• 제목/요약/키워드: jam

검색결과 515건 처리시간 0.025초

Purification and characterization of a lectin from hard roe of skipjack tuna, Katsuwonus pelamis

  • Jung, Won-Kyo;Park, Pyo-Jam;Kim, Se-Kwon
    • 한국어업기술학회:학술대회논문집
    • /
    • 한국어업기술학회 2001년도 춘계 수산관련학회 공동학술대회발표요지집
    • /
    • pp.146-147
    • /
    • 2001
  • Lectins or carbohydrate-binding proteins are proteins of non-immune origin, which is able to agglutinate cells, and precipitate polysaccharides and glycoconjugates (Goldstein et al., 1980). Lectins with diverse physiological roles are widely distributed to the various plant, microorganisms, invertebrates and vertebrates. The ubiquitous occurrence of lectins in nature and their ability to recognize complementary sugars provided a stimulus for the continuous research for their biochemical properties and physiological functions (Raz and Lotan, 1987). (omitted)

  • PDF

Morphology and crystallinity of silkworm cocoons with different rearing seasons

  • Lee, Hye Gyeoung;Nho, Si Kab;Um, In Chul
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • 제43권1호
    • /
    • pp.16-21
    • /
    • 2021
  • The silkworm cocoon has recently attracted the attention of researchers because of its usefulness as a biomedical material (e.g., usage in the development of the membrane for guided bone regeneration and usage as a starting material for the fabrication of natural silk nonwoven fabric). The silkworm variety and strain have been reported as one of the important factors affecting the structure and properties of silk materials. This study examines the morphology and the molecular conformation of the silkworm cocoon at different cocoon measurement points, as well as the effect of the silkworm strain and rearing season on the morphology and crystallinity of the silkworm cocoon. The results show that the morphology of the outside of the cocoon does not differ depending on the cocoon measurement points, but that of the inside does. The silkworm cocoon crystallinity is not affected by the cocoon division. Interestingly, the crystallinity of the outside of the Jam101 cocoon differs depending on the rearing season, whereas it does not in other silkworm strains.

A Study of Mobile Edge Computing System Architecture for Connected Car Media Services on Highway

  • Lee, Sangyub;Lee, Jaekyu;Cho, Hyeonjoong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.5669-5684
    • /
    • 2018
  • The new mobile edge network architecture has been required for an increasing amount of traffic, quality requirements, advanced driver assistance system for autonomous driving and new cloud computing demands on highway. This article proposes a hierarchical cloud computing architecture to enhance performance by using adaptive data load distribution for buses that play the role of edge computing server. A vehicular dynamic cloud is based on wireless architecture including Wireless Local Area Network and Long Term Evolution Advanced communication is used for data transmission between moving buses and cars. The main advantages of the proposed architecture include both a reduction of data loading for top layer cloud server and effective data distribution on traffic jam highway where moving vehicles require video on demand (VOD) services from server. Through the description of real environment based on NS-2 network simulation, we conducted experiments to validate the proposed new architecture. Moreover, we show the feasibility and effectiveness for the connected car media service on highway.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

사과가공품의 인지도 및 중요도-만족도 분석 (Recognition and Importance-Satisfaction of Apple Processed Products)

  • 허무열
    • 한국식생활문화학회지
    • /
    • 제25권1호
    • /
    • pp.1-8
    • /
    • 2010
  • The purpose of this study was to analyze consumer recognition, perceived importance, and satisfaction to create a new apple processed product and to promote its consumption. Data were collected from 527 men and women living throughout Korea through a self-administrated questionnaire. Frequencies, one-way analysis of variance, and Duncan's multiple range were conducted using SPSS v. 17.0 software. Recognition of juice and drinks, milk and dairy products, apple jam, and seasoning was high, while that of the other products was low. Consumer perceived importance of products was higher than consumer satisfaction of products. Quality preservation attributes were sanitation, taste, flavor, place of origin, and convenience of purchase. Attributes for improved consumer post-purchase satisfaction after purchasing were content of apple, quality of apple, price, and certificate of quality. The attributes of content of apple and certificate of quality were statistically different by consumer age.

딸기의 세척 및 가공 과정에 따른 농약 잔류량 변화 (Variation of Pesticide Residues in Strawberries by Washing and Boiling Processes)

  • 곽세연;이상협;정혜린;남애지;;김효영;임채욱;조현정;김장억
    • 한국환경농학회지
    • /
    • 제38권4호
    • /
    • pp.281-290
    • /
    • 2019
  • 안전한 딸기 섭취를 위해 딸기에 acetamiprid외 9종의 농약을 인위적으로 살포하여 건조시킨 후 물, 세제, 소주에 침지 및 초음파 세척하였을 경우와 가열하여 잼으로 가공하였을 때 잔류량 변화 및 가공계수를 산출하였다. 농약이 처리된 딸기를 세척 및 가공하였을 때 물에 침지하여 세척한 경우 13.9-65.1%, 세제에 침지한 경우 9.2-71.9%, 소주에 침지한 경우 12.4-61.6%, 물로 초음파 세척한 경우 22.4-62.8%, 세제로 초음파 세척한 경우 18.7-64.5%, 소주로 초음파 세척한 경우 23.1-64.4% 감소하였다. 딸기 중 잔류농약의 제거율은 농약에 따라서 다르게 나타났으나, 세척 용매 및 방법에 따라 큰 차이를 보이지 않았기 때문에 물로 세척하는 것이 가장 효율적이며 세척 횟수를 늘리는 것이 보다 효과적인 방법으로 생각되었다. 가공함에 따라 딸기의 생체량이 2.5배 감소하는 것을 반영하여 가공 전과 후의 절대량을 산출한 결과, 10종의 시험 농약 모두 59.8-98.4%감소하는 경향을 보였다.