23,023 research outputs found

    Combined inhibitory effect of nisin with EDTA against Listeria monocytogenes in soy-protein edible coating on turkey frankfurters stored at 4°C and 10°C

    Get PDF
    Several food contamination outbreaks are linked to Listeria monocytogenes. More effective methods are needed to prevent the growth and recontamination of L. monocytogenes on ready-to-eat (RTE) food products. Therefore, the objectives of this study were to evaluate the inhibitory activities of nisin (10,000 IU/mL), EDTA (sodium Ethylenediaminetetraacetic acid: 1.6 mg/mL), and the combination of nisin (10,000 IU/mL) with EDTA 1.6 mg/mL either in brain-heart-infusion (BHI) media at 37°C for 72 h or in soy-protein edible coating on the surface of full-fat commercial turkey frankfurters against the cell populations of approximately 106 colony forming units (CFU/mL) of L. monocytogenes. The surface-inoculated frankfurters were dipped into soy-protein film forming solutions with and without the addition of antimicrobial agents [(nisin (10,000 IU) or EDTA (0.16%) or the combination)] and stored at either 4°C or 10°C. The inhibitory effects of edible coatings were evaluated on a weekly basis for 45 d. The greatest inhibitory activities of 6 log cycle reductions of L. monocytogenes were found when nisin was combined with EDTA and eliminated 6 log cycles of L. monocytogenes in both systems. In the combined nisin (10,000 IU) with EDTA (0.16%) treatment, the L. monocytogenes population was reduced to undetectable levels after 15 h or 7 d incubation in BHI at 37°C or on turkey frankfurters stored at 4°C and 10°C, respectively. This research has demonstrated that the use of an edible film coating containing nisin with EDTA is a promising means of controlling the growth and recontamination of L. monocytogenes on RTE meat products

    A Measure of Stregth of an Unextendible Product Basis

    Get PDF
    A notion of strength of an unextendible product basis is introduced and a quantitative measure for it is suggested with a view to providing an indirect measure for the bound entanglement of formation of the bound entangled mixed state associated with an unextendible product basis.Comment: 4 pages, Latex, 1 figure, remarks, criticisms welcom

    Quantum identification system

    Full text link
    A secure quantum identification system combining a classical identification procedure and quantum key distribution is proposed. Each identification sequence is always used just once and new sequences are ``refuelled'' from a shared provably secret key transferred through the quantum channel. Two identification protocols are devised. The first protocol can be applied when legitimate users have an unjammable public channel at their disposal. The deception probability is derived for the case of a noisy quantum channel. The second protocol employs unconditionally secure authentication of information sent over the public channel, and thus it can be applied even in the case when an adversary is allowed to modify public communications. An experimental realization of a quantum identification system is described.Comment: RevTeX, 4 postscript figures, 9 pages, submitted to Physical Review

    The Ingwavuma Land Deal: A Case Study of Self-Determination

    Get PDF

    Judging the impact of leadership-development activities on school practice

    Get PDF
    The nature and effectiveness of professional-development activities should be judged in a way that takes account of both the achievement of intended outcomes and the unintended consequences that may result. Our research project set out to create a robust approach that school staff members could use to assess the impact of professional-development programs on leadership and management practice without being constrained in this judgment by the stated aims of the program. In the process, we identified a number of factors and requirements relevant to a wider audience than that concerned with the development of leadership and management in England. Such an assessment has to rest upon a clear understanding of educational leadership,a clearly articulated model of practice, and a clear model of potential forms of impact. Such foundations, suitably adapted to the subject being addressed, are appropriate for assessing all teacher professional development

    Central venous dialysis : an Australian survey

    Full text link
    Aim: To explore the current central venous dialysis catheter (CVDC) nursing care practices in Australia. Method: A survey of dialysis units in Australia. Results: 66% return rate (48/73) Internal jugular is the main insertion site (75%) and the majority are tunneled (85%). Insertion was performed most commonly by radiologists (34%) followed by intensivists (24%) with one center reporting insertion by nursing staff. CVDCs were most commonly inserted in radiology (54%), followed by theatre (33%). Dressings were attended weekly (55%) or on dialysis days (45%). Chlorhexidine was the antiseptic solution of choice (54%) followed by povidine-iodine (37%). In 21% of centres Mupirocin was routinely applied in addition to the antiseptic solution. Transparent dressings were overwhelmingly favoured however most centres recommended alternatives related to patient need. 21% of units reported enrolled nurses undertaking dressings. All units reported the use of sterile gloves and sterile dressing packs. 10% reported different routine care for tunneled and non-tunneled. 40% of the units collected data on infection rates per catheter days. General opinion (39%) was identified as the reason to base CVDC protocols while descriptive studies (25%), RCTs (23%) and guidelines (18%) were also reported. Conclusion: There are significant variations in the Australian nursing practice related to the care of CVDCs. Although there is still practice based on general opinion there is evidence that changes in practice in the past 8 years may be associated with knowledge derived from research.<br /

    Quantum Distribution of Gaussian Keys with Squeezed States

    Full text link
    A continuous key distribution scheme is proposed that relies on a pair of canonically conjugate quantum variables. It allows two remote parties to share a secret Gaussian key by encoding it into one of the two quadrature components of a single-mode electromagnetic field. The resulting quantum cryptographic information vs disturbance tradeoff is investigated for an individual attack based on the optimal continuous cloning machine. It is shown that the information gained by the eavesdropper then simply equals the information lost by the receiver.Comment: 5 pages, RevTe

    Experimental ancilla-assisted qubit transmission against correlated noise using quantum parity checking

    Full text link
    We report the experimental demonstration of a transmission scheme of photonic qubits over unstabilized optical fibers, which has the plug-and-play feature as well as the ability to transmit any state of a qubit, regardless of whether it is known, unknown, or entangled to other systems. A high fidelity to the noiseless quantum channel was achieved by adding an ancilla photon after the signal photon within the correlation time of the fiber noise and by performing quantum parity checking. Simplicity, maintenance-free feature and robustness against path-length mismatches among the nodes make our scheme suitable for multi-user quantum communication networks.Comment: 8 pages, 4 figures; published in New J. Phys. and selected in IOP Selec
    corecore