Search results for "SAF"

showing 10 items of 2183 documents

APPLICATION OF REAL-TIME POLYMERASE CHAIN REACTION FOR RAPID DETERMINATION OFSALMONELLAIN RESTAURANT FOODS

2008

Several foods have been identified as frequently or occasionally contaminated with Salmonella, such as eggs, raw milk and all raw foods of animal origin that may carry salmonella and other bacteria. Salmonellosis is the most common food-borne illness, but it is usually preventable according to the implementation of a food safety system that includes Hazard Analysis and Critical Control Point. In this study, 96 food samples of the University restaurant of Valencia (Spain) were divided into four groups: first course; main course; accompaniment; and dessert, and were analyzed simultaneously with classical and fluorogenic polymerase chain reaction microbiological analysis. Neither of the proced…

Salmonellabusiness.industryRaw milkBiologyFood safetymedicine.disease_causeMicrobiologyAnimal originlaw.inventionBiotechnologyReal-time polymerase chain reactionlawCritical control pointmedicineScreening toolFood sciencebusinessPolymerase chain reactionJournal of Rapid Methods & Automation in Microbiology
researchProduct

Moving across the static magnetic field of a 1.5 T MRI scanner: Analysing compliance with Directive 2013/35/EU

2018

Abstract Does the exposure of magnetic resonance imaging personnel to static magnetic fields fully comply with Directive 2013/35/EU? Despite the obligation to satisfy this question, a general answer cannot be provided, nor are final satisfying good practices methods for exposure assessment currently available. In order to contribute to fix this problem, three different 1.5 T scanners are analysed and – by a new theoretical insight – a positive answer is provided.

ScannerComputer scienceBiophysicsGeneral Physics and AstronomyExposure030218 nuclear medicine & medical imagingMotionPhysics and Astronomy (all)03 medical and health sciences0302 clinical medicineOccupational ExposureMagnetic Fieldmedia_common.cataloged_instanceRadiology Nuclear Medicine and imagingEuropean UnionObligationEuropean unionmedia_commonGuideline adherenceNIRGeneral MedicineMagnetostaticsDirectiveMagnetic Resonance ImagingIndustrial engineeringMagnetic FieldsBiophysic030220 oncology & carcinogenesisGuideline AdherenceOccupational exposureSafetyMRIPhysica Medica
researchProduct

Experimental and Modeling Analyses of Human Motion Across the Static Magnetic Field of an MRI Scanner

2021

It is established that human movements in the vicinity of a permanent static magnetic field, such as those in magnetic resonance imaging (MRI) scanners induce electric fields in the human body; this raises potential severe risks of health to radiographers and cleaners exposed routinely to these fields in MRI rooms. The relevant directives and parameters, however, are based on theoretical models, and accurate studies on the simulation of the effects based on human movement data obtained in real conditions are still lacking. Two radiographers and one cleaner, familiar with MRI room activities and these directives, were gait analyzed during the execution of routine job motor tasks at different…

ScannerHistologyComputer scienceBiomedical EngineeringBioengineeringWorkspaceMotion (physics)030218 nuclear medicine & medical imaging03 medical and health sciences0302 clinical medicineGait (human)Position (vector)medicineComputer visionstatic magnetic fieldsOriginal Researchmedicine.diagnostic_testbusiness.industryBioengineering and BiotechnologyCentroidMagnetic resonance imagingMagnetostaticsMRI personnel safetyexposure limit valuesArtificial intelligencebusinessDirective 2013/35/EU030217 neurology & neurosurgeryhuman movement analysisTP248.13-248.65BiotechnologyFrontiers in Bioengineering and Biotechnology
researchProduct

Attribute based access control scheme with controlled access delegation for collaborative E-health environments

2017

Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …

Scheme (programming language)Computer access controlDelegationRevocationComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subject020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringPhysical accessRole-based access controlSafety Risk Reliability and QualitybusinesscomputerSoftwaremedia_commoncomputer.programming_languageJournal of Information Security and Applications
researchProduct

Energy Performance and Indoor Comfort of a 1930s Italian School Building: A case study

2021

Reducing energy consumption in the building tertiary sector, which accounts for a big share of the total energy use (and related CO 2 emissions) at European and Italian level, represent a strong element of safety for the EU-28. On the other hand, it is important to improve the, often overlooked, indoor comfort conditions of Italian schools since they have a significant impact on the well-being, productivity, health and safety of their occupants. Thus, it is appropriate to take into account the combination of both needs, also in light of the climate change scenario, in order to identify adequate improvement measures and justify such economic investment. This paper brings a contribution to th…

SchoolBuilding Simulationbusiness.industryEnergy EfficiencyEnergy consumptionEnvironmental economicsInvestment (macroeconomics)language.human_languageOccupational safety and healthIndoor Environmental QualityThermal ComfortOrder (exchange)Climate change scenariolanguageBuilding RetrofitbusinessSicilianProductivityTertiary sector of the economy
researchProduct

Strategies to exiting the COVID-19 lockdown for workplace and school: A scoping review

2021

Highlights • Epidemiological conditions should be monitored and enforced. • COVID-19 must be under control below thresholds of safeguards. • Testing, contact tracing, and isolation strategies are essential components to ease the lockdown. • The maintenance of social distancing measures is an overarching mitigation strategy. • The benefit gained from the implementation of social distancing was evident.

SchoolWorkExit strategyCoronavirus disease 2019 (COVID-19)business.industryWork from homeSocial distancePublic Health Environmental and Occupational HealthExit strategyGrey literaturePublic relationsSettore MED/45 - Scienze Infermieristiche Generali Cliniche E PediatricheArticleExit strategy SchoolnursingWork (electrical)Political sciencePandemicCovi 19 WorkCovid-19businessSafety Risk Reliability and QualitySafety ResearchSafety Science
researchProduct

Knowledge exchange through science diplomacy to assist disaster risk reduction

2021

Abstract This paper analyses science diplomacy efforts to reduce disaster risks and proposes establishing national knowledge exchange centers (KECs) to help individual states adhere to their Sendai Framework goals. KECs are considered to be interconnected globally and work together to promote resilience efforts by facilitating sharing of information and strategies in risk monitoring, assessment, and ultimately reduction across the globe. KECs can provide high-quality scientific evidence for informed decisionmaking along with a component related to disaster science media to ensure that appropriate knowledge reaches a variety of people who need it in different forms tailored for them. KECs ca…

Science adviceDisaster risk reductionGeography & travelmedia_common.quotation_subjectGeography Planning and DevelopmentInterdisciplinarityGlobeEnvironmental Science (miscellaneous)Risk monitoringScientific evidenceKnowledge exchangeInformed decisionmakingEarth and Planetary Sciences (miscellaneous)medicineGE1-350Disaster risk reductionDiplomacyddc:910media_commonH1-99business.industryPublic relationsScience diplomacyVariety (cybernetics)Environmental sciencesSocial sciences (General)Resilience (organizational)VDP::Teknologi: 500medicine.anatomical_structureWork (electrical)businessSafety ResearchProgress in Disaster Science
researchProduct

Healthcare Waste Management: What do the Health Workers in a Nigerian Tertiary Hospital Know and Practice

2015

Introduction: Healthcare waste is any solid or liquid waste that is generated in the diagnosis, treatment or immunization of human beings or animals, in research pertaining thereto, or in production or testing of biologicals. Mismanagement of healthcare waste poses risks to people and the environment. Improving the standards of healthcare waste management protects the health and safety of healthcare workers, patients, visitors to healthcare facilities and the general public. This study was carried out to determine the knowledge and practice of healthcare waste management by the healthcare workers in Nnamdi Azikiwe University Teaching Hospital Nnewi, Nigeria. Methods: This was a cross-sectio…

Secondary educationWaste managementHigher educationbusiness.industryOrganic ChemistryPrimary educationBiochemistryOccupational safety and healthHealth careMedicineUniversity teachingSeventy NineDescriptive researchbusinessScience Journal of Public Health
researchProduct

Autochthonous microalgae grown in municipal wastewaters as a tool for effectively removing nitrogen and phosphorous

2020

Abstract Microalgae have promising applications in wastewater treatment because of their ability to use inorganic compounds such as nitrates and phosphates as nutrients for their growth. Microalgae are applied to the secondary and tertiary bio-treatment with two benefits: i) pollutants removal from wastewater; ii) production of microalgal biomass, that can be exploited as a source of biomass and biomolecules. In the present work, four different microalgal strains (two from culture collections and two isolated from Sicilian littoral) were tested in municipal sewage bioremediation. The sewage of a municipal plant, already processed with primary treatment, was used for the cultivation of micro…

Secondary treatmentBiochemical oxygen demandbusiness.industryBioremediation Chlorella Dunaliella MicroalgaeNannochloropsis Nutrient removalSettore ING-IND/25 - Impianti ChimiciProcess Chemistry and TechnologyChemical oxygen demandBiomassSewage02 engineering and technology010501 environmental sciencesPulp and paper industry01 natural sciencesBioremediation020401 chemical engineeringWastewaterEnvironmental scienceSewage treatment0204 chemical engineeringSafety Risk Reliability and QualitybusinessWaste Management and Disposal0105 earth and related environmental sciencesBiotechnologyJournal of Water Process Engineering
researchProduct

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies

2013

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives…

Security analysisInformation Systems and ManagementComputer Networks and Communicationsbusiness.industryInternet privacyComputer securitycomputer.software_genreHardware and ArchitectureNational Strategy to Secure CyberspaceCyber-attackBusinessSafety Risk Reliability and QualityCyberspaceSafety ResearchcomputerComputingMilieux_MISCELLANEOUSSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct