• Title/Summary/Keyword: jam

Search Result 515, Processing Time 0.025 seconds

Purification and characterization of a lectin from hard roe of skipjack tuna, Katsuwonus pelamis

  • Jung, Won-Kyo;Park, Pyo-Jam;Kim, Se-Kwon
    • Proceedings of the Korean Society of Fisheries Technology Conference
    • /
    • 2001.05a
    • /
    • pp.146-147
    • /
    • 2001
  • Lectins or carbohydrate-binding proteins are proteins of non-immune origin, which is able to agglutinate cells, and precipitate polysaccharides and glycoconjugates (Goldstein et al., 1980). Lectins with diverse physiological roles are widely distributed to the various plant, microorganisms, invertebrates and vertebrates. The ubiquitous occurrence of lectins in nature and their ability to recognize complementary sugars provided a stimulus for the continuous research for their biochemical properties and physiological functions (Raz and Lotan, 1987). (omitted)

  • PDF

Morphology and crystallinity of silkworm cocoons with different rearing seasons

  • Lee, Hye Gyeoung;Nho, Si Kab;Um, In Chul
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.43 no.1
    • /
    • pp.16-21
    • /
    • 2021
  • The silkworm cocoon has recently attracted the attention of researchers because of its usefulness as a biomedical material (e.g., usage in the development of the membrane for guided bone regeneration and usage as a starting material for the fabrication of natural silk nonwoven fabric). The silkworm variety and strain have been reported as one of the important factors affecting the structure and properties of silk materials. This study examines the morphology and the molecular conformation of the silkworm cocoon at different cocoon measurement points, as well as the effect of the silkworm strain and rearing season on the morphology and crystallinity of the silkworm cocoon. The results show that the morphology of the outside of the cocoon does not differ depending on the cocoon measurement points, but that of the inside does. The silkworm cocoon crystallinity is not affected by the cocoon division. Interestingly, the crystallinity of the outside of the Jam101 cocoon differs depending on the rearing season, whereas it does not in other silkworm strains.

A Study of Mobile Edge Computing System Architecture for Connected Car Media Services on Highway

  • Lee, Sangyub;Lee, Jaekyu;Cho, Hyeonjoong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5669-5684
    • /
    • 2018
  • The new mobile edge network architecture has been required for an increasing amount of traffic, quality requirements, advanced driver assistance system for autonomous driving and new cloud computing demands on highway. This article proposes a hierarchical cloud computing architecture to enhance performance by using adaptive data load distribution for buses that play the role of edge computing server. A vehicular dynamic cloud is based on wireless architecture including Wireless Local Area Network and Long Term Evolution Advanced communication is used for data transmission between moving buses and cars. The main advantages of the proposed architecture include both a reduction of data loading for top layer cloud server and effective data distribution on traffic jam highway where moving vehicles require video on demand (VOD) services from server. Through the description of real environment based on NS-2 network simulation, we conducted experiments to validate the proposed new architecture. Moreover, we show the feasibility and effectiveness for the connected car media service on highway.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

Recognition and Importance-Satisfaction of Apple Processed Products (사과가공품의 인지도 및 중요도-만족도 분석)

  • Huh, Moo-Yul
    • Journal of the Korean Society of Food Culture
    • /
    • v.25 no.1
    • /
    • pp.1-8
    • /
    • 2010
  • The purpose of this study was to analyze consumer recognition, perceived importance, and satisfaction to create a new apple processed product and to promote its consumption. Data were collected from 527 men and women living throughout Korea through a self-administrated questionnaire. Frequencies, one-way analysis of variance, and Duncan's multiple range were conducted using SPSS v. 17.0 software. Recognition of juice and drinks, milk and dairy products, apple jam, and seasoning was high, while that of the other products was low. Consumer perceived importance of products was higher than consumer satisfaction of products. Quality preservation attributes were sanitation, taste, flavor, place of origin, and convenience of purchase. Attributes for improved consumer post-purchase satisfaction after purchasing were content of apple, quality of apple, price, and certificate of quality. The attributes of content of apple and certificate of quality were statistically different by consumer age.

Variation of Pesticide Residues in Strawberries by Washing and Boiling Processes (딸기의 세척 및 가공 과정에 따른 농약 잔류량 변화)

  • Kwak, Se-Yeon;Lee, Sang-Hyeob;Jeong, Hye-Rin;Nam, Ae-Ji;Sarker, Aniruddha;Kim, Hyo-Young;Lim, Chae-Uk;Cho, Hyun-Jeong;Kim, Jang-Eok
    • Korean Journal of Environmental Agriculture
    • /
    • v.38 no.4
    • /
    • pp.281-290
    • /
    • 2019
  • BACKGROUND: As the demand for strawberries increases, people are paying attention to food safety in strawberry, especially pesticide residues. To remove the pesticides from strawberry, various washing and processing technique in households are additionally required. METHODS AND RESULTS: Strawberries were washed with water, detergent, alcohol, and ultrasonication and processed to strawberry jam. The mean reduction efficiency according to the washing solvent and method was found to be higher in the order of detergent (42.5%) > alcohol (41.7%) > water (41.3%) > ultrasoniation with alcohol (40.2%) > ultrasoniation with water (38.6%) > ultrasoniation with detergent (36.9%), but there was no significant difference among the treatments. The residue levels of pesticides during processing to jam decreased by 11.9-94.4% for etoxazole, fluopyram, procymidone, spiromesifen, and prochloraz, while the other pesticides were concentrated by boiling, or rather increased by 11.8-40.2%. However, when the residue levels were converted to residual amounts in consideration of the change in weight after processing, the residual amounts of the tested pesticides were reduced by 59.8-98.4% during processing. The processing factor (PF) were different for each pesticide, but PFs were < 1 for all washing solvents and methods, and 0.06-1.40 when processed into jam. CONCLUSION: To ensure the consumption of pesticide-free strawberry, the most efficient washing method is to immerse the strawberry in fresh water for few minutes, followed by rinsing them under running water.