpohjaisesti. Kustannustekijöiden määrittämisen jälkeen kustannukset on kohdistettu kullekin tekijälle yksitellen. Kustannustietojen osalta tutkimus kohdistui yrityksen omaan raportointiin, kirjanpitoon, palveluita tarjoavien toimijoiden laskutukseen sekä toimijoiden rahtien ja varastoinnin dokumentointeihin. Työn teoriaosuus pohjautuu tieteellisiin artikkeleihin ja kirjallisuuteen. Tutkimuskohteiden ja asetetun säästötavoitteen pohjalta on haarukoitu keinoja säästötavoitteen saavuttamiseksi. Kustannussäästöjä on haettu kahta eri reittiä pitkin. Ensimmäiseksi säästöjä haetaan organisaation oman toiminnan tehostamisella ja sitä kautta löytyvillä muutoksilla nykyiseen toimintamalliin nähden. Toinen tutkimuspolku on säästöjen hakeminen investointeja tekemällä. Oman toiminnan tehostamisen toimenpiteillä sekä investointeja tekemällä on mahdollista päästä asetettuun säästötavoitteeseen koskien yrityksen logistiikkakustannuksia.
Resumo:
The ongoing global financial crisis has demonstrated the importance of a systemwide, or macroprudential, approach to safeguarding financial stability. An essential part of macroprudential oversight concerns the tasks of early identification and assessment of risks and vulnerabilities that eventually may lead to a systemic financial crisis. Thriving tools are crucial as they allow early policy actions to decrease or prevent further build-up of risks or to otherwise enhance the shock absorption capacity of the financial system. In the literature, three types of systemic risk can be identified: i ) build-up of widespread imbalances, ii ) exogenous aggregate shocks, and iii ) contagion. Accordingly, the systemic risks are matched by three categories of analytical methods for decision support: i ) early-warning, ii ) macro stress-testing, and iii ) contagion models. Stimulated by the prolonged global financial crisis, today's toolbox of analytical methods includes a wide range of innovative solutions to the two tasks of risk identification and risk assessment. Yet, the literature lacks a focus on the task of risk communication. This thesis discusses macroprudential oversight from the viewpoint of all three tasks: Within analytical tools for risk identification and risk assessment, the focus concerns a tight integration of means for risk communication. Data and dimension reduction methods, and their combinations, hold promise for representing multivariate data structures in easily understandable formats. The overall task of this thesis is to represent high-dimensional data concerning financial entities on lowdimensional displays. The low-dimensional representations have two subtasks: i ) to function as a display for individual data concerning entities and their time series, and ii ) to use the display as a basis to which additional information can be linked. The final nuance of the task is, however, set by the needs of the domain, data and methods. The following ve questions comprise subsequent steps addressed in the process of this thesis: 1. What are the needs for macroprudential oversight? 2. What form do macroprudential data take? 3. Which data and dimension reduction methods hold most promise for the task? 4. How should the methods be extended and enhanced for the task? 5. How should the methods and their extensions be applied to the task? Based upon the Self-Organizing Map (SOM), this thesis not only creates the Self-Organizing Financial Stability Map (SOFSM), but also lays out a general framework for mapping the state of financial stability. This thesis also introduces three extensions to the standard SOM for enhancing the visualization and extraction of information: i ) fuzzifications, ii ) transition probabilities, and iii ) network analysis. Thus, the SOFSM functions as a display for risk identification, on top of which risk assessments can be illustrated. In addition, this thesis puts forward the Self-Organizing Time Map (SOTM) to provide means for visual dynamic clustering, which in the context of macroprudential oversight concerns the identification of cross-sectional changes in risks and vulnerabilities over time. Rather than automated analysis, the aim of visual means for identifying and assessing risks is to support disciplined and structured judgmental analysis based upon policymakers' experience and domain intelligence, as well as external risk communication.
Resumo:
The overall aim of this study was to investigate and examine teacher educators’ conceptions and experiences of quality of teacher education. The research interest therefore was two-fold: a) to deepen understanding of the concept quality and b) scrutinize experiences of teacher educators of quality enhancement. To achieve this ambition the study was conducted in the context of a newly established university college-based teacher education in Tanzania. Two research questions guided the study. The first focused on investigating how teacher educators conceived quality in the domain of teacher education and the second intended to explore teacher educators’ experiences of quality enhancement. The theoretical framework of the study centered on the concepts of teacher education, quality, and criteria for quality enhancement. Phenomenographic and phenomenological approaches under the main umbrella of qualitative research design were selected. Twenty five teacher educators participated in the study. Interviews were used for the collection of the data. The results of the first research question, in brief, indicate that teacher educators’ conceptions of quality are expressed in two main categories, namely, outstanding academic scholarship and adequate professional scholarship. Quality as outstanding academic scholarship was illustrated by two subcategories: excellence and positive transformation. While the former was composed of two aspects, the latter was demonstrated by three aspects. Quality as adequate professional scholarship was described in three sub-categories. The first was improved teaching competency, consisting of two aspects. The second was conscious research orientation, which is displayed by three aspects, and the last was enhancing the ability to reflect, represented by two aspects. The results of the second research question, which focused on exploring teacher educators’ experience of quality enhancement, were classified into two main categories of description: insufficient programs of teacher education and unsatisfactory professional development of teacher educators. From the two categories, the strengths, weaknesses, opportunities and challenges related to programs of educating teachers, particularly curriculum development and implementation, and the professional development of educators, were exposed. Since the ambition of conducting the study was to deepen the understanding by producing insight that would act as a platform for appraising and enhancing the quality of teacher education, the results hopefully can be used for the development of the quality of teacher education in Tanzania.
Resumo:
The objective of the thesis is to study the role of design in adding value for wearable technology (WT) items in B2C markets by applying previous value creation literature to the subject. The thesis investigates value creation through types of value perceived by the customer being functional/instrumental, experiential/hedonic, symbolic/expressive and cost/sacrifice. The data was collected in face-to-face interviews with both consumers and industry experts. The results suggest that value perceived by both experts and consumers in every end-user category was elementarily functional, however, design was considered to bring most added value to WT in the categories of health and medicine, infotainment, and fashion. Also, WT ought to have same characteristics as regular clothing in order to attract mass markets. The results of the study suggest that companies should invest in design in order to gain long-term user engagement.
Resumo:
The purpose of this study is to identify factors contributory to success or failure of a microenterprise. Microenterprise is an enterprise with less than10 employees. About 99 % of all Finnish enterprises fall in this category. Earlier studies do not provide a comprehensive view on microenterprise success and failure factors. The theoretical part discusses the definition of success and failure, previous research and results already established about the topic and categories of business environment. The empirical part is founded on quantitative survey results from 204 Finnish microenterprises. The questions of the survey were based on previous surveys, literature and intuition. Both success and failure factors were enquired. Summary of the results was made and the results were compared among successful and unsuccessful enterprises. In open-end questions, the most important factors mentioned to affect enterprise performance positively were "Employees", "Customers" and "Skills, knowledge, education and experience." The most important factors affecting enterprise performance negatively were "Economical situation", "Employees availability and attitudes" as well as "Political decisions and passed laws". In Likert-scale set of questions, the most significant factors from the point of view of enterprise performance were "Product and / or service good quality", "Good reputation of the company" and "Staff's strong skills". The least significant factors were "Effect of marketing and promotion", "Conflicts" and "Differences of points of views of different generations". By Likert-scale set of questions, it was also tested which operations the enterprises perform, and according to the results, successful enterprises found "Performing a market research", "Use of distribution channel in sales" and "Expanding to new markets" less important than unsuccessful enterprises. The tests proved that the age of the enterprise correlates with the level of success of the enterprise: The younger the enterprise, the more successful it is. In addition, the results show that if the enterprise is family based, the less successful it is. In addition, there was also slight correlation between success and the level of growth, indicating that higher the level of growth the more successful the enterprise is. From the business environment point of view, the key finding was that internal factors affect more on the success of an enterprise than external factors, and that external factors affect more on the failure of an enterprise than internal factors.
Resumo:
This thesis aims to find an effective way of conducting a target audience analysis (TAA) in cyber domain. There are two main focal points that are addressed; the nature of the cyber domain and the method of the TAA. Of the cyber domain the object is to find the opportunities, restrictions and caveats that result from its digital and temporal nature. This is the environment in which the TAA method is examined in this study. As the TAA is an important step of any psychological operation and critical to its success, the method used must cover all the main aspects affecting the choice of a proper target audience. The first part of the research was done by sending an open-ended questionnaire to operators in the field of information warfare both in Finland and abroad. As the results were inconclusive, the research was completed by assessing the applicability of United States Army Joint Publication FM 3-05.301 in the cyber domain via a theory-based content analysis. FM 3- 05.301 was chosen because it presents a complete method of the TAA process. The findings were tested against the results of the questionnaire and new scientific research in the field of psychology. The cyber domain was found to be “fast and vast”, volatile and uncontrollable. Although governed by laws to some extent, the cyber domain is unpredictable by nature and not controllable to reasonable amount. The anonymity and lack of verification often present in the digital channels mean that anyone can have an opinion, and any message sent may change or even be counterproductive to the original purpose. The TAA method of the FM 3-05.301 is applicable in the cyber domain, although some parts of the method are outdated and thus suggested to be updated if used in that environment. The target audience categories of step two of the process were replaced by new groups that exist in the digital environment. The accessibility assessment (step eight) was also redefined, as in the digital media the mere existence of a written text is typically not enough to convey the intended message to the target audience. The scientific studies made in computer sciences and both in psychology and sociology about the behavior of people in social media (and overall in cyber domain) call for a more extensive remake of the TAA process. This falls, however, out of the scope of this work. It is thus suggested that further research should be carried out in search of computer-assisted methods and a more thorough TAA process, utilizing the latest discoveries of human behavior. ---------------------------------------------------------------------------------------------------------------------------------- Tämän opinnäytetyön tavoitteena on löytää tehokas tapa kohdeyleisöanalyysin tekemiseksi kybertoimintaympäristössä. Työssä keskitytään kahteen ilmiöön: kybertoimintaympäristön luonteeseen ja kohdeyleisöanalyysin metodiin. Kybertoimintaympäristön osalta tavoitteena on löytää sen digitaalisesta ja ajallisesta luonteesta juontuvat mahdollisuudet, rajoitteet ja sudenkuopat. Tämä on se ympäristö jossa kohdeyleisöanalyysiä tarkastellaan tässä työssä. Koska kohdeyleisöanalyysi kuuluu olennaisena osana jokaiseen psykologiseen operaatioon ja on onnistumisen kannalta kriittinen tekijä, käytettävän metodin tulee pitää sisällään kaikki oikean kohdeyleisön valinnan kannalta merkittävät osa-alueet. Tutkimuksen ensimmäisessä vaiheessa lähetettiin avoin kysely informaatiosodankäynnin ammattilaisille Suomessa ja ulkomailla. Koska kyselyn tulokset eivät olleet riittäviä johtopäätösten tekemiseksi, tutkimusta jatkettiin tarkastelemalla Yhdysvaltojen armeijan kenttäohjesäännön FM 3-05.301 soveltuvuutta kybertoimintaympäristössä käytettäväksi teorialähtöisen sisällönanalyysin avulla. FM 3-05.301 valittiin koska se sisältää kokonaisvaltaisen kohdeyleisöanalyysiprosessin. Havaintoja verrattiin kyselytutkimuksen tuloksiin ja psykologian uusiin tutkimuksiin. Kybertoimintaympäristö on tulosten perusteella nopea ja valtava, jatkuvasti muuttuva ja kontrolloimaton. Vaikkakin lait hallitsevat kybertoimintaympäristöä jossakin määrin, on se silti luonteeltaan ennakoimaton eikä sitä voida luotettavasti hallita. Digitaalisilla kanavilla usein läsnäoleva nimettömyys ja tiedon tarkastamisen mahdottomuus tarkoittavat että kenellä tahansa voi olla mielipide asioista, ja mikä tahansa viesti voi muuttua, jopa alkuperäiseen tarkoitukseen nähden vastakkaiseksi. FM 3-05.301:n metodi toimii kybertoimintaympäristössä, vaikkakin jotkin osa-alueet ovat vanhentuneita ja siksi ne esitetään päivitettäväksi mikäli metodia käytetään kyseisessä ympäristössä. Kohdan kaksi kohdeyleisökategoriat korvattiin uusilla, digitaalisessa ympäristössä esiintyvillä ryhmillä. Lähestyttävyyden arviointi (kohta 8) muotoiltiin myös uudestaan, koska digitaalisessa mediassa pelkkä tekstin läsnäolo ei sellaisenaan tyypillisesti vielä riitä halutun viestin välittämiseen kohdeyleisölle. Tietotekniikan edistyminen ja psykologian sekä sosiologian aloilla tehty tieteellinen tutkimus ihmisten käyttäytymisestä sosiaalisessa mediassa (ja yleensä kybertoimintaympäristössä) mahdollistavat koko kohdeyleisöanalyysiprosessin uudelleenrakentamisen. Tässä työssä sitä kuitenkaan ei voida tehdä. Siksi esitetäänkin että lisätutkimusta tulisi tehdä sekä tietokoneavusteisten prosessien että vielä syvällisempien kohdeyleisöanalyysien osalta, käyttäen hyväksi viimeisimpiä ihmisen käyttäytymiseen liittyviä tutkimustuloksia.
Resumo:
In the present retrospective study we determined the frequency of glucose intolerance in active untreated acromegaly, and searched for risk factors possibly supporting the emergence of the diabetic condition. Among 43 patients, 8 (19%; 95% CI: 8-33%) had diabetes mellitus and 2 (5%; 1-16%) impaired glucose tolerance. No impaired fasting glycemia was demonstrable. The frequency of diabetes was on average 4.5 times higher than in the general Slovak population. Ten factors suspected to support progression to glucose intolerance were studied by comparing the frequency of glucose intolerance between patients with present and absent risk factors. A family history of diabetes and arterial hypertension proved to have a significant promoting effect (P<0.05, chi-square test). A significant association with female gender was demonstrated only after pooling our data with literature data. Concomitant prolactin hypersecretion had a nonsignificant promoting effect. In conclusion, the association of active untreated acromegaly with each of the three categories of glucose intolerance (including impaired fasting glycemia, not yet studied in this connection) was defined as a confidence interval, thus permitting a sound comparison with the findings of future studies. Besides a family history of diabetes, female gender and arterial hypertension were defined as additional, not yet described risk factors.
Resumo:
Various categories of food packaging indicators namely; VTT, Ageless Eye, Mocon, Åbo Akademi and Impak were selected and incorporated into food trays manufactured at LUT packaging laboratory. Each of these food packaging indicators was used to investigate (visually and qualitatively) the transmission of oxygen through the seal, and tray material, as well as to detect microbial activity within the content of the package. Applications of different methods of gas flushing, content variation and introduction of two distinct levels of oxygen scavengers were employed as treatments to evaluate the packaging performance of the food packaging indicators. Ease of handling of each food packaging indicator was also taken into considerations. Findings showed that for packages, which contained chicken product, the amount of oxygen in the package, measured immediately after the sealing operation on the first day gradually decreased to zero percent by the third day of the storage period. The oxygen level remained at this point throughout the duration of storage for the chicken packages. Besides, level of oxygen in the packages without product continued to increase with the storage time, at moderate rate of 0.1% for 100%N2 and 0.3% for 30%CO2/70%N2 empty packages. More carbon dioxide gas was recorded for packages flushed with 30%CO2/70%N2. Results also revealed that visual analysis of one of the color indicators for example Ageless Eye, conformed to the data derived from the luminescence food-packaging indicator. This shows that packaging operation of the packaging line was considerably stable, and efficient with negligible exception. However, it was found that most of the food packaging indicators investigated in this research study exhibited considerable packaging challenges, such as, reaction with the content of the package (Impak); over sensitivity (Åbo Akademi and Impak); ease of handling problem (Åbo Akademi); and ease of activation problem (VTT indicators). In this study, the strengths and limitations of different indicators were analyzed. This study demonstrates the applicability of various indicators in MAP using chicken package application.