7,511 research outputs found
Antimicrobial susceptibility assessment of Campylobacter on outdoor iberian pig sows
Both Campylobacter and Salmonella are considered the most frequent bacterial causes of human enteritis in
industrialized countries. The consumption of raw or undercooked poultry and pork contaminated meat products
are the main sources of human infection. The prevalence of Campylobacter and Salmonella was determined in
the present work for extensive production Iberian pig sows, Sus mediterraneus. Samples were collected at the
maternity area of a creator from, water drinkers, feed and feed containers as well as from sows faecal matter. Of
42 samples, 31 and 23 carried Campylobacter spp. and Salmonella spp. respectively. Only Salmonella spp. was
found in all 3 tested water and feed containers. Of the 58 isolated Campylobacter strains only one was identified,
by multiplex-PCR, as Campylobacter jejuni, all other were C. coli. Antibiotic susceptibility was performed by
disc diffusion method with Nalidixic acid, Ciprofloxacin, Erythromycin, Tetracycline, Chloramphenicol and
Ampicilin. While 95% of the tested strains were susceptible to chloramphenicol, 66% and 53% were resistant to
the tested fluoroquinolones, Ciprofloxacin and Nalidixic acid respectively. Erythromycin resistance was fairly
low in comparison to previous publications with 14% of resistant strains. 38% were resistant to Tetracycline and
57% to Ampicilin. Seven of the 58 Campylobacter strains were entirely susceptible and none were resistant to all
the antimicrobials tested. Multiple drug resistance was found in 88% of strains. Cross contamination may occur
between sows inside maternity facilities and piglets may become infected in an early age by their mothers. New
and better control measures are therefore necessary to minimize transmission between animals reducing the
number of contaminated individuals and the potential transmission to human handlers and consumers
Hidden Costs of Hiding Stigma: Ironic Interpersonal Consequences of Concealing a Stigmatized Identity in Social Interactions
PublishedArticleCopyright © 2014 Elsevier Inc. All rights reserved.People who possess a concealable stigmatized identity (e.g., minority sexual orientation; history of mental illness) often choose to hide this identity from others in order to avoid stigmatization and bias. Despite the potential benefits of this identity management strategy, we propose that instead of increasing acceptance, hiding a stigmatized identity can result in a lowered sense of belonging and even actual social rejection. Across three experimental studies, we show that hiding (vs. revealing) a stigmatized identity during a social interaction reduces feelings of belonging (Studies 1-3), an effect that is mediated by feelings of inauthenticity and reduced self-disclosure (Study 2). Furthermore, we demonstrate that the detrimental interpersonal effects of hiding (vs. revealing) a stigmatized identity are detected by external observers (Study 2) and non-stigmatized interaction partners (Study 3). Implications for understanding the predicament of people living with stigmatized social identities are discussed
Revealing side effects of quota rules on group cooperation
ArticleThe quota rule in employment is a legal tool to promote gender equality in professions and positions where women are underrepresented. An accompanying assumption is that gender diversity positively affects one of the aspects of team performance in form of group cooperation.
However, it is unclear whether this positive effect can be achieved if diversity increases due to a quota rule. In two fully incentivized experiments involving a real-effort task (N1 = 188 and N2 = 268), we examined the impact of quotas as compared to performance-based promotion on group
cooperation. We thereby categorized participants either with regard to gender or to an artificial category that was randomly assigned. Cooperation within groups declined when promotion was based on quota compared to performance-based promotion, irrespective of the categorization
criterion. Further analyses revealed that this negative effect of quota rules on cooperation is not driven by procedural fairness perceptions or expectations about performance of the promoted group member. Implications of the results for the implementation of equality and diversity
initiatives are discussed
Utilização de gliricídia no sistema de cultivo em alameda nos solos de tabuleiros costeiros.
bitstream/item/87360/1/CPATC-PESQ.-AND.-06-96.pd
Recomendações técnicas para o uso da adubação verde em solos de tabuleiros Costeiros.
bitstream/CPATC/19947/1/CircularT_19.pd
Adubação verde comv leguminosas em cultivo intercalar com a cultura do milho.
bitstream/item/33977/1/bp-07.pd
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a
number of applications, in particular, as an essential building block for
two-party and multi-party computation. We construct a round-optimal (2 rounds)
universally composable (UC) protocol for oblivious transfer secure against
active adaptive adversaries from any OW-CPA secure public-key encryption scheme
with certain properties in the random oracle model (ROM). In terms of
computation, our protocol only requires the generation of a public/secret-key
pair, two encryption operations and one decryption operation, apart from a few
calls to the random oracle. In~terms of communication, our protocol only
requires the transfer of one public-key, two ciphertexts, and three binary
strings of roughly the same size as the message. Next, we show how to
instantiate our construction under the low noise LPN, McEliece, QC-MDPC, LWE,
and CDH assumptions. Our instantiations based on the low noise LPN, McEliece,
and QC-MDPC assumptions are the first UC-secure OT protocols based on coding
assumptions to achieve: 1) adaptive security, 2) optimal round complexity, 3)
low communication and computational complexities. Previous results in this
setting only achieved static security and used costly cut-and-choose
techniques.Our instantiation based on CDH achieves adaptive security at the
small cost of communicating only two more group elements as compared to the
gap-DH based Simplest OT protocol of Chou and Orlandi (Latincrypt 15), which
only achieves static security in the ROM
- …