• 제목/요약/키워드: multiple S/H

검색결과 880건 처리시간 0.037초

NMR Assignments of Two Furofuran Lignans from Sesame Seeds

  • Kang, Sam-Sik;Kim, Ju-Sun;Jung, Jee-Hyung;Kim, Young-Hee
    • Archives of Pharmacal Research
    • /
    • 제18권5호
    • /
    • pp.361-363
    • /
    • 1995
  • Two furofuran lignans, sesamolin and sesangolin were isolated from the seeds of Sesamum indicum and S.angolense, respectively. Detailed analysis of the $^1H-and^{13}C-NMR$ spectra of these lignans was carried out by the application of two-dimensional $^1H-^1/H\; COSY\; and^1/H^{13}C$ multiple-bond, multiple-quantum spectroscopic correlation techniques.

  • PDF

AT LEAST FOUR SOLUTIONS TO THE NONLINEAR ELLIPTIC SYSTEM

  • Jung, Tacksun;Choi, Q-Heung
    • Korean Journal of Mathematics
    • /
    • 제17권2호
    • /
    • pp.197-210
    • /
    • 2009
  • We prove the existence of multiple solutions (${\xi},{\eta}$) for perturbations of the elliptic system with Dirichlet boundary condition $$(0.1)\;\begin{array}{lcr}A{\xi}+g_1({\xi}+ 2{\eta})=s{\phi}_1+h\;in\;{\Omega},\\A{\xi}+g_2({\xi}+ 2{\eta})=s{\phi}_1+h\;in\;{\Omega},\end{array}$$ where $lim_{u{\rightarrow}{\infty}}\frac{gj(u)}{u}={\beta}_j$, $lim_{u{\rightarrow}-{\infty}}\frac{gj(u)}{u}={\alpha}_j$ are finite and the nonlinearity $g_1+2g_2$ crosses eigenvalues of A.

  • PDF

Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator

  • Panduranga, H.T.;Naveen, Kumar S.K.;Sharath, Kumar H.S.
    • Journal of Information Processing Systems
    • /
    • 제9권3호
    • /
    • pp.499-510
    • /
    • 2013
  • Hardware-Software co-simulation of a multiple image encryption technique shall be described in this paper. Our proposed multiple image encryption technique is based on the Latin Square Image Cipher (LSIC). First, a carrier image that is based on the Latin Square is generated by using 256-bits of length key. The XOR operation is applied between an input image and the Latin Square Image to generate an encrypted image. Then, the XOR operation is applied between the encrypted image and the second input image to encrypt the second image. This process is continues until the nth input image is encrypted. We achieved hardware co-simulation of the proposed multiple image encryption technique by using the Xilinx System Generator (XSG). This encryption technique is modeled using Simulink and XSG Block set and synthesized onto Virtex 2 pro FPGA device. We validated our proposed technique by using the hardware software co-simulation method.