Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Authenticity

GOST 30415 specifies plans for inspection the products of different types and sets formulae for calculation of inspected numbers while applying magnetic inspection. The procedure of random inspection is predetermined to check the authenticity of the correlated relation usage and regulations are introduced to enter data file of non-destructive and parallel tests. [Pg.26]

The suggested method is appropriately implemented at the practice. The cost and working hours of unit measurement of it is less than of any alternative method of destructive test and with respect to the authenticity inspection of Stress-Deformation the given method is inferior only to destructive testing. The method was successfully implemented while evaluation of service life of main pipe-lines sections and pressure vessels as well. Data of method and instrument are used as official data equally with ultrasonic, radiation, magnetic particles methods, adding them by the previously non available information about " fatigue " metalwork structure. [Pg.29]

Currently, the elaboration of methods for the objective control of the authenticity of important documents, such as passports, securities, licenses, certificates, identification cards, etc., is being intensively developed. [Pg.264]

Beckmann rearrangement of benzophenone oxime to benz-anilide. Dissolve 2 g. of benzophenone oxime in 20 ml. of anhydrous ether in a small conical flask and add 3 g. of powdered phosphorus pentachloride (or 3 ml. of pure tbionyl chloride). Distil off the solvent and other volatile products on a water bath CAUTION ether), add 25 ml. of water, boil for several minutes and break up any lumps which may be formed. Decant the supernatant liquid, and recrystallise, in the same vessel, from boiling alcohol. The product is benzanilide, m.p. 163° confirm this by a mixed m.p. determination with an authentic specimen. [Pg.741]

Complex environmental samples originate from diverse matrices (the predominant material of which the sample to be analyzed is composed). These matrices, usually either water or soil/sediment, can contain as many as 50 to 100 organic components at widely varying concentrations. The EPA approach to the analysis of these samples involves the analysis of specific (or target) compounds and the use of authentic standards for quality control. The current number of standards in the EPA repository is about 1500, and their analysis is covered by various approved methods. [Pg.295]

The National Institutes of Health-EPA mass spectral library is used to identify analyzed components of a sample by comparing their mass spectra with those of authentic specimens held in the library. [Pg.418]

There are several possible reasons why a scientific study of an art work may be desirable. An obvious one is in cases where the authenticity of an object is doubted on styHstic grounds, but no unanimous opinion exists. The scientist can identify the materials, analy2e the chemical composition, and then investigate whether these correspond to what has been found in comparable objects of unquestioned provenance. If the sources for the materials can be characterized, eg, through trace element composition or stmcture, it may be possible to determine whether the sources involved in the procurement of the materials for comparable objects with known provenance are the same. Comparative examination of the technological processes involved in the manufacture allows for conclusions as to whether the object was made using techniques actually available to the people who supposedly created it. Additionally, dating techniques may lead to the estabUshment of the date of manufacture. [Pg.416]

The Vinland Map, supposed evidence of the Viking discovery of America long before Columbus, was proclaimed a forgery after the detection in the ink of titanium white, a modem pigment (see Pigments, inorganic) (13). Subsequendy, however, after another analytical study, the interpretation of the eadiet results has been questioned, and the matter of authenticity of this unique document stiU remains an open question (14,15). [Pg.416]

Although the cases in which scientific analysis is called upon to assist in the authentication process tend to draw the most attention and have. [Pg.416]

Dating. The useflilness of dating techniques in the study of art objects, either for authentication purposes or in the evaluation of their historical context, is self evident (41,42). [Pg.418]

Accuracy is of less importance in authenticity questions, and it is here that the technique finds extremely widespread use. [Pg.419]

Exa.mina.tlon, The technical examination of stone objects begins with the use of the low power stereomicroscope. This study yields information regarding toolmarks and, hence, cutting techniques, wear patterns, and wear of toolmark edges. Such information is clearly significant in authenticity studies, but also provides an insight into the skill and the tools of the carver. [Pg.423]

The most ancient uses of spices appear to be therapeutic in nature. The use of spices was common in China but tittle, if any, authentic Chinese records exist to confirm this. According to Chinese myths and legends, Shen Nung, the Divine Cultivator, founded Chinese medicine and discovered the curative powers of many herbs. He is said to have described more than 100 plants in a treatise reportedly written in 2700 BC. It has been shown, however, that no written language was available in China at that time. Although some of the herbal uses in the treatise go back several centuries BC, the work seems to have been produced by unknown authors in the first century AD. Other records on the use of cassia and ginger are known to have been written in the fifth and fourth centuries BC, in the latter case by Confucius. [Pg.23]

Microscopists in every technical field use the microscope to characterize, compare, and identify a wide variety of substances, eg, protozoa, bacteria, vimses, and plant and animal tissue, as well as minerals, building materials, ceramics, metals, abrasives, pigments, foods, dmgs, explosives, fibers, hairs, and even single atoms. In addition, microscopists help to solve production and process problems, control quaUty, and handle trouble-shooting problems and customer complaints. Microscopists also do basic research in instmmentation, new techniques, specimen preparation, and appHcations of microscopy. The areas of appHcation include forensic trace evidence, contamination analysis, art conservation and authentication, and asbestos control, among others. [Pg.328]

The information given for the commercial oils represents data critically selected from pubUshed rehable sources or, in some cases, analyses performed in the authors laboratories on authentic oil samples. These data are provided as a general guide to composition only and are not meant to be exclusive of analytical results obtained by other researchers on similar oils. Where the Hterature provides ranges of composition, these have, in several cases, been included. Many variables affect the composition of essential oils. [Pg.299]

Sometimes a skilled peifumei detects a sandalwood-musky note in authentic Bulgarian otto of rose. This note has been identified (11) as the trace iagredient, 7-methoxy-3,7-dimethyl-2-octanol [41890-92-0] (17), which has been commercially available for some time as Ossyrol (trademark of Bush, Boake, Aken Inc). This compound had never before been identified ia nature, but demonstrates how, sometimes, synthetic fragrance chemists can anticipate nature. [Pg.301]

Table 38. Comparison of Components of Authentic Coriander Seed Oil and Headspace Volatiles over Freshly Crushed Ripe Coriander Seeds ... Table 38. Comparison of Components of Authentic Coriander Seed Oil and Headspace Volatiles over Freshly Crushed Ripe Coriander Seeds ...
Juniper Oil. The best juniper oil [8012-91 -7] is obtained from the steam distillation of the ripe cmshed, dried berries of Juniperus communis L., a shmb which grows wild in many regions of Europe, Asia, Africa, and North America. However, most commercial juniperberry oil comes from the fermented fmits as a by-product of flavors for alcohoHc beverages such as gin, brandy, Hquors, cordials, and sloe-gin. This represents the actual commercial juniperberry oil, since very Httle tme juniperberry oil is produced. A comparison of the headspace volatiles of ripe juniperberries (85) with an authentic, freshly prepared juniperberry oil (86) is shown in Table 42. [Pg.331]

Table 42. Comparison of Headspace Volatiles of Ripe Juniperberries with an Authentic Juniperberry Oil... Table 42. Comparison of Headspace Volatiles of Ripe Juniperberries with an Authentic Juniperberry Oil...
Group II consists of the enkephalins which come from the 267-aniino acid piecuisoi pro-enkephalin A [88402-54-4] (Fig. 2). This proteia contains four copies of Met-enkephalin, one copy of Leu-enkephalin, and the extended peptides Met-enkephalin-Arg -Phe (the last Met-enkephalin sequence ia Fig. 2) and Met-enkephalin-Arg -Gly -Leu (the fourth Met-enkephalin sequence ia Fig. 2) (25,26). AH of these products ate formed by trypsin-like cleavage between pairs of basic residues. The extended enkephalin peptides are further cleaved by carboxypeptidase E (27) to form authentic Met-enkephalin. [Pg.446]

Physiological functions as well as clinical symptoms that occur in humans deficient in specific vitamins are given in Table 6. It is becoming more authenticated that vitamins have additional potential health benefits when adrninistered, via the diet or by supplementation, at levels above those required for obviating deficiency. Although for most vitamins the optimal levels are not yet estabUshed, some of the potential health benefits to be derived from vitamins are indicated (16). In one case, the level of scientific proof is such that the U.S. FDA has allowed "a health cl aim that women who are capable of... [Pg.6]

Anhydrotetracycline oxygenase from Streptomjces aureofaciens which cataly2es the conversion of anhydrotetracycline to dehydrotetracycline, has been isolated and characterized as a flavin-dependent oxygenase (83). It consists of two subunits of mol wt = 57, 500 based on SDS/polyacrylamide—gel electrophoresis. The cosynthetic factor 1 of Streptomjces aureofaciens involved in the reduction of 5a,lla-dehydrochlortetracycline to chlortetracycline, has been identified as 7,8-didemethyl-8-hydroxy-5-deazariboflavin. This work was aided by comparison of spectral data with that of an authentic sample obtained from the hydrolysis of coenzyme F-420 (84). [Pg.181]


See other pages where Authenticity is mentioned: [Pg.912]    [Pg.1216]    [Pg.34]    [Pg.474]    [Pg.1142]    [Pg.573]    [Pg.375]    [Pg.375]    [Pg.375]    [Pg.78]    [Pg.416]    [Pg.417]    [Pg.418]    [Pg.421]    [Pg.422]    [Pg.425]    [Pg.430]    [Pg.23]    [Pg.142]    [Pg.189]    [Pg.197]    [Pg.204]    [Pg.324]    [Pg.328]    [Pg.329]    [Pg.481]    [Pg.121]   
See also in sourсe #XX -- [ Pg.4 , Pg.19 , Pg.20 ]

See also in sourсe #XX -- [ Pg.379 ]

See also in sourсe #XX -- [ Pg.135 , Pg.140 , Pg.141 , Pg.142 , Pg.160 , Pg.186 ]

See also in sourсe #XX -- [ Pg.120 , Pg.122 , Pg.167 ]

See also in sourсe #XX -- [ Pg.33 , Pg.34 ]

See also in sourсe #XX -- [ Pg.285 ]

See also in sourсe #XX -- [ Pg.265 , Pg.266 , Pg.325 ]

See also in sourсe #XX -- [ Pg.98 ]

See also in sourсe #XX -- [ Pg.222 ]

See also in sourсe #XX -- [ Pg.114 , Pg.135 , Pg.136 , Pg.139 , Pg.152 , Pg.153 ]




SEARCH



Analysis of minor components as an aid to authentication

Antiquities authentication

Artwork, authenticating

Authentic

Authentic Carotenoids

Authentic Involvement

Authentic Scripture of the Great

Authentic Scripture of the Great Cavern

Authentic channel

Authentic content

Authentic materials

Authentic materials definition

Authentic reference spectra

Authentic storage

Authentication

Authentication agent

Authentication code

Authentication in the future

Authentication of antiquities

Authentication of cocoa butter

Authentication of evening primrose, borage and fish oils

Authentication of fats from other sources

Authentication of olive oil

Authentication of records

Authentication scientific examination

Authentication studies

Authenticity 9, Table

Authenticity Assessment - Latest Developments

Authenticity assessment

Authenticity brass

Authenticity coins

Authenticity control

Authenticity criterion

Authenticity factor

Authenticity function

Authenticity of Questioned Documents

Authenticity of edible oils and fats the legal position

Authenticity of fruit juices

Authenticity studies

Authenticity, food chemometrics technique

Biometric-based authentication system

Bottom-up tree authentication

Center for Authentic Science Practice

Center for Authentic Science Practice in Education

Checking the authenticity

Chemometrics as an aid in authentication

Chemometrics authenticity

Composition and analysis for authenticity

Comprehensive Authenticity Assessment

Definitive notes, authentication

Dependence of authentication on the recipient

Directedness of authentication

Divine, Authentic, and Superior

Divine, Authentic, and Superior Scripture of the Elixir Flower

Effectiveness authentication

Enantioselective and Isotope Analysis—Key Steps to flavour Authentication

Fail-stop signature scheme with bottom-up tree authentication

Fail-stop signature scheme with top-down tree authentication

Food Authenticity Applications

Food authentication

Food authenticity

Foundation of identification (authentication)

Fruit juice concentrate authenticity

Honey authentication

Identification and Authentication

Identity with an Authentic Sample

Logic of authentication

Mere authentication scheme

Milk analysis authenticity

Non-interactive authentication

Notes authentication

Olive oil authentication

Olive oil authenticity

Pigment analysis authentication

Quality and authenticity of foods

Quality records authentication

Searching for Authenticity

Silver authenticity

Some Authentication Studies

Symmetric authentication scheme

Technical and Scientific Methods of Authentication

The Analytical Authentication of Brass

The Malefactor Authenticated

Three Authentic Models of Safety Rather Than Only One

Top-Down Tree Authentication with Small Amount of Private Storage

Top-down tree authentication

Tree authentication

User authentication

Vegetable oils authentication

Vegetable oils authenticity

© 2024 chempedia.info