• Title/Summary/Keyword: A key technique

Search Result 1,745, Processing Time 0.053 seconds

Microbial Diversity during Fermentation of Sweet Paste, a Chinese Traditional Seasoning, Using PCR-Denaturing Gradient Gel Electrophoresis

  • Mao, Ping;Hu, Yuanliang;Liao, Tingting;Wang, Zhaoting;Zhao, Shumiao;Liang, Yunxiang;Hu, Yongmei
    • Journal of Microbiology and Biotechnology
    • /
    • v.27 no.4
    • /
    • pp.678-684
    • /
    • 2017
  • The aim of this study was to elucidate the changes in the microbial community and biochemical properties of a traditional sweet paste during fermentation. PCR-denaturing gradient gel electrophoresis (DGGE) analysis showed that Aspergillus oryzae was the predominant species in the koji (the fungal mixture), and the majority of the fungi isolated belonged to two Zygosaccharomyces species in the mash. The bacterial DGGE profiles revealed the presence of Bacillus subtilis during fermentation, and Lactobacillus acidipiscis, Lactobacillus pubuzihii, Lactobacillus sp., Staphylococcus kloosi, and several uncultured bacteria were also detected in the mash after 14 days of main fermentation. Additionally, during main fermentation, amino-type nitrogen and total acid increased gradually to a maximum of $6.77{\pm}0.25g/kg$ and $19.10{\pm}0.58g/kg$ (30 days) respectively, and the concentration of reducing sugar increased to $337.41{\pm}3.99g/kg$ (7 days). The 180-day fermented sweet paste contained $261.46{\pm}19.49g/kg$ reducing sugar and its pH value remained at around 4.65. This study has used the PCR-DGGE technique to demonstrate the microbial community (including bacteria and fungi) in sweet paste and provides useful information (biochemical properties) about the assessment of the quality of sweet paste throughout fermentation.

Recent Progress in Methods of Generating Water Mist for Fire Suppression

  • Guangxuan, Liao;Xin, Huang;Beihua, Cong;Jun, Qin;Jianghong, Liu;Xishi, Wang
    • Journal of ILASS-Korea
    • /
    • v.11 no.4
    • /
    • pp.251-265
    • /
    • 2006
  • To prevent the ozonosphere from being destroyed by Halon, it is an urgent task to find out Halon replacement. As one of the replacements water mist have showed broad applications by its advantages: little pollution to environment (not destroying the ozone layer or bring green house effect), extinguishing fire quickly, consuming a small quantity of water and having little damage to the protected objects. The methods of generating water mist strongly influence fire suppression effectiveness, which determine the cone angle, drop size distribution, flux uniformity, and momentum of the generating spray. The traditional water mist nozzle included pressure jet nozzles, impingement nozzles and twin-fluid nozzles. All of them have more or less disadvantages for fire suppression. Therefore, many research institutes and corporations are taking up with innovations in mist generation. This article provided some recent studies in State Key Laboratory of Fire Science (SKLFS) of University of Science and Technology of China. SKLFS have investigated new methods of generating water mist (i.e. effervescent atomization and ultrasonic atomization). and self developed a series of nozzles and developed advanced DPIVS (Digital Particle Image Velocimetry and Sizing) technique. Characteristics of water mist (the distribution of droplet sizes, flux density, spray dynamics and cone angle) produced by these nozzles were measured under different conditions (work pressure, nozzle geometry, etc.) using LDV/APV and DPTVS systems. A series of experiments were performed to study the fire suppression effectiveness in different fire scenario (different kindsof the fuel, fire size and ventilation conditions). The fire extinguishing mechanisms of water mist was also discussed.

  • PDF

Load carrying capacity of CFRP retrofitted broken concrete arch

  • Wang, Peng;Jiang, Meirong;Chen, Hailong;Jin, Fengnian;Zhou, Jiannan;Zheng, Qing;Fan, Hualin
    • Steel and Composite Structures
    • /
    • v.23 no.2
    • /
    • pp.187-194
    • /
    • 2017
  • To reuse a broken plain concrete (PC) arch, a retrofitting method was proposed to ensure excellent structural performances, in which carbon fiber reinforced polymers (CFRPs) were applied to repair and strengthen the damaged PC arch through bonding and wrapping techniques. Experiments were carried out to reveal the deformation and the load carrying capacity of the retrofitted composite arch. Based on the experiments, repairing and strengthening effects of the CFRP retrofitted broken arch were revealed. Simplified analysing model was suggested to predict the peak load of the CFRP retrofitted broken arch. According to the research, it is confirmed that absolutely broken PC arch can be completely repaired and reinforced, and even behaves more excellent than the intact PC arch when bonded together and strengthened with CFRP sheets. Using CFRP bonding/wrapping technique a novel efficient composite PC arch structure can be constructed, the comparison between rebar reinforced concrete (RC) arch and composite PC arch reveals that CFRP reinforcements can replace the function of steel bars in concrete arch.

Double Encryption of Binary Image using a Random Phase Mask and Two-step Phase-shifting Digital Holography (랜덤 위상 마스크와 2-단계 위상 천이 디지털 홀로그래피를 이용한 이진 영상 이중 암호화)

  • Kim, Cheolsu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.6
    • /
    • pp.1043-1051
    • /
    • 2016
  • In this paper, double encryption technique of binary image using random phase mask and 2-step phase-shifting digital holography is proposed. After phase modulating of binary image, firstly, random phase mask to be used as key image is generated through the XOR operation with the binary phase image. And the first encrypted image is encrypted again through the fresnel transform and 2-step phase-shifting digital holography. In the decryption, simple arithmetic operation and inverse Fresnel transform are used to get the first decryption image, and second decryption image is generated through XOR operation between first decryption image and key image. Finally, the original binary image is recovered through phase modulation.

Walking load model for single footfall trace in three dimensions based on gait experiment

  • Peng, Yixin;Chen, Jun;Ding, Guo
    • Structural Engineering and Mechanics
    • /
    • v.54 no.5
    • /
    • pp.937-953
    • /
    • 2015
  • This paper investigates the load model for single footfall trace of human walking. A large amount of single person walking load tests were conducted using the three-dimensional gait analysis system. Based on the experimental data, Fourier series functions were adopted to model single footfall trace in three directions, i.e. along walking direction, direction perpendicular to the walking path and vertical direction. Function parameters such as trace duration time, number of Fourier series orders, dynamic load factors (DLFs) and phase angles were determined from the experimental records. Stochastic models were then suggested by treating walking rates, duration time and DLFs as independent random variables, whose probability density functions were obtained from experimental data. Simulation procedures using the stochastic models are presented with examples. The simulated single footfall traces are similar to the experimental records.

Critical Path Analysis for Codesign of Public Key Crypto-Systems (공개키 연산기의 효율적인 통합 설계를 위한 임계 경로 분석)

  • Lee Wan bok;Roh Chang hyun;Ryu Dae hyun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.1
    • /
    • pp.79-87
    • /
    • 2005
  • In e-commerce applications, a public key cryptosystem is an important and indispensible element for the basic security operations such as authentication, digital signaturing, and key distribution. In wired network environments, the public key infrastructure certificate, which is based on X.509 specification, has been widely used. On the other hand, it still remains difficult to use the certificate information in wireless network environments due to the inherent limitations of the hand-held devices such as low computational power and short battery life. In this paper, we facilitate a codesign approach by implementing a software public-key cryptosystem and classifying its internal computation overheads quantitatively using a software profiling technique. Moreover, we propose a method to analyze the profiled data and apply it to the problem of software/hardware partitioning in a codesign approach. As an illustrative example, we analyze the computational overheads of an EC-Elfagamal application and examine a critical computational path.

  • PDF

Nanoscale-NMR with Nitrogen Vacancy center spins in diamond

  • Lee, Junghyun
    • Journal of the Korean Magnetic Resonance Society
    • /
    • v.24 no.2
    • /
    • pp.59-65
    • /
    • 2020
  • Nitrogen-Vacancy (NV) center in diamond has been an emerging versatile tool for quantum sensing applications. Amongst various applications, nano-scale nuclear magnetic resonance (NMR) using a single or ensemble NV centers has demonstrated promising results, opening possibility of a single molecule NMR for its chemical structural studies or multi-nuclear spin spectroscopy for quantum information science. However, there is a key challenge, which limited the spectral resolution of NMR detection using NV centers; the interrogation duration for NV-NMR detection technique has been limited by the NV sensor spin lifetime (T1 ~ 3ms), which is orders of magnitude shorter than the coherence times of nuclear spins in bulk liquid samples (T2 ~ 1s) or intrinsic 13C nuclear spins in diamond. Recent studies have shown that quantum memory technique or synchronized readout detection technique can further narrow down the spectral linewidth of NMR signal. In this short review paper, we overview basic concepts of nanoscale NMR using NV centers, and introduce further developments in high spectral resolution NV NMR studies.

A study on the advanced RFID system using the parallel cyclic redundancy check (병렬 순환 잉여 검사를 이용한 발전된 무선인식 시스템에 관한 연구)

  • Kang Tai-Kyu;Yoon Sang-Mun;Shin Seok-kyun;Kang Min-Soo;Lee Key-Sea
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1235-1240
    • /
    • 2004
  • This paper has presented the parallel cyclic redundancy check (CRC) technique that performs CRC computation in parallel superior to the conventional CRC technique that processes data bits serially. Also, it has showed that the implemented parallel CRC circuit had been successfully applied to the inductively coupled passive RFID system working at a frequency of 13.56MHz in order to process the detection of logical faults more fast and the system had been verified experimentally. In comparison with previous works, the proposed RFID system using the parallel CRC technique has been shown to reduce the latency and increase the data processing rates in the results. Therefore, it seems reasonable to conclude that the parallel CRC realization in the RFID system offers a means of maintaining the integrity of data in the high speed RFID system.

  • PDF

New method for dependence assessment in human reliability analysis based on linguistic hesitant fuzzy information

  • Zhang, Ling;Zhu, Yu-Jie;Hou, Lin-Xiu;Liu, Hu-Chen
    • Nuclear Engineering and Technology
    • /
    • v.53 no.11
    • /
    • pp.3675-3684
    • /
    • 2021
  • Human reliability analysis (HRA) is a proactive approach to model and evaluate human systematic errors, and has been extensively applied in various complicated systems. Dependence assessment among human errors plays a key role in the HRA, which relies heavily on the knowledge and experience of experts in real-world cases. Moreover, there are ofthen different types of uncertainty when experts use linguistic labels to evaluate the dependencies between human failure events. In this context, this paper aims to develop a new method based on linguistic hesitant fuzzy sets and the technique for human error rate prediction (THERP) technique to manage the dependence in HRA. This method handles the linguistic assessments given by experts according to the linguistic hesitant fuzzy sets, determines the weights of influential factors by an extended best-worst method, and confirms the degree of dependence between successive actions based on the THERP method. Finally, the effectiveness and practicality of the presented linguistic hesitant fuzzy THERP method are demonstrated through an empirical healthcare dependence analysis.