Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Authenticity function

Function c), from a technical point of view, is a mixture of the warning function and the authenticity function On the one hand, users are to be protected from signing sketches or beginnings of documents inadvertently on the other hand, it has to be guaranteed that no part of a signed document can be deleted. [Pg.4]

Main security solutions proposed to address security requirements of patient-monitoring systems reside in the areas of encryption and secure communication. Access-control techniques need to be developed to address the privacy issues in eHealth applications. In particular, procedures for authentication (user identification) and authorization (access right checking) are essential for acceptable and sustainable eHealth applications. The authentication function ensures that users are indeed who they claim to be. Therefore, an unauthorized party should not be able to receive or access a patient s medical data. Various techniques being considered include a combination of different authentication atomics. These atomics include biometric information (fingerprint, retina scan, typing pattern, etc.) and information the user knows (mother s maiden name), user possessions (e.g., smart card identification systems), and may also include current location and/or the end-user terminal identity (media access control [MAC] hardware address) and time of access. [Pg.360]

Physiological functions as well as clinical symptoms that occur in humans deficient in specific vitamins are given in Table 6. It is becoming more authenticated that vitamins have additional potential health benefits when adrninistered, via the diet or by supplementation, at levels above those required for obviating deficiency. Although for most vitamins the optimal levels are not yet estabUshed, some of the potential health benefits to be derived from vitamins are indicated (16). In one case, the level of scientific proof is such that the U.S. FDA has allowed "a health cl aim that women who are capable of... [Pg.6]

Other methods of identification include the customary preparation of derivatives, comparisons with authentic substances whenever possible, and periodate oxidation. Lately, the application of nuclear magnetic resonance spectroscopy has provided an elegant approach to the elucidation of structures and stereochemistry of various deoxy sugars (18). Microcell techniques can provide a spectrum on 5-6 mg. of sample. The practicing chemist is frequently confronted with the problem of having on hand a few milligrams of a product whose structure is unknown. It is especially in such instances that a full appreciation of the functions of mass spectrometry can be developed. [Pg.214]

The content of a curriculum must be functional when dealing with societal activities necessary chemical concepts, skills and attitudes with respect to macro-micro thinking must be included. This can be derived from representative authentic tasks. The content of the curriculum should be considered as a chemical toolbox. The traditional content of the present chemistry curriculum, such as the stmcture of atoms, ionic theoiy, fundamental acid-base calculations, are not necessarily part of the chemical toolbox when addressing chemical and technological tasks. The validity of the toolbox (philosophical substmcture) is determined by the representative practices and tasks related to chemistry (cf need-to-know principle in context-based approaches). [Pg.198]

User Authentication. User authentication is a vital required function, particularly for fully electronic systems, but one whose implementation varies widely from one company to another. Different companies may use different authentication mechanisms and technologies to validate their users, for example, Windows username, Oracle usernames, smartcards (such as SAFE-compliant cards provided by a trust authority), and biometrics. Typical enterprise ELN systems will delegate this authentication process to an external module that is customized to match the corporate IT infrastructure. [Pg.223]

Using zinc oxide as the internal standard, the relative amounts of two polymorphic forms of fenretinide were quantified [55], Mixtures containing 25, 50, and 75% w/w form I were prepared by mixing authentic standards of form I and form II fenretinide. After the addition of the internal standard, the maximum intensities (peak heights) of the 4.6 A line (peak at 19.1° 20) of fenretinide form I (/19. i) and the 2.8 Aline (peak at 31.8° 20) of zinc oxide (/318) were determined. A plot of the intensity ratio (/19.//31.8) as a function of the weight percent form I was linear. The method was reported to be precise and accurate to within 6%. [Pg.210]

Venkov C, Rankin A, Vaughan D (1996) Identification of authentic estrogen receptor in cultured endothelial cells a potential mechanism for steroid hormone regulation of endothelial function. Circulation 94 727-733... [Pg.246]

Segall and coworkers described the in vitro mouse hepatic microsomal metabolism of the alkaloid senecionine (159) (Scheme 34). Several pyrrolizidine alkaloid metabolites were isolated from mouse liver microsomal incubation mixtures and identified (222, 223). Preparative-scale incubations with mouse liver microsomes enabled the isolation of metabolites for mass spectral and H-NMR analysis. Senecic acid (161) was identified by GC-MS comparison with authentic 161. A new metabolite, 19-hydroxysenecionine (160), gave a molecular ion consistent with the addition of one oxygen atom to the senecionine structure. The position to which the new oxygen atom had been added was made evident by the H-NMR spectrum. The three-proton doublet for the methyl group at position 19 of senecionine was absent in the NMR spectrum of the metabolite and was replaced by two signals (one proton each) at 3.99 and 3.61 ppm for a new carbinol methylene functional group. All other H-NMR spectral data were consistent for the structure of 160 as the new metabolite (222). [Pg.395]

D-ribitol (21), and the structure formulated as 2,4-0-benzylidene-D-er-ythrose (22), would be 2,3-O-benzylidene-D-erythrose (23). These reassignments are supported by comparison of the properties of the product described as 22 with data from the literature. Thus, an authentic sample of 22, obtained by a different route (32), had an optical rotation value of — 20 °, which greatly differs from that found for the product formulated (31) as 22 (—65.2° — — 62.6°). The fact that mutarotation is observed, as well as the correspondence with the [a]D value (—62°) for 23, would indicate that the latter is the correct structure for the product described as 22. In any event, hydrolysis of the acetal function of both (22 and 23), leads to D-erythrose. [Pg.131]

IR spectroscopy is useful for the identification of some of the functional groups in an organic molecule. The technique also provides a fingerprint of the molecule and its comparison with authentic specimen often confirms the structure of that molecule. The IR spectra of AHLs show characteristic absorption peaks at 1780,1710,1650 cm-1 arising from the lactone ring, 3-oxo (when present), and amide carbonyl, respectively [15,16]. [Pg.304]


See other pages where Authenticity function is mentioned: [Pg.75]    [Pg.310]    [Pg.276]    [Pg.84]    [Pg.3]    [Pg.4]    [Pg.7]    [Pg.139]    [Pg.75]    [Pg.310]    [Pg.276]    [Pg.84]    [Pg.3]    [Pg.4]    [Pg.7]    [Pg.139]    [Pg.1142]    [Pg.121]    [Pg.34]    [Pg.243]    [Pg.129]    [Pg.91]    [Pg.196]    [Pg.207]    [Pg.210]    [Pg.448]    [Pg.75]    [Pg.1142]    [Pg.498]    [Pg.328]    [Pg.141]    [Pg.130]    [Pg.133]    [Pg.183]    [Pg.186]    [Pg.331]    [Pg.20]    [Pg.134]    [Pg.774]    [Pg.151]    [Pg.391]    [Pg.151]    [Pg.126]    [Pg.135]    [Pg.138]    [Pg.289]    [Pg.291]   
See also in sourсe #XX -- [ Pg.3 ]




SEARCH



Authenticity

© 2024 chempedia.info