7,511 research outputs found

    Antimicrobial susceptibility assessment of Campylobacter on outdoor iberian pig sows

    Get PDF
    Both Campylobacter and Salmonella are considered the most frequent bacterial causes of human enteritis in industrialized countries. The consumption of raw or undercooked poultry and pork contaminated meat products are the main sources of human infection. The prevalence of Campylobacter and Salmonella was determined in the present work for extensive production Iberian pig sows, Sus mediterraneus. Samples were collected at the maternity area of a creator from, water drinkers, feed and feed containers as well as from sows faecal matter. Of 42 samples, 31 and 23 carried Campylobacter spp. and Salmonella spp. respectively. Only Salmonella spp. was found in all 3 tested water and feed containers. Of the 58 isolated Campylobacter strains only one was identified, by multiplex-PCR, as Campylobacter jejuni, all other were C. coli. Antibiotic susceptibility was performed by disc diffusion method with Nalidixic acid, Ciprofloxacin, Erythromycin, Tetracycline, Chloramphenicol and Ampicilin. While 95% of the tested strains were susceptible to chloramphenicol, 66% and 53% were resistant to the tested fluoroquinolones, Ciprofloxacin and Nalidixic acid respectively. Erythromycin resistance was fairly low in comparison to previous publications with 14% of resistant strains. 38% were resistant to Tetracycline and 57% to Ampicilin. Seven of the 58 Campylobacter strains were entirely susceptible and none were resistant to all the antimicrobials tested. Multiple drug resistance was found in 88% of strains. Cross contamination may occur between sows inside maternity facilities and piglets may become infected in an early age by their mothers. New and better control measures are therefore necessary to minimize transmission between animals reducing the number of contaminated individuals and the potential transmission to human handlers and consumers

    Hidden Costs of Hiding Stigma: Ironic Interpersonal Consequences of Concealing a Stigmatized Identity in Social Interactions

    Get PDF
    PublishedArticleCopyright © 2014 Elsevier Inc. All rights reserved.People who possess a concealable stigmatized identity (e.g., minority sexual orientation; history of mental illness) often choose to hide this identity from others in order to avoid stigmatization and bias. Despite the potential benefits of this identity management strategy, we propose that instead of increasing acceptance, hiding a stigmatized identity can result in a lowered sense of belonging and even actual social rejection. Across three experimental studies, we show that hiding (vs. revealing) a stigmatized identity during a social interaction reduces feelings of belonging (Studies 1-3), an effect that is mediated by feelings of inauthenticity and reduced self-disclosure (Study 2). Furthermore, we demonstrate that the detrimental interpersonal effects of hiding (vs. revealing) a stigmatized identity are detected by external observers (Study 2) and non-stigmatized interaction partners (Study 3). Implications for understanding the predicament of people living with stigmatized social identities are discussed

    Revealing side effects of quota rules on group cooperation

    Get PDF
    ArticleThe quota rule in employment is a legal tool to promote gender equality in professions and positions where women are underrepresented. An accompanying assumption is that gender diversity positively affects one of the aspects of team performance in form of group cooperation. However, it is unclear whether this positive effect can be achieved if diversity increases due to a quota rule. In two fully incentivized experiments involving a real-effort task (N1 = 188 and N2 = 268), we examined the impact of quotas as compared to performance-based promotion on group cooperation. We thereby categorized participants either with regard to gender or to an artificial category that was randomly assigned. Cooperation within groups declined when promotion was based on quota compared to performance-based promotion, irrespective of the categorization criterion. Further analyses revealed that this negative effect of quota rules on cooperation is not driven by procedural fairness perceptions or expectations about performance of the promoted group member. Implications of the results for the implementation of equality and diversity initiatives are discussed

    Utilização de gliricídia no sistema de cultivo em alameda nos solos de tabuleiros costeiros.

    Get PDF
    bitstream/item/87360/1/CPATC-PESQ.-AND.-06-96.pd

    Recomendações técnicas para o uso da adubação verde em solos de tabuleiros Costeiros.

    Get PDF
    bitstream/CPATC/19947/1/CircularT_19.pd

    Adubação verde comv leguminosas em cultivo intercalar com a cultura do milho.

    Get PDF
    bitstream/item/33977/1/bp-07.pd

    A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM

    Get PDF
    Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation. We construct a round-optimal (2 rounds) universally composable (UC) protocol for oblivious transfer secure against active adaptive adversaries from any OW-CPA secure public-key encryption scheme with certain properties in the random oracle model (ROM). In terms of computation, our protocol only requires the generation of a public/secret-key pair, two encryption operations and one decryption operation, apart from a few calls to the random oracle. In~terms of communication, our protocol only requires the transfer of one public-key, two ciphertexts, and three binary strings of roughly the same size as the message. Next, we show how to instantiate our construction under the low noise LPN, McEliece, QC-MDPC, LWE, and CDH assumptions. Our instantiations based on the low noise LPN, McEliece, and QC-MDPC assumptions are the first UC-secure OT protocols based on coding assumptions to achieve: 1) adaptive security, 2) optimal round complexity, 3) low communication and computational complexities. Previous results in this setting only achieved static security and used costly cut-and-choose techniques.Our instantiation based on CDH achieves adaptive security at the small cost of communicating only two more group elements as compared to the gap-DH based Simplest OT protocol of Chou and Orlandi (Latincrypt 15), which only achieves static security in the ROM
    corecore