WorldWideScience

Sample records for batch rsa decryption

  1. Compression-RSA technique: A more efficient encryption-decryption procedure

    Science.gov (United States)

    Mandangan, Arif; Mei, Loh Chai; Hung, Chang Ee; Che Hussin, Che Haziqah

    2014-06-01

    The efficiency of encryption-decryption procedures has become a major problem in asymmetric cryptography. Compression-RSA technique is developed to overcome the efficiency problem by compressing the numbers of kplaintext, where k∈Z+ and k > 2, becoming only 2 plaintext. That means, no matter how large the numbers of plaintext, they will be compressed to only 2 plaintext. The encryption-decryption procedures are expected to be more efficient since these procedures only receive 2 inputs to be processed instead of kinputs. However, it is observed that as the numbers of original plaintext are increasing, the size of the new plaintext becomes bigger. As a consequence, it will probably affect the efficiency of encryption-decryption procedures, especially for RSA cryptosystem since both of its encryption-decryption procedures involve exponential operations. In this paper, we evaluated the relationship between the numbers of original plaintext and the size of the new plaintext. In addition, we conducted several experiments to show that the RSA cryptosystem with embedded Compression-RSA technique is more efficient than the ordinary RSA cryptosystem.

  2. RSA cryptosystem with fuzzy set theory for encryption and decryption

    Science.gov (United States)

    Abdullah, Kamilah; Bakar, Sumarni Abu; Kamis, Nor Hanimah; Aliamis, Hardi

    2017-11-01

    In the communication area, user is more focus on communication instead of security of the data communication. Many cryptosystems have been improvised to achieved the effectiveness in communication. RSA cryptosystem is one of well-known cryptosystem used to secure the information and protect the communication by providing a difficulty to the attackers specifically in encryption and decryption. As need arises for guarantee the security of the cryptosystem while the communication must be ensured, we propose a new RSA cryptosystem which is based on fuzzy set theory whereby the plaintext and the ciphertext are in terms of Triangular Fuzzy Number (TFN). Decryption result shows that the message obtained is the same as the original plaintext. This study reveals that the fuzzy set theory is suitable to be used as an alternative tool in securing other cryptosystem.

  3. Compression-RSA: New approach of encryption and decryption method

    Science.gov (United States)

    Hung, Chang Ee; Mandangan, Arif

    2013-04-01

    Rivest-Shamir-Adleman (RSA) cryptosystem is a well known asymmetric cryptosystem and it has been applied in a very wide area. Many researches with different approaches have been carried out in order to improve the security and performance of RSA cryptosystem. The enhancement of the performance of RSA cryptosystem is our main interest. In this paper, we propose a new method to increase the efficiency of RSA by shortening the number of plaintext before it goes under encryption process without affecting the original content of the plaintext. Concept of simple Continued Fraction and the new special relationship between it and Euclidean Algorithm have been applied on this newly proposed method. By reducing the number of plaintext-ciphertext, the encryption-decryption processes of a secret message can be accelerated.

  4. VLSI design of an RSA encryption/decryption chip using systolic array based architecture

    Science.gov (United States)

    Sun, Chi-Chia; Lin, Bor-Shing; Jan, Gene Eu; Lin, Jheng-Yi

    2016-09-01

    This article presents the VLSI design of a configurable RSA public key cryptosystem supporting the 512-bit, 1024-bit and 2048-bit based on Montgomery algorithm achieving comparable clock cycles of current relevant works but with smaller die size. We use binary method for the modular exponentiation and adopt Montgomery algorithm for the modular multiplication to simplify computational complexity, which, together with the systolic array concept for electric circuit designs effectively, lower the die size. The main architecture of the chip consists of four functional blocks, namely input/output modules, registers module, arithmetic module and control module. We applied the concept of systolic array to design the RSA encryption/decryption chip by using VHDL hardware language and verified using the TSMC/CIC 0.35 m 1P4 M technology. The die area of the 2048-bit RSA chip without the DFT is 3.9 × 3.9 mm2 (4.58 × 4.58 mm2 with DFT). Its average baud rate can reach 10.84 kbps under a 100 MHz clock.

  5. Modified Multi Prime RSA Cryptosystem

    Science.gov (United States)

    Ghazali Kamardan, M.; Aminudin, N.; Che-Him, Norziha; Sufahani, Suliadi; Khalid, Kamil; Roslan, Rozaini

    2018-04-01

    RSA [1] is one of the mostly used cryptosystem in securing data and information. Though, it has been recently discovered that RSA has some weaknesses and in advance technology, RSA is believed to be inefficient especially when it comes to decryption. Thus, a new algorithm called Multi prime RSA, an extended version of the standard RSA is studied. Then, a modification is made to the Multi prime RSA where another keys is shared secretly between the receiver and the sender to increase the securerity. As in RSA, the methodology used for modified Multi-prime RSA also consists of three phases; 1. Key Generation in which the secret and public keys are generated and published. In this phase, the secrecy is improved by adding more prime numbers and addition of secret keys. 2. Encryption of the message using the public and secret keys given. 3. Decryption of the secret message using the secret key generated. For the decryption phase, a method called Chinese Remainder Theorem is used which helps to fasten the computation. Since Multi prime RSA use more than two prime numbers, the algorithm is more efficient and secure when compared to the standard RSA. Furthermore, in modified Multi prime RSA another secret key is introduced to increase the obstacle to the attacker. Therefore, it is strongly believed that this new algorithm is better and can be an alternative to the RSA.

  6. Hybrid cryptosystem RSA - CRT optimization and VMPC

    Science.gov (United States)

    Rahmadani, R.; Mawengkang, H.; Sutarman

    2018-03-01

    Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys. In this paper we propose hybrid cryptosystem that combine symmetric algorithms VMPC and asymmetric algorithms RSA - CRT optimization. RSA - CRT optimization speeds up the decryption process by obtaining plaintext with dp and p key only, so there is no need to perform CRT processes. The VMPC algorithm is more efficient in software implementation and reduces known weaknesses in RC4 key generation. The results show hybrid cryptosystem RSA - CRT optimization and VMPC is faster than hybrid cryptosystem RSA - VMPC and hybrid cryptosystem RSA - CRT - VMPC. Keyword : Cryptography, RSA, RSA - CRT, VMPC, Hybrid Cryptosystem.

  7. Testing System Encryption-Decryption Method to RSA Security Documents

    International Nuclear Information System (INIS)

    Supriyono

    2008-01-01

    A model of document protection which was tested as one of the instruments, especially text document. The principle of the document protection was how the system was able to protect the document storage and transfer processes. Firstly, the text-formed document was encrypted; therefore, the document cannot be read for the text was transformed into random letters. The letter-randomized text was then unfolded by the description in order that the document owner was able to read it. In the recent research, the method adopted was RSA method, in which it used complicated mathematics calculation and equipped with initial protection key (with either private key or public key), thus, it was more difficult to be attacked by hackers. The system was developed by using the software of Borland Delphi 7. The results indicated that the system was capable to save and transfer the document, both via internet and intranet in the form of encrypted letter and put it back to the initial form of document by way of description. The research also tested for encrypted and decrypted process for various memory size documents. (author)

  8. RSA and its Correctness through Modular Arithmetic

    Science.gov (United States)

    Meelu, Punita; Malik, Sitender

    2010-11-01

    To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA system generally belongs to the category of PKCS for both encryption and authentication. This paper describes an introduction to RSA through encryption and decryption schemes, mathematical background which includes theorems to combine modular equations and correctness of RSA. In short, this paper explains some of the maths concepts that RSA is based on, and then provides a complete proof that RSA works correctly. We can proof the correctness of RSA through combined process of encryption and decryption based on the Chinese Remainder Theorem (CRT) and Euler theorem. However, there is no mathematical proof that RSA is secure, everyone takes that on trust!.

  9. Encryption and decryption using FPGA

    Science.gov (United States)

    Nayak, Nikhilesh; Chandak, Akshay; Shah, Nisarg; Karthikeyan, B.

    2017-11-01

    In this paper, we are performing multiple cryptography methods on a set of data and comparing their outputs. Here AES algorithm and RSA algorithm are used. Using AES Algorithm an 8 bit input (plain text) gets encrypted using a cipher key and the result is displayed on tera term (serially). For simulation a 128 bit input is used and operated with a 128 bit cipher key to generate encrypted text. The reverse operations are then performed to get decrypted text. In RSA Algorithm file handling is used to input plain text. This text is then operated on to get the encrypted and decrypted data, which are then stored in a file. Finally the results of both the algorithms are compared.

  10. RSA cryptography and multi prime RSA cryptography

    Science.gov (United States)

    Sani, Nur Atiqah Abdul; Kamarulhaili, Hailiza

    2017-08-01

    RSA cryptography is one of the most powerful and popular cryptosystem which is being applied until now. There is one variant of RSA cryptography named Multi Prime RSA (MPRSA) cryptography. MPRSA cryptography is the improved version of RSA cryptography. We only need to modify a few steps in key generation part and apply the Chinese Remainder Theorem (CRT) in the decryption part to get the MPRSA algorithm. The focus of this research is to compare between the standard RSA cryptography and MPRSA cryptography in a few aspects. The research shows that MPRSA cryptography is more efficient than the RSA cryptography. Time complexity using Mathematica software is also conducted and it is proven that MPRSA cryptography has shorter time taken. It also implies the computational time is less than RSA cryptography. Mathematica software version 9.0 and a laptop HP ProBook 4331s are used to check the timing and to implement both algorithms.

  11. Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email

    Directory of Open Access Journals (Sweden)

    Albert Ginting

    2015-04-01

    Full Text Available In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography. One fairly popular cryptographic algorithms are RSA algorithm. In this study will discuss the implementation of a cryptographic algorithm RSA encryption and decryption process email. To test created a java-based email client program with message encryption and decryption features messages. This application uses the Java programming language and Netbeans 7.4 as editor. Mail servers used is Google Mail. The initial step of this study was to download email from the Google server and encrypt the message. The second step is decrypt the message to verify whether the message is still the same as the original message before it is encrypted . Results from this study is the application that can encrypt and decrypt messages using RSA cryptographic algorithm. With this application is expected to mail delivery is much safer. Because encrypted email will generate a random decimal number of unknown value .

  12. Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System

    Science.gov (United States)

    Aryanti, Aryanti; Mekongga, Ikhthison

    2018-02-01

    Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.

  13. Post-quantum rsa

    NARCIS (Netherlands)

    Bernstein, D.J.; Heninger, N.; Lou, P.; Valenta, L.; Lange, T.; Takagi, T.

    2017-01-01

    This paper proposes RSA parameters for which (1) key generation, encryption, decryption, signing, and verification are feasible on today’s computers while (2) all known attacks are infeasible, even assuming highly scalable quantum computers. As part of the performance analysis, this paper introduces

  14. Implementation of Rivest Shamir Adleman Algorithm (RSA and Vigenere Cipher In Web Based Information System

    Directory of Open Access Journals (Sweden)

    Aryanti Aryanti

    2018-01-01

    Full Text Available Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.

  15. VLSI implementation of RSA encryption system using ancient Indian Vedic mathematics

    Science.gov (United States)

    Thapliyal, Himanshu; Srinivas, M. B.

    2005-06-01

    This paper proposes the hardware implementation of RSA encryption/decryption algorithm using the algorithms of Ancient Indian Vedic Mathematics that have been modified to improve performance. The recently proposed hierarchical overlay multiplier architecture is used in the RSA circuitry for multiplication operation. The most significant aspect of the paper is the development of a division architecture based on Straight Division algorithm of Ancient Indian Vedic Mathematics and embedding it in RSA encryption/decryption circuitry for improved efficiency. The coding is done in Verilog HDL and the FPGA synthesis is done using Xilinx Spartan library. The results show that RSA circuitry implemented using Vedic division and multiplication is efficient in terms of area/speed compared to its implementation using conventional multiplication and division architectures.

  16. The Combination of RSA And Block Chiper Algorithms To Maintain Message Authentication

    Science.gov (United States)

    Yanti Tarigan, Sepri; Sartika Ginting, Dewi; Lumban Gaol, Melva; Lorensi Sitompul, Kristin

    2017-12-01

    RSA algorithm is public key algorithm using prime number and even still used today. The strength of this algorithm lies in the exponential process, and the factorial number into 2 prime numbers which until now difficult to do factoring. The RSA scheme itself adopts the block cipher scheme, where prior to encryption, the existing plaintext is divide in several block of the same length, where the plaintext and ciphertext are integers between 1 to n, where n is typically 1024 bit, and the block length itself is smaller or equal to log(n)+1 with base 2. With the combination of RSA algorithm and block chiper it is expected that the authentication of plaintext is secure. The secured message will be encrypted with RSA algorithm first and will be encrypted again using block chiper. And conversely, the chipertext will be decrypted with the block chiper first and decrypted again with the RSA algorithm. This paper suggests a combination of RSA algorithms and block chiper to secure data.

  17. Kombinasi RSA-CRT dengan Random LSB untuk Keamanan Data di Kanwil Kementerian Agama Prov. Sumatera Utara

    Directory of Open Access Journals (Sweden)

    Niti Ravika Nasution

    2017-04-01

    Full Text Available In this study the authors use Cryptographic Algorithms Rivest Shamir Adleman Chinese Remainder Theorem (RSA-CRT and steganography technique Random Least Significant Bits (LSB. RSA-CRT is basically the same as usual, but utilizing RSA CRT theorem to shorten the bit size decryption exponent d by hiding d on congruent systems that accelerate time decryption, the difference in the key generation process and the decryption process. Cryptographic algorithm RSA-CRT produce ciphertext stored into a picture (image using Steganography technique Random Least Significant Bits (LSB. The workings of Random LSB is storing the message (ciphertext in the first bit or the second bit random key for use random number generator Pseudo Random Number Generator (PRNG with Linear Congruential Generator (LCG method. Ciphertext stored in a picture  (image has extracted key re-use random number generator at the time of inserting the message. Then the ciphertext is decrypted back by the algorithm RSA-CRT to produce the original text (plaintext. Merging Cryptographic Algorithm RSA-CRT with Steganography Technique Simple  LSB than with Random LSB generate higher PSNR and MSE is lower, which means better level of data security and more resistant to attack. Has more difficult to find a secret message by cryptanalysis and steganalyst.

  18. On the Efficiency of Fast RSA Variants in Modern Mobile Phones

    DEFF Research Database (Denmark)

    Hansen, Klaus; Larsen, Troels; Olsen, Kim

    2009-01-01

    Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public-key cryptosystem RSA. It is, however, well-known that public-key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA...... decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on modern mobile phones....

  19. Penambahan Chinese Reminder Theorem Untuk Mempercepat Proses Enkripsi Dan Dekripsi Pada RSA

    OpenAIRE

    Hasibuan, Andi Hazri

    2015-01-01

    Many methods are used to protect digital data stored or transmitted via electronic media. One way is to use a cryptographic algorithm RSA (Rivest-Shamir-Adleman). Standard RSA uses modular arithmetic to perform the encryption and decryption. In this thesis discussed the addition of Chinese Remainder Theorem to speed up the RSA. 100823021

  20. A Review of RSA and Public-Key Cryptosystems | Rabah | Botswana ...

    African Journals Online (AJOL)

    ... study and analyze the RSA cryptosystems – a public-key cryptographic algorithm - a system that uses two sets of keys; one for encryption and the other for decryption. Key Words: Public-key cryptography, DH, RSA, Internet Security and attacks, Digital Signature, Message digest, Authentication, Secure Socket Layer (SSL)

  1. RSA Asymmetric Cryptosystem beyond Homogeneous Transformation

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... In this paper, we looked at the security of data and message, using ... out this research, the methodology we have adopted is the Structured Systems Analysis Method ... Keywords: Cryptosystem, Internet Security, Encryption, Decryption, ... communication traffic. ... hand, large primes imply a large RSA-.

  2. Dual-Layer Video Encryption using RSA Algorithm

    Science.gov (United States)

    Chadha, Aman; Mallik, Sushmit; Chadha, Ankit; Johar, Ravdeep; Mani Roja, M.

    2015-04-01

    This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two layers of encryption to ensure a reasonable level of security. Encryption of the video component involves applying the RSA algorithm followed by the PN-based encryption. Similarly, the audio component is first encrypted using PN and further subjected to encryption using the Discrete Cosine Transform. Combining these techniques, an efficient system, invulnerable to security breaches and attacks with favorable values of parameters such as encryption/decryption speed, encryption/decryption ratio and visual degradation; has been put forth. For applications requiring encryption of sensitive data wherein stringent security requirements are of prime concern, the system is found to yield negligible similarities in visual perception between the original and the encrypted video sequence. For applications wherein visual similarity is not of major concern, we limit the encryption task to a single level of encryption which is accomplished by using RSA, thereby quickening the encryption process. Although some similarity between the original and encrypted video is observed in this case, it is not enough to comprehend the happenings in the video.

  3. HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY

    Directory of Open Access Journals (Sweden)

    Grace Lamudur Arta Sihombing

    2017-03-01

    Full Text Available Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman algorithm. The advantages of hybrid cryptography is the speed in processing data using a symmetric algorithm and easy transfer of key using asymmetric algorithm. This can increase the speed of transaction processing data. Stream Cipher Algorithm using the image digital signature as a keys, that will be secured by the RSA algorithm. So, the key for encryption and decryption are different. Blum Blum Shub methods used to generate keys for the value p, q on the RSA algorithm. It will be very difficult for a cryptanalyst to break the key. Analysis of hybrid cryptography stream cipher and RSA algorithms with digital signatures as a key, indicates that the size of the encrypted file is equal to the size of the plaintext, not to be larger or smaller so that the time required for encryption and decryption process is relatively fast.

  4. Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration

    Directory of Open Access Journals (Sweden)

    Jiankuo Dong

    2017-01-01

    Full Text Available Asymmetric cryptographic algorithm (e.g., RSA and Elliptic Curve Cryptography implementations on Graphics Processing Units (GPUs have been researched for over a decade. The basic idea of most previous contributions is exploiting the highly parallel GPU architecture and porting the integer-based algorithms from general-purpose CPUs to GPUs, to offer high performance. However, the great potential cryptographic computing power of GPUs, especially by the more powerful floating-point instructions, has not been comprehensively investigated in fact. In this paper, we fully exploit the floating-point computing power of GPUs, by various designs, including the floating-point-based Montgomery multiplication/exponentiation algorithm and Chinese Remainder Theorem (CRT implementation in GPU. And for practical usage of the proposed algorithm, a new method is performed to convert the input/output between octet strings and floating-point numbers, fully utilizing GPUs and further promoting the overall performance by about 5%. The performance of RSA-2048/3072/4096 decryption on NVIDIA GeForce GTX TITAN reaches 42,211/12,151/5,790 operations per second, respectively, which achieves 13 times the performance of the previous fastest floating-point-based implementation (published in Eurocrypt 2009. The RSA-4096 decryption precedes the existing fastest integer-based result by 23%.

  5. Distributed Factorization Computation on Multiple Volunteered Mobile Resource to Break RSA Key

    Science.gov (United States)

    Jaya, I.; Hardi, S. M.; Tarigan, J. T.; Zamzami, E. M.; Sihombing, P.

    2017-01-01

    Similar to common asymmeric encryption, RSA can be cracked by usmg a series mathematical calculation. The private key used to decrypt the massage can be computed using the public key. However, finding the private key may require a massive amount of calculation. In this paper, we propose a method to perform a distributed computing to calculate RSA’s private key. The proposed method uses multiple volunteered mobile devices to contribute during the calculation process. Our objective is to demonstrate how the use of volunteered computing on mobile devices may be a feasible option to reduce the time required to break a weak RSA encryption and observe the behavior and running time of the application on mobile devices.

  6. Hybrid information privacy system: integration of chaotic neural network and RSA coding

    Science.gov (United States)

    Hsu, Ming-Kai; Willey, Jeff; Lee, Ting N.; Szu, Harold H.

    2005-03-01

    Electronic mails are adopted worldwide; most are easily hacked by hackers. In this paper, we purposed a free, fast and convenient hybrid privacy system to protect email communication. The privacy system is implemented by combining private security RSA algorithm with specific chaos neural network encryption process. The receiver can decrypt received email as long as it can reproduce the specified chaos neural network series, so called spatial-temporal keys. The chaotic typing and initial seed value of chaos neural network series, encrypted by the RSA algorithm, can reproduce spatial-temporal keys. The encrypted chaotic typing and initial seed value are hidden in watermark mixed nonlinearly with message media, wrapped with convolution error correction codes for wireless 3rd generation cellular phones. The message media can be an arbitrary image. The pattern noise has to be considered during transmission and it could affect/change the spatial-temporal keys. Since any change/modification on chaotic typing or initial seed value of chaos neural network series is not acceptable, the RSA codec system must be robust and fault-tolerant via wireless channel. The robust and fault-tolerant properties of chaos neural networks (CNN) were proved by a field theory of Associative Memory by Szu in 1997. The 1-D chaos generating nodes from the logistic map having arbitrarily negative slope a = p/q generating the N-shaped sigmoid was given first by Szu in 1992. In this paper, we simulated the robust and fault-tolerance properties of CNN under additive noise and pattern noise. We also implement a private version of RSA coding and chaos encryption process on messages.

  7. Additively homomorphic encryption with a double decryption mechanism, revisited

    NARCIS (Netherlands)

    Peter, Andreas; Kronberg, M.; Trei, W.; Katzenbeisser, S.

    We revisit the notion of additively homomorphic encryption with a double decryption mechanism (DD-PKE), which allows for additions in the encrypted domain while having a master decryption procedure that can decrypt all properly formed ciphertexts by using a special master secret. This type of

  8. Twin RSA

    OpenAIRE

    Lenstra, Arjen K.; Weger, De; Benjamin, M. M.

    2005-01-01

    We introduce Twin RSA, pairs of RSA moduli (n, n+ 2), and formulate several questions related to it. Our main questions are: is Twin RSA secure, and what is it good for? © Springer-Verlag Berlin Heidelberg 2005.

  9. Information security in data exchange between mobile devices with Android system using RSA encryption

    Directory of Open Access Journals (Sweden)

    Fernando Solís

    2017-02-01

    Full Text Available The new styles and ways of life lead to greater use of wireless networks, the mobile device being a tool for data transmission, which are susceptible to threats in the transmission channels in the network. IT security plays a very important role in guaranteeing the availability, privacy and integrity of information, one of the techniques that helps in this task is cryptography, whose foundation is to transform a message so that it is unintelligible except for those who have the Key to decipher it. The research focuses on the use of the RSA algorithm between mobile devices, the encrypted data is sent through communication channels called threads that through formulas and processes executed on the server, will help to execute the encryption and decryption of the data. To carry it out, a prototype for the exchange of data between mobile devices wirelessly was designed and implemented, conducting performance tests with three nodes to improve the security. The results show the efficiency of the algorithm and additionally its functionality, the times of encryption and decryption are fast against the sending of information without any method or algorithm used.

  10. An Optical Encryption and Decryption Method and System

    DEFF Research Database (Denmark)

    2000-01-01

    The invention relates to securing of information utilising optical imaging technologies and more specifically to phase encryption and decryption of images. An image is encrypted into a mask having a plurality of mask resolution elements (Xm, Ym) by encoding the image using e.g. a phase mask with ...... modulator resolution elements, the decrypting phase value phi d (Xd, Yd) and the decrypting amplitude value ad (Xd, Yd) respectively, of a modulator resolution element (Xd, Yd) being substantially equal to - phi c (Xm, Ym) and ac (Xm, Ym)....

  11. Range Scheduling Aid (RSA)

    Science.gov (United States)

    Logan, J. R.; Pulvermacher, M. K.

    1991-01-01

    Range Scheduling Aid (RSA) is presented in the form of the viewgraphs. The following subject areas are covered: satellite control network; current and new approaches to range scheduling; MITRE tasking; RSA features; RSA display; constraint based analytic capability; RSA architecture; and RSA benefits.

  12. ???????????? ???????????? ???? ??? ?????????? ????????? ?????????? ????????? ????????? ???????? ??????????????

    OpenAIRE

    ????????? ?. ?.

    2016-01-01

    ? ????????????? ????????? RSA-????????? ?? ???????????? ????????? ???????-????????????? ???????? ???????????? ????????, ?? ???????? ??????????????????????? ????????? ?? ?????? ??????? ????????? ?????????????? ????????? ?????????????? ? ????? ?????? ????????? RSA ????, ??? ?????????????? ????????? ?????????? ????????? RSA. Using elements of the RSA algorithm in the form of coefficients of binary linearquadratic affine transformation proved that the encryption-decryption images with clear conto...

  13. RSA-salausmenetelmä

    OpenAIRE

    Sipola, T. (Tapani)

    2017-01-01

    Tiivistelmä Tutkielmassa esitellään lyhyesti salakirjoituksen perusperiaatteita. Tämän jälkeen perehdytään RSA-salauksen periaatteeseen, jonka toimivuus todistetaan. Lisäksi kerrotaan RSA-salauksen käytöstä digitaalisessa allekirjoituksessa. Lopuksi perustellaan RSA-salauksen turvallisuutta tutkimalla mahdollisia heikkouksia ja miten niitä voi välttää. RSA-salaus hyödyntää nopeaa potenssiinkorotusalgoritmia, jota sovelletaa...

  14. File Cryptography with AES and RSA for Mobile Based on Android

    Science.gov (United States)

    laia, Yonata; Nababan, Marlince; Sihombing, Oloan; Aisyah, Siti; Sitanggang, Delima; Parsaoran, Saut; Zendato, Niskarto

    2018-04-01

    The users of mobile based on android were increasing currently even now mobile was almost the same computer one of which could be used to be done by every users mobile was save the individual important data.Saving the data on mobile was very risk because become hackers’ target. That was the reason of researchers want to add cryptography which the combination between Advance Encryption System (AES) dan Ron Rivest, Adi Shamir dan Len Adleman (RSA). The result of the second method above could do cryptography data on mobile. With different encryption time where the file size; 25.44 KB, encryption time 4 second, 200 KB, 5 second, 600 KB 7 second, 2.29 MB, 10 second. Where decryption 25.44 KB, encryption 2 second, 200 KB, 1.5 second, 600 KB 2.5 second, 2.29 MB, 2.7 second.

  15. Combinations of resting RSA and RSA reactivity impact maladaptive mood repair and depression symptoms.

    Science.gov (United States)

    Yaroslavsky, Ilya; Bylsma, Lauren M; Rottenberg, Jonathan; Kovacs, Maria

    2013-10-01

    We examined whether the combined indices of respiratory sinus arrhythmia at rest (resting RSA) and in response to a sad film (RSA reactivity) predict effective and ineffective responses to reduce sadness (adaptive vs. maladaptive mood repair) in women with histories of juvenile-onset depression (n=74) and no history of major mental disorders (n=75). Structural equation models were used to estimate latent resting RSA, depression, and adaptive and maladaptive mood repair and to test the study hypotheses. Results indicated that combinations of resting RSA+RSA reactivity (RSA patterns) predicted maladaptive mood repair, which in turn, mediated the effects of RSA pattern on depression. Further, RSA patterns moderated the depressogenic effects of maladaptive mood repair. RSA patterns were unrelated to adaptive mood repair. Our findings suggest that mood repair is one mechanism through which physiological vulnerabilities adversely affect mental health. Copyright © 2013 Elsevier B.V. All rights reserved.

  16. RSA algoritam i njegova praktična primena / RSA algorithm

    Directory of Open Access Journals (Sweden)

    Sonja R. Kuljanski

    2010-07-01

    Full Text Available RSA algoritam jeste algoritam sa javnim ključem koji uključuje tri koraka: generisanje ključa, enkripciju i dekripciju. RSA enkripciona šema je determinističaka što znači da se osnovni tekst uvek enkriptuje u isti šifrovani tekst za unapred zadati javni ključ. Da bi se izbegao ovaj problem, praktična implementacija RSA algoritma obično koristi neke strukture, kao što je dodavanje slučajnog teksta u samu poruku pre enkripcije. Ovo dodavanje obezbeđuje da osnovna poruka bude sigurna i da se može enkriptovati u veliki broj različitih šifrovanih poruka. Standardi, kao što je PKCS #1, pažljivo su dizajnirani tako da dodaju tekst u osnovnu poruku pre RSA same enkripcije. / RSA is an algorithm for public-key encryption. It is the first algorithm known to be suitable for encryption as well as digital signing. The RSA encryption scheme is deterministic in the sense that under a fixed public key, a particular plaintext is always encrypted to the same ciphertext. A deterministic encryption scheme (as opposed to a probabilistic encryption scheme is a cryptosystem which always produces the same ciphertext for a given plaintext and key, even over separate executions of the encryption algorithm. Probabilistic encryption uses randomness in an encryption algorithm, so that when encrypting the same message several times it will, in general, yield different ciphertexts.

  17. Simple Backdoors on RSA Modulus by Using RSA Vulnerability

    Science.gov (United States)

    Sun, Hung-Min; Wu, Mu-En; Yang, Cheng-Ta

    This investigation proposes two methods for embedding backdoors in the RSA modulus N=pq rather than in the public exponent e. This strategy not only permits manufacturers to embed backdoors in an RSA system, but also allows users to choose any desired public exponent, such as e=216+1, to ensure efficient encryption. This work utilizes lattice attack and exhaustive attack to embed backdoors in two proposed methods, called RSASBLT and RSASBES, respectively. Both approaches involve straightforward steps, making their running time roughly the same as that of normal RSA key-generation time, implying that no one can detect the backdoor by observing time imparity.

  18. Cryptanalysis of RSA and its variants

    CERN Document Server

    Hinek, M Jason

    2009-01-01

    Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its main variants, including CRT-RSA, multi-prime RSA, and multi-power RSA. Divided into three parts, the book first introduces RSA and reviews the mathematical background needed for the majority of attacks described in the remainder of the text. It then brings together all of the most popular mathematical attacks on RSA and its variants. For each attack presented, the author includes a mathematical proof if possible or a mathematical justification for attacks that rely on assumptions. For the attacks that cannot be proven, he gives experimental evidence to illustrate their practical effectiveness. Focusing on mathematical attacks that exploit the structure of RSA and specific parameter choic...

  19. RSA fluctuation in major depressive disorder.

    Science.gov (United States)

    Rottenberg, Jonathan; Clift, April; Bolden, Sarah; Salomon, Kristen

    2007-05-01

    Cardiac vagal control, as measured by indices of respiratory sinus arrhythmia (RSA), has been investigated as a marker of impaired self-regulation in mental disorders, including depression. Past work in depressed samples has focused on deficits in resting RSA levels, with mixed results. This study tested the hypothesis that depression involves abnormal RSA fluctuation. RSA was measured in depressed and healthy control participants during rest and during two reactivity tasks, each followed by a recovery period. Relative to controls, depressed persons exhibited lower resting RSA levels as well as less RSA fluctuation, primarily evidenced by a lack of task-related vagal suppression. Group differences in RSA fluctuation were not accounted for by differences in physical health or respiration, whereas group differences in resting RSA level did not survive covariate analyses. Depression may involve multiple deficits in cardiac vagal control.

  20. Video Encryption and Decryption on Quantum Computers

    Science.gov (United States)

    Yan, Fei; Iliyasu, Abdullah M.; Venegas-Andraca, Salvador E.; Yang, Huamin

    2015-08-01

    A method for video encryption and decryption on quantum computers is proposed based on color information transformations on each frame encoding the content of the encoding the content of the video. The proposed method provides a flexible operation to encrypt quantum video by means of the quantum measurement in order to enhance the security of the video. To validate the proposed approach, a tetris tile-matching puzzle game video is utilized in the experimental simulations. The results obtained suggest that the proposed method enhances the security and speed of quantum video encryption and decryption, both properties required for secure transmission and sharing of video content in quantum communication.

  1. Dynamic RSA: Examining parasympathetic regulatory dynamics via vector-autoregressive modeling of time-varying RSA and heart period.

    Science.gov (United States)

    Fisher, Aaron J; Reeves, Jonathan W; Chi, Cyrus

    2016-07-01

    Expanding on recently published methods, the current study presents an approach to estimating the dynamic, regulatory effect of the parasympathetic nervous system on heart period on a moment-to-moment basis. We estimated second-to-second variation in respiratory sinus arrhythmia (RSA) in order to estimate the contemporaneous and time-lagged relationships among RSA, interbeat interval (IBI), and respiration rate via vector autoregression. Moreover, we modeled these relationships at lags of 1 s to 10 s, in order to evaluate the optimal latency for estimating dynamic RSA effects. The IBI (t) on RSA (t-n) regression parameter was extracted from individual models as an operationalization of the regulatory effect of RSA on IBI-referred to as dynamic RSA (dRSA). Dynamic RSA positively correlated with standard averages of heart rate and negatively correlated with standard averages of RSA. We propose that dRSA reflects the active downregulation of heart period by the parasympathetic nervous system and thus represents a novel metric that provides incremental validity in the measurement of autonomic cardiac control-specifically, a method by which parasympathetic regulatory effects can be measured in process. © 2016 Society for Psychophysiological Research.

  2. Про одну модифікацію алгоритму RSA шифрування – дешифрування півтонових зображень

    OpenAIRE

    Ковальчук, А.; Пелешко, Д.; Навитка, М.; Борзов, Ю.

    2012-01-01

    Описано застосування модифікації алгоритму RSA для шифрування – дешифрування зображень. Шифрування – дешифрування проводиться без і з додатковим зашумленням. We describe the use of modified RSA algorithm for encryption – decryption of images. Encryption – decryption is carried out without and with extra noisy.

  3. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  4. RSA in Spine: A Review.

    Science.gov (United States)

    Humadi, Ali; Dawood, Sulaf; Halldin, Klas; Freeman, Brian

    2017-12-01

    Systematic review of literature. This systematic review was conducted to investigate the accuracy of radiostereometric analysis (RSA), its assessment of spinal motion and disorders, and to investigate the limitations of this technique in spine assessment. Systematic review in all current literature to invesigate the role of RSA in spine. The results of this review concluded that RSA is a very powerful tool to detect small changes between 2 rigid bodies such as a vertebral segment. The technique is described for animal and human studies for cervical and lumbar spine and can be used to analyze range of motion, inducible displacement, and fusion of segments. However, there are a few disadvantages with the technique; RSA percutaneous procedure needs to be performed to implant the markers (and cannot be used preoperatively), one needs a specific knowledge to handle data and interpret the results, and is relatively time consuming and expensive. RSA should be looked at as a very powerful research instrument and there are many questions suitable for RSA studies.

  5. Decryption-decompression of AES protected ZIP files on GPUs

    Science.gov (United States)

    Duong, Tan Nhat; Pham, Phong Hong; Nguyen, Duc Huu; Nguyen, Thuy Thanh; Le, Hung Duc

    2011-10-01

    AES is a strong encryption system, so decryption-decompression of AES encrypted ZIP files requires very large computing power and techniques of reducing the password space. This makes implementations of techniques on common computing system not practical. In [1], we reduced the original very large password search space to a much smaller one which surely containing the correct password. Based on reduced set of passwords, in this paper, we parallel decryption, decompression and plain text recognition for encrypted ZIP files by using CUDA computing technology on graphics cards GeForce GTX295 of NVIDIA, to find out the correct password. The experimental results have shown that the speed of decrypting, decompressing, recognizing plain text and finding out the original password increases about from 45 to 180 times (depends on the number of GPUs) compared to sequential execution on the Intel Core 2 Quad Q8400 2.66 GHz. These results have demonstrated the potential applicability of GPUs in this cryptanalysis field.

  6. Batch Attribute-Based Encryption for Secure Clouds

    Directory of Open Access Journals (Sweden)

    Chen Yang

    2015-10-01

    Full Text Available Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext are associated with an access policy and an attribute set, respectively; in addition to holding a secret key, one can decrypt a ciphertext only if the associated attributes match the predetermined access policy, which allows one to enforce fine-grained access control on outsourced files. One issue in existing ABE schemes is that they are designed for the users of a single organization. When one wants to share the data with the users of different organizations, the owner needs to encrypt the messages to the receivers of one organization and then repeats this process for another organization. This situation is deteriorated with more and more mobile devices using cloud services, as the ABE encryption process is time consuming and may exhaust the power supplies of the mobile devices quickly. In this paper, we propose a batch attribute-based encryption (BABE approach to address this problem in a provably-secure way. With our approach, the data owner can outsource data in batches to the users of different organizations simultaneously. The data owner is allowed to decide the receiving organizations and the attributes required for decryption. Theoretical and experimental analyses show that our approach is more efficient than traditional encryption implementations in computation and communication.

  7. RSA-salaus ja sen lukuteoreettinen pohja

    OpenAIRE

    LARJA, PEKKA

    2011-01-01

    Tämä tutkielma käsittelee RSA-salausta ja sen lukuteoreettista perustaa. RSA-salaus on varmasti yksi yleisimmin käytetyistä (ellei yleisin) julkisen avaimen salakirjoitusjärjestelmistä. Nykyisen viestintätekniikan kehityksen mukana salakirjoitusjärjestelmistä on tullut keskeisiä välineitä modernissa yhteiskunnassa. RSA-salaus perustuu eräisiin lukuteorian keskeisiin tuloksiin ja on perusidealtaan hämmästyttävän yksinkertainen. Tutkielman luvussa 2 tarkastellaan RSA-salauksen käyttämiä luk...

  8. The utility of combining RSA indices in depression prediction.

    Science.gov (United States)

    Yaroslavsky, Ilya; Rottenberg, Jonathan; Kovacs, Maria

    2013-05-01

    Depression is associated with protracted despondent mood, blunted emotional reactivity, and dysregulated parasympathetic nervous system (PNS) activity. PNS activity is commonly indexed via cardiac output, using indictors of its level (resting respiratory sinus arrhythmia [RSA]) or fluctuations (RSA reactivity). RSA reactivity can reflect increased or decreased PNS cardiac output (RSA augmentation and RSA withdrawal, respectively). Because a single index of a dynamic physiological system may be inadequate to characterize interindividual differences, we investigated whether the interaction of RSA reactivity and resting RSA is a better predictor of depression. Adult probands with childhood-onset depressive disorder histories (n = 113) and controls with no history of major mental disorders (n = 93) completed a psychophysiology protocol involving assessment of RSA at multiple rest periods and while watching a sad film. When examined independently, resting RSA and RSA reactivity were unrelated to depression, but their interaction predicted latent depression levels and proband status. In the context of high resting RSA, RSA withdrawal from the sad film predicted the lowest levels of depressive symptoms (irrespective of depression histories) and the greatest likelihood of having had no history of major mental disorder (irrespective of current distress). Our findings highlight the utility of combining indices of physiological responses in studying depression; combinations of RSA indices should be given future consideration as reflecting depression endophenotypes. © 2013 American Psychological Association

  9. H1 in RSA galaxies

    Science.gov (United States)

    Richter, OTTO-G.

    1993-01-01

    The original Revised Shapley-Ames (RSA) galaxy sample of almost 1300 galaxies has been augmented with further bright galaxies from the RSA appendix as well as newer galaxy catalogs. A complete and homogeneous, strictly magnitude-limited all-sky sample of 2345 galaxies brighter than 13.4 in apparent blue magnitude was formed. New 21 cm H1 line observations for more than 600 RSA galaxies have been combined with all previously available H1 data from the literature. This new extentise data act allows detailed tests of widely accepted 'standard' reduction and analysis techniques.

  10. Enhanced rearrangement technique for secure data transmission: case study credit card process

    Science.gov (United States)

    Vyavahare, Tushar; Tekade, Darshana; Nayak, Saurabh; kumar, N. Suresh; Blessy Trencia Lincy, S. S.

    2017-11-01

    Encryption of data is very important in order to keep the data secure and make secure transactions and transmission of data. Such as online shopping. whenever we give our card details there is possibility of data being hacked or intruded. So to secure that we need to encrypt the data and decryption strategy should be known only to that particular bank. Therefore to achieve this objective RSA algorithm can be used. Where only intended sender and receiver can know about the encryption and decryption of data. To make the RSA technique more secure in this paper we propose the technique we call it Modified RSA. for which a transposition module is designed which uses Row Transposition method to encrypt the data. Before giving the card details to RSA the input will be given to this transposition module which will scrambles the data and rearranges it. Output of transposition will be then provided to the modified RSA which produces the cipher text to send over the network. Use of RSA and the transposition module will provide the dual security to whole system.

  11. QR code based noise-free optical encryption and decryption of a gray scale image

    Science.gov (United States)

    Jiao, Shuming; Zou, Wenbin; Li, Xia

    2017-03-01

    In optical encryption systems, speckle noise is one major challenge in obtaining high quality decrypted images. This problem can be addressed by employing a QR code based noise-free scheme. Previous works have been conducted for optically encrypting a few characters or a short expression employing QR codes. This paper proposes a practical scheme for optically encrypting and decrypting a gray-scale image based on QR codes for the first time. The proposed scheme is compatible with common QR code generators and readers. Numerical simulation results reveal the proposed method can encrypt and decrypt an input image correctly.

  12. Attribute-based encryption with encryption and decryption outsourcing

    NARCIS (Netherlands)

    Asim, M.; Petkovic, M.; Ignatenko, T.

    2014-01-01

    In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows outsourcing of computationally expensive encryption and decryption steps. The scheme constitutes an important building block for mobile applications where both the host and users use mobile devices

  13. Improved decryption quality and security of a joint transform correlator-based encryption system

    Science.gov (United States)

    Vilardy, Juan M.; Millán, María S.; Pérez-Cabré, Elisabet

    2013-02-01

    Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption-decryption process. Numerical results are presented and discussed.

  14. Improved decryption quality and security of a joint transform correlator-based encryption system

    International Nuclear Information System (INIS)

    Vilardy, Juan M; Millán, María S; Pérez-Cabré, Elisabet

    2013-01-01

    Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption–decryption process. Numerical results are presented and discussed. (paper)

  15. DMAC-AN INTEGRATED ENCRYPTION SCHEME WITH RSA FOR AC TO OBSTRUCT INFERENCE ATTACKS

    Directory of Open Access Journals (Sweden)

    R. Jeeva

    2012-12-01

    Full Text Available The proposal of indistinguishable encryption in Randomized Arithmetic Coding(RAC doesn’t make the system efficient because it was not encrypting the messages it sends. It recomputes the cipher form of every messages it sends that increases not only the computational cost but also increases the response time.Floating point representation in cipher increases the difficulty in decryption side because of loss in precison.RAC doesn’t handle the inference attacks like Man-in-Middle attack,Third party attack etc. In our system, Dynamic Matrix Arithmetic Coding(DMAC using dynamic session matrix to encrypt the messages. The size of the matrix is deduced from the session key that contains ID of end users which proves the server authentication.Nonce values is represented as the public key of the opponents encrypted by the session key will be exchanged between the end users to provide mutual authentication. If the adversary try to compromise either server or end users,the other system won’t respond and the intrusion will be easily detected. we have increased the hacking complexity of AC by integrating with RSA upto 99%.

  16. RSA Reactivity in Current and Remitted Major Depressive Disorder

    Science.gov (United States)

    Bylsma, Lauren M.; Salomon, Kristen; Taylor-Clift, April; Morris, Bethany H.; Rottenberg, Jonathan

    2014-01-01

    Objective Low resting respiratory sinus arrhythmia (RSA) levels and blunted RSA reactivity are thought to index impaired emotion regulation capacity. Major Depressive Disorder (MDD) has been associated with abberant RSA reactivity and recovery to a speech stressor task relative to healthy controls. Whether impaired RSA functioning reflects aspects of the depressed mood state or a stable vulnerability marker for depression is unknown. Methods We compared resting RSA and RSA reactivity between individuals with MDD (n=49), remitted depression (RMD, n=24), and healthy controls (n=45). ECG data were collected during a resting baseline, a paced-breathing baseline, and two reactivity tasks (speech stressor, cold exposure). Results A group by time quadratic effect emerged (F=4.36(2,109), p=.015) for RSA across phases of the speech stressor (baseline, instruction, preparation, speech, recovery). Follow-up analyses revealed that those with MDD uniquely exhibited blunted RSA reactivity, whereas RMD and controls both exhibited normal task-related vagal withdrawal and post-task recovery. The group by time interaction remained after covariation for age, sex, waist circumference, physical activity, and respiration, but not sleep quality. Conclusions These results provide new evidence that abberant RSA reactivity marks features that track the depressed state, such as poor sleep, rather than a stable trait evident among asymtomatic persons. PMID:24367127

  17. Factorisation of RSA-220 with CADO-NFS

    OpenAIRE

    Bai , Shi; Gaudry , Pierrick; Kruppa , Alexander; Thomé , Emmanuel; Zimmermann , Paul

    2016-01-01

    We give details of the factorization of RSA-220 with CADO-NFS. This is a new record computation with this open-source software. We report on the factorization of RSA-220 (220 decimal digits), which is the 3rd largest integer factorization with the General Number Field Sieve (GNFS), after the factorization of RSA-768 (232 digits) in December 2009 [3], and that of 3 697 + 1 (221 digits) in February 2015 by NFS@home.

  18. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  19. Factorization of a 768-Bit RSA Modulus

    OpenAIRE

    Kleinjung, Thorsten; Aoki, Kazumaro; Franke, Jens; Lenstra, Arjen K.; Thome, Emmanuel; Bos, Joppe Willem; Gaudry, Pierrick; Kruppa, Alexander; Montgomery, Peter L.; Osvik, Dag Arne; Riele, Herman Te; Timofeev, Andrey; Zimmermann, Paul

    2010-01-01

    The original publication is available at www.springerlink.com; International audience; This paper reports on the factorization of the 768-bit number RSA-768 by the number field sieve factoring method and discusses some implications for RSA.

  20. Dynamic measures of RSA predict distress and regulation in toddlers.

    Science.gov (United States)

    Brooker, Rebecca J; Buss, Kristin A

    2010-05-01

    In this study, we examined a new method for quantifying individual variability using dynamic measures of respiratory sinus arrhythmia (RSA). This method incorporated temporal variation into the measurement of RSA and provided information beyond that offered by more traditional quantifications such as difference scores. Dynamic and static measures of change in RSA were tested in relation to displays of emotion and affective behaviors during a fear-eliciting episode in a sample of 88 typically developing and high-fear toddlers during a laboratory visit at age 24 months. Dynamic measures of RSA contributed information that was unique from traditionally employed, static change scores in predicting high-fear toddlers' displays of shyness during a fear-eliciting episode. In contrast, RSA change scores offered information related to boldness in nonhigh-fear children. In addition, several associations included estimates of nonlinear change in RSA. Implications for the study of individual differences in RSA and relations with emotion and emotion regulation are discussed.

  1. 50 CFR 648.207 - Herring Research Set-Aside (RSA).

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Herring Research Set-Aside (RSA). 648.207... Measures for the Atlantic Herring Fishery § 648.207 Herring Research Set-Aside (RSA). (a) NMFS shall... authorized to utilize RSA, based on the selection criteria described in the RFP. (d) NMFS shall consider each...

  2. Center index method-an alternative for wear measurements with radiostereometry (RSA).

    Science.gov (United States)

    Dahl, Jon; Figved, Wender; Snorrason, Finnur; Nordsletten, Lars; Röhrl, Stephan M

    2013-03-01

    Radiostereometry (RSA) is considered to be the most precise and accurate method for wear-measurements in total hip replacement. Post-operative stereoradiographs has so far been necessary for wear measurement. Hence, the use of RSA has been limited to studies planned for RSA measurements. We compared a new RSA method for wear measurements that does not require previous radiographs with conventional RSA. Instead of comparing present stereoradiographs with post-operative ones, we developed a method for calculating the post-operative position of the center of the femoral head on the present examination and using this as the index measurement. We compared this alternative method to conventional RSA in 27 hips in an ongoing RSA study. We found a high degree of agreement between the methods for both mean proximal (1.19 mm vs. 1.14 mm) and mean 3D wear (1.52 mm vs. 1.44 mm) after 10 years. Intraclass correlation coefficients (ICC) were 0.958 and 0.955, respectively (pRSA offers comparable results to conventional RSA measurements. It allows precise wear measurements without previous radiological examinations. Copyright © 2012 Orthopaedic Research Society.

  3. Effectiveness of leukocyte immunotherapy in primary recurrent spontaneous abortion (RSA).

    Science.gov (United States)

    Gharesi-Fard, Behrouz; Zolghadri, Jaleh; Foroughinia, Leila; Tavazoo, Fahimeh; Samsami Dehaghani, Alamtaj

    2007-09-01

    Recurrent spontaneous abortion (RSA) is defined as three or more sequential abortions before the twentieth week of gestation. There are evidences to support an allo-immunologic mechanism for RSA. One of the methods for treatment of RSA is leukocyte therapy; however there is still controversy about effectiveness of this method. To evaluate the effectiveness of leukocyte therapy for treatment of RSA. Ninety two non-pregnant women with at least three sequential abortions (60 primary & 32 secondary aborters) recognized as RSA were referred to our Laboratory for immunotherapy. All the cases were immunized by isolated lymphocytes from their husbands. Fifty to 100 million washed and resuspended mononuclear cells were injected by I.V., S.C., and I.D. route. The result of each injection was checked by WBC cross matching between couples after four weeks of injections. Immunization was repeated in fifth week to a maximum of 3 times if needed. Eighty one age-matched non-pregnant RSA women (52 primary and 29 secondary aborters) with at least three sequential abortions were also included in this study as controls. The control group was not immunized. 67 out of 92 (72.8%) immunized cases and 44 out of 81 controls (54.3%) showed a successful outcome of pregnancy (pRSA patients. Despite the current controversy and limitation of leukocyte therapy in RSA, the results of our investigation provide evidence supporting the use of allo-immunization in improving the outcome of pregnancy in primary RSA patients.

  4. RSA migration of total knee replacements.

    Science.gov (United States)

    Pijls, Bart G; Plevier, José W M; Nelissen, Rob G H H

    2018-06-01

    Purpose - We performed a systematic review and meta-analyses to evaluate the early and long-term migration patterns of tibial components of TKR of all known RSA studies. Methods - Migration pattern was defined as at least 2 postoperative RSA follow-up moments. Maximal total point motion (MTPM) at 6 weeks, 3 months, 6 months, 1 year, 2 years, 5 years, and 10 years were considered. Results - The literature search yielded 1,167 hits of which 53 studies were included, comprising 111 study groups and 2,470 knees. The majority of the early migration occurred in the first 6 months postoperatively followed by a period of stability, i.e., no or very little migration. Cemented and uncemented tibial components had different migration patterns. For cemented tibial components there was no difference in migration between all-poly and metal-backed components, between mobile bearing and fixed bearing, between cruciate retaining and posterior stabilized. Furthermore, no difference existed between TKR measured with model-based RSA or marker-based RSA methods. For uncemented TKR there was some variation in migration with the highest migration for uncoated TKR. Interpretation - The results from this meta-analysis on RSA migration of TKR are in line with both the survival analyses results from joint registries of these TKRs as well as revision rates results from meta-analyses, thus providing further proof for the association between early migration and late revision for loosening. The pooled migration patterns can be used both as benchmarks and for defining migration thresholds for future evaluation of new TKR.

  5. RSA Monitoring Redesign Initiative Informational Booklet #1

    Science.gov (United States)

    US Department of Education, 2005

    2005-01-01

    This informational booklet contains background materials regarding the Rehabilitation Services Administration (RSA) initiative to redesign its monitoring system. The booklet is intended to expand the knowledge and understanding of those individuals selected to participate in the RSA-sponsored monitoring conference that was held August 24 and 25,…

  6. Factorization of a 512-bit RSA modulus

    NARCIS (Netherlands)

    S.H. Cavallar; W.M. Lioen (Walter); H.J.J. te Riele (Herman); B. Dodson; A.K. Lenstra (Arjen); P.L. Montgomery; B. Murphy

    2000-01-01

    textabstractOn August 22, 1999, we completed the factorization of the 512--bit 155--digit number RSA--155 with the help of the Number Field Sieve factoring method (NFS). This is a new record for factoring general numbers. Moreover, 512--bit RSA keys are frequently used for the protection of

  7. Use of the RSA/RCOD Index to Identify Training Priority in Soccer Players.

    Science.gov (United States)

    Wong, Del P; Hjelde, Geir H; Cheng, Ching-Feng; Ngo, Jake K

    2015-10-01

    The use of RSA/RCOD index indicates the repeated change-of-direction (RCOD) performance relative to the repeated-sprint ability (RSA) and provides a standardized approach to prioritize training needs for RSA and RCOD. To compare the RSA/RCOD index among different age groups, RSA and RCOD were measured from 20 under-16 players (U16), 20 under-19 players (U19), and 17 first-team professional players (PRO) from a football (soccer) club that has regular participation in the UEFA Champions League. Each player performed the RSA and RCOD tests, during which the fastest time (FT), average time (AT), total time (TT), and percentage decrement score (%Dec) were recorded. No significant differences were found in RSA/RCOD index-FT, AT, TT, and %Dec among the 3 groups (p > 0.05) and between U19 and PRO in all RSA and RCOD measures (p > 0.05). Most values of RSA/RCOD index were 0.51 among the U16, U19, and PRO groups. Moreover, we concluded that the RSA/RCOD index might not be further changed after 16 years of age unless specific training programs for RSA and RCOD are prescribed. Therefore, this study provides an empirical case, and coaches can establish the RSA/RCOD index value relevant to their training system and monitor players' training needs of RSA and RCOD in a longer term.

  8. Rsa algoritam i njegova praktična primena

    OpenAIRE

    Kuljanski R. Sonja

    2010-01-01

    RSA algoritam jeste algoritam sa javnim ključem koji uključuje tri koraka: generisanje ključa, enkripciju i dekripciju. RSA enkripciona šema je determinističaka što znači da se osnovni tekst uvek enkriptuje u isti šifrovani tekst za unapred zadati javni ključ. Da bi se izbegao ovaj problem, praktična implementacija RSA algoritma obično koristi neke strukture, kao što je dodavanje slučajnog teksta u samu poruku pre enkripcije. Ovo dodavanje obezbeđuje da osnovna poruka bude s...

  9. Cryptanalysis of 'less short' RSA secret exponents

    NARCIS (Netherlands)

    Verheul, E.R.; Tilborg, van H.C.A.

    1997-01-01

    In some applications of RSA, it is desirable to have a short secret exponent d. Wiener [6], describes a technique to use continued fractions (CF) in a cryptanalytic attack on an RSA cryptosystem having a ‘short’ secret exponent. Let n=p¿·¿q be the modulus of the system. In the typical case that

  10. Implementasi Kriptografi Kunci Publik dengan Algoritma RSA-CRT pada Aplikasi Instant Messaging

    Directory of Open Access Journals (Sweden)

    Ashari Arief

    2016-06-01

    Full Text Available Instant messaging merupakan salah satu bentuk kemajuan teknologi komunikasi yang mempermudah penyampaian informasi. Saat ini, dengan semakin banyaknya pengguna aplikasi instant messaging berakibat pada dampak negatif berupa penyadapan data khususnya saat terjadi komunikasi yang bersifat rahasia. Algoritma RSA merupakan salah satu satu algoritma dalam kriptografi kunci publik. Pada proses enkripsi dan dekripsi digunakan kunci yang berbeda. Proses dekripsi algoritma RSA sering terjadi kendala karena ukuran kunci dekripsi yang relatif besar dapat memperlambat proses. Untuk mempercepat proses dekripsi, algoritma RSA dapat dimodifikasi dengan algoritma CRT (Chinese Remainder Theorem, sering disebut dengan Algoritma RSA-CRT. Implementasi algoritma kriptografi RSA-CRT pada aplikasi instant messaging pada panjang bit n mulai dari 56 bit sampai 88 bit, proses dekripsi RSA-CRT dua kali lebih cepat dibandingkan proses dekripsi RSA

  11. Hoe je het cryptosysteem RSA soms kunt kraken

    NARCIS (Netherlands)

    Weger, de B.M.M.; Wiegerinck, J.J.O.O.

    2010-01-01

    RSA is een veelgebruikt cryptografisch systeem, bijvoorbeeld voor het beveiligen van internetverkeer. Het is een asymmetrisch systeem, d.w.z. versleutelen gebeurt met een publieke sleutel, ontsleutelen met de bijbehorende privésleutel. RSA maakt gebruik van eenvoudige getaltheorie en kan dan ook

  12. Hardware modules of the RSA algorithm

    Directory of Open Access Journals (Sweden)

    Škobić Velibor

    2014-01-01

    Full Text Available This paper describes basic principles of data protection using the RSA algorithm, as well as algorithms for its calculation. The RSA algorithm is implemented on FPGA integrated circuit EP4CE115F29C7, family Cyclone IV, Altera. Four modules of Montgomery algorithm are designed using VHDL. Synthesis and simulation are done using Quartus II software and ModelSim. The modules are analyzed for different key lengths (16 to 1024 in terms of the number of logic elements, the maximum frequency and speed.

  13. Improved Mask Protected DES using RSA Algorithm

    Directory of Open Access Journals (Sweden)

    Asha Latha S.

    2016-01-01

    Full Text Available The data encryption standard is a pioneering and farsighted standard which helped to set a new paradigm for encryption standards. But now DES is considered to be insecure for some application. Asymmetric mask protected DES is an advanced encryption method for effectively protecting the advanced DES. There are still probabilities to improve its security. This paper propose a method, which introduce a RSA key generation scheme in mask protected DES instead of plain key, which result in enhancement in the security of present asymmetric mask protected DES. We further propose a Vedic mathematical method of RSA implementation which reduce the complexity of computation in RSA block thereby resulting in reduced delay (four timesthat improves the performance of overall system. The software implementation was performed using Xilinx 13.2 and Model-Sim was used for the simulation environment.

  14. Adolescent RSA responses during an anger discussion task: Relations to emotion regulation and adjustment.

    Science.gov (United States)

    Cui, Lixian; Morris, Amanda Sheffield; Harrist, Amanda W; Larzelere, Robert E; Criss, Michael M; Houltberg, Benjamin J

    2015-06-01

    The current study examined associations between adolescent respiratory sinus arrhythmia (RSA) during an angry event discussion task and adolescents' emotion regulation and adjustment. Data were collected from 206 adolescents (10-18 years of age, M age = 13.37). Electrocardiogram (ECG) and respiration data were collected from adolescents, and RSA values and respiration rates were computed. Adolescents reported on their own emotion regulation, prosocial behavior, and aggressive behavior. Multilevel latent growth modeling was employed to capture RSA responses across time (i.e., linear and quadratic changes; time course approach), and adolescent emotion regulation and adjustment variables were included in the model to test their links to RSA responses. Results indicated that high RSA baseline was associated with more adolescent prosocial behavior. A pattern of initial RSA decreases (RSA suppression) in response to angry event recall and subsequent RSA increases (RSA rebound) were related to better anger and sadness regulation and more prosocial behavior. However, RSA was not significantly linked to adolescent aggressive behavior. We also compared the time course approach with the conventional linear approach and found that the time course approach provided more meaningful and rich information. The implications of adaptive RSA change patterns are discussed. (c) 2015 APA, all rights reserved).

  15. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA)

    DEFF Research Database (Denmark)

    Muharemovic, O; Troelsen, A; Thomsen, M G

    2018-01-01

    INTRODUCTION: Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time...... imaging. Radiographers in the control group used a standard RSA protocol. RESULTS: At three months, radiographers in the case group significantly reduced (p .... No significant improvements were found in the control group at any time point. CONCLUSION: There is strong evidence that personalized RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute...

  16. Estimating time-varying RSA to examine psychophysiological linkage of marital dyads.

    Science.gov (United States)

    Gates, Kathleen M; Gatzke-Kopp, Lisa M; Sandsten, Maria; Blandon, Alysia Y

    2015-08-01

    One of the primary tenets of polyvagal theory dictates that parasympathetic influence on heart rate, often estimated by respiratory sinus arrhythmia (RSA), shifts rapidly in response to changing environmental demands. The current standard analytic approach of aggregating RSA estimates across time to arrive at one value fails to capture this dynamic property within individuals. By utilizing recent methodological developments that enable precise RSA estimates at smaller time intervals, we demonstrate the utility of computing time-varying RSA for assessing psychophysiological linkage (or synchrony) in husband-wife dyads using time-locked data collected in a naturalistic setting. © 2015 Society for Psychophysiological Research.

  17. Conversion of invisible metal-organic frameworks to luminescent perovskite nanocrystals for confidential information encryption and decryption.

    Science.gov (United States)

    Zhang, Congyang; Wang, Bo; Li, Wanbin; Huang, Shouqiang; Kong, Long; Li, Zhichun; Li, Liang

    2017-10-31

    Traditional smart fluorescent materials, which have been attracting increasing interest for security protection, are usually visible under either ambient or UV light, making them adverse to the potential application of confidential information protection. Herein, we report an approach to realize confidential information protection and storage based on the conversion of lead-based metal-organic frameworks (MOFs) to luminescent perovskite nanocrystals (NCs). Owing to the invisible and controlled printable characteristics of lead-based MOFs, confidential information can be recorded and encrypted by MOF patterns, which cannot be read through common decryption methods. Through our conversion strategy, highly luminescent perovskite NCs can be formed quickly and simply by using a halide salt trigger that reacts with the MOF, thus promoting effective information decryption. Finally, through polar solvents impregnation and halide salt conversion, the luminescence of the perovskite NCs can be quenched and recovered, leading to reversible on/off switching of the luminescence signal for multiple information encryption and decryption processes.

  18. Secret Message Decryption: Group Consulting Projects Using Matrices and Linear Programming

    Science.gov (United States)

    Gurski, Katharine F.

    2009-01-01

    We describe two short group projects for finite mathematics students that incorporate matrices and linear programming into fictional consulting requests presented as a letter to the students. The students are required to use mathematics to decrypt secret messages in one project involving matrix multiplication and inversion. The second project…

  19. Selective forgery of RSA signatures with fixed-pattern padding

    NARCIS (Netherlands)

    Lenstra, A.K.; Shparlinski, I.E.; Naccache, D.; Paillier, P.

    2002-01-01

    We present a practical selective forgery attack against RSA signatures with fixed-pattern padding shorter than two thirds of the modulus length. Our result extends the practical existential forgery of such RSA signatures that was presented at Crypto 2001. For an n-bit modulus the heuristic

  20. RSA and registries: the quest for phased introduction of new implants.

    Science.gov (United States)

    Nelissen, Rob G H H; Pijls, Bart G; Kärrholm, Johan; Malchau, Henrik; Nieuwenhuijse, Marc J; Valstar, Edward R

    2011-12-21

    Although the overall survival of knee and hip prostheses at ten years averages 90%, recent problems with several hip and knee prostheses have illustrated that the orthopaedic community, industry, and regulators can still further improve patient safety. Given the early predictive properties of roentgen stereophotogrammetric analysis (RSA) and the meticulous follow-up of national joint registries, these two methods are ideal tools for such a phased clinical introduction. In this paper, we elaborate on the predictive power of RSA within a two-year follow-up after arthroplasty and its relationship to national joint registries. The association between RSA prosthesis-migration data and registry data is evaluated. The five-year rate of revision of RSA-tested total knee replacements was compared with that of non-RSA-tested total knee replacements. Data were extracted from the published results of the national joint registries of Sweden, Australia, and New Zealand. There was a 22% to 35% reduction in the number of revisions of RSA-tested total knee replacements as compared with non-RSA-tested total knee replacements in the national joint registries. Assuming that the total cost of total knee arthroplasty is $37,000 in the United States, a 22% to 35% reduction in the number of revisions (currently close to 55,000 annually) could lead to an estimated annual savings of over $400 million to the health-care system. The phased clinical introduction of new prostheses with two-year RSA results as a qualitative tool could lead to better patient care and could reduce the costs associated with revision total knee arthroplasty. Follow-up in registries is necessary to substantiate these results and to improve post-market surveillance.

  1. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA).

    Science.gov (United States)

    Muharemovic, O; Troelsen, A; Thomsen, M G; Kallemose, T; Gosvig, K K

    2018-05-01

    Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time and the number of exposure repetitions. Forty patients undergoing primary total hip arthroplasty were equally randomized to either a case or a control group. Radiographers in the case group were assisted by personalized patient protocols containing information about each patient's post-operative RSA imaging. Radiographers in the control group used a standard RSA protocol. At three months, radiographers in the case group significantly reduced (p RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute to the reduction of examination time, thus ensuring a cost benefit for department and patient safety. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  2. Are CT Scans a Satisfactory Substitute for the Follow-Up of RSA Migration Studies of Uncemented Cups? A Comparison of RSA Double Examinations and CT Datasets of 46 Total Hip Arthroplasties.

    Science.gov (United States)

    Otten, Volker; Maguire, Gerald Q; Noz, Marilyn E; Zeleznik, Michael P; Nilsson, Kjell G; Olivecrona, Henrik

    2017-01-01

    As part of the 14-year follow-up of a prospectively randomized radiostereometry (RSA) study on uncemented cup fixation, two pairs of stereo radiographs and a CT scan of 46 hips were compared. Tantalum beads, inserted during the primary operation, were detected in the CT volume and the stereo radiographs and used to produce datasets of 3D coordinates. The limit of agreement between the combined CT and RSA datasets was calculated in the same way as the precision of the double RSA examination. The precision of RSA corresponding to the 99% confidence interval was 1.36°, 1.36°, and 0.60° for X -, Y -, and Z -rotation and 0.40, 0.17, and 0.37 mm for X -, Y -, and Z -translation. The limit of agreement between CT and RSA was 1.51°, 2.17°, and 1.05° for rotation and 0.59, 0.56, and 0.74 mm for translation. The differences between CT and RSA are close to the described normal 99% confidence interval for precision in RSA: 0.3° to 2° for rotation and 0.15 to 0.6 mm for translation. We conclude that measurements using CT and RSA are comparable and that CT can be used for migration studies for longitudinal evaluations of patients with RSA markers.

  3. SEB teams up with RSA

    Index Scriptorium Estoniae

    2011-01-01

    Globaalne kindlustusgrupp RSA ja SEB Pank teatasid 19. aprillil, et alustavad koostööd varakindlustustoodete pakkumisel SEB klientidele Eestis, mis tähendab seda, et RSAst saab ainus varakindlustuse pakkuja pangas

  4. A High-Speed Design of Montgomery Multiplier

    Science.gov (United States)

    Fan, Yibo; Ikenaga, Takeshi; Goto, Satoshi

    With the increase of key length used in public cryptographic algorithms such as RSA and ECC, the speed of Montgomery multiplication becomes a bottleneck. This paper proposes a high speed design of Montgomery multiplier. Firstly, a modified scalable high-radix Montgomery algorithm is proposed to reduce critical path. Secondly, a high-radix clock-saving dataflow is proposed to support high-radix operation and one clock cycle delay in dataflow. Finally, a hardware-reused architecture is proposed to reduce the hardware cost and a parallel radix-16 design of data path is proposed to accelerate the speed. By using HHNEC 0.25μm standard cell library, the implementation results show that the total cost of Montgomery multiplier is 130 KGates, the clock frequency is 180MHz and the throughput of 1024-bit RSA encryption is 352kbps. This design is suitable to be used in high speed RSA or ECC encryption/decryption. As a scalable design, it supports any key-length encryption/decryption up to the size of on-chip memory.

  5. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    DEFF Research Database (Denmark)

    Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal

    2011-01-01

    with security against malicious behavior. Our second contribution is complete Paillier [Pai99] threshold encryption scheme in the two-party setting with security against malicious behavior. Furthermore, we describe how to extend our protocols to the multiparty setting with dishonest majority. Our RSA key...... generation is comprised of the following: (i) a distributed protocol for generation of an RSA composite, and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite as public key and is comprised of: (i) a distributed......The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite...

  6. RSA/Legacy Wind Sensor Comparison. Part 2; Eastern Range

    Science.gov (United States)

    Short, David A.; Wheeler, Mark M.

    2006-01-01

    This report describes a comparison of data from ultrasonic and propeller-and-vane anemometers on 5 wind towers at Kennedy Space Center and Cape Canaveral Air Force Station. The ultrasonic sensors are scheduled to replace the Legacy propeller-and-vane sensors under the Range Standardization and Automation (RSA) program. Because previous studies have noted differences between peak wind speeds reported by mechanical and ultrasonic wind sensors, the latter having no moving parts, the 30th and 45th Weather Squadrons wanted to understand possible differences between the two sensor types. The period-of-record was 13-30 May 2005, A total of 357,626 readings of 1-minute average and peak wind speed/direction from each sensor type were used. Statistics of differences in speed and direction were used to identify 15 out of 19 RSA sensors having the most consistent performance, with respect to the Legacy sensors. RSA average wind speed data from these 15 showed a small positive bias of 0.38 kts. A slightly larger positive bias of 0.94 kts was found in the RSA peak wind speed.

  7. Respiratory sinus arrhythmia responses to cognitive tasks: effects of task factors and RSA indices.

    Science.gov (United States)

    Overbeek, Thérèse J M; van Boxtel, Anton; Westerink, Joyce H D M

    2014-05-01

    Many studies show that respiratory sinus arrhythmia (RSA) decreases while performing cognitive tasks. However, there is uncertainty about the role of contaminating factors such as physical activity and stress-inducing task variables. Different methods to quantify RSA may also contribute to variable results. In 83 healthy subjects, we studied RSA responses to a working memory task requiring varying levels of cognitive control and a perceptual attention task not requiring strong cognitive control. RSA responses were quantified in the time and frequency domain and were additionally corrected for differences in mean interbeat interval and respiration rate, resulting in eight different RSA indices. The two tasks were clearly differentiated by heart rate and facial EMG reference measures. Cognitive control induced inhibition of RSA whereas perceptual attention generally did not. However, the results show several differences between different RSA indices, emphasizing the importance of methodological variables. Age and sex did not influence the results. Copyright © 2014 Elsevier B.V. All rights reserved.

  8. Associations between respiratory sinus arrhythmia (RSA) reactivity and effortful control in preschool-age children.

    Science.gov (United States)

    Sulik, Michael J; Eisenberg, Nancy; Spinrad, Tracy L; Silva, Kassondra M

    2015-07-01

    We tested whether respiratory sinus arrhythmia (RSA) reactivity in response to each of three self-regulation tasks (bird and dragon; knock-tap; and gift wrap) would predict self-regulation performance in a sample of 101 preschool-age children (M age = 4.49, SD = .64). While controlling for baseline RSA, decreases in RSA from bird and dragon to knock-tap (but not from baseline to bird and dragon) predicted a latent variable measuring self-regulation. Furthermore, increases in RSA from the knock-tap to gift wrap-the only task involving delay of gratification-were related to concurrent task performance while controlling for the relation between RSA reactivity and the latent self-regulation variable. Results suggest that the relations between RSA reactivity and self-regulatory ability are influenced by task-specific demands and possibly by task order. Furthermore, RSA reactivity appears to relate differently to performance on motivationally salient self-regulation tasks such as delay of gratification relative to cool executive function tasks. © 2015 Wiley Periodicals, Inc.

  9. Image-based RSA: Roentgen stereophotogrammetric analysis based on 2D-3D image registration.

    Science.gov (United States)

    de Bruin, P W; Kaptein, B L; Stoel, B C; Reiber, J H C; Rozing, P M; Valstar, E R

    2008-01-01

    Image-based Roentgen stereophotogrammetric analysis (IBRSA) integrates 2D-3D image registration and conventional RSA. Instead of radiopaque RSA bone markers, IBRSA uses 3D CT data, from which digitally reconstructed radiographs (DRRs) are generated. Using 2D-3D image registration, the 3D pose of the CT is iteratively adjusted such that the generated DRRs resemble the 2D RSA images as closely as possible, according to an image matching metric. Effectively, by registering all 2D follow-up moments to the same 3D CT, the CT volume functions as common ground. In two experiments, using RSA and using a micromanipulator as gold standard, IBRSA has been validated on cadaveric and sawbone scapula radiographs, and good matching results have been achieved. The accuracy was: |mu |RSA but higher than in vivo standard RSA. Because IBRSA does not require radiopaque markers, it adds functionality to the RSA method by opening new directions and possibilities for research, such as dynamic analyses using fluoroscopy on subjects without markers and computer navigation applications.

  10. RSA Key Development Using Fingerprint Image on Text Message

    Science.gov (United States)

    Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti

    2017-12-01

    Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.

  11. 47 CFR 22.969 - Cellular RSA licenses subject to competitive bidding.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Cellular RSA licenses subject to competitive bidding. 22.969 Section 22.969 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.969 Cellular RSA licenses...

  12. RSA/Legacy Wind Sensor Comparison. Part 1; Western Range

    Science.gov (United States)

    Short, David A.; Wheeler, Mark M.

    2006-01-01

    This report describes a comparison of data from ultrasonic and cup-and-vane anemometers on 5 wind towers at Vandenberg AFB. The ultrasonic sensors are scheduled to replace the Legacy cup-and-vane sensors under the Range Standardization and Automation (RSA) program. Because previous studies have noted differences between peak wind speeds reported by mechanical and ultrasonic wind sensors, the latter having no moving parts, the 30th and 45th Weather Squadrons wanted to understand possible differences between the two sensor types. The period-of-record was 13-30 May 2005. A total of 153,961 readings of I-minute average and peak wind speed/direction from each sensor type were used. Statistics of differences in speed and direction were used to identify 18 out of 34 RSA sensors having the most consistent performance, with respect to the Legacy sensors. Data from these 18 were used to form a composite comparison. A small positive bias in the composite RSA average wind speed increased from +0.5 kts at 15 kts, to +1 kt at 25 kts. A slightly larger positive bias in the RSA peak wind speed increased from +1 kt at 15 kts, to +2 kts at 30 kts.

  13. Simultaneous transmission for an encrypted image and a double random-phase encryption key

    Science.gov (United States)

    Yuan, Sheng; Zhou, Xin; Li, Da-Hai; Zhou, Ding-Fu

    2007-06-01

    We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.

  14. Security analysis of RSA cryptosystem algorithm and it’s properties

    International Nuclear Information System (INIS)

    Liu, Chenglian; Guo, Yongning; Lin, Juan

    2014-01-01

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA

  15. Security analysis of RSA cryptosystem algorithm and it’s properties

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  16. Parallel data encryption with RSA algorithm

    OpenAIRE

    Неретин, А. А.

    2016-01-01

    In this paper a parallel RSA algorithm with preliminary shuffling of source text was presented.Dependence of an encryption speed on the number of encryption nodes has been analysed, The proposed algorithm was implemented on C# language.

  17. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin

    2014-01-01

    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  18. Children's dynamic RSA change during anger and its relations with parenting, temperament, and control of aggression.

    Science.gov (United States)

    Miller, Jonas G; Chocol, Caroline; Nuselovici, Jacob N; Utendale, William T; Simard, Melissa; Hastings, Paul D

    2013-02-01

    This study examined the moderating effects of child temperament on the association between maternal socialization and 4-6-year-old children's dynamic respiratory sinus arrhythmia (RSA) change in response to anger-themed emotional materials (N=180). We used latent growth curve modeling to explore adaptive patterns of dynamic RSA change in response to anger. Greater change in RSA during anger-induction, characterized by more initial RSA suppression and a subsequent return to baseline, was related to children's better regulation of aggression. For anger-themed materials, low levels of authoritarian parenting predicted more RSA suppression and recovery for more anger-prone children, whereas more authoritative parenting predicted more RSA suppression and recovery for less anger-prone children. These findings suggest that children's adaptive patterns of dynamic RSA change can be characterized by latent growth curve modeling, and that these patterns may be differentially shaped by parent socialization experiences as a function of child temperament. Copyright © 2013 Elsevier B.V. All rights reserved.

  19. Nurses as advocates between western and traditional wealth practices in RSA

    Directory of Open Access Journals (Sweden)

    Valerie Ehlers

    2000-10-01

    Full Text Available The RSA, like most African countries, have two health care systems. The most visible one is the Westernised hospital and/or clinic based treatment of diseases. This system was introduced by the colonisers and perpetuated by the current formal education programmes of most health care professionals in the RSA. Traditional African medicine has existed since time immemorial and continues to treat vast numbers of people. Both these health care systems will be briefly discussed. Then the role of nurses in the RSA's health care system(s will be examined. *Please note: This is a reduced version of the abstract. Please refer to PDF for full text.

  20. Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length

    Directory of Open Access Journals (Sweden)

    Jiguo Li

    2017-01-01

    Full Text Available Outsourced decryption ABE system largely reduces the computation cost for users who intend to access the encrypted files stored in cloud. However, the correctness of the transformation ciphertext cannot be guaranteed because the user does not have the original ciphertext. Lai et al. provided an ABE scheme with verifiable outsourced decryption which helps the user to check whether the transformation done by the cloud is correct. In order to improve the computation performance and reduce communication overhead, we propose a new verifiable outsourcing scheme with constant ciphertext length. To be specific, our scheme achieves the following goals. (1 Our scheme is verifiable which ensures that the user efficiently checks whether the transformation is done correctly by the CSP. (2 The size of ciphertext and the number of expensive pairing operations are constant, which do not grow with the complexity of the access structure. (3 The access structure in our scheme is AND gates on multivalued attributes and we prove our scheme is verifiable and it is secure against selectively chosen-plaintext attack in the standard model. (4 We give some performance analysis which indicates that our scheme is adaptable for various limited bandwidth and computation-constrained devices, such as mobile phone.

  1. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    DEFF Research Database (Denmark)

    Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal

    2012-01-01

    The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite wi...

  2. Emotion suppression moderates the quadratic association between RSA and executive function.

    Science.gov (United States)

    Spangler, Derek P; Bell, Martha Ann; Deater-Deckard, Kirby

    2015-09-01

    There is uncertainty about whether respiratory sinus arrhythmia (RSA), a cardiac marker of adaptive emotion regulation, is involved in relatively low or high executive function performance. In the present study, we investigated (a) whether RSA during rest and tasks predict both relatively low and high executive function within a larger quadratic association among the two variables, and (b) the extent to which this quadratic trend was moderated by individual differences in emotion regulation. To achieve these aims, a sample of ethnically and socioeconomically diverse women self-reported reappraisal and emotion suppression. They next experienced a 2-min resting period during which electrocardiogram (ECG) was continually assessed. In the next phase, the women completed an array of executive function and nonexecutive cognitive tasks while ECG was measured throughout. As anticipated, resting RSA showed a quadratic association with executive function that was strongest for high suppression. These results suggest that relatively high resting RSA may predict poor executive function ability when emotion regulation consumes executive control resources needed for ongoing cognitive performance. © 2015 Society for Psychophysiological Research.

  3. Longitudinal associations between temperament and socioemotional outcomes in young children: the moderating role of RSA and gender.

    Science.gov (United States)

    Morales, Santiago; Beekman, Charles; Blandon, Alysia Y; Stifter, Cynthia A; Buss, Kristin A

    2015-01-01

    Temperament is an important predictor of socioemotional adjustment, such as externalizing and internalizing symptoms. However, there is not a one-to-one correspondence between temperamental predispositions and these outcomes, implying that other factors also contribute to the development of internalizing and externalizing problems. Self-regulation is believed to interact with temperament, and has been studied as a predictor for later socioemotional outcomes. Respiratory sinus arrhythmia (RSA) is a psychophysiological measure of self-regulation that has been studied as a moderator of risk. The primary aim of the present study was to test if RSA baseline and RSA reactivity would moderate the link between temperament and socioemotional outcomes. Mothers reported the temperament of their infants (20 months; N = 154), RSA was collected at 24- and 42-months, and mothers reported externalizing and internalizing behaviors at kindergarten entry. RSA baseline and RSA reactivity moderated the relation between exuberant temperament and externalizing behaviors. However, these results were only significant for girls, such that high RSA baseline and greater RSA suppression predicted more externalizing behaviors when exuberance was high. Fearful temperament predicted later internalizing behaviors, but no moderation was present. These results are discussed in light of recent evidence regarding gender differences in the role of RSA as a protective factor for risk. © 2014 Wiley Periodicals, Inc.

  4. Efficient, Robust and Constant-Round Distributed RSA Key Generation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe

    2010-01-01

    We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one iteration of the underlying primality test on each candidate number.......We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one iteration of the underlying primality test on each candidate number....

  5. RSA-Based Secret Handshakes

    OpenAIRE

    Vergnaud , Damien

    2006-01-01

    A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong and, so far, all the schemes proposed are based on discrete log systems. This paper proposes three new secret handshake protocols secure against active impersonator and detector adversaries. Inspired by two RSA-based key agreement protocols introduced by Okamoto and Tanaka in 1989 and Gira...

  6. Association between HLA-E gene polymorphism and unexplained recurrent spontaneous abortion (RSA) in Iranian women.

    Science.gov (United States)

    Fotoohi, Maryam; Ghasemi, Nasrin; Mirghanizadeh, Seyed Ali; Vakili, Mahmood; Samadi, Morteza

    2016-07-01

    Human leukocyte antigen-E (HLA-E)is a non-classical major histocompatibility complex (MHC) class I antigens which expressed on extra villous cytotrophoblast, which interacts with NKG2A, is an inhibitory receptor on natural killer (NK) cells and leading to down regulation of immune response in the maternal-fetal interface and provides maternal immune tolerance of the fetus. This study was designated to investigate the gene frequencies of E0101 and E0103 in HLA-E gene in Iranian women with recurrent spontaneous abortion (RSA). Amplification Refractory Mutation System (ARMS-PCR) technique was carried out to detect polymorphism in exon 3 of the HLA-E gene in women with RSA and controls (n=200). Differences between groups were analyzed by SPSS19 software using (2) test. There was no significant difference in the allele frequencies of the HLA-E polymorphism between RSA and fertile controls but HLA-E 0101/0103 heterozygous genotype was found to be significantly higher in RSA group (p=0.006, OR=1.73), so this genotype might confer susceptibility to RSA. Our results suggest that HLA-E 0101/0103 heterozygous genotype leads to increase of RSA risk. It seems that by genotyping of HLA-E polymorphism, we can predict the risk of RSA in infertile women.

  7. Early adversity, RSA, and inhibitory control: evidence of children's neurobiological sensitivity to social context.

    Science.gov (United States)

    Skowron, Elizabeth A; Cipriano-Essel, Elizabeth; Gatzke-Kopp, Lisa M; Teti, Douglas M; Ammerman, Robert T

    2014-07-01

    This study examined parasympathetic physiology as a moderator of the effects of early adversity (i.e., child abuse and neglect) on children's inhibitory control. Children's respiratory sinus arrhythmia (RSA) was assessed during a resting baseline, two joint challenge tasks with mother, and an individual frustration task. RSA assessed during each of the joint parent-child challenge tasks moderated the effects of child maltreatment (CM) status on children's independently-assessed inhibitory control. No moderation effect was found for RSA assessed at baseline or in the child-alone challenge task. Among CM-exposed children, lower RSA levels during the joint task predicted the lowest inhibitory control, whereas higher joint task RSA was linked to higher inhibitory control scores that were indistinguishable from those of non-CM children. Results are discussed with regard to the importance of considering context specificity (i.e., individual and caregiver contexts) in how biomarkers inform our understanding of individual differences in vulnerability among at-risk children. © 2013 Wiley Periodicals, Inc.

  8. Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems

    DEFF Research Database (Denmark)

    Bendlin, Rikke; Damgård, Ivan Bjerre

    2010-01-01

    generation protocol. In the final part of the paper we show how one can, in zero-knowledge - prove knowledge of the plaintext contained in a given ciphertext from Regev's original cryptosystem or our variant. The proof is of size only a constant times the size of the public key....... a very efficient and non-interactive decryption protocol. We prove the threshold cryptosystem secure against passive adversaries corrupting all but one of the players, and againts active adversaries corrupting less than one third of the players. We also describe how one can build a distributed key...

  9. Sleep duration and RSA suppression as predictors of internalizing and externalizing behaviors.

    Science.gov (United States)

    Cho, Sunghye; Philbrook, Lauren E; Davis, Elizabeth L; Buss, Kristin A

    2017-01-01

    Although the conceptual interplay among the biological and clinical features of sleep, arousal, and emotion regulation has been noted, little is understood about how indices of sleep duration and parasympathetic reactivity operate jointly to predict adjustment in early childhood. Using a sample of 123 toddlers, the present study examined sleep duration and RSA reactivity as predictors of internalizing and externalizing behaviors. Parents reported on children's sleep duration and adjustment. RSA reactivity was assessed via children's responses to fear-eliciting stimuli and an inhibitory control challenge. Findings demonstrated that greater RSA suppression to both types of tasks in combination with longer sleep duration was concurrently associated with less internalizing. In contrast, greater RSA augmentation to an inhibitory control task in the context of shorter sleep duration predicted more externalizing 1 year later. The significance of duration of toddlers' sleep as well as the context in which physiological regulatory difficulties occurs is discussed. © 2016 Wiley Periodicals, Inc.

  10. Children’s dynamic RSA change during anger and its relations with parenting, temperament, and control of aggression☆

    Science.gov (United States)

    Miller, Jonas G.; Chocol, Caroline; Nuselovici, Jacob N.; Utendale, William T.; Simard, Melissa; Hastings, Paul D.

    2014-01-01

    This study examined the moderating effects of child temperament on the association between maternal socialization and 4–6-year-old children’s dynamic respiratory sinus arrhythmia (RSA) change in response to anger-themed emotional materials (N = 180). We used latent growth curve modeling to explore adaptive patterns of dynamic RSA change in response to anger. Greater change in RSA during anger-induction, characterized by more initial RSA suppression and a subsequent return to baseline, was related to children’s better regulation of aggression. For anger-themed materials, low levels of authoritarian parenting predicted more RSA suppression and recovery for more anger-prone children, whereas more authoritative parenting predicted more RSA suppression and recovery for less anger-prone children. These findings suggest that children’s adaptive patterns of dynamic RSA change can be characterized by latent growth curve modeling, and that these patterns may be differentially shaped by parent socialization experiences as a function of child temperament. PMID:23274169

  11. RSA Algorithm. Features of the C # Object Programming Implementation

    Directory of Open Access Journals (Sweden)

    Elena V. Staver

    2012-08-01

    Full Text Available Public-key algorithms depend on the encryption key and the decoding key, connected with the first one. For data public key encryption, the text is divided into blocks, each of which is represented as a number. To decrypt the message a secret key is used.

  12. Marker-based or model-based RSA for evaluation of hip resurfacing arthroplasty? A clinical validation and 5-year follow-up.

    Science.gov (United States)

    Lorenzen, Nina Dyrberg; Stilling, Maiken; Jakobsen, Stig Storgaard; Gustafson, Klas; Søballe, Kjeld; Baad-Hansen, Thomas

    2013-11-01

    The stability of implants is vital to ensure a long-term survival. RSA determines micro-motions of implants as a predictor of early implant failure. RSA can be performed as a marker- or model-based analysis. So far, CAD and RE model-based RSA have not been validated for use in hip resurfacing arthroplasty (HRA). A phantom study determined the precision of marker-based and CAD and RE model-based RSA on a HRA implant. In a clinical study, 19 patients were followed with stereoradiographs until 5 years after surgery. Analysis of double-examination migration results determined the clinical precision of marker-based and CAD model-based RSA, and at the 5-year follow-up, results of the total translation (TT) and the total rotation (TR) for marker- and CAD model-based RSA were compared. The phantom study showed that comparison of the precision (SDdiff) in marker-based RSA analysis was more precise than model-based RSA analysis in TT (p CAD RSA analysis (p = 0.002), but showed no difference between the marker- and CAD model-based RSA analysis regarding the TR (p = 0.91). Comparing the mean signed values regarding the TT and the TR at the 5-year follow-up in 13 patients, the TT was lower (p = 0.03) and the TR higher (p = 0.04) in the marker-based RSA compared to CAD model-based RSA. The precision of marker-based RSA was significantly better than model-based RSA. However, problems with occluded markers lead to exclusion of many patients which was not a problem with model-based RSA. HRA were stable at the 5-year follow-up. The detection limit was 0.2 mm TT and 1° TR for marker-based and 0.5 mm TT and 1° TR for CAD model-based RSA for HRA.

  13. RSA Asymmetric Cryptosystem beyond Homogeneous Transformation

    African Journals Online (AJOL)

    computation of public and private keys, and privacy, using Turbo C++ 4.5. Our work was able to address up to 32 bits. The objective of this paper is to develop an encryption scheme which is heterogeneous compared with the current RSA system that is ...

  14. Comparison of two different Radiostereometric analysis (RSA) systems with markerless elementary geometrical shape modeling for the measurement of stem migration.

    Science.gov (United States)

    Li, Ye; Röhrl, Stephan M; Bøe, B; Nordsletten, Lars

    2014-09-01

    Radiostereometric analysis (RSA) is the gold standard of measurement for in vivo 3D implants migration. The aim of this study was to evaluate the in vivo precision of 2 RSA marker-based systems compared with that of marker-free, elementary geometrical shape modeling RSA. Stem migration was measured in 50 patients recruited from an on-going Randomized Controlled Trial. We performed marker-based analysis with the Um RSA and RSAcore systems and compared these results with those of the elementary geometrical shape RSA. The precision for subsidence was 0.118 mm for Um RSA, 0.141 mm for RSAcore, and 0.136 mm for elementary geometrical shape RSA. The precision for retroversion was 1.3° for elementary geometrical shape RSA, approximately 2-fold greater than that for the other methods. The intraclass correlation coefficient between the marker-based systems and elementary geometrical shape RSA was approximately 0.5 for retroversion. All 3 methods yielded ICCs for subsidence and varus-valgus rotation above 0.9. We found an excellent correlation between marker-based RSA and elementary geometrical shape RSA for subsidence and varus-valgus rotation, independent of the system used. The precisions for out-of-plane migration were inferior for elementary geometrical shape RSA. Therefore, as a mechanism of failure, retroversion may be more difficult to detect early. This is to our knowledge the first study to compare different RSA systems with or without markers on the implant. Marker-based RSA has high precision in all planes, independent of the system used. Elementary geometrical shape RSA is inferior in out-of-plane migration. Copyright © 2014 Elsevier Ltd. All rights reserved.

  15. Directly assessing interpersonal RSA influences in the frequency domain: An illustration with generalized partial directed coherence.

    Science.gov (United States)

    Liu, Siwei; Gates, Kathleen M; Blandon, Alysia Y

    2018-06-01

    Despite recent research indicating that interpersonal linkage in physiology is a common phenomenon during social interactions, and the well-established role of respiratory sinus arrhythmia (RSA) in socially facilitative physiological regulation, little research has directly examined interpersonal influences in RSA, perhaps due to methodological challenges in analyzing multivariate RSA data. In this article, we aim to bridge this methodological gap by introducing a new method for quantifying interpersonal RSA influences. Specifically, we show that a frequency-domain statistic, generalized partial directed coherence (gPDC), can be used to capture lagged relations in RSA between social partners without first estimating RSA for each person. We illustrate its utility by examining the relation between gPDC and marital conflict in a sample of married couples. Finally, we discuss how gPDC complements existing methods in the time domain and provide guidelines for choosing among these different statistical techniques. © 2018 Society for Psychophysiological Research.

  16. [Study on the relationship between ER Rsa I gene polymorphism and children's dental fluorosis].

    Science.gov (United States)

    Ba, Yue; Li, Hai-Xia; Yin, Gong-Ju; Wu, Wei-Hua; Yu, Bo; Cheng, Xue-Min; Cui, Liu-Xin

    2009-09-01

    To explore the distribution of ER Rsa I genotype in children who lived in the areas with or without high fluoride, and evaluate the relationship between ER Rsa I gene polymorphism and children's dental fluorosis. Children aged 8 to 12 years, born and raised in high fluoride areas and control areas in two counties of Henan Province were recruited. The Rsa I marker of ER gene was genotyped in 237 children composed of both dental fluorosis cases and controls by PCR-RFLP procedure. Urine fluoride was detected with fluoride ion selective electrode method. The frequency distribution of ER Rsa I genotype was rr 60.81% (45/74), Rr 27.02% (20/74), RR 12.16% (9/74) in children with fluorosis; rr 73.91% (51/69), Rr 20.29% (14/69), RR 5.80% (4/69) in children without fluorosis from high fluoride areas, and rr 63.83% (60/94), Rr 34.04% (32/94), RR 2.13% (2/94) in the children without fluorosis from control areas respectively. There were no significant differences in the three groups (P>0.05), but children carrying allele R of ER Rsa I had a significantly increased risk of dental fluorosis (OR=1.821, 95% CI: 1.013-3.274) compared to children carrying the allele r in endemic fluorosis areas. Although no significant difference was found in ER Rsa I genotype between cases and non-dental fluorosis in endemic fluorosis areas, children carrying R allele of ER Rsa I had a higher risk compared to children carrying r allele, and the further study is needed.

  17. Combined model of 9x9 playfair and RSA for securing confidential ...

    African Journals Online (AJOL)

    Combined model of 9x9 playfair and RSA for securing confidential information. Y.B. Zakariyau, L.J. Muhammad, A.M. Usman, A Garba. Abstract. No Abstract. Keywords: Cryptography, RSA, Playfair Cipher, Public and Secret Key. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL ...

  18. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    OpenAIRE

    Kuang Tsan Lin; Sheng Lih Yeh

    2014-01-01

    The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matri...

  19. Precision assessment of model-based RSA for a total knee prosthesis in a biplanar set-up.

    Science.gov (United States)

    Trozzi, C; Kaptein, B L; Garling, E H; Shelyakova, T; Russo, A; Bragonzoni, L; Martelli, S

    2008-10-01

    Model-based Roentgen Stereophotogrammetric Analysis (RSA) was recently developed for the measurement of prosthesis micromotion. Its main advantage is that markers do not need to be attached to the implants as traditional marker-based RSA requires. Model-based RSA has only been tested in uniplanar radiographic set-ups. A biplanar set-up would theoretically facilitate the pose estimation algorithm, since radiographic projections would show more different shape features of the implants than in uniplanar images. We tested the precision of model-based RSA and compared it with that of the traditional marker-based method in a biplanar set-up. Micromotions of both tibial and femoral components were measured with both the techniques from double examinations of patients participating in a clinical study. The results showed that in the biplanar set-up model-based RSA presents a homogeneous distribution of precision for all the translation directions, but an inhomogeneous error for rotations, especially internal-external rotation presented higher errors than rotations about the transverse and sagittal axes. Model-based RSA was less precise than the marker-based method, although the differences were not significant for the translations and rotations of the tibial component, with the exception of the internal-external rotations. For both prosthesis components the precisions of model-based RSA were below 0.2 mm for all the translations, and below 0.3 degrees for rotations about transverse and sagittal axes. These values are still acceptable for clinical studies aimed at evaluating total knee prosthesis micromotion. In a biplanar set-up model-based RSA is a valid alternative to traditional marker-based RSA where marking of the prosthesis is an enormous disadvantage.

  20. [Health care economic guidance in Germany from the example Morbi-RSA].

    Science.gov (United States)

    Litmathe, Jens

    2016-04-01

    Increasing costs in health care represent still a major challenge in most industrial contries. A lot of attempts especially in Germany have been made to manage such problems and for a fair allocation oft he underlying resources. One of this ist the Morbi-RSA. The current review reflects all historical, medical and economical aspects of the Morbi-RSA and gives a perspective to possible future developments.

  1. Teknik Penyembunyian dan Enkripsi Pesan pada Citra Digital dengan Kombinasi Metode LSB dan RSA

    Directory of Open Access Journals (Sweden)

    Antonius Erick Handoyo

    2018-02-01

    Full Text Available This study proposed a combination of steganography and cryptography techniques using LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to digital imagery. Digital image pixel values range from 0 to 255, making the keys used in RSA limited enough and less secure. So in this study, it is proposed to convert pixel image value to 16 bits so that the key used can be more varied. Experimental results proved that there was a steady increase in security and imperceptibility. This was shown by the results of PSNR 57.2258dB and MSE 0.1232dB. This method was also resistant to salt and pepper attacks. Penelitian ini mengusulkan kombinasi teknik steganografi dan kriptografi menggunakan metode LSB – RSA. RSA merupakan teknik kriptografi yang populer dapat diterapkan pada citra digital. Nilai piksel citra digital hanya berkisar 0 sampai 255. Hal ini membuat kunci yang digunakan dalam RSA cukup terbatas sehingga kurang aman. Dalam penelitian ini diusulkan untuk mengkonversi nilai piksel citra menjadi 16 bit sehingga kunci yang digunakan dapat lebih bervariasi. Hasil eksperimen membuktikan adanya peningkatan keamanan serta nilai imperceptibility yang tetap terjaga. Hal ini dibuktikan dengan hasil PSNR 57.2258dB, MSE 0.1232dB. Metode ini juga tahan terhadap serangan salt and pepper.

  2. Children’s dynamic RSA change during anger and its relations with parenting, temperament, and control of aggression☆

    OpenAIRE

    Miller, Jonas G.; Chocol, Caroline; Nuselovici, Jacob N.; Utendale, William T.; Simard, Melissa; Hastings, Paul D.

    2012-01-01

    This study examined the moderating effects of child temperament on the association between maternal socialization and 4–6-year-old children’s dynamic respiratory sinus arrhythmia (RSA) change in response to anger-themed emotional materials (N = 180). We used latent growth curve modeling to explore adaptive patterns of dynamic RSA change in response to anger. Greater change in RSA during anger-induction, characterized by more initial RSA suppression and a subsequent return to baseline, was rel...

  3. Implementation and validation of an implant-based coordinate system for RSA migration calculation.

    Science.gov (United States)

    Laende, Elise K; Deluzio, Kevin J; Hennigar, Allan W; Dunbar, Michael J

    2009-10-16

    An in vitro radiostereometric analysis (RSA) phantom study of a total knee replacement was carried out to evaluate the effect of implementing two new modifications to the conventional RSA procedure: (i) adding a landmark of the tibial component as an implant marker and (ii) defining an implant-based coordinate system constructed from implant landmarks for the calculation of migration results. The motivation for these two modifications were (i) to improve the representation of the implant by the markers by including the stem tip marker which increases the marker distribution (ii) to recover clinical RSA study cases with insufficient numbers of markers visible in the implant polyethylene and (iii) to eliminate errors in migration calculations due to misalignment of the anatomical axes with the RSA global coordinate system. The translational and rotational phantom studies showed no loss of accuracy with the two new measurement methods. The RSA system employing these methods has a precision of better than 0.05 mm for translations and 0.03 degrees for rotations, and an accuracy of 0.05 mm for translations and 0.15 degrees for rotations. These results indicate that the new methods to improve the interpretability, relevance, and standardization of the results do not compromise precision and accuracy, and are suitable for application to clinical data.

  4. Early Adversity, RSA, and Inhibitory Control: Evidence of Children’s Neurobiological Sensitivity to Social Context

    Science.gov (United States)

    Skowron, Elizabeth A.; Cipriano-Essel, Elizabeth; Gatzke-Kopp, Lisa M.; Teti, Douglas M.; Ammerman, Robert T.

    2014-01-01

    This study examined parasympathetic physiology as a moderator of the effects of early adversity (i.e., child abuse and neglect) on children’s inhibitory control. Children’s respiratory sinus arrhythmia (RSA) was assessed during a resting baseline, two joint challenge tasks with mother, and an individual frustration task. RSA assessed during each of the joint parent–child challenge tasks moderated the effects of child maltreatment (CM) status on children’s independently-assessed inhibitory control. No moderation effect was found for RSA assessed at baseline or in the child-alone challenge task. Among CM-exposed children, lower RSA levels during the joint task predicted the lowest inhibitory control, whereas higher joint task RSA was linked to higher inhibitory control scores that were indistinguishable from those of non-CM children. Results are discussed with regard to the importance of considering context specificity (i.e., individual and caregiver contexts) in how biomarkers inform our understanding of individual differences in vulnerability among at-risk children. PMID:24142832

  5. Adherence of hip and knee arthroplasty studies to RSA standardization guidelines

    Science.gov (United States)

    Mäkinen, Tatu J; Aro, Hannu T; Bragdon, Charles; Malchau, Henrik

    2014-01-01

    Background and purpose Guidelines for standardization of radiostereometry (RSA) of implants were published in 2005 to facilitate comparison of outcomes between various research groups. In this systematic review, we determined how well studies have adhered to these guidelines. Methods We carried out a literature search to identify all articles published between January 2000 and December 2011 that used RSA in the evaluation of hip or knee prosthesis migration. 2 investigators independently evaluated each of the studies for adherence to the 13 individual guideline items. Since some of the 13 points included more than 1 criterion, studies were assessed on whether each point was fully met, partially met, or not met. Results 153 studies that met our inclusion criteria were identified. 61 of these were published before the guidelines were introduced (2000–2005) and 92 after the guidelines were introduced (2006–2011). The methodological quality of RSA studies clearly improved from 2000 to 2011. None of the studies fully met all 13 guidelines. Nearly half (43) of the studies published after the guidelines demonstrated a high methodological quality and adhered at least partially to 10 of the 13 guidelines, whereas less than one-fifth (11) of the studies published before the guidelines had the same methodological quality. Commonly unaddressed guideline items were related to imaging methodology, determination of precision from double examinations, and also mean error of rigid-body fitting and condition number cutoff levels. Interpretation The guidelines have improved methodological reporting in RSA studies, but adherence to these guidelines is still relatively low. There is a need to update and clarify the guidelines for clinical hip and knee arthroplasty RSA studies. PMID:24954489

  6. Children's Externalizing and Internalizing Symptoms over Time: The Role of Individual Differences in Patterns of RSA Responding

    Science.gov (United States)

    Hinnant, James Benjamin; El-Sheikh, Mona

    2009-01-01

    We examined associations between basal respiratory sinus arrhythmia (RSA) in conjunction with RSA regulation with the hypothesis that their interaction would explain unique variability in children's prospective adjustment 2 years later. Participants were 176 children (98 girls; 78 boys) in middle childhood. RSA regulation was assessed through…

  7. The effect of decreasing computed tomography dosage on radiostereometric analysis (RSA) accuracy at the glenohumeral joint.

    Science.gov (United States)

    Fox, Anne-Marie V; Kedgley, Angela E; Lalone, Emily A; Johnson, James A; Athwal, George S; Jenkyn, Thomas R

    2011-11-10

    Standard, beaded radiostereometric analysis (RSA) and markerless RSA often use computed tomography (CT) scans to create three-dimensional (3D) bone models. However, ethical concerns exist due to risks associated with CT radiation exposure. Therefore, the aim of this study was to investigate the effect of decreasing CT dosage on RSA accuracy. Four cadaveric shoulder specimens were scanned using a normal-dose CT protocol and two low-dose protocols, where the dosage was decreased by 89% and 98%. 3D computer models of the humerus and scapula were created using each CT protocol. Bi-planar fluoroscopy was used to image five different static glenohumeral positions and two dynamic glenohumeral movements, of which a total of five static and four dynamic poses were selected for analysis. For standard RSA, negligible differences were found in bead (0.21±0.31mm) and bony landmark (2.31±1.90mm) locations when the CT dosage was decreased by 98% (p-values>0.167). For markerless RSA kinematic results, excellent agreement was found between the normal-dose and lowest-dose protocol, with all Spearman rank correlation coefficients greater than 0.95. Average root mean squared errors of 1.04±0.68mm and 2.42±0.81° were also found at this reduced dosage for static positions. In summary, CT dosage can be markedly reduced when performing shoulder RSA to minimize the risks of radiation exposure. Standard RSA accuracy was negligibly affected by the 98% CT dose reduction and for markerless RSA, the benefits of decreasing CT dosage to the subject outweigh the introduced errors. Copyright © 2011 Elsevier Ltd. All rights reserved.

  8. Cross-cultural validation of the Resilience Scale for Adults (RSA) in Iran.

    Science.gov (United States)

    Jowkar, Bahram; Friborg, Oddgeir; Hjemdal, Odin

    2010-10-01

    Resilience, as an ability to withstand and rebound from crisis and adversity, is becoming an increasingly popular concept in research on intervention and prevention of mental health. The present study examined psychometric properties of a Persian version of the Resilience Scale for Adults (RSA), a scale intended to measure protective factors presumed to enhance resilience. The participants were 373 university undergraduate students, as well as 30 pairs of run-away girls and a matched control group. A confirmatory factor analysis verified the Norwegian five-factor structure. All subscale scores, personal competence, social competence, family cohesion, social resources and structured style, had good reliability. The convergent validity of the RSA was supported by showing positive associations with another resilience scale, i.e., a Persian version of the Connor-Davidson Resilience Scale (CD-RISC). Predictive validity of the RSA was supported, as well, by significantly differentiating between girls who had run away from home and a matched control group. The results indicate that the RSA may be a valid and reliable scale for the assessment of resilience protective resources in an Iranian population. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  9. Respiratory sinus arrhythmia responses to cognitive tasks : effects of task factors and RSA indices

    NARCIS (Netherlands)

    Overbeek, T.; Boxtel, van Anton; Westerink, J.H.D.M.

    2014-01-01

    Many studies show that respiratory sinus arrhythmia (RSA) decreases while performing cognitive tasks. However, there is uncertainty about the role of contaminating factors such as physical activity and stress-inducing task variables. Different methods to quantify RSA may also contribute to variable

  10. Respiratory sinus arrhythmia responses to cognitive tasks: Effects of task factors and RSA indices

    NARCIS (Netherlands)

    Overbeek, T.J.M.; van Boxtel, A.; Westerink, J.H.D.M.

    2014-01-01

    Many studies show that respiratory sinus arrhythmia (RSA) decreases while performing cognitive tasks. However, there is uncertainty about the role of contaminating factors such as physical activity and stress-inducing task variables. Different methods to quantify RSA may also contribute to variable

  11. RSA Monitoring Redesign Initiative Informational Booklet #2

    Science.gov (United States)

    US Department of Education, 2005

    2005-01-01

    The U.S. Department of Education's Rehabilitation Services Administration (RSA) is undertaking a major initiative to substantially redesign its program monitoring and improvement system. The overriding goal is to improve vocational rehabilitation (VR) services and employment outcomes for individuals with disabilities through the development of a…

  12. Respiratory sinus arrhythmia responses to induced emotional states: effects of RSA indices, emotion induction method, age, and sex.

    Science.gov (United States)

    Overbeek, Thérèse J M; van Boxtel, Anton; Westerink, Joyce H D M

    2012-09-01

    The literature shows large inconsistencies in respiratory sinus arrhythmia (RSA) responses to induced emotional states. This may be caused by differences in emotion induction methods, RSA quantification, and non-emotional demands of the situation. In 83 healthy subjects, we studied RSA responses to pictures and film fragments eliciting six different discrete emotions relative to neutral baseline stimuli. RSA responses were quantified in the time and frequency domain and were additionally corrected for differences in mean heart rate and respiration rate, resulting in eight different RSA response measures. Subjective ratings of emotional stimuli and facial electromyographic responses indicated that pictures and film fragments elicited the intended emotions. Although RSA measures showed various emotional effects, responses were quite heterogeneous and frequently nonsignificant. They were substantially influenced by methodological factors, in particular time vs. frequency domain response measures, correction for changes in respiration rate, use of pictures vs. film fragments, and sex of participants. Copyright © 2012 Elsevier B.V. All rights reserved.

  13. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  14. On the Estimation of the k-RSA Attack

    Directory of Open Access Journals (Sweden)

    Anatoliy Sergeyevich Makeyev

    2016-03-01

    Full Text Available In this paper, we discuss the attack on the RSA cryptosystem with  modules (≥2. We also provide estimation of the attacks’s complexity. Finally, we give the experimental results for different modules and open exponents.

  15. Another way of doing RSA cryptography in hardware

    NARCIS (Netherlands)

    Batina, L.; Bruin - Muurling, G.; Honary, B.

    2001-01-01

    In this paper we describe an efficient and secure hardware implementation of the RSA cryptosystem. Modular exponentiation is based on Montgomery’s method without any modular reduction achieving the optimal bound. The presented systolic array architecture is scalable in severalparameters which makes

  16. Measurement of migration of soft tissue by modified Roentgen stereophotogrammetric analysis (RSA): validation of a new technique to monitor rotator cuff tears.

    Science.gov (United States)

    Cashman, P M M; Baring, T; Reilly, P; Emery, R J H; Amis, A A

    2010-04-01

    The purpose of this study was to develop a technique to use Roentgen stereophotogrammetric analysis (RSA) to measure migration of soft-tissue structures after rotator cuff repair. RSA stereo films were obtained; images were analysed using a semi-automatic software program allowing 3D viewing of results. RSA imaging experiments were performed to validate the technique, using a glass phantom with implanted RSA beads and an animal model with steel sutures as RSA markers which were moved known distances. Repeated measurements allowed assessment of inter- and intra-observer variability at a maximum of 1.06 mm. RSA analysis of the phantom showed a variation up to 0.22 mm for static and 0.28 mm for dynamic studies. The ovine tissue specimen demonstrated that using steel sutures as RSA markers in soft tissue is feasible, although less accurate than when measuring bone motion. This novel application of RSA to measure soft tissue migration is practicable and can be extended to in vivo studies.

  17. Association of the IL4R single-nucleotide polymorphism I50V with recurrent spontaneous abortion (RSA).

    Science.gov (United States)

    Tavasolian, Fataneh; Abdollahi, Elham; Samadi, Morteza

    2014-07-01

    Recurrent spontaneous abortion (RSA) is defined as three or more consecutive abortions before the 20th week of gestation. There is increasing evidence to support an immunological mechanism for the occurrence of RSA. The purpose of our study was to examine whether single-nucleotide polymorphisms (SNPs) of the interleukin-4 receptor gene IL4R influence susceptibility to, recurrent spontaneous abortion. This is a case-control study. We recruited 200 patients with RSA (case group) using established diagnostic criteria and 200, normal individuals (control group) at the fertility and infertility center in Yazd city and Isfahan city during 2012 to 2013. We screened the I50V variant in IL-4R in patients and controls by PCR-RFLF method, and we performed an association analysis between I50V variant and RSA.the data was analyzed by spss 16 software using Chi-square test. No differences in the genotype and allele frequencies of the I50V SNPs were identified between patients with RSA and healthy controls. The frequency of SNP in IL-4 receptor (I50V) in patients with recurrent spontaneous abortion did not differ significantly compared with the control group. Analysis of IL4R SNP haplotypes or complex alleles suggested no dominant protection in patients with RSA.

  18. On factoring RSA modulus using random-restart hill-climbing algorithm and Pollard’s rho algorithm

    Science.gov (United States)

    Budiman, M. A.; Rachmawati, D.

    2017-12-01

    The security of the widely-used RSA public key cryptography algorithm depends on the difficulty of factoring a big integer into two large prime numbers. For many years, the integer factorization problem has been intensively and extensively studied in the field of number theory. As a result, a lot of deterministic algorithms such as Euler’s algorithm, Kraitchik’s, and variants of Pollard’s algorithms have been researched comprehensively. Our study takes a rather uncommon approach: rather than making use of intensive number theories, we attempt to factorize RSA modulus n by using random-restart hill-climbing algorithm, which belongs the class of metaheuristic algorithms. The factorization time of RSA moduli with different lengths is recorded and compared with the factorization time of Pollard’s rho algorithm, which is a deterministic algorithm. Our experimental results indicates that while random-restart hill-climbing algorithm is an acceptable candidate to factorize smaller RSA moduli, the factorization speed is much slower than that of Pollard’s rho algorithm.

  19. On the improvement of Wiener attack on RSA with small private exponent.

    Science.gov (United States)

    Wu, Mu-En; Chen, Chien-Ming; Lin, Yue-Hsun; Sun, Hung-Min

    2014-01-01

    RSA system is based on the hardness of the integer factorization problem (IFP). Given an RSA modulus N = pq, it is difficult to determine the prime factors p and q efficiently. One of the most famous short exponent attacks on RSA is the Wiener attack. In 1997, Verheul and van Tilborg use an exhaustive search to extend the boundary of the Wiener attack. Their result shows that the cost of exhaustive search is 2r + 8 bits when extending the Weiner's boundary r bits. In this paper, we first reduce the cost of exhaustive search from 2r + 8 bits to 2r + 2 bits. Then, we propose a method named EPF. With EPF, the cost of exhaustive search is further reduced to 2r - 6 bits when we extend Weiner's boundary r bits. It means that our result is 2(14) times faster than Verheul and van Tilborg's result. Besides, the security boundary is extended 7 bits.

  20. On the Improvement of Wiener Attack on RSA with Small Private Exponent

    Directory of Open Access Journals (Sweden)

    Mu-En Wu

    2014-01-01

    Full Text Available RSA system is based on the hardness of the integer factorization problem (IFP. Given an RSA modulus N=pq, it is difficult to determine the prime factors p and q efficiently. One of the most famous short exponent attacks on RSA is the Wiener attack. In 1997, Verheul and van Tilborg use an exhaustive search to extend the boundary of the Wiener attack. Their result shows that the cost of exhaustive search is 2r+8 bits when extending the Weiner's boundary r bits. In this paper, we first reduce the cost of exhaustive search from 2r+8 bits to 2r+2 bits. Then, we propose a method named EPF. With EPF, the cost of exhaustive search is further reduced to 2r-6 bits when we extend Weiner's boundary r bits. It means that our result is 214 times faster than Verheul and van Tilborg's result. Besides, the security boundary is extended 7 bits.

  1. Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm

    Science.gov (United States)

    Meng, X. F.; Peng, X.; Cai, L. Z.; Li, A. M.; Gao, Z.; Wang, Y. R.

    2009-08-01

    A hybrid cryptosystem is proposed, in which one image is encrypted to two interferograms with the aid of double random-phase encoding (DRPE) and two-step phase-shifting interferometry (2-PSI), then three pairs of public-private keys are utilized to encode and decode the session keys (geometrical parameters, the second random-phase mask) and interferograms. In the stage of decryption, the ciphered image can be decrypted by wavefront reconstruction, inverse Fresnel diffraction, and real amplitude normalization. This approach can successfully solve the problem of key management and dispatch, resulting in increased security strength. The feasibility of the proposed cryptosystem and its robustness against some types of attack are verified and analyzed by computer simulations.

  2. On the common modulus attack into the LUC4,6 cryptosystem

    Science.gov (United States)

    Wong, Tze Jin; Said, Mohd Rushdan Md; Othman, Mohamed; Koo, Lee Feng

    2015-05-01

    The LUC4,6 cryptosystem is a system analogy with RSA cryptosystem and extended from LUC and LUC3 cryptosystems. The process of encryption and decryption are derived from the fourth order linear recurrence sequence and based on Lucas function. This paper reports an investigation into the common modulus attack on the LUC4,6 cryptosystem. In general, the common modulus attack will be succeeded if the sender sends the plaintext to two users used same RSA-modulus and both of encryption keys of them are relatively prime to each other. However, based on the characteristics of high order Lucas sequence, the LUC4,6 cryptosystem is unattackable

  3. Factoring estimates for a 1024-bit RSA modulus

    NARCIS (Netherlands)

    Lenstra, A.K.; Tromer, E.; Shamir, A.; Kortsmit, W.J.P.M.; Dodson, B.; Hughes, J.; Leyland, P.; Laih, Chi Sung

    2003-01-01

    We estimate the yield of the number field sieve factoring algorithm when applied to the 1024-bit composite integer RSA-1024 and the parameters as proposed in the draft version [17] of the TWIRL hardware factoring device [18]. We present the details behind the resulting improved parameter choices

  4. Least loaded and route fragmentation aware RSA strategies for elastic optical networks

    Science.gov (United States)

    Batham, Deepak; Yadav, Dharmendra Singh; Prakash, Shashi

    2017-12-01

    Elastic optical networks (EONs) provide flexibility to assign wide range of spectral resources to the connection requests. In this manuscript, we address two issues related to spectrum assignment in EONs: the non uniform spectrum assignment along different links of the route and the spectrum fragmentation in the network. To address these issues, two routing and spectrum assignment (RSA) strategies have been proposed: Least Loaded RSA (LLRSA) and Route Fragmentation Aware RSA (RFARSA). The LLRSA allocates spectrum homogeneously along different links in the network, where as RFARSA accords priority to the routes which are less fragmented. To highlight the salient features of the two strategies, two new metrics, route fragmentation index (RFI) and standard deviation (SD) are introduced. RFI is defined as the ratio of non-contiguous FSs to the total available free FSs on the route, and SD relates to the measure of non-uniformity in the allocation of resources on the links in the network. A simulation program has been developed to evaluate the performance of the proposed (LLRSA and RFARSA) strategies, and the existing strategies of shortest path RSA (SPRSA) and spectrum compactness based defragmentation (SCD) strategies, on the metric of RFI, bandwidth blocking probability (BBP), network capacity utilized, and SD. The variation in the metrics on the basis of number of requests and the bandwidth (number of FSs) requested has been studied. It has been conclusively established that the proposed strategies (LLRSA and RFARSA) outperform the existing strategies in terms of all the metrics.

  5. Побітові операції й елементи алгоритму RSA в шифруванні-дешифруванні кольорових зображень

    OpenAIRE

    Ковальчук, А.; Шевчук, А.; Цепак, В.

    2017-01-01

    Описано поєднання елементів алгоритму RSA і побітових операцій для сумісного використання під час шифрування-дешифрування зображень. Шифрування-дешифру- вання здійснюють без додаткового зашумлення. Described combination of elements of the RSA algorithm and a bit-wise operations for the joint use for encryption - interpretation of images. Encryption - decryption is performed without additional noise....

  6. Бінарні операції та елементи алгоритму RSA при шифруванні-дешифруванні кольорових зображень

    OpenAIRE

    Ковальчук, А.; Пелешко, Д.; Борзов, Ю.

    2013-01-01

    Описано поєднання елементів алгоритму RSA і бінарних операцій для сумісного використання при шифруванні–дешифруванні зображень. Шифрування–дешифрування проводиться без додаткового зашумлення. Described combination of elements of the RSA algorithm and binary operations for the joint use for encryption–interpretation of images. Encryption–decryption is performed without additional noise....

  7. Resilience in a reborn nation: Validation of the Lithuanian Resilience Scale for Adults (RSA).

    Science.gov (United States)

    Hilbig, Jan; Viliūnienė, Rima; Friborg, Oddgeir; Pakalniškienė, Vilmantė; Danilevičiūtė, Vita

    2015-07-01

    Resilience, as an ability to withstand or rebound from crisis or adversity, is becoming an increasingly significant concept in health promotion and well-being. Individuals exhibiting resilience use skills or resources flexibly to solve situational demands. The Resilience Scale for Adults (RSA) may be used to assess protective resources, and the aim of the present study was to validate the Lithuanian translation. The translated RSA was administered to a clinical (n=125) and a non clinical sample (n=499) to examine the discriminant validity of the RSA items with a confirmatory factor analysis, the internal consistency as well as construct validity by correlating it with the Quick Psycho-Affective Symptoms Scan (QPASS). The internal consistency, the test-retest stability and the factor structure were replicated as adequate, thus indicating good psychometric properties and support of discriminant validity. Females reported more resilience resources for the domains of social competence, family cohesion and social resources compared to men. The RSA subscales correlated negatively with the QPASS scores, and patients reported significantly less resilience resources than non-patients, thus indicating construct validity. Valid psychometric tools for research purposes and routine every-day use are urgently needed in Lithuania, a young nation still under numerous challenges due to social, economic and political transitions. The RSA represents a reliable and valid tool for assessing protective factors. Assessing resilience factors may extend the understanding of factors relevant for mental health problems as well as treatment prognosis beyond the capabilities of mere symptom oriented approaches. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. A UV-sensitive human clonal cell line, RSa, which has low repair activity

    International Nuclear Information System (INIS)

    Suzuki, N.; Fuse, A.

    1981-01-01

    The repair activity of a human transformed cell line, RSa, which was found to be highly sensitive to the lethal effects of 254 mm far-ultraviolet radiation, was compared with that of HeLa cells by evaluating the range of UV-induced incorporation of [methyl- 3 H]thymidine ([ 3 H]dThd) or 5-[6- 3 H]bromodeoxyuridine ([ 3 H]BrdUrd) into deoxyribonucleic acid. Direct scintillation counting was used for measuring the extent of unscheduled DNA synthesis (UDS) in UV-irradiated cells, which were treated with hydroxyurea or with arginine deprivation. More quantitative measurements were made by using the density labeling and equilibrium centrifugation method for assaying repair replication. All the amounts of UDS and repair replication in RSa cells were markedly below those in HeLa cells. The possible relationships of the low repair activity to abnormally high UV sensitivity in RSa cells are discussed. (orig.)

  9. Introducing random safety audits (RSA) in a neonatal intensive care unit (NICU).

    LENUS (Irish Health Repository)

    Szymanska, M

    2012-01-31

    Random safety audits (RSA) have been shown to be effective in improving standards of clinical practice. 19 data collection audits were performed relating to hygiene, safe prescribing, oxygen pulse oximetry monitoring and documentation in keeping with the requirements of the new Medical Practitioners Act (MPA) 2007. Hygiene audits (range from 20\\/25 to 21\\/21 80%-100%) and safe prescribing audits (range from 23\\/25 to 25\\/25 86%-100%) achieved n=25 100% compliance with unit guidelines over a 3 month period. Compliance with oxygen pulse oximetry monitoring guideline limits improved from 4\\/27 (15%) to 9\\/16 (56%). Compliance with requirement and use of Physician IMC registration number in documentation was only 10\\/18 (56%). RSA\\'s led to improvements in hygiene and prescribing. Compliance with oxygen monitoring guideline limits highlighted the need for greater education. Awareness of legal requirements relating to documentation improved but this has not translated into a change in practice. RSA\\'s can facilitate real time quality improvement in daily clinical practice.

  10. RSA Opening Minds: A Curriculum for the 21st Century

    Science.gov (United States)

    Candy, Sara

    2011-01-01

    This article discusses the RSA Opening Minds competence framework, an innovative curriculum to meet the needs of young people as future employees, lifelong learners and as citizens of the twenty-first century.

  11. Validation of the brief version of the Recovery Self-Assessment (RSA-B) using Rasch measurement theory.

    Science.gov (United States)

    Barbic, Skye P; Kidd, Sean A; Davidson, Larry; McKenzie, Kwame; O'Connell, Maria J

    2015-12-01

    In psychiatry, the recovery paradigm is increasingly identified as the overarching framework for service provision. Currently, the Recovery Self-Assessment (RSA), a 36-item rating scale, is commonly used to assess the uptake of a recovery orientation in clinical services. However, the consumer version of the RSA has been found challenging to complete because of length and the reading level required. In response to this feedback, a brief 12-item version of the RSA was developed (RSA-B). This article describes the development of the modified instrument and the application of traditional psychometric analysis and Rasch Measurement Theory to test the psychometrics properties of the RSA-B. Data from a multisite study of adults with serious mental illnesses (n = 1256) who were followed by assertive community treatment teams were examined for reliability, clinical meaning, targeting, response categories, model fit, reliability, dependency, and raw interval-level measurement. Analyses were performed using the Rasch Unidimensional Measurement Model (RUMM 2030). Adequate fit to the Rasch model was observed (χ2 = 112.46, df = 90, p = .06) and internal consistency was good (r = .86). However, Rasch analysis revealed limitations of the 12-item version, with items covering only 39% of the targeted theoretical continuum, 2 misfitting items, and strong evidence for the 5 option response categories not working as intended. This study revealed areas for improvement in the shortened version of the 12-item RSA-B. A revisit of the conceptual model and original 36-item rating scale is encouraged to select items that will help practitioners and researchers measure the full range of recovery orientation. (c) 2015 APA, all rights reserved).

  12. Adherence of hip and knee arthroplasty studies to RSA standardization guidelines. A systematic review.

    Science.gov (United States)

    Madanat, Rami; Mäkinen, Tatu J; Aro, Hannu T; Bragdon, Charles; Malchau, Henrik

    2014-09-01

    Guidelines for standardization of radiostereometry (RSA) of implants were published in 2005 to facilitate comparison of outcomes between various research groups. In this systematic review, we determined how well studies have adhered to these guidelines. We carried out a literature search to identify all articles published between January 2000 and December 2011 that used RSA in the evaluation of hip or knee prosthesis migration. 2 investigators independently evaluated each of the studies for adherence to the 13 individual guideline items. Since some of the 13 points included more than 1 criterion, studies were assessed on whether each point was fully met, partially met, or not met. 153 studies that met our inclusion criteria were identified. 61 of these were published before the guidelines were introduced (2000-2005) and 92 after the guidelines were introduced (2006-2011). The methodological quality of RSA studies clearly improved from 2000 to 2011. None of the studies fully met all 13 guidelines. Nearly half (43) of the studies published after the guidelines demonstrated a high methodological quality and adhered at least partially to 10 of the 13 guidelines, whereas less than one-fifth (11) of the studies published before the guidelines had the same methodological quality. Commonly unaddressed guideline items were related to imaging methodology, determination of precision from double examinations, and also mean error of rigid-body fitting and condition number cutoff levels. The guidelines have improved methodological reporting in RSA studies, but adherence to these guidelines is still relatively low. There is a need to update and clarify the guidelines for clinical hip and knee arthroplasty RSA studies.

  13. Improved prediction of residue flexibility by embedding optimized amino acid grouping into RSA-based linear models.

    Science.gov (United States)

    Zhang, Hua; Kurgan, Lukasz

    2014-12-01

    Knowledge of protein flexibility is vital for deciphering the corresponding functional mechanisms. This knowledge would help, for instance, in improving computational drug design and refinement in homology-based modeling. We propose a new predictor of the residue flexibility, which is expressed by B-factors, from protein chains that use local (in the chain) predicted (or native) relative solvent accessibility (RSA) and custom-derived amino acid (AA) alphabets. Our predictor is implemented as a two-stage linear regression model that uses RSA-based space in a local sequence window in the first stage and a reduced AA pair-based space in the second stage as the inputs. This method is easy to comprehend explicit linear form in both stages. Particle swarm optimization was used to find an optimal reduced AA alphabet to simplify the input space and improve the prediction performance. The average correlation coefficients between the native and predicted B-factors measured on a large benchmark dataset are improved from 0.65 to 0.67 when using the native RSA values and from 0.55 to 0.57 when using the predicted RSA values. Blind tests that were performed on two independent datasets show consistent improvements in the average correlation coefficients by a modest value of 0.02 for both native and predicted RSA-based predictions.

  14. Flexible hardware design for RSA and Elliptic Curve Cryptosystems

    NARCIS (Netherlands)

    Batina, L.; Bruin - Muurling, G.; Örs, S.B.; Okamoto, T.

    2004-01-01

    This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduced hardware accelerator features a design which can be varied from very small (less than 20 Kgates) targeting wireless

  15. miR-520 promotes DNA-damage-induced trophoblast cell apoptosis by targeting PARP1 in recurrent spontaneous abortion (RSA).

    Science.gov (United States)

    Dong, Xiujuan; Yang, Long; Wang, Hui

    2017-04-01

    The establishment and maintenance of successful pregnancy mainly depends on trophoblast cells. Their dysfunction has been implicated in recurrent spontaneous abortion (RSA), a major complication of pregnancy. However, the underlying mechanisms of trophoblasts dysfunction remain unclear. DNA-damage-induced cell apoptosis has been reported to play a vital role in cell death. In this study, we identified a novel microRNA (miR-520) in RSA progression via regulating trophoblast cell apoptosis. Microarray analysis showed that miR-520 was highly expressed in villus of RSA patients. By using flow cytometry analysis, we observed miR-520 expression was correlated with human trophoblast cell apoptosis in vitro, along with decreased poly (ADP-ribose) polymerase-1 (PARP1) expression. With the analysis of clinic samples, we observed that miR-520 level was negatively correlated with PARP1 level in RSA villus. In addition, overexpression of PARP1 restored the miR-520-induced trophoblast cell apoptosis in vitro. The status of chromosome in trophoblast implied that miR-520-promoted DNA-damage-induced cell apoptosis to regulate RSA progression. These results indicated that the level of miR-520 might associate with RSA by prompting trophoblast cell apoptosis via PARP1 dependent DNA-damage pathway.

  16. Extending Differential Fault Analysis to Dynamic S-Box Advanced Encryption Standard Implementations

    Science.gov (United States)

    2014-09-18

    number. As a result decryption is a different function which relies on a different key to efficiently undo the work of encryption . RSA is the most...EXTENDING DIFFERENTIAL FAULT ANALYSIS TO DYNAMIC S-BOX ADVANCED ENCRYPTION STANDARD IMPLEMENTATIONS THESIS Bradley M. Flamm, Civilian AFIT-ENG-T-14-S...ADVANCED ENCRYPTION STANDARD IMPLEMENTATIONS THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of

  17. RSA prediction of high failure rate for the uncoated Interax TKA confirmed by meta-analysis.

    Science.gov (United States)

    Pijls, Bart G; Nieuwenhuijse, Marc J; Schoones, Jan W; Middeldorp, Saskia; Valstar, Edward R; Nelissen, Rob G H H

    2012-04-01

    In a previous radiostereometric (RSA) trial the uncoated, uncemented, Interax tibial components showed excessive migration within 2 years compared to HA-coated and cemented tibial components. It was predicted that this type of fixation would have a high failure rate. The purpose of this systematic review and meta-analysis was to investigate whether this RSA prediction was correct. We performed a systematic review and meta-analysis to determine the revision rate for aseptic loosening of the uncoated and cemented Interax tibial components. 3 studies were included, involving 349 Interax total knee arthroplasties (TKAs) for the comparison of uncoated and cemented fixation. There were 30 revisions: 27 uncoated and 3 cemented components. There was a 3-times higher revision rate for the uncoated Interax components than that for cemented Interax components (OR = 3; 95% CI: 1.4-7.2). This meta-analysis confirms the prediction of a previous RSA trial. The uncoated Interax components showed the highest migration and turned out to have the highest revision rate for aseptic loosening. RSA appears to enable efficient detection of an inferior design as early as 2 years postoperatively in a small group of patients.

  18. Heuristics for batching and sequencing in batch processing machines

    Directory of Open Access Journals (Sweden)

    Chuda Basnet

    2016-12-01

    Full Text Available In this paper, we discuss the “batch processing” problem, where there are multiple jobs to be processed in flow shops. These jobs can however be formed into batches and the number of jobs in a batch is limited by the capacity of the processing machines to accommodate the jobs. The processing time required by a batch in a machine is determined by the greatest processing time of the jobs included in the batch. Thus, the batch processing problem is a mix of batching and sequencing – the jobs need to be grouped into distinct batches, the batches then need to be sequenced through the flow shop. We apply certain newly developed heuristics to the problem and present computational results. The contributions of this paper are deriving a lower bound, and the heuristics developed and tested in this paper.

  19. Accuracy and Precision of Three-Dimensional Low Dose CT Compared to Standard RSA in Acetabular Cups: An Experimental Study.

    Science.gov (United States)

    Brodén, Cyrus; Olivecrona, Henrik; Maguire, Gerald Q; Noz, Marilyn E; Zeleznik, Michael P; Sköldenberg, Olof

    2016-01-01

    Background and Purpose. The gold standard for detection of implant wear and migration is currently radiostereometry (RSA). The purpose of this study is to compare a three-dimensional computed tomography technique (3D CT) to standard RSA as an alternative technique for measuring migration of acetabular cups in total hip arthroplasty. Materials and Methods. With tantalum beads, we marked one cemented and one uncemented cup and mounted these on a similarly marked pelvic model. A comparison was made between 3D CT and standard RSA for measuring migration. Twelve repeated stereoradiographs and CT scans with double examinations in each position and gradual migration of the implants were made. Precision and accuracy of the 3D CT were calculated. Results. The accuracy of the 3D CT ranged between 0.07 and 0.32 mm for translations and 0.21 and 0.82° for rotation. The precision ranged between 0.01 and 0.09 mm for translations and 0.06 and 0.29° for rotations, respectively. For standard RSA, the precision ranged between 0.04 and 0.09 mm for translations and 0.08 and 0.32° for rotations, respectively. There was no significant difference in precision between 3D CT and standard RSA. The effective radiation dose of the 3D CT method, comparable to RSA, was estimated to be 0.33 mSv. Interpretation. Low dose 3D CT is a comparable method to standard RSA in an experimental setting.

  20. Design and evaluation of learning strategies for a group of radiographers in radiostereometric analysis (RSA)

    DEFF Research Database (Denmark)

    Muharemovic, O; Troelsen, A; Thomsen, M G

    2017-01-01

    INTRODUCTION: The purpose of this study was to design and evaluate a radiostereometric analysis (RSA) program aimed at radiographers in order to increase their cognitive and practical skills, thereby increasing image quality and minimizing exposure repetition. METHODS AND MATERIALS: Twenty...... radiographers were randomized into two identically sized study groups. Training consisted of a theoretical and practical workshop using a phantom. Tests were performed to compare the effect of training to nontraining, and the effect of time duration on the maintenance of RSA skills. The effect of training...... after training group B had experienced overall significant improvement on a par with group A. CONCLUSION: It is realistic to implement an RSA X-ray training program where radiographers significantly improve their theoretical and practical skills in centering the CP closer to the CCF, NB and RP...

  1. The mathematics of ciphers number theory and RSA cryptography

    CERN Document Server

    Coutinho, S C

    1999-01-01

    This book is an introduction to the algorithmic aspects of number theory and its applications to cryptography, with special emphasis on the RSA cryptosys-tem. It covers many of the familiar topics of elementary number theory, all with an algorithmic twist. The text also includes many interesting historical notes.

  2. Algoritma The Sieve Of Eratosthenes dan Linear Congruential Generator ( LCG ) Dalam Perancangan Aplikasi Kriptografi RSA

    OpenAIRE

    Fakhriza, M

    2013-01-01

    Kriptografi adalah ilmu untuk menyamarkan pesan agar hanya dikenal baik oleh penyedia dan penerima pesan. Algoritma kunci publik RSA adalah salah satu metode dalam ilmu kriptografi. Dalam algoritma kunci publik RSA, ada kunci privat dan publik, di mana masing-masing kunci menggunakan bilangan acak yang merupakan bilangan prima untuk melakukan enkripsi dan dekripsi.Bilangan acak yang dihasilkan sebenarnya adalah bilangan pseudo-random ('hampir' acak). Linear Congruential Generator (LCG) algor...

  3. Factorization of RSA-140 using the number field sieve

    NARCIS (Netherlands)

    S.H. Cavallar; B. Dodson; A.K. Lenstra (Arjen); P.C. Leyland; W.M. Lioen (Walter); P.L. Montgomery; B. Murphy; H.J.J. te Riele (Herman); P. Zimmermann

    1999-01-01

    textabstractOn February 2, 1999, we completed the factorization of the 140--digit number RSA--140 with the help of the Number Field Sieve factoring method (NFS). This is a new general factoring record. The previous record was established on April 10, 1996 by the factorization of the 130--digit

  4. Does respiratory sinus arrhythmia (RSA) predict anxiety reduction during cognitive behavioral therapy (CBT) for social anxiety disorder (SAD)?

    Science.gov (United States)

    Mathewson, Karen J; Schmidt, Louis A; Miskovic, Vladimir; Santesso, Diane L; Duku, Eric; McCabe, Randi E; Antony, Martin M; Moscovitch, David A

    2013-05-01

    Modifying dysfunctional emotion regulation is an important goal in psychological treatments for social anxiety disorder (SAD). Antecedent-focused strategies learned in cognitive behavioral therapy (CBT), such as cognitive reappraisal, have proven more effective in reducing social anxiety than response-focused strategies, such as expressive suppression. Still, not all patients with SAD respond well to CBT. Medications and physiological factors may also influence the clinical response. The purpose of the present study was to examine the role that these factors play in determining treatment response following CBT for SAD. Using multilevel modeling, we examined associations across four separate laboratory visits between change in self-reported anxiety and indices of reappraisal, suppression, medication status, and resting respiratory sinus arrhythmia (RSA), a proxy measure of self-regulatory capacity, in 23 socially anxious adults during a 12-week program of CBT. Most participants were ultimately classified as responders to CBT (n=15), but in some, anxiety levels remained unchanged (n=8). Medication use explained substantial variance related to individual differences in anxiety among participants. When modeled separately, reappraisal, suppression, and RSA each accounted for significant variance related to anxiety. However, the best-fitting model included reappraisal and RSA. Moreover, RSA reactivity (change in RSA levels over time) was more important for predicting anxiety reduction than were baseline levels of RSA. These findings suggest that reappraisal and parasympathetic responsiveness may be important in reducing anxiety in adults with SAD who respond well to CBT. Copyright © 2013 Elsevier B.V. All rights reserved.

  5. Dual mobility hip arthroplasty wear measurement: Experimental accuracy assessment using radiostereometric analysis (RSA).

    Science.gov (United States)

    Pineau, V; Lebel, B; Gouzy, S; Dutheil, J-J; Vielpeau, C

    2010-10-01

    The use of dual mobility cups is an effective method to prevent dislocations. However, the specific design of these implants can raise the suspicion of increased wear and subsequent periprosthetic osteolysis. Using radiostereometric analysis (RSA), migration of the femoral head inside the cup of a dual mobility implant can be defined to apprehend polyethylene wear rate. The study aimed to establish the precision of RSA measurement of femoral head migration in the cup of a dual mobility implant, and its intra- and interobserver variability. A total hip prosthesis phantom was implanted and placed under weight loading conditions in a simulator. Model-based RSA measurement of implant penetration involved specially machined polyethylene liners with increasing concentric wear (no wear, then 0.25, 0.5 and 0.75mm). Three examiners, blinded to the level of wear, analyzed (10 times) the radiostereometric films of the four liners. There was one experienced, one trained, and one inexperienced examiner. Statistical analysis measured the accuracy, precision, and intra- and interobserver variability by calculating Root Mean Square Error (RMSE), Concordance Correlation Coefficient (CCC), Intra Class correlation Coefficient (ICC), and Bland-Altman plots. Our protocol, that used a simple geometric model rather than the manufacturer's CAD files, showed precision of 0.072mm and accuracy of 0.034mm, comparable with machining tolerances with low variability. Correlation between wear measurement and true value was excellent with a CCC of 0.9772. Intraobserver reproducibility was very good with an ICC of 0.9856, 0.9883 and 0.9842, respectively for examiners 1, 2 and 3. Interobserver reproducibility was excellent with a CCC of 0.9818 between examiners 2 and 1, and 0.9713 between examiners 3 and 1. Quantification of wear is indispensable for the surveillance of dual mobility implants. This in vitro study validates our measurement method. Our results, and comparison with other studies using

  6. RsaM: a transcriptional regulator of Burkholderia spp. with novel fold

    Energy Technology Data Exchange (ETDEWEB)

    Michalska, Karolina [Midwest Center for Structural Genomics, Argonne National Laboratory, IL USA; Structural Biology Center, Biosciences Division, Argonne National Laboratory, IL USA; Chhor, Gekleng [Midwest Center for Structural Genomics, Argonne National Laboratory, IL USA; Clancy, Shonda [Midwest Center for Structural Genomics, Argonne National Laboratory, IL USA; Jedrzejczak, Robert [Midwest Center for Structural Genomics, Argonne National Laboratory, IL USA; Babnigg, Gyorgy [Midwest Center for Structural Genomics, Argonne National Laboratory, IL USA; Winans, Stephen C. [Department of Microbiology, Cornell University, Ithaca NY USA; Joachimiak, Andrzej [Midwest Center for Structural Genomics, Argonne National Laboratory, IL USA; Structural Biology Center, Biosciences Division, Argonne National Laboratory, IL USA; Department of Biochemistry and Molecular Biology, University of Chicago, IL USA

    2014-07-04

    Burkholderia cepacia complex (Bcc) is a set of closely related bacterial species that are notorious pathogens of cystic fibrosis patients, responsible for life-threatening lung infections. Expression of several virulence factors of Bcc is controlled by a mechanism known as quorum sensing (QS). QS is a means of bacterial communication used to coordinate gene expression in a cell-density-dependent manner. The system involves the production of diffusible signaling molecules (N-acyl-L-homoserine lactones, AHLs), that bind to cognate transcriptional regulators and influence their ability to regulate gene expression. One such system that is highly conserved in Bcc consists of CepI and CepR. CepI is AHL synthase, while CepR is an AHL-dependent transcription factor. In most members of the Bcc group, the cepI and cepR genes are divergently transcribed and separated by additional genes. One of them, bcam1869, encodes the BcRsaM protein, which was recently postulated to modulate the abundance or activity of CepI or CepR. Here we show the crystal structure of BcRsaM from B. cenocepacia J2315. It is a single-domain protein with unique topology and presents a novel fold. The protein is a dimer in the crystal and in solution. This regulator has no known DNA binding motifs and direct binding of BcRsaM to the cepI promoter could not be detected in in vitro assays. Therefore, we propose that the modulatory action of RsaM might result from interactions with other components of the QS machinery rather than from direct association with the DNA promoter.

  7. Simplified Threshold RSA with Adaptive and Proactive Security

    DEFF Research Database (Denmark)

    Almansa Guerra, Jesus Fernando; Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2006-01-01

    We present the currently simplest, most efficient, optimally resilient, adaptively secure, and proactive threshold RSA scheme. A main technical contribution is a new rewinding strategy for analysing threshold signature schemes. This new rewinding strategy allows to prove adaptive security...... of a proactive threshold signature scheme which was previously assumed to be only statically secure. As a separate contribution we prove that our protocol is secure in the UC framework....

  8. APLIKASI KEAMANAN FILE AUDIO WAV (WAVEFORM DENGAN TERAPAN ALGORITMA RSA

    Directory of Open Access Journals (Sweden)

    Raja Nasrul Fuad

    2017-03-01

    Full Text Available The WAV file format that is widely used rough on various kinds of multimedia and gaming platforms. Ease of access and technological development with a variety of media to facilitate the exchange of information to various places. The data are important and need to be kept confidential secret for a wide range of security threats so that data can be intercepted and acknowledged by third parties during the shipping process. Of these problems led to the idea to create an application data security functions can secure the data using the RSA algorithm. The programming language is C # with Visual Studio software, the processed data is a sample each byte in WAV file, the header will be the same as that originally WAV files can be played even if the information has been withheld. RSA algorithm can be implemented into a programming language that WAV files can be processed and secured the data.

  9. Design and evaluation of learning strategies for a group of radiographers in radiostereometric analysis (RSA).

    Science.gov (United States)

    Muharemovic, O; Troelsen, A; Thomsen, M G; Kallemose, T; Gosvig, K K

    2017-11-01

    The purpose of this study was to design and evaluate a radiostereometric analysis (RSA) program aimed at radiographers in order to increase their cognitive and practical skills, thereby increasing image quality and minimizing exposure repetition. Twenty radiographers were randomized into two identically sized study groups. Training consisted of a theoretical and practical workshop using a phantom. Tests were performed to compare the effect of training to nontraining, and the effect of time duration on the maintenance of RSA skills. The effect of training was measured by a written test and three defined parameters influencing image quality. Group A reduced significantly (p RSA X-ray training program where radiographers significantly improve their theoretical and practical skills in centering the CP closer to the CCF, NB and RP. A duration of up to two months after training does not influence the quality of participants' performance. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  10. Trochanteric fracture-implant motion during healing - A radiostereometry (RSA) study.

    Science.gov (United States)

    Bojan, Alicja J; Jönsson, Anders; Granhed, Hans; Ekholm, Carl; Kärrholm, Johan

    2018-03-01

    Cut-out complication remains a major unsolved problem in the treatment of trochanteric hip fractures. A better understanding of the three-dimensional fracture-implant motions is needed to enable further development of clinical strategies and countermeasures. The aim of this clinical study was to characterise and quantify three-dimensional motions between the implant and the bone and between the lag screw and nail of the Gamma nail. Radiostereometry Analysis (RSA) analysis was applied in 20 patients with trochanteric hip fractures treated with an intramedullary nail. The following three-dimensional motions were measured postoperatively, at 1 week, 3, 6 and 12 months: translations of the tip of the lag screw in the femoral head, motions of the lag screw in the nail, femoral head motions relative to the nail and nail movements in the femoral shaft. Cranial migration of the tip of the lag screw dominated over the other two translation components in the femoral head. In all fractures the lag screw slid laterally in the nail and the femoral head moved both laterally and inferiorly towards the nail. All femoral heads translated posteriorly relative to the nail, and rotations occurred in both directions with median values close to zero. The nail tended to retrovert in the femoral shaft. Adverse fracture-implant motions were detected in stable trochanteric hip fractures treated with intramedullary nails with high resolution. Therefore, RSA method can be used to evaluate new implant designs and clinical strategies, which aim to reduce cut-out complications. Future RSA studies should aim at more unstable fractures as these are more likely to fail with cut-out. Copyright © 2018 Elsevier Ltd. All rights reserved.

  11. Video encryption using chaotic masks in joint transform correlator

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2015-03-01

    A real-time optical video encryption technique using a chaotic map has been reported. In the proposed technique, each frame of video is encrypted using two different chaotic random phase masks in the joint transform correlator architecture. The different chaotic random phase masks can be obtained either by using different iteration levels or by using different seed values of the chaotic map. The use of different chaotic random phase masks makes the decryption process very complex for an unauthorized person. Optical, as well as digital, methods can be used for video encryption but the decryption is possible only digitally. To further enhance the security of the system, the key parameters of the chaotic map are encoded using RSA (Rivest-Shamir-Adleman) public key encryption. Numerical simulations are carried out to validate the proposed technique.

  12. Video encryption using chaotic masks in joint transform correlator

    International Nuclear Information System (INIS)

    Saini, Nirmala; Sinha, Aloka

    2015-01-01

    A real-time optical video encryption technique using a chaotic map has been reported. In the proposed technique, each frame of video is encrypted using two different chaotic random phase masks in the joint transform correlator architecture. The different chaotic random phase masks can be obtained either by using different iteration levels or by using different seed values of the chaotic map. The use of different chaotic random phase masks makes the decryption process very complex for an unauthorized person. Optical, as well as digital, methods can be used for video encryption but the decryption is possible only digitally. To further enhance the security of the system, the key parameters of the chaotic map are encoded using RSA (Rivest–Shamir–Adleman) public key encryption. Numerical simulations are carried out to validate the proposed technique. (paper)

  13. A Model-based B2B (Batch to Batch) Control for An Industrial Batch Polymerization Process

    Science.gov (United States)

    Ogawa, Morimasa

    This paper describes overview of a model-based B2B (batch to batch) control for an industrial batch polymerization process. In order to control the reaction temperature precisely, several methods based on the rigorous process dynamics model are employed at all design stage of the B2B control, such as modeling and parameter estimation of the reaction kinetics which is one of the important part of the process dynamics model. The designed B2B control consists of the gain scheduled I-PD/II2-PD control (I-PD with double integral control), the feed-forward compensation at the batch start time, and the model adaptation utilizing the results of the last batch operation. Throughout the actual batch operations, the B2B control provides superior control performance compared with that of conventional control methods.

  14. Pro Spring Batch

    CERN Document Server

    Minella, Michael T

    2011-01-01

    Since its release, Spring Framework has transformed virtually every aspect of Java development including web applications, security, aspect-oriented programming, persistence, and messaging. Spring Batch, one of its newer additions, now brings the same familiar Spring idioms to batch processing. Spring Batch addresses the needs of any batch process, from the complex calculations performed in the biggest financial institutions to simple data migrations that occur with many software development projects. Pro Spring Batch is intended to answer three questions: *What? What is batch processing? What

  15. The standard of spirometry in the RSA | Basson | South African ...

    African Journals Online (AJOL)

    Standards for high-quality lung function testing have not yet been formally adopted in the RSA, despite the increase in the performance of spirometry. A study was undertaken to determine the standard of spirometry in clinical practice in this country. Forty-five spirometer users agreed to participate. Responses to a ...

  16. Establishing a recovery orientation in mental health services: Evaluating the Recovery Self-Assessment (RSA) in a Swedish context.

    Science.gov (United States)

    Rosenberg, David; Svedberg, Petra; Schön, Ulla-Karin

    2015-12-01

    Although there has been an emphasis on developing knowledge regarding recovery in Sweden, it is unclear to what extent this has been translated into a recovery orientation in the provision of mental health services. Instruments, which present the components of recovery as measurable dimensions of change, may provide a framework for program development. Involving users is an essential factor in the utilization of such tools. The purpose of this study was to evaluate the psychometric properties of the Recovery Self-Assessment (RSA) measure and its potential for being utilized in a Swedish context. The sample consisted of 78 participants from 6 community mental health services targeting people with serious mental illnesses in a municipality in Sweden. They completed the RSA at the study baseline and two weeks later. User panels participated in the translation and administration of the RSA and the reporting of results. The Swedish version of the RSA had good face and content validity, satisfactory internal consistency, and a moderate to good level of stability in test-retest reliability. The user panels contributed to establishing validity and as collaborators in the study. Establishing the RSA as a valid and reliable instrument with which to focus on the recovery orientation of services is a first step in beginning to study the types of interventions that may effect and contribute to recovery oriented practice in Sweden. (c) 2015 APA, all rights reserved).

  17. Validation of gait analysis with dynamic radiostereometric analysis (RSA) in patients operated with total hip arthroplasty.

    Science.gov (United States)

    Zügner, Roland; Tranberg, Roy; Lisovskaja, Vera; Shareghi, Bita; Kärrholm, Johan

    2017-07-01

    We simultaneously examined 14 patients with OTS and dynamic radiostereometric analysis (RSA) to evaluate the accuracy of both skin- and a cluster-marker models. The mean differences between the OTS and RSA system in hip flexion, abduction, and rotation varied up to 9.5° for the skin-marker and up to 11.3° for the cluster-marker models, respectively. Both models tended to underestimate the amount of flexion and abduction, but a significant systematic difference between the marker and RSA evaluations could only be established for recordings of hip abduction using cluster markers (p = 0.04). The intra-class correlation coefficient (ICC) was 0.7 or higher during flexion for both models and during abduction using skin markers, but decreased to 0.5-0.6 when abduction motion was studied with cluster markers. During active hip rotation, the two marker models tended to deviate from the RSA recordings in different ways with poor correlations at the end of the motion (ICC ≤0.4). During active hip motions soft tissue displacements occasionally induced considerable differences when compared to skeletal motions. The best correlation between RSA recordings and the skin- and cluster-marker model was found for studies of hip flexion and abduction with the skin-marker model. Studies of hip abduction with use of cluster markers were associated with a constant underestimation of the motion. Recordings of skeletal motions with use of skin or cluster markers during hip rotation were associated with high mean errors amounting up to about 10° at certain positions. © 2016 Orthopaedic Research Society. Published by Wiley Periodicals, Inc. J Orthop Res 35:1515-1522, 2017. © 2016 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  18. Factoring RSA keys from certified smart cards : Coppersmith in the wild

    NARCIS (Netherlands)

    Bernstein, D.J.; Chang, Y.A.; Cheng, C.M.; Chou, L.P.; Heninger, N.; Lange, T.; Someren, van N.

    2013-01-01

    An attacker can efficiently factor at least 184 distinct 1024-bit RSA keys from Taiwan's national "Citizen Digital Certificate" database. The big story here is that these keys were generated by government-issued smart cards that were certified secure. The certificates had all the usual buzzwords:

  19. Open-Wedge High Tibial Osteotomy: RCT 2 Years RSA Follow-Up.

    Science.gov (United States)

    Lind-Hansen, Thomas Bruno; Lind, Martin Carøe; Nielsen, Poul Torben; Laursen, Mogens Berg

    2016-11-01

    We investigated the influence of three different bone grafting materials on stability and clinical outcome of the healing open-wedge high tibial osteotomy (OW-HTO) with immediate partial weight bearing. A total of 45 (3 × 15) patients were randomized to injectable calcium phosphate cement (Calcibon; Biomet-Merck Biomaterials GmbH, Darmstadt, Germany), local bone autograft, or iliac crest autograft. Stability of the bony healing was evaluated with radiostereometric analysis (RSA) up to 24 months postoperatively. Clinical outcome was evaluated with the knee injury and osteoarthritis outcome score (KOOS). RSA revealed translations and rotations close to zero regardless of bone grafting material, with no statistically significant differences between the groups. Clinically, the Calcibon group had lower quality of life KOOS subscore at 2 years follow-up. We conclude that with a stable implant and 6 weeks of partial weight bearing, local autografting is sufficient to achieve solid bone consolidation following OW-HTO. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  20. Security Implications of Third-Party Accelerators

    Science.gov (United States)

    2015-06-11

    than intended. Kleptography [4], [21], allows texts to be encrypted in such a way that a secret big-brother key can decrypt them. At system scope, a...symmetric encryption against mass surveillance,” Cryptology ePrint Archive, Report 2014/438, 2014. [5] R. Callan, A. Zaji, and M. Prvulovic, “A practical...cryptographic modules,” National Institute of Standards and Technology, 2001. [11] P. Kocher, “Timing attacks on implementations of Diffie-Hellman, RSA , DSS, and

  1. A Review Of Encryption Algorithms-RSA And Diffie-Hellman

    Directory of Open Access Journals (Sweden)

    Nilesh A. Lal

    2017-07-01

    Full Text Available Network security is protecting data and message from cybercrime. Cryptography system is designed freely to communicate over a computer network. It is a process where sender sends encrypted message to the recipient. Symmetric encryption is known as the single key encryption. RSA algorithm is a symmetric key encryption.it uses public key and private key. Diffie Hellman cryptography is where both parties exchange secrets keys to encrypt message.

  2. Evaluation of RSA set-up from a clinical biplane fluoroscopy system for 3D joint kinematic analysis.

    Science.gov (United States)

    Bonanzinga, Tommaso; Signorelli, Cecilia; Bontempi, Marco; Russo, Alessandro; Zaffagnini, Stefano; Marcacci, Maurilio; Bragonzoni, Laura

    2016-01-01

    dinamic roentgen stereophotogrammetric analysis (RSA), a technique currently based only on customized radiographic equipment, has been shown to be a very accurate method for detecting three-dimensional (3D) joint motion. The aim of the present work was to evaluate the applicability of an innovative RSA set-up for in vivo knee kinematic analysis, using a biplane fluoroscopic image system. To this end, the Authors describe the set-up as well as a possible protocol for clinical knee joint evaluation. The accuracy of the kinematic measurements is assessed. the Authors evaluated the accuracy of 3D kinematic analysis of the knee in a new RSA set-up, based on a commercial biplane fluoroscopy system integrated into the clinical environment. The study was organized in three main phases: an in vitro test under static conditions, an in vitro test under dynamic conditions reproducing a flexion-extension range of motion (ROM), and an in vivo analysis of the flexion-extension ROM. For each test, the following were calculated, as an indication of the tracking accuracy: mean, minimum, maximum values and standard deviation of the error of rigid body fitting. in terms of rigid body fitting, in vivo test errors were found to be 0.10±0.05 mm. Phantom tests in static and kinematic conditions showed precision levels, for translations and rotations, of below 0.1 mm/0.2° and below 0.5 mm/0.3° respectively for all directions. the results of this study suggest that kinematic RSA can be successfully performed using a standard clinical biplane fluoroscopy system for the acquisition of slow movements of the lower limb. a kinematic RSA set-up using a clinical biplane fluoroscopy system is potentially applicable and provides a useful method for obtaining better characterization of joint biomechanics.

  3. The RSA survey of dwarf galaxies, 1: Optical photometry

    Science.gov (United States)

    Vader, J. Patricia; Chaboyer, Brian

    1994-01-01

    We present detailed surface photometry, based on broad B-band charge coupled device (CCD) images, of about 80 dwarf galaxies. Our sample represents approximately 10% of all dwarf galaxies identified in the vicinity of Revised Shapley-Ames (RSA) galaxies on high resolution blue photographic plates, referred to as the RSA survey of dwarf galaxies. We derive global properties and radial surface brightness profiles, and examine the morphologies. The radial surface brightness profiles of dwarf galaxies, whether early or late type, display the same varieties in shape and complexity as those of classical giant galaxies. Only a few are well described by a pure r(exp 1/4) law. Exponential profiles prevail. Features typical of giant disk galaxies, such as exponential profiles with a central depression, lenses, and even, in one case (IC 2041), a relatively prominent bulge are also found in dwarf galaxies. Our data suggest that the central region evolves from being bulge-like, with an r(exp 1/4) law profile, in bright galaxies to a lens-like structure in dwarf galaxies. We prove detailed surface photometry to be a helpful if not always sufficient tool in investigating the structure of dwarf galaxies. In many cases kinematic information is needed to complete the picture. We find the shapes of the surface brightness profiles to be loosely associated with morphological type. Our sample contains several new galaxies with properties intermediate between those of giant and dwarf ellipticals (but no M32-like objects). This shows that such intermediate galaxies exist so that at least a fraction of early-type dwarf ellipticals is structurally related to early-type giants instead of belonging to a totally unrelated, disjunct family. This supports an origin of early-type dwarf galaxies as originally more massive systems that acquired their current morphology as a result of substantial, presumable supernova-driven, mass loss. On the other hand, several early-type dwarfs in our sample are

  4. Exercise to rest ratios in RSA training in women's soccer.

    Science.gov (United States)

    Ruscello, Bruno; Esposito, Mario; Partipilo, Filippo; DI Cicco, Dalila; Filetti, Cristoforo; Pantanella, Laura; D'Ottavio, Stefano

    2017-10-27

    To investigate the applicability of three different exercise to rest ratios in RSA training in women's soccer players, applying those ones already adopted in male adult and young players, when performing three different sprinting modes (straight, shuttle and sprinting with changing of direction). 15 trained female soccer players (height: 1.65 ± 0.06 m; weight: 59.3 ± 9.0 kg; BMI 21.6 ± 2.7 kg·m-2; age: 23.3±5.9 years) participated to the study. In order to compare the different values of the time recorded, an Index of Fatigue was used. Recovery times among trials in the sets were administered according to the 1:5, 1:3; 1:2 exercise to rest ratio, respectively. Blood lactate concentrations at the end of each set (3') were analyzed. Significant differences among trials within each set (Repeated Measures Anova; p0.05). Significant differences were found in blood lactate concentrations (pRSA in women's soccer players, keeping the performances in the speed domain (IF% < ⊕7-8%) but inducing the fatigue processes sought with this kind of training method.

  5. Energy efficiency of batch and semi-batch (CCRO) reverse osmosis desalination.

    Science.gov (United States)

    Warsinger, David M; Tow, Emily W; Nayar, Kishor G; Maswadeh, Laith A; Lienhard V, John H

    2016-12-01

    As reverse osmosis (RO) desalination capacity increases worldwide, the need to reduce its specific energy consumption becomes more urgent. In addition to the incremental changes attainable with improved components such as membranes and pumps, more significant reduction of energy consumption can be achieved through time-varying RO processes including semi-batch processes such as closed-circuit reverse osmosis (CCRO) and fully-batch processes that have not yet been commercialized or modelled in detail. In this study, numerical models of the energy consumption of batch RO (BRO), CCRO, and the standard continuous RO process are detailed. Two new energy-efficient configurations of batch RO are analyzed. Batch systems use significantly less energy than continuous RO over a wide range of recovery ratios and source water salinities. Relative to continuous RO, models predict that CCRO and batch RO demonstrate up to 37% and 64% energy savings, respectively, for brackish water desalination at high water recovery. For batch RO and CCRO, the primary reductions in energy use stem from atmospheric pressure brine discharge and reduced streamwise variation in driving pressure. Fully-batch systems further reduce energy consumption by not mixing streams of different concentrations, which CCRO does. These results demonstrate that time-varying processes can significantly raise RO energy efficiency. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. Psychometric properties of the Resilience Scale for Adults (RSA) and its relationship with life-stress, anxiety and depression in a Hispanic Latin-American community sample.

    Science.gov (United States)

    Morote, Roxanna; Hjemdal, Odin; Martinez Uribe, Patricia; Corveleyn, Jozef

    2017-01-01

    Resilience is a multi-dimensional construct associated with health and well-being. At present, we do not yet have a valid, scientific instrument that is designed to evaluate adult resilience in Spanish-speaking countries and that accounts for family, social and individual components. This study aimed at investigating the construct and cross-cultural validity of the Resilience Scale for Adults (RSA) by combining Confirmatory Factor Analysis (CFA), Multidimensional Scaling (MDS) and Hierarchical Regression models in a Hispanic Latin-American group. A community sample of 805 adults answered the RSA, Spanish Language Stressful Life-Events checklist (SL-SLE), and the Hopkins Symptom Checklist-25 (HSCL-25). First-order CFA verified the six factors structure for the RSA (RMSEA = .037, SRMR = .047, CFI = .91, TLI = .90). Five RSA scales and total score have good internal consistency (scales α > .70; total score α = .90). Two second-order CFA verified the intrapersonal and interpersonal dimensions of the protector factors of resilience, as well as their commonality and uniqueness with affective symptoms (anxiety and depression). An exploratory MDS reproduced the relations of RSA items and factors at first and second-order levels against random simulated data, thereby providing initial evidence of its cross-cultural validity in a Spanish-speaking group. The Four-steps hierarchical model showed that the RSA scales are the strongest predictors of anxiety and depression-greater than gender, age, education and stressful life-events. Three RSA scales are significant unique predictors of affective symptoms. In addition, similar to findings in diverse cultural settings, resilience is positively associated with age but not with education. Women report higher scores of Social Resources and Social Competence and lower scores of Perception of the Self. In conclusion, this study demonstrates the construct and criterion-related validity of the RSA in broad, diverse and Spanish speaking

  7. A heterogeneous computing environment to solve the 768-bit RSA challenge

    OpenAIRE

    Kleinjung, Thorsten; Bos, Joppe Willem; Lenstra, Arjen K.; Osvik, Dag Arne; Aoki, Kazumaro; Contini, Scott; Franke, Jens; Thomé, Emmanuel; Jermini, Pascal; Thiémard, Michela; Leyland, Paul; Montgomery, Peter L.; Timofeev, Andrey; Stockinger, Heinz

    2010-01-01

    In December 2009 the 768-bit, 232-digit number RSA-768 was factored using the number field sieve. Overall, the computational challenge would take more than 1700 years on a single, standard core. In the article we present the heterogeneous computing approach, involving different compute clusters and Grid computing environments, used to solve this problem.

  8. Uneven batch data alignment with application to the control of batch end-product quality.

    Science.gov (United States)

    Wan, Jian; Marjanovic, Ognjen; Lennox, Barry

    2014-03-01

    Batch processes are commonly characterized by uneven trajectories due to the existence of batch-to-batch variations. The batch end-product quality is usually measured at the end of these uneven trajectories. It is necessary to align the time differences for both the measured trajectories and the batch end-product quality in order to implement statistical process monitoring and control schemes. Apart from synchronizing trajectories with variable lengths using an indicator variable or dynamic time warping, this paper proposes a novel approach to align uneven batch data by identifying short-window PCA&PLS models at first and then applying these identified models to extend shorter trajectories and predict future batch end-product quality. Furthermore, uneven batch data can also be aligned to be a specified batch length using moving window estimation. The proposed approach and its application to the control of batch end-product quality are demonstrated with a simulated example of fed-batch fermentation for penicillin production. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  9. RSA calibration accuracy of a fluoroscopy-based system using nonorthogonal images for measuring functional kinematics

    International Nuclear Information System (INIS)

    Kedgley, Angela E.; Jenkyn, Thomas R.

    2009-01-01

    When performing radiostereometric analysis (RSA) in a clinical setting it may be desirable to orient the two imaging devices nonorthogonally to obtain the best views of an anatomical structure. In this study, a calibration frame was constructed that allowed the relative angles of fiducial and control planes to be adjusted. Precision and accuracy were quantified across multiple trials and orientations. The 90 deg. frame was always of equivalent or greater accuracy than a calibration frame with the fiducial and control planes aligned parallel to the image intensifiers. This study also showed that RSA may be performed with imaging devices at relative angles other than 90 deg. without compromising accuracy. This allows researchers greater freedom in positioning equipment.

  10. Algoritmo de criptografia RSA: análise entre a segurança e velocidade

    Directory of Open Access Journals (Sweden)

    Rafael Santos Andrade

    2012-12-01

    Full Text Available O objetivo deste trabalho é abordar a relação existente entre a busca pela segurança de dados e a velocidade de codificação e decodificação do algoritmo de criptografia RSA, que utiliza um par de números inteiros como ‘chave’. Considerando o tamanho da chave como requisito de segurança, devido à dificuldade computacional de fatorar números inteiros extensos, simulamos estes processos, com o algoritmo implementado na linguagem de programação C, utilizando chaves aleatórias de 1024, 2048 e 4096 bits. Desta forma, observamos o tempo de processamento em função do tamanho das chaves, confrontando segurança e desempenho.Palavras-chave: criptografia; algoritmo RSA; segurança; desempenho.

  11. Application Mail Tracking Using RSA Algorithm As Security Data and HOT-Fit a Model for Evaluation System

    Science.gov (United States)

    Permadi, Ginanjar Setyo; Adi, Kusworo; Gernowo, Rahmad

    2018-02-01

    RSA algorithm give security in the process of the sending of messages or data by using 2 key, namely private key and public key .In this research to ensure and assess directly systems are made have meet goals or desire using a comprehensive evaluation methods HOT-Fit system .The purpose of this research is to build a information system sending mail by applying methods of security RSA algorithm and to evaluate in uses the method HOT-Fit to produce a system corresponding in the faculty physics. Security RSA algorithm located at the difficulty of factoring number of large coiled factors prima, the results of the prime factors has to be done to obtain private key. HOT-Fit has three aspects assessment, in the aspect of technology judging from the system status, the quality of system and quality of service. In the aspect of human judging from the use of systems and satisfaction users while in the aspect of organization judging from the structure and environment. The results of give a tracking system sending message based on the evaluation acquired.

  12. Application Mail Tracking Using RSA Algorithm As Security Data and HOT-Fit a Model for Evaluation System

    Directory of Open Access Journals (Sweden)

    Setyo Permadi Ginanjar

    2018-01-01

    Full Text Available RSA algorithm give security in the process of the sending of messages or data by using 2 key, namely private key and public key .In this research to ensure and assess directly systems are made have meet goals or desire using a comprehensive evaluation methods HOT-Fit system .The purpose of this research is to build a information system sending mail by applying methods of security RSA algorithm and to evaluate in uses the method HOT-Fit to produce a system corresponding in the faculty physics. Security RSA algorithm located at the difficulty of factoring number of large coiled factors prima, the results of the prime factors has to be done to obtain private key. HOT-Fit has three aspects assessment, in the aspect of technology judging from the system status, the quality of system and quality of service. In the aspect of human judging from the use of systems and satisfaction users while in the aspect of organization judging from the structure and environment. The results of give a tracking system sending message based on the evaluation acquired.

  13. Stable fixation of an osseointegated implant system for above-the-knee amputees: titel RSA and radiographic evaluation of migration and bone remodeling in 55 cases.

    Science.gov (United States)

    Nebergall, Audrey; Bragdon, Charles; Antonellis, Anne; Kärrholm, Johan; Brånemark, Rickard; Malchau, Henrik

    2012-04-01

    Rehabilitation of patients with transfemoral amputations is particularly difficult due to problems in using standard socket prostheses. We wanted to assess long-term fixation of the osseointegrated implant system (OPRA) using radiostereometric analysis (RSA) and periprosthetic bone remodeling. 51 patients with transfemoral amputations (55 implants) were enrolled in an RSA study. RSA and plain radiographs were scheduled at 6 months and at 1, 2, 5, 7, and 10 years after surgery. RSA films were analyzed using UmRSA software. Plain radiographs were graded for bone resorption, cancellization, cortical thinning, and trabecular streaming or buttressing in specifically defined zones around the implant. At 5 years, the median (SE) migration of the implant was -0.02 (0.06) mm distally. The rotational movement was 0.42 (0.32) degrees around the longitudinal axis. There was no statistically significant difference in median rotation or migration at any follow-up time. Cancellization of the cortex (plain radiographic grading) appeared in at least 1 zone in over half of the patients at 2 years. However, the prevalence of cancellization had decreased by the 5-year follow-up. The RSA analysis for the OPRA system indicated stable fixation of the implant. The periprosthetic bone remodeling showed similarities with changes seen around uncemented hip stems. The OPRA system is a new and promising approach for addressing the challenges faced by patients with transfemoral amputations.

  14. A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System

    Directory of Open Access Journals (Sweden)

    Nishaal J. Parmar

    2017-01-01

    Full Text Available This paper presents a comparative evaluation of possible encryption algorithms for use in a self-contained, ultra-secure router-to-router communication system, first proposed by El Rifai and Verma. The original proposal utilizes a discrete logarithm-based encryption solution, which will be compared in this paper to RSA, AES, and ECC encryption algorithms. RSA certificates are widely used within the industry but require a trusted key generation and distribution architecture. AES and ECC provide advantages in key length, processing requirements, and storage space, also maintaining an arbitrarily high level of security. This paper modifies each of the four algorithms for use within the self-contained router-to-router environment system and then compares them in terms of features offered, storage space and data transmission needed, encryption/decryption efficiency, and key generation requirements.

  15. Fast parallel molecular algorithms for DNA-based computation: factoring integers.

    Science.gov (United States)

    Chang, Weng-Long; Guo, Minyi; Ho, Michael Shan-Hui

    2005-06-01

    The RSA public-key cryptosystem is an algorithm that converts input data to an unrecognizable encryption and converts the unrecognizable data back into its original decryption form. The security of the RSA public-key cryptosystem is based on the difficulty of factoring the product of two large prime numbers. This paper demonstrates to factor the product of two large prime numbers, and is a breakthrough in basic biological operations using a molecular computer. In order to achieve this, we propose three DNA-based algorithms for parallel subtractor, parallel comparator, and parallel modular arithmetic that formally verify our designed molecular solutions for factoring the product of two large prime numbers. Furthermore, this work indicates that the cryptosystems using public-key are perhaps insecure and also presents clear evidence of the ability of molecular computing to perform complicated mathematical operations.

  16. CYP2E1 Rsa I/Pst I polymorphism contributes to oral cancer susceptibility: a meta-analysis.

    Science.gov (United States)

    Niu, Yuming; Hu, Yuanyuan; Wu, Mingyue; Jiang, Fei; Shen, Ming; Tang, Chunbo; Chen, Ning

    2012-01-01

    Previous data on association between CYP2E1 Rsa I/Pst I polymorphism and oral cancer risk were controversial. To investigate the association between CYP2E1 Rsa I/Pst I polymorphism and oral cancer risk. We performed a meta-analysis to assess the relationship between oral cancer and genotype with English language until June 2010. Twelve published case-control studies of 1259 patients with oral cancer and 2262 controls were acquired. Odds ratios (ORs) with 95% confidence intervals (CIs) were used to assess the strength of the association in codominant and dominant models. Overall, the pooled ORs indicated a significant association between CYP2E1 Rsa I/Pst I polymorphism and oral cancer risk (for c1/c2 vs. c1/c1: OR=1.30, 95% CI=1.04-1.62, Pheterogeneity=0.57; for (c1/c2+c2/c2) vs. c1/c1: OR=1.32, 95% CI=1.07-1.64, Pheterogeneity=0.57, respectively). In subgroup analysis by race, the same significant risks were found among Asian (for c1/c2 vs. c1/c1: OR=1.41, 95% CI=1.05-1.91, Pheterogeneity=0.92; for (c1/c2+c2/c2) vs. c1/c1: OR=1.43, 95% CI=1.08-1.88, Pheterogeneity=0.97, respectively). In conclusion, this meta-analysis demonstrates that CYP2E1 Rsa I/Pst I c2 allele may be a biomarker for oral cancer, especially among Asian populations.

  17. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  18. Production of nattokinase by batch and fed-batch culture of Bacillus subtilis.

    Science.gov (United States)

    Cho, Young-Han; Song, Jae Yong; Kim, Kyung Mi; Kim, Mi Kyoung; Lee, In Young; Kim, Sang Bum; Kim, Hyeon Shup; Han, Nam Soo; Lee, Bong Hee; Kim, Beom Soo

    2010-09-30

    Nattokinase was produced by batch and fed-batch culture of Bacillus subtilis in flask and fermentor. Effect of supplementing complex media (peptone, yeast extract, or tryptone) was investigated on the production of nattokinase. In flask culture, the highest cell growth and nattokinase activity were obtained with 50 g/L of peptone supplementation. In this condition, nattokinase activity was 630 unit/ml at 12 h. In batch culture of B. subtilis in fermentor, the highest nattokinase activity of 3400 unit/ml was obtained at 10h with 50 g/L of peptone supplementation. From the batch kinetics data, it was shown that nattokinase production was growth-associated and culture should be harvested before stationary phase for maximum nattokinase production. In fed-batch culture of B. subtilis using pH-stat feeding strategy, cell growth (optical density monitored at 600 nm) increased to ca. 100 at 22 h, which was 2.5 times higher than that in batch culture. The highest nattokinase activity was 7100 unit/ml at 19 h, which was also 2.1 times higher than that in batch culture. Copyright 2010 Elsevier B.V. All rights reserved.

  19. ANALISIS KEAMANAN DATA PADA BLOCK CIPHER ALGORITMA KRIPTOGRAFI RSA

    Directory of Open Access Journals (Sweden)

    Fadhillah Azmi

    2017-01-01

    Full Text Available Komunikasi adalah proses dasar dari pertukaran informasi. Efektifitas komunikasikomputer secara umum adalah melalui internet atau beberapa saluran komunikasi lainnya.Tujuan utama tulisan ini adalah berdasarkan pada analisis hasil yang diberikan Weinermengatakan bahwa jika private key d digunakan dalam algoritma kriptografi RSA kurang darin292, maka sistem tersebut kurang aman. Di sini penulis menganalisa pada hasil yang diberikanoleh Weiner dan mencoba untuk meningkatkan range dari private key d sampai n0.5. Karena nadalah perkalian p dan q, yang mana bilangan relative prima. Sehingga mempengaruhi kinerjaenkripsi algoritma yang lebih aman.

  20. 10-year results of a new low-monomer cement: follow-up of a randomized RSA study.

    Science.gov (United States)

    Söderlund, Per; Dahl, Jon; Röhrl, Stephan; Nivbrant, Bo; Nilsson, Kjell G

    2012-12-01

    The properties and performance of a new low-monomer cement were examined in this prospective randomized, controlled RSA study. 5-year data have already been published, showing no statistically significant differences compared to controls. In the present paper we present the 10-year results. 44 patients were originally randomized to receive total hip replacement with a Lubinus SPII titanium-aluminum-vanadium stem cemented either with the new Cemex Rx bone cement or with control bone cement, Palacos R. Patients were examined using RSA, Harris hip score, and conventional radiographs. At 10 years, 33 hips could be evaluated clinically and 30 hips could be evaluated with RSA (16 Cemex and 14 Palacos). 9 patients had died and 4 patients were too old or infirm to be investigated. Except for 1 hip that was revised for infection after less than 5 years, no further hips were revised before the 10-year follow-up. There were no statistically significant clinical differences between the groups. The Cemex cement had magnitudes of migration similar to or sometimes lower than those of Palacos cement. In both groups, most hips showed extensive radiolucent lines, probably due to the use of titanium alloy stems. At 10 years, the Cemex bone cement tested performed just as well as the control (Palacos bone cement).

  1. Reverse saturable absorption (RSA) in fluorinated iridium derivatives

    Science.gov (United States)

    Ferry, Michael J.; O'Donnell, Ryan M.; Bambha, Neal; Ensley, Trenton R.; Shensky, William M.; Shi, Jianmin

    2017-08-01

    The photophysical properties of cyclometallated iridium compounds are beneficial for nonlinear optical (NLO) applications, such as the design of reverse saturable absorption (RSA) materials. We report on the NLO characterization of a family of compounds of the form [Ir(pbt)2(LX)], where pbt is 2-phenylbenzothiazole and LX is a beta-diketonate ligand. In particular, we investigate the effects of trifluoromethylation on compound solubility and photophysics compared to the parent acetylacetonate (acac) version. The NLO properties, such as the singlet and triplet excited-state cross sections, of these compounds were measured using the Z-scan technique. The excited-state lifetimes were determined from visible transient absorption spectroscopy.

  2. The methylenetetrahydrofolate reductase c.c.677 C>T and c.c.1298 A>C polymorphisms in reproductive failures: Experience from an RSA and RIF study on a Polish population.

    Science.gov (United States)

    Nowak, Izabela; Bylińska, Aleksandra; Wilczyńska, Karolina; Wiśniewski, Andrzej; Malinowski, Andrzej; Wilczyński, Jacek R; Radwan, Paweł; Radwan, Michał; Barcz, Ewa; Płoski, Rafał; Motak-Pochrzęst, Hanna; Banasik, Małgorzata; Sobczyński, Maciej; Kuśnierczyk, Piotr

    2017-01-01

    Almost 1600 individuals from the Polish population were recruited to this study. Among them 319 were fertile couples, 289 were recurrent spontaneous abortion (RSA) couples, and 131 were in the group of recurrent implantation failure (RIF) following in vitro fertilization. The aim of this study was to evaluate the MTHFR c.c.677 C>T and c.c.1298 A>C polymorphisms' association with RSA and RIF. We used PCR-RFLP with HinfI (677 C>T) and MboII (1298 A>C) digestion. We observed a protective effect of the female AC genotype (OR = 0.64, p = 0.01) and the C allele (AC+CC genotypes; OR = 0.65, p = 0.009) against RSA. Moreover, 1298 AA/677 CT women were more frequent in RSA (31.14%) and RIF (25.20%) groups in comparison to fertile women (22.88%), although this difference was significant only in the case of RSA (p = 0.022, OR = 1.52). Male combined genotype analysis revealed no association with reproductive failure of their partners. Nevertheless, the female/male combination AA/AC of the 1298 polymorphism was more frequent in RSA couples (p = 0.049, OR = 1.49). However, the significant results became insignificant after Bonferroni correction. In addition, analysis of haplotypes showed significantly higher frequency of the C/C haplotype (1298 C/677 C) in the female control group than in the female RSA group (p = 0.03, OR = 0.77). Moreover, the association between elevated homocysteine (Hcy) level in plasma of RSA and RIF women and MTHFR polymorphisms was investigated but did not reveal significant differences. In conclusion, for clinical practice, it is better to check the homocysteine level in plasma and, if the Hcy level is increased, to recommend patients to take folic acid supplements rather than undergo screening of MTHFR for 1298 A>C and 677 C>T polymorphisms.

  3. SPS batch spacing optimisation

    CERN Document Server

    Velotti, F M; Carlier, E; Goddard, B; Kain, V; Kotzian, G

    2017-01-01

    Until 2015, the LHC filling schemes used the batch spac-ing as specified in the LHC design report. The maximumnumber of bunches injectable in the LHC directly dependson the batch spacing at injection in the SPS and hence onthe MKP rise time.As part of the LHC Injectors Upgrade project for LHCheavy ions, a reduction of the batch spacing is needed. In thisdirection, studies to approach the MKP design rise time of150ns(2-98%) have been carried out. These measurementsgave clear indications that such optimisation, and beyond,could be done also for higher injection momentum beams,where the additional slower MKP (MKP-L) is needed.After the successful results from 2015 SPS batch spacingoptimisation for the Pb-Pb run [1], the same concept wasthought to be used also for proton beams. In fact, thanksto the SPS transverse feed back, it was already observedthat lower batch spacing than the design one (225ns) couldbe achieved. For the 2016 p-Pb run, a batch spacing of200nsfor the proton beam with100nsbunch spacing wasreque...

  4. The robustness and accuracy of in vivo linear wear measurements for knee prostheses based on model-based RSA.

    Science.gov (United States)

    van Ijsseldijk, E A; Valstar, E R; Stoel, B C; Nelissen, R G H H; Reiber, J H C; Kaptein, B L

    2011-10-13

    Accurate in vivo measurements methods of wear in total knee arthroplasty are required for a timely detection of excessive wear and to assess new implant designs. Component separation measurements based on model-based Roentgen stereophotogrammetric analysis (RSA), in which 3-dimensional reconstruction methods are used, have shown promising results, yet the robustness of these measurements is unknown. In this study, the accuracy and robustness of this measurement for clinical usage was assessed. The validation experiments were conducted in an RSA setup with a phantom setup of a knee in a vertical orientation. 72 RSA images were created using different variables for knee orientations, two prosthesis types (fixed-bearing Duracon knee and fixed-bearing Triathlon knee) and accuracies of the reconstruction models. The measurement error was determined for absolute and relative measurements and the effect of knee positioning and true seperation distance was determined. The measurement method overestimated the separation distance with 0.1mm on average. The precision of the method was 0.10mm (2*SD) for the Duracon prosthesis and 0.20mm for the Triathlon prosthesis. A slight difference in error was found between the measurements with 0° and 10° anterior tilt. (difference=0.08mm, p=0.04). The accuracy of 0.1mm and precision of 0.2mm can be achieved for linear wear measurements based on model-based RSA, which is more than adequate for clinical applications. The measurement is robust in clinical settings. Although anterior tilt seems to influence the measurement, the size of this influence is low and clinically irrelevant. Copyright © 2011 Elsevier Ltd. All rights reserved.

  5. Dynamic RSA for the evaluation of inducible micromotion of Oxford UKA during step-up and step-down motion.

    Science.gov (United States)

    Horsager, Kristian; Kaptein, Bart L; Rømer, Lone; Jørgensen, Peter B; Stilling, Maiken

    2017-06-01

    Background and purpose - Implant inducible micromotions have been suggested to reflect the quality of the fixation interface. We investigated the usability of dynamic RSA for evaluation of inducible micromotions of the Oxford Unicompartmental Knee Arthroplasty (UKA) tibial component, and evaluated factors that have been suggested to compromise the fixation, such as fixation method, component alignment, and radiolucent lines (RLLs). Patients and methods - 15 patients (12 men) with a mean age of 69 (55-86) years, with an Oxford UKA (7 cemented), were studied after a mean time in situ of 4.4 (3.6-5.1) years. 4 had tibial RLLs. Each patient was recorded with dynamic RSA (10 frames/second) during a step-up/step-down motion. Inducible micromotions were calculated for the tibial component with respect to the tibia bone. Postoperative component alignment was measured with model-based RSA and RLLs were measured on screened radiographs. Results - All tibial components showed inducible micromotions as a function of the step-cycle motion with a mean subsidence of up to -0.06 mm (95% CI: -0.10 to -0.03). Tibial component inducible micromotions were similar for cemented fixation and cementless fixation. Patients with tibial RLLs had 0.5° (95% CI: 0.18-0.81) greater inducible medio-lateral tilt of the tibial component. There was a correlation between postoperative posterior slope of the tibial plateau and inducible anterior-posterior tilt. Interpretation - All patients had inducible micromotions of the tibial component during step-cycle motion. RLLs and a high posterior slope increased the magnitude of inducible micromotions. This suggests that dynamic RSA is a valuable clinical tool for the evaluation of functional implant fixation.

  6. High-precision measurements of cementless acetabular components using model-based RSA: an experimental study

    DEFF Research Database (Denmark)

    Baad-Hansen, Thomas; Kold, Søren; Kaptein, Bart L

    2007-01-01

    BACKGROUND: In RSA, tantalum markers attached to metal-backed acetabular cups are often difficult to detect on stereo radiographs due to the high density of the metal shell. This results in occlusion of the prosthesis markers and may lead to inconclusive migration results. Within the last few years...

  7. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  8. Association between lower frequency of R381Q variant (rs11209026) in IL-23 receptor gene and increased risk of recurrent spontaneous abortion (RSA).

    Science.gov (United States)

    Abdollahi, Elham; Tavasolian, Fataneh; Ghasemi, Nasrin; Mirghanizadeh, Seyed Ali; Azizi, Mohammdareza; Ghoryani, Mohsen; Samadi, Morteza

    2015-01-01

    Recurrent spontaneous abortion (RSA) is defined as three or more consecutive spontaneous abortions before the 20th week of gestation. The purpose of the present study was to investigate the association between a functional single nucleotide polymorphism (SNP) in the interleukin (IL)-23 receptor gene (IL-23R; rs11209026, 1142 G wild type → A reduced function, Arg381Gln, R381Q) and RSA. For the study, 200 RSA patients (confirmed using established diagnostic criteria) and 200 normal individuals in fertility and infertility centers in the cities of Yazd and Isfahan were recruited during a period from 2012-2013. Using PCR-RFLP, the R381Q variant was screened for in the IL-23R gene of the patients and controls. The results indicated there were significant differences in the frequency of this genetic variant in the patients versus the healthy controls, i.e. 2% and 7.5%, respectively (p value = 0.01; odds ratio = 0.25; CI = 95%). No significant difference was found for the G allelic frequency in patients with RSA and in the control group (p = 0.60). The A allelic frequency was significantly different between the two groups (p = 0.01). Based on these findings, it is concluded that the frequency of single nucleotide polymorphism in the IL-23 receptor (R381Q) in patients with recurrent spontaneous abortion (RSA) is less than that found in normal control women.

  9. [Correlation of polymorphisms of adiponectin receptor 2 gene +33371Gln/Arg, cytochrome P4502E1 gene Rsa I and smoking with nonalcoholic fatty liver disease].

    Science.gov (United States)

    Zhang, Chaoxian; Guo, Like

    2014-10-01

    To investigate the correlation of the polymorphisms of adiponectin receptor 2 (AdipoR2) gene +33371Gln/;Arg and cytochromes P4502E1 gene Rsa I (CYP2E1-Rsa I) as well as smoking with nonalcoholic fatty liver disease (NAFLD). The polymorphisms of AdipoR2 gene +33371Gln/Arg and CYP2E1-Rsa I were analyzed with PCR technique in peripheral blood leukocytes from 750 NAFLD cases and 750 healthy subjects. The frequencies of AdipoR2 gene +33371Gln/Arg (A/A) and CYP2E1-Rsa I (c2/c2 ) were 39.20% and 71.73% in NAFLD cases, respectively, significantly higher than those in healthy subjects (21.07% and 43.07%, respectively, PRsa I (c2/c2) (OR=3.3547, 95% CI=1.9182-4.5057). Combined analysis of the polymorphisms showed that the percentage of +33371Gln/Arg (A/A)/CYP2E1-Rsa I (c2/c2) was 32. 67% in NAFLD cases, significantly higher than that in the healthy subjects (6.40%, PRsa I (c2/c2) had a high risk of NAFLD (OR=9.9264, 95% CI=4.2928-12.4241). The smoking rate was significantly higher in the case group than in the control group (OR=2.5919, 95% CI=1.4194-4. 9527, PRsa I (c2/c2) to increase the risk of NAFLD (OR=34.6764, 95% CI=18.9076-61.5825). +33371Gln/Arg (A/A), CYP2E1-Rsa I (c2/c2 ) and smoking are risk factors for NAFLD and coordinately contribute to the occurrence of NAFLD.

  10. A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments

    Directory of Open Access Journals (Sweden)

    Ruhul Amin

    2017-01-01

    Full Text Available The concept of two-factor multiserver authentication protocol was developed to avoid multiple number of registrations using multiple smart-cards and passwords. Recently, a variety of two-factor multiserver authentication protocols have been developed. It is observed that the existing RSA-based multiserver authentication protocols are not suitable in terms of computation complexities and security attacks. To provide lower complexities and security resilience against known attacks, this article proposes a two-factor (password and smart-card user authentication protocol with the RSA cryptosystem for multiserver environments. The comprehensive security discussion proved that the known security attacks are eliminated in our protocol. Besides, our protocol supports session key agreement and mutual authentication between the application server and the user. We analyze the proof of correctness of the mutual authentication and freshness of session key using the BAN logic model. The experimental outcomes obtained through simulation of the Automated Validation of Internet Security Protocols and Applications (AVISPA S/W show that our protocol is secured. We consider the computation, communication, and storage costs and the comparative explanations show that our protocol is flexible and efficient compared with protocols. In addition, our protocol offers security resilience against known attacks and provides lower computation complexities than existing protocols. Additionally, the protocol offers password change facility to the authorized user.

  11. Resting RSA Is Associated with Natural and Self-Regulated Responses to Negative Emotional Stimuli

    Science.gov (United States)

    Demaree, Heath A.; Robinson, Jennifer L.; Everhart, D. Erik; Schmeichel, Brandon J.

    2004-01-01

    Resting respiratory sinus arrhythmia (RSA) was assessed among 111 adult participants. These individuals were then asked to watch a positive or negative affective film in either a natural manner or while exaggerating their facial response. Facial reactions to the film were video-recorded and subsequently rated in terms of facial affect.…

  12. Die rol van die kurrikulum in private skole in die RSA

    OpenAIRE

    2014-01-01

    M.Ed. (Curriculum Studies) This research focuses on the role the curriculum plays in the existence of certain types of private schools in the RSA. Private schools in South Africa currently number in excess of 500 and the number is increasing every year. The various private schools claim that they offer curricula suited to the specific needs of certain pupils. A structured interview was compiled and used to interview three different schools namely a volkskool (a people's school), a church s...

  13. Measuring polyethylene wear in total knee arthroplasty by RSA: differences between weight-bearing and non-weight-bearing positioning.

    Science.gov (United States)

    van Ijsseldijk, Emiel A; Valstar, Edward R; Stoel, Berend C; de Ridder, Ruud; Nelissen, Rob G H H; Kaptein, Bart L

    2014-04-01

    Measuring the minimum-joint-space-width (mJSW) in total knee arthroplasty (TKA) in Roentgen stereophotogrammetric analysis (RSA) provides valuable information on polyethylene wear, a leading cause for TKA failure. Most existing studies use non-weight-bearing (NWB) patient positioning. The latter may compromise mJSW measurements due to knee laxity with subsequent non-contact between the TKA components. We investigated the difference in mJSW between weight-bearing (WB) and NWB images and the association with mediolateral (ML) knee stability. At one-year follow-up, 23 TKAs were included from an ongoing RSA study, and ML stability was evaluated. For each examination, the mJSW and femoral-tibial contact locations were measured. A linear regression model was used to analyze the association between the mJSW difference (NWB-WB) with the ML stability and contact locations. The mean mJSW difference was 0.28 mm medially and 0.20 mm laterally. Four TKAs had medium (5-9°) and 19 TKAs had high (RSA studies are influenced by knee laxity, but may still provide information on wear progression based on TKA with high ML stability. A direct comparison of mJSW measurements from WB and NWB data is not possible. © 2014 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  14. Angled BIO-RSA (bony-increased offset-reverse shoulder arthroplasty): a solution for the management of glenoid bone loss and erosion.

    Science.gov (United States)

    Boileau, Pascal; Morin-Salvo, Nicolas; Gauci, Marc-Olivier; Seeto, Brian L; Chalmers, Peter N; Holzer, Nicolas; Walch, Gilles

    2017-12-01

    Glenoid deficiency and erosion (excessive retroversion/inclination) must be corrected in reverse shoulder arthroplasty (RSA) to avoid prosthetic notching or instability and to maximize function, range of motion, and prosthesis longevity. This study reports the results of RSA with an angled, autologous glenoid graft harvested from the humerus (angled BIO-RSA). A trapezoidal bone graft, harvested from the humeral head and fixed with a long-post baseplate and screws, was used to compensate for residual glenoid bone loss/erosion. For simple to moderate (25°) and complex (multiplanar) glenoid bone defects, patient-specific grafts and guides were used after 3-dimensional planning. Patients were reviewed with minimum 2 years of follow-up. Mean follow-up was 36 months (range, 24-81 months). Preoperative and postoperative measurements of inclination and version were performed in the plane of the scapula on computed tomography images. The study included 54 patients (41 women, 13 men; mean 73 years old). Fifteen patients had combined vertical and horizontal glenoid bone deficiency. Among E2/E3 glenoids, inclination improved from 37° (range, 14° to 84°) to 10.2° (range -28° to 36°, P RSA predictably corrects glenoid deficiency, including severe (>25°) multiplanar deformity. Graft incorporation is predictable. Advantages of using an autograftharvested in situ include bone stock augmentation, lateralization, low donor-site morbidity, low relative cost, and flexibility needed to simultaneously correct posterior and superior glenoid defects. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  15. Predicting 3D pose in partially overlapped X-ray images of knee prostheses using model-based Roentgen stereophotogrammetric analysis (RSA).

    Science.gov (United States)

    Hsu, Chi-Pin; Lin, Shang-Chih; Shih, Kao-Shang; Huang, Chang-Hung; Lee, Chian-Her

    2014-12-01

    After total knee replacement, the model-based Roentgen stereophotogrammetric analysis (RSA) technique has been used to monitor the status of prosthetic wear, misalignment, and even failure. However, the overlap of the prosthetic outlines inevitably increases errors in the estimation of prosthetic poses due to the limited amount of available outlines. In the literature, quite a few studies have investigated the problems induced by the overlapped outlines, and manual adjustment is still the mainstream. This study proposes two methods to automate the image processing of overlapped outlines prior to the pose registration of prosthetic models. The outline-separated method defines the intersected points and segments the overlapped outlines. The feature-recognized method uses the point and line features of the remaining outlines to initiate registration. Overlap percentage is defined as the ratio of overlapped to non-overlapped outlines. The simulated images with five overlapping percentages are used to evaluate the robustness and accuracy of the proposed methods. Compared with non-overlapped images, overlapped images reduce the number of outlines available for model-based RSA calculation. The maximum and root mean square errors for a prosthetic outline are 0.35 and 0.04 mm, respectively. The mean translation and rotation errors are 0.11 mm and 0.18°, respectively. The errors of the model-based RSA results are increased when the overlap percentage is beyond about 9%. In conclusion, both outline-separated and feature-recognized methods can be seamlessly integrated to automate the calculation of rough registration. This can significantly increase the clinical practicability of the model-based RSA technique.

  16. Modelling of Batch Process Operations

    DEFF Research Database (Denmark)

    Abdul Samad, Noor Asma Fazli; Cameron, Ian; Gani, Rafiqul

    2011-01-01

    Here a batch cooling crystalliser is modelled and simulated as is a batch distillation system. In the batch crystalliser four operational modes of the crystalliser are considered, namely: initial cooling, nucleation, crystal growth and product removal. A model generation procedure is shown that s...

  17. Performance analysis of AES-Blowfish hybrid algorithm for security of patient medical record data

    Science.gov (United States)

    Mahmud H, Amir; Angga W, Bayu; Tommy; Marwan E, Andi; Siregar, Rosyidah

    2018-04-01

    A file security is one method to protect data confidentiality, integrity and information security. Cryptography is one of techniques used to secure and guarantee data confidentiality by doing conversion to the plaintext (original message) to cipher text (hidden message) with two important processes, they are encrypt and decrypt. Some researchers proposed a hybrid method to improve data security. In this research we proposed hybrid method of AES-blowfish (BF) to secure the patient’s medical report data into the form PDF file that sources from database. Generation method of private and public key uses two ways of approach, those are RSA method f RSA and ECC. We will analyze impact of these two ways of approach for hybrid method at AES-blowfish based on time and Throughput. Based on testing results, BF method is faster than AES and AES-BF hybrid, however AES-BF hybrid is better for throughput compared with AES and BF is higher.

  18. Wear of a 5 megarad cross-linked polyethylene liner: a 6-year RSA study.

    Science.gov (United States)

    Callary, Stuart A; Campbell, David G; Mercer, Graham; Nilsson, Kjell G; Field, John R

    2013-07-01

    One cross-linked polyethylene (XLPE) liner is manufactured using a lower dose of radiation, 5 Mrad, which may result in less cross-linking. The reported in vivo wear rate of this XLPE liner in patients undergoing THA has varied, and has included some patients in each reported cohort who had greater than 0.1 mm/year of wear, which is an historical threshold for osteolysis. Previous studies have measured wear on plain radiographs, an approach that has limited sensitivity. We therefore measured the amount and direction of wear at 6 years using Radiostereometric analysis (RSA) in patients who had THAs that included a cross-linked polyethylene liner manufactured using 5 Mrad radiation. We prospectively reviewed wear in 30 patients who underwent primary THAs with the same design of cross-linked acetabular liner and a 28-mm articulation. Tantalum markers were inserted during surgery and all patients had RSA radiographic examinations at 1 week, 6 months, 1, 2, and 6 years postoperatively. The mean proximal, two-dimensional (2-D) and three-dimensional (3-D) wear rates calculated between 1 year and 6 years were 0.014, 0.014, and 0.018 mm/per year, respectively. The direction of the head penetration recorded between 1 week and 6 years was in a proximal direction for all patients, proximolateral for 16 of 24 patients, and proximomedial for eight of 24 patients. The proximal, 2-D and 3-D wear of a XLPE liner produced using 5 Mrad of radiation was low but measurable by RSA after 6 years. No patients had proximal 2-D or 3-D wear rates exceeding 0.1 mm/year. Further followup is needed to evaluate the effect of XLPE wear particles on the development of long-term osteolysis.

  19. Spring batch essentials

    CERN Document Server

    Rao, P Raja Malleswara

    2015-01-01

    If you are a Java developer with basic knowledge of Spring and some experience in the development of enterprise applications, and want to learn about batch application development in detail, then this book is ideal for you. This book will be perfect as your next step towards building simple yet powerful batch applications on a Java-based platform.

  20. Deducing trapdoor primitives in public key encryption schemes

    Science.gov (United States)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  1. Usage of the hybrid encryption in a cloud instant messages exchange system

    Science.gov (United States)

    Kvyetnyy, Roman N.; Romanyuk, Olexander N.; Titarchuk, Evgenii O.; Gromaszek, Konrad; Mussabekov, Nazarbek

    2016-09-01

    A new approach for constructing cloud instant messaging represented in this article allows users to encrypt data locally by using Diffie - Hellman key exchange protocol. The described approach allows to construct a cloud service which operates only by users encrypted messages; encryption and decryption takes place locally at the user party using a symmetric AES encryption. A feature of the service is the conferences support without the need for messages reecryption for each participant. In the article it is given an example of the protocol implementation on the ECC and RSA encryption algorithms basis, as well as a comparison of these implementations.

  2. Monte Carlo simulation on kinetics of batch and semi-batch free radical polymerization

    KAUST Repository

    Shao, Jing; Tang, Wei; Xia, Ru; Feng, Xiaoshuang; Chen, Peng; Qian, Jiasheng; Song, Changjiang

    2015-01-01

    experimental and simulation studies, we showed the capability of our Monte Carlo scheme on representing polymerization kinetics in batch and semi-batch processes. Various kinetics information, such as instant monomer conversion, molecular weight

  3. Monte Carlo simulation on kinetics of batch and semi-batch free radical polymerization

    KAUST Repository

    Shao, Jing

    2015-10-27

    Based on Monte Carlo simulation technology, we proposed a hybrid routine which combines reaction mechanism together with coarse-grained molecular simulation to study the kinetics of free radical polymerization. By comparing with previous experimental and simulation studies, we showed the capability of our Monte Carlo scheme on representing polymerization kinetics in batch and semi-batch processes. Various kinetics information, such as instant monomer conversion, molecular weight, and polydispersity etc. are readily calculated from Monte Carlo simulation. The kinetic constants such as polymerization rate k p is determined in the simulation without of “steady-state” hypothesis. We explored the mechanism for the variation of polymerization kinetics those observed in previous studies, as well as polymerization-induced phase separation. Our Monte Carlo simulation scheme is versatile on studying polymerization kinetics in batch and semi-batch processes.

  4. The effect of tourniquet use on fixation quality in cemented total knee arthroplasty a prospective randomized clinical controlled RSA trial.

    Science.gov (United States)

    Molt, Mats; Harsten, Andreas; Toksvig-Larsen, Sören

    2014-03-01

    A concern that arises with any change in technique is whether it affects the long-term implant stability. The objective of this study was to evaluate the early migration, measured by radiostereometric analysis (RSA), and the functional outcome of the Triathlon™ cemented knee prosthesis, operated on with or without a tourniquet. During the last decades RSA has emerged as a way to assess prosthetic fixation and long time prognosis. The method has been used extensively in both hip and knee arthroplasty. This was a single centre prospective study including 60 patients randomized into two groups operated on either with or without tourniquet. RSA investigation was done within 2-3 days postoperatively after full weight bearing, and then at 3 months, 1 year and 2 years postoperatively. There were no differences between the groups regarding the translation along or rotation around the three coordinal axes, or in maximum total point motion (MTPM). At 2 years the mean MTPM (SD) was 0.71 mm (0.64) for the tourniquet-group and 0.53 mm (0.21) for the non-tourniquet-group. The tibial tray of the Triathlon™ cemented knee prosthesis showed similar early stability whether operated on with or without tourniquet. Level I. Article focus: A safety study for total knee replacement operated on with or without perioperative tourniquet regarding the prosthetic fixation. Strengths and limitations: Strength of this study is that it is a randomized prospective trial using an objective measuring tool. The sample size of 25-30 patients is reportedly sufficient for the screening of implants using RSA (1-3). Clinical trials NCT01604382, Ethics Committee approval D-nr: 144/20085. © 2013.

  5. Combination of Rivest-Shamir-Adleman Algorithm and End of File Method for Data Security

    Science.gov (United States)

    Rachmawati, Dian; Amalia, Amalia; Elviwani

    2018-03-01

    Data security is one of the crucial issues in the delivery of information. One of the ways which used to secure the data is by encoding it into something else that is not comprehensible by human beings by using some crypto graphical techniques. The Rivest-Shamir-Adleman (RSA) cryptographic algorithm has been proven robust to secure messages. Since this algorithm uses two different keys (i.e., public key and private key) at the time of encryption and decryption, it is classified as asymmetric cryptography algorithm. Steganography is a method that is used to secure a message by inserting the bits of the message into a larger media such as an image. One of the known steganography methods is End of File (EoF). In this research, the cipher text resulted from the RSA algorithm is compiled into an array form and appended to the end of the image. The result of the EoF is the image which has a line with black gradations under it. This line contains the secret message. This combination of cryptography and steganography in securing the message is expected to increase the security of the message, since the message encryption technique (RSA) is mixed with the data hiding technique (EoF).

  6. Data-driven batch schuduling

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John [Los Alamos National Laboratory; Denehy, Tim [GOOGLE; Arpaci - Dusseau, Remzi [UNIV OF WISCONSIN; Livny, Miron [UNIV OF WISCONSIN; Arpaci - Dusseau, Andrea C [NON LANL

    2009-01-01

    In this paper, we develop data-driven strategies for batch computing schedulers. Current CPU-centric batch schedulers ignore the data needs within workloads and execute them by linking them transparently and directly to their needed data. When scheduled on remote computational resources, this elegant solution of direct data access can incur an order of magnitude performance penalty for data-intensive workloads. Adding data-awareness to batch schedulers allows a careful coordination of data and CPU allocation thereby reducing the cost of remote execution. We offer here new techniques by which batch schedulers can become data-driven. Such systems can use our analytical predictive models to select one of the four data-driven scheduling policies that we have created. Through simulation, we demonstrate the accuracy of our predictive models and show how they can reduce time to completion for some workloads by as much as 80%.

  7. Resilience or hope? Incremental and convergent validity of the resilience scale for adults (RSA and the Herth hope scale (HHS in the prediction of anxiety and depression

    Directory of Open Access Journals (Sweden)

    Roxanna Morote

    2017-10-01

    Full Text Available Abstract Background Hope and resilience protect against inner vulnerabilities or harsh life circumstances; they explain individual differences in physical or mental health outcomes under high stress. They have been studied in complementary or competing theoretical frameworks; therefore, the study of measures of hope and resilience should be undertaken prior to explore if they are truly value-added for research. This study investigates the convergent and incremental validity of the Resilience Scale for Adults (RSA and the Herth Hope Scale (HHS, in the prediction of anxiety and depression (HSCL-25. Methods Participants in this community-based sample are 762 adults from 18 to 74 years old. They answered the RSA, HHS, Spanish Language Stressful Life-Events Checklist (SL-SLE, and the Hopkins Symptom Checklist-25 (HSCL-25. Incremental validity analyses combined hierarchical regression and structural equation models (SEM. First, hierarchical regression models were compared based on three criteria (R 2 Diff., ΔF, and semi-partial r, then the direct effect of resilience on affective symptoms was compared with the mediated effect of resilience on affective symptoms through hope. Results The hierarchical models showed that (1 hope and resilience account significantly for the variance of affective symptoms above age, sex, and life-stress; (2 Resilience Total score has greater incremental validity than positive scales of HHS Hope; and (3 RSA Total score, HHS Optimism/Spiritual support, Stressful life-events and sex are unique predictors of affective symptoms. The SEM analyses verified a stronger direct effect of resilience in the prediction of affective symptoms above the significant partial mediated effect of resilience through hope. Additionally, results show that age and better educational opportunities were associated with protection (i.e. resilience and hope and emotional well-being (i.e. affective symptoms and hopelessness. Women showed higher scores

  8. Resilience or hope? Incremental and convergent validity of the resilience scale for adults (RSA) and the Herth hope scale (HHS) in the prediction of anxiety and depression.

    Science.gov (United States)

    Morote, Roxanna; Hjemdal, Odin; Krysinska, Karolina; Martinez Uribe, Patricia; Corveleyn, Jozef

    2017-10-27

    Hope and resilience protect against inner vulnerabilities or harsh life circumstances; they explain individual differences in physical or mental health outcomes under high stress. They have been studied in complementary or competing theoretical frameworks; therefore, the study of measures of hope and resilience should be undertaken prior to explore if they are truly value-added for research. This study investigates the convergent and incremental validity of the Resilience Scale for Adults (RSA) and the Herth Hope Scale (HHS), in the prediction of anxiety and depression (HSCL-25). Participants in this community-based sample are 762 adults from 18 to 74 years old. They answered the RSA, HHS, Spanish Language Stressful Life-Events Checklist (SL-SLE), and the Hopkins Symptom Checklist-25 (HSCL-25). Incremental validity analyses combined hierarchical regression and structural equation models (SEM). First, hierarchical regression models were compared based on three criteria (R 2 Diff., ΔF, and semi-partial r), then the direct effect of resilience on affective symptoms was compared with the mediated effect of resilience on affective symptoms through hope. The hierarchical models showed that (1) hope and resilience account significantly for the variance of affective symptoms above age, sex, and life-stress; (2) Resilience Total score has greater incremental validity than positive scales of HHS Hope; and (3) RSA Total score, HHS Optimism/Spiritual support, Stressful life-events and sex are unique predictors of affective symptoms. The SEM analyses verified a stronger direct effect of resilience in the prediction of affective symptoms above the significant partial mediated effect of resilience through hope. Additionally, results show that age and better educational opportunities were associated with protection (i.e. resilience and hope) and emotional well-being (i.e. affective symptoms and hopelessness). Women showed higher scores in social competences and resources (RSA

  9. Three Year RSA Evaluation of Vitamin E Diffused Highly Cross-linked Polyethylene Liners and Cup Stability.

    Science.gov (United States)

    Sillesen, Nanna H; Greene, Meridith E; Nebergall, Audrey K; Nielsen, Poul T; Laursen, Mogens B; Troelsen, Anders; Malchau, Henrik

    2015-07-01

    Vitamin E diffusion into highly cross-linked polyethylene (E-XLPE) is a method for enhancing oxidative stability of acetabular liners. The purpose of this study was to evaluate in vivo penetration of E-XLPE using radiostereometric analysis (RSA). Eighty-four hips were recruited into a prospective 10-year RSA. This is the first evaluation of the multicenter cohort after 3-years. All patients received E-XLPE liners (E1, Biomet) and porous-titanium coated cups (Regenerex, Biomet). There was no difference (P=0.450) in median femoral head penetration into the E-XLPE liners at 3-years comparing cobalt-chrome heads (-0.028mm; inter-quartile range (IQR) - 0.065 to 0.047) with ceramic heads (-0.043mm, IQR - 0.143to0.042). The 3-year follow-up indicates minimal E-XLPE liner penetration regardless of head material and minimal early cup movement. Copyright © 2015 Elsevier Inc. All rights reserved.

  10. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  11. Effect of ADA1 mother-fetus and wife-husband phenotypic differences on the ratio birth weight/placental weight in fertile women and on reproductive success in couples with RSA.

    Science.gov (United States)

    Gloria-Bottini, Fulvia; Nicotra, Maria; Amante, Ada; Ambrosi, Sara; Cozzoli, Eliana; Saccucci, Patrizia; Bottini, Egidio; Magrini, Andrea

    2012-01-01

    To study the effect Adenosine Deaminase locus 1 (ADA(1)) mother-fetus and wife-husband phenotypic differences on the ratio Birth Weight/Placental Weight (BW/PW) in fertile women and on reproductive success in couples with repeated spontaneous abortion (RSA). 209 couples with primary RSA and a consecutive series of 379 healthy puerperae with their newborn infants from the White Caucasian population of central Italy were studied. In primary RSA women reproductive success was indicated by the presence of at least one live-born infant within 5 years of follow up. Two way contingency tables were analyzed by chi-square. The proportion of primary RSA couples with at least a live-born infant shows the highest value in couples mother ADA(1)1/father carrier of ADA(1)*2 allele (55.2%) and the lowest value in reciprocal couples mother carrier of ADA(1)*2 allele /father ADA(1)1 (18.7%) (O.R. = 5.33; P = 0.023). The highest ratio BW/PW is observed in the class mother ADA(1)1/newborn carrier of ADA(1)*2 allele while the lowest ratio is observed in the reciprocal class mother carrier of ADA(1)*2 allele/ newborn ADA(1)1. Differences between mother and fetus in ADA(1) phenotype may influence the ratio BW/PW in healthy women and reproductive success in RSA women. Copyright © 2012 Wiley Periodicals, Inc.

  12. Kinetic study of batch and fed-batch enzymatic saccharification of pretreated substrate and subsequent fermentation to ethanol

    Directory of Open Access Journals (Sweden)

    Gupta Rishi

    2012-03-01

    Full Text Available Abstract Background Enzymatic hydrolysis, the rate limiting step in the process development for biofuel, is always hampered by its low sugar concentration. High solid enzymatic saccharification could solve this problem but has several other drawbacks such as low rate of reaction. In the present study we have attempted to enhance the concentration of sugars in enzymatic hydrolysate of delignified Prosopis juliflora, using a fed-batch enzymatic hydrolysis approach. Results The enzymatic hydrolysis was carried out at elevated solid loading up to 20% (w/v and a comparison kinetics of batch and fed-batch enzymatic hydrolysis was carried out using kinetic regimes. Under batch mode, the actual sugar concentration values at 20% initial substrate consistency were found deviated from the predicted values and the maximum sugar concentration obtained was 80.78 g/L. Fed-batch strategy was implemented to enhance the final sugar concentration to 127 g/L. The batch and fed-batch enzymatic hydrolysates were fermented with Saccharomyces cerevisiae and ethanol production of 34.78 g/L and 52.83 g/L, respectively, were achieved. Furthermore, model simulations showed that higher insoluble solids in the feed resulted in both smaller reactor volume and shorter residence time. Conclusion Fed-batch enzymatic hydrolysis is an efficient procedure for enhancing the sugar concentration in the hydrolysate. Restricting the process to suitable kinetic regimes could result in higher conversion rates.

  13. Kinetic study of batch and fed-batch enzymatic saccharification of pretreated substrate and subsequent fermentation to ethanol

    Science.gov (United States)

    2012-01-01

    Background Enzymatic hydrolysis, the rate limiting step in the process development for biofuel, is always hampered by its low sugar concentration. High solid enzymatic saccharification could solve this problem but has several other drawbacks such as low rate of reaction. In the present study we have attempted to enhance the concentration of sugars in enzymatic hydrolysate of delignified Prosopis juliflora, using a fed-batch enzymatic hydrolysis approach. Results The enzymatic hydrolysis was carried out at elevated solid loading up to 20% (w/v) and a comparison kinetics of batch and fed-batch enzymatic hydrolysis was carried out using kinetic regimes. Under batch mode, the actual sugar concentration values at 20% initial substrate consistency were found deviated from the predicted values and the maximum sugar concentration obtained was 80.78 g/L. Fed-batch strategy was implemented to enhance the final sugar concentration to 127 g/L. The batch and fed-batch enzymatic hydrolysates were fermented with Saccharomyces cerevisiae and ethanol production of 34.78 g/L and 52.83 g/L, respectively, were achieved. Furthermore, model simulations showed that higher insoluble solids in the feed resulted in both smaller reactor volume and shorter residence time. Conclusion Fed-batch enzymatic hydrolysis is an efficient procedure for enhancing the sugar concentration in the hydrolysate. Restricting the process to suitable kinetic regimes could result in higher conversion rates. PMID:22433563

  14. BATCH-GE: Batch analysis of Next-Generation Sequencing data for genome editing assessment

    Science.gov (United States)

    Boel, Annekatrien; Steyaert, Woutert; De Rocker, Nina; Menten, Björn; Callewaert, Bert; De Paepe, Anne; Coucke, Paul; Willaert, Andy

    2016-01-01

    Targeted mutagenesis by the CRISPR/Cas9 system is currently revolutionizing genetics. The ease of this technique has enabled genome engineering in-vitro and in a range of model organisms and has pushed experimental dimensions to unprecedented proportions. Due to its tremendous progress in terms of speed, read length, throughput and cost, Next-Generation Sequencing (NGS) has been increasingly used for the analysis of CRISPR/Cas9 genome editing experiments. However, the current tools for genome editing assessment lack flexibility and fall short in the analysis of large amounts of NGS data. Therefore, we designed BATCH-GE, an easy-to-use bioinformatics tool for batch analysis of NGS-generated genome editing data, available from https://github.com/WouterSteyaert/BATCH-GE.git. BATCH-GE detects and reports indel mutations and other precise genome editing events and calculates the corresponding mutagenesis efficiencies for a large number of samples in parallel. Furthermore, this new tool provides flexibility by allowing the user to adapt a number of input variables. The performance of BATCH-GE was evaluated in two genome editing experiments, aiming to generate knock-out and knock-in zebrafish mutants. This tool will not only contribute to the evaluation of CRISPR/Cas9-based experiments, but will be of use in any genome editing experiment and has the ability to analyze data from every organism with a sequenced genome. PMID:27461955

  15. Medication waste reduction in pediatric pharmacy batch processes.

    Science.gov (United States)

    Toerper, Matthew F; Veltri, Michael A; Hamrock, Eric; Mollenkopf, Nicole L; Holt, Kristen; Levin, Scott

    2014-04-01

    To inform pediatric cart-fill batch scheduling for reductions in pharmaceutical waste using a case study and simulation analysis. A pre and post intervention and simulation analysis was conducted during 3 months at a 205-bed children's center. An algorithm was developed to detect wasted medication based on time-stamped computerized provider order entry information. The algorithm was used to quantify pharmaceutical waste and associated costs for both preintervention (1 batch per day) and postintervention (3 batches per day) schedules. Further, simulation was used to systematically test 108 batch schedules outlining general characteristics that have an impact on the likelihood for waste. Switching from a 1-batch-per-day to a 3-batch-per-day schedule resulted in a 31.3% decrease in pharmaceutical waste (28.7% to 19.7%) and annual cost savings of $183,380. Simulation results demonstrate how increasing batch frequency facilitates a more just-in-time process that reduces waste. The most substantial gains are realized by shifting from a schedule of 1 batch per day to at least 2 batches per day. The simulation exhibits how waste reduction is also achievable by avoiding batch preparation during daily time periods where medication administration or medication discontinuations are frequent. Last, the simulation was used to show how reducing batch preparation time per batch provides some, albeit minimal, opportunity to decrease waste. The case study and simulation analysis demonstrate characteristics of batch scheduling that may support pediatric pharmacy managers in redesign toward minimizing pharmaceutical waste.

  16. Batch-to-batch quality consistency evaluation of botanical drug products using multivariate statistical analysis of the chromatographic fingerprint.

    Science.gov (United States)

    Xiong, Haoshu; Yu, Lawrence X; Qu, Haibin

    2013-06-01

    Botanical drug products have batch-to-batch quality variability due to botanical raw materials and the current manufacturing process. The rational evaluation and control of product quality consistency are essential to ensure the efficacy and safety. Chromatographic fingerprinting is an important and widely used tool to characterize the chemical composition of botanical drug products. Multivariate statistical analysis has showed its efficacy and applicability in the quality evaluation of many kinds of industrial products. In this paper, the combined use of multivariate statistical analysis and chromatographic fingerprinting is presented here to evaluate batch-to-batch quality consistency of botanical drug products. A typical botanical drug product in China, Shenmai injection, was selected as the example to demonstrate the feasibility of this approach. The high-performance liquid chromatographic fingerprint data of historical batches were collected from a traditional Chinese medicine manufacturing factory. Characteristic peaks were weighted by their variability among production batches. A principal component analysis model was established after outliers were modified or removed. Multivariate (Hotelling T(2) and DModX) control charts were finally successfully applied to evaluate the quality consistency. The results suggest useful applications for a combination of multivariate statistical analysis with chromatographic fingerprinting in batch-to-batch quality consistency evaluation for the manufacture of botanical drug products.

  17. Cadmium removal using Cladophora in batch, semi-batch and flow reactors.

    Science.gov (United States)

    Sternberg, Steven P K; Dorn, Ryan W

    2002-02-01

    This study presents the results of using viable algae to remove cadmium from a synthetic wastewater. In batch and semi-batch tests, a local strain of Cladophora algae removed 80-94% of the cadmium introduced. The flow experiments that followed were conducted using non-local Cladophora parriaudii. Results showed that the alga removed only 12.7(+/-6.4)% of the cadmium introduced into the reactor. Limited removal was the result of insufficient algal quantities and poor contact between the algae and cadmium solution.

  18. Kubernetes as a batch scheduler

    OpenAIRE

    Souza, Clenimar; Brito Da Rocha, Ricardo

    2017-01-01

    This project aims at executing a CERN batch use case using Kubernetes, in order to figure out what are the advantages and disadvantages, as well as the functionality that can be replicated or is missing. The reference for the batch system is the CERN Batch System, which uses HTCondor. Another goal of this project is to evaluate the current status of federated resources in Kubernetes, in comparison to the single-cluster API resources. Finally, the last goal of this project is to implement buil...

  19. Absence of a Tourniquet Does Not Affect Fixation of Cemented TKA: A Randomized RSA Study of 70 Patients.

    Science.gov (United States)

    Ejaz, Ashir; Laursen, Anders C; Jakobsen, Thomas; Rasmussen, Sten; Nielsen, Poul Torben; Laursen, Mogens B

    2015-12-01

    We aimed to determine whether not using a tourniquet in cemented TKA would affect migration of the tibial component measured by radiosterometric analysis (RSA). Seventy patients were randomized into a tourniquet group and a non-tourniquet group and using model-based RSA, the migration of the tibial component was analyzed. Primary and secondary outcome measures were maximum total point motion (MTPM) and translations and rotations. Follow-up period was 2 years. The tibial component was well fixated in both groups and no significant difference in migration between the two groups was detected (P=0.632). Mean MTPM (SD) was 0.47 mm (0.16) in the tourniquet group and 0.45 mm (0.21) in the non-tourniquet group. Absence of tourniquet indicates that stable fixation of the tibial component can be achieved in cemented TKA. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. BatchJS: Implementing Batches in JavaScript

    NARCIS (Netherlands)

    D. Kasemier

    2014-01-01

    htmlabstractNone of our popular programming languages know how to handle distribution well. Yet our programs interact more and more with each other and our data resorts in databases and web services. Batches are a new addition to languages that can finally bring native support for distribution to

  1. Batch-to-batch uniformity of bacterial community succession and flavor formation in the fermentation of Zhenjiang aromatic vinegar.

    Science.gov (United States)

    Wang, Zong-Min; Lu, Zhen-Ming; Yu, Yong-Jian; Li, Guo-Quan; Shi, Jin-Song; Xu, Zheng-Hong

    2015-09-01

    Solid-state fermentation of traditional Chinese vinegar is a mixed-culture refreshment process that proceeds for many centuries without spoilage. Here, we investigated bacterial community succession and flavor formation in three batches of Zhenjiang aromatic vinegar using pyrosequencing and metabolomics approaches. Temporal patterns of bacterial succession in the Pei (solid-state vinegar culture) showed no significant difference (P > 0.05) among three batches of fermentation. In all the batches investigated, the average number of community operational taxonomic units (OTUs) decreased dramatically from 119 ± 11 on day 1 to 48 ± 16 on day 3, and then maintained in the range of 61 ± 9 from day 5 to the end of fermentation. We confirmed that, within a batch of fermentation process, the patterns of bacterial diversity between the starter (took from the last batch of vinegar culture on day 7) and the Pei on day 7 were similar (90%). The relative abundance dynamics of two dominant members, Lactobacillus and Acetobacter, showed high correlation (coefficient as 0.90 and 0.98 respectively) among different batches. Furthermore, statistical analysis revealed dynamics of 16 main flavor metabolites were stable among different batches. The findings validate the batch-to-batch uniformity of bacterial community succession and flavor formation accounts for the quality of Zhenjiang aromatic vinegar. Based on our understanding, this is the first study helps to explain the rationality of age-old artistry from a scientific perspective. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. Production of ethanol in batch and fed-batch fermentation of soluble sugar

    International Nuclear Information System (INIS)

    Chaudhary, M.Y.; Shah, M.A.; Shah, F.H.

    1991-01-01

    Keeping in view of the demand and need for alternate energy source, especially liquid fuels and the availability of raw materials in Pakistan, we have carried out biochemical and technological studies for ethanol through fermentation of renewable substrates. Molasses and sugar cane have been used as substrate for yeast fermentation. Selected yeast were used in both batch and semi continuous fermentation of molasses. Clarified dilute molasses were fermented with different strains of Saccharomyces cerevisiae. Ethanol concentration after 64 hours batch fermentation reached 9.4% with 90% yield based on sugar content. During feed batch system similar results were obtained after a fermentation cycle of 48 hours resulting in higher productivity. Similarly carbohydrates in fruit juices and hydro lysates of biomass can be economically fermented to ethanol to be used as feed stock for other chemicals. (author)

  3. GUI implementation of image encryption and decryption using Open CV-Python script on secured TFTP protocol

    Science.gov (United States)

    Reddy, K. Rasool; Rao, Ch. Madhava

    2018-04-01

    Currently safety is one of the primary concerns in the transmission of images due to increasing the use of images within the industrial applications. So it's necessary to secure the image facts from unauthorized individuals. There are various strategies are investigated to secure the facts. In that encryption is certainly one of maximum distinguished method. This paper gives a sophisticated Rijndael (AES) algorithm to shield the facts from unauthorized humans. Here Exponential Key Change (EKE) concept is also introduced to exchange the key between client and server. The things are exchange in a network among client and server through a simple protocol is known as Trivial File Transfer Protocol (TFTP). This protocol is used mainly in embedded servers to transfer the data and also provide protection to the data if protection capabilities are integrated. In this paper, implementing a GUI environment for image encryption and decryption. All these experiments carried out on Linux environment the usage of Open CV-Python script.

  4. Batch-batch stable microbial community in the traditional fermentation process of huyumei broad bean pastes.

    Science.gov (United States)

    Zhu, Linjiang; Fan, Zihao; Kuai, Hui; Li, Qi

    2017-09-01

    During natural fermentation processes, a characteristic microbial community structure (MCS) is naturally formed, and it is interesting to know about its batch-batch stability. This issue was explored in a traditional semi-solid-state fermentation process of huyumei, a Chinese broad bean paste product. The results showed that this MCS mainly contained four aerobic Bacillus species (8 log CFU per g), including B. subtilis, B. amyloliquefaciens, B. methylotrophicus, and B. tequilensis, and the facultative anaerobe B. cereus with a low concentration (4 log CFU per g), besides a very small amount of the yeast Zygosaccharomyces rouxii (2 log CFU per g). The dynamic change of the MCS in the brine fermentation process showed that the abundance of dominant species varied within a small range, and in the beginning of process the growth of lactic acid bacteria was inhibited and Staphylococcus spp. lost its viability. Also, the MCS and its dynamic change were proved to be highly reproducible among seven batches of fermentation. Therefore, the MCS naturally and stably forms between different batches of the traditional semi-solid-state fermentation of huyumei. Revealing microbial community structure and its batch-batch stability is helpful for understanding the mechanisms of community formation and flavour production in a traditional fermentation. This issue in a traditional semi-solid-state fermentation of huyumei broad bean paste was firstly explored. This fermentation process was revealed to be dominated by a high concentration of four aerobic species of Bacillus, a low concentration of B. cereus and a small amount of Zygosaccharomyces rouxii. Lactic acid bacteria and Staphylococcus spp. lost its viability at the beginning of fermentation. Such the community structure was proved to be highly reproducible among seven batches. © 2017 The Society for Applied Microbiology.

  5. Design Optimization of A PCHE Using RSA Model

    International Nuclear Information System (INIS)

    Lee, Sang Moon; Kim, Kwang Yong

    2011-01-01

    Nuclear power generation based on gas turbine cycle is recently considered as a nuclear power generation concept for the future due to the advantages in terms of simplicity and efficiency in comparison with steam turbine cycle. However, durability of each component of this cycle should be guaranteed due to high temperature and high pressure environment. In addition, since gas is used as working fluid, inefficiency due to the large volume is inevitable in the case that a heat exchanger is used as a recuperator and pre-cooler. In this respect, as the alternative type of heat exchanger, printed circuit heat exchanger (PCHE) developed by HEATRIC, which has excellent heat transfer performance, is the heat exchanger suitable for the high temperature gas cooled reactors. In this work, PCHE channels have been optimized to enhance heat transfer and friction performances using three-dimensional Reynolds-Averaged Navier-Stokes (RANS) analysis and response surface approximation (RSA)

  6. Multi-objective optimization of glycopeptide antibiotic production in batch and fed batch processes

    DEFF Research Database (Denmark)

    Maiti, Soumen K.; Eliasson Lantz, Anna; Bhushan, Mani

    2011-01-01

    batch operations using process model for Amycolatopsis balhimycina, a glycopeptide antibiotic producer. This resulted in a set of several pareto optimal solutions with the two objectives ranging from (0.75gl−1, 3.97g$-1) to (0.44gl−1, 5.19g$-1) for batch and from (1.5gl−1, 5.46g$-1) to (1.1gl−1, 6.34g...

  7. Security for decentralized health information systems.

    Science.gov (United States)

    Bleumer, G

    1994-02-01

    Health care information systems must reflect at least two basic characteristics of the health care community: the increasing mobility of patients and the personal liability of everyone giving medical treatment. Open distributed information systems bear the potential to reflect these requirements. But the market for open information systems and operating systems hardly provides secure products today. This 'missing link' is approached by the prototype SECURE Talk that provides secure transmission and archiving of files on top of an existing operating system. Its services may be utilized by existing medical applications. SECURE Talk demonstrates secure communication utilizing only standard hardware. Its message is that cryptography (and in particular asymmetric cryptography) is practical for many medical applications even if implemented in software. All mechanisms are software implemented in order to be executable on standard-hardware. One can investigate more or less decentralized forms of public key management and the performance of many different cryptographic mechanisms. That of, e.g. hybrid encryption and decryption (RSA+DES-PCBC) is about 300 kbit/s. That of signing and verifying is approximately the same using RSA with a DES hash function. The internal speed, without disk accesses etc., is about 1.1 Mbit/s. (Apple Quadra 950 (MC 68040, 33 MHz, RAM: 20 MB, 80 ns. Length of RSA modulus is 512 bit).

  8. Design of two-column batch-to-batch recirculation to enhance performance in ion-exchange chromatography.

    Science.gov (United States)

    Persson, Oliver; Andersson, Niklas; Nilsson, Bernt

    2018-01-05

    Preparative liquid chromatography is a separation technique widely used in the manufacturing of fine chemicals and pharmaceuticals. A major drawback of traditional single-column batch chromatography step is the trade-off between product purity and process performance. Recirculation of impure product can be utilized to make the trade-off more favorable. The aim of the present study was to investigate the usage of a two-column batch-to-batch recirculation process step to increase the performance compared to single-column batch chromatography at a high purity requirement. The separation of a ternary protein mixture on ion-exchange chromatography columns was used to evaluate the proposed process. The investigation used modelling and simulation of the process step, experimental validation and optimization of the simulated process. In the presented case the yield increases from 45.4% to 93.6% and the productivity increases 3.4 times compared to the performance of a batch run for a nominal case. A rapid concentration build-up product can be seen during the first cycles, before the process reaches a cyclic steady-state with reoccurring concentration profiles. The optimization of the simulation model predicts that the recirculated salt can be used as a flying start of the elution, which would enhance the process performance. The proposed process is more complex than a batch process, but may improve the separation performance, especially while operating at cyclic steady-state. The recirculation of impure fractions reduces the product losses and ensures separation of product to a high degree of purity. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. 7 CFR 58.728 - Cooking the batch.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Cooking the batch. 58.728 Section 58.728 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards... Procedures § 58.728 Cooking the batch. Each batch of cheese within the cooker, including the optional...

  10. NGBAuth - Next Generation Batch Authentication for long running batch jobs.

    CERN Document Server

    Juto, Zakarias

    2015-01-01

    This document describes the prototyping of a new solution for the CERN batch authentication of long running jobs. While the job submission requires valid user credentials, these have to be renewed due to long queuing and execution times. Described within is a new system which will guarantee a similar level of security as the old LSFAuth while simplifying the implementation and the overall architecture. The new system is being built on solid, streamlined and tested components (notably OpenSSL) and a priority has been to make it more generic in order to facilitate the evolution of the current system such as for the expected migration from LSF to Condor as backend batch system.

  11. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  12. NDA BATCH 2002-02

    Energy Technology Data Exchange (ETDEWEB)

    Lawrence Livermore National Laboratory

    2009-12-09

    QC sample results (daily background checks, 20-gram and 100-gram SGS drum checks) were within acceptable criteria established by WIPP's Quality Assurance Objectives for TRU Waste Characterization. Replicate runs were performed on 5 drums with IDs LL85101099TRU, LL85801147TRU, LL85801109TRU, LL85300999TRU and LL85500979TRU. All replicate measurement results are identical at the 95% confidence level as established by WIPP criteria. Note that the batch covered 5 weeks of SGS measurements from 23-Jan-2002 through 22-Feb-2002. Data packet for SGS Batch 2002-02 generated using gamma spectroscopy with the Pu Facility SGS unit is technically reasonable. All QC samples are in compliance with established control limits. The batch data packet has been reviewed for correctness, completeness, consistency and compliance with WIPP's Quality Assurance Objectives and determined to be acceptable. An Expert Review was performed on the data packet between 28-Feb-02 and 09-Jul-02 to check for potential U-235, Np-237 and Am-241 interferences and address drum cases where specific scan segments showed Se gamma ray transmissions for the 136-keV gamma to be below 0.1 %. Two drums in the batch showed Pu-238 at a relative mass ratio more than 2% of all the Pu isotopes.

  13. Bioprocess iterative batch-to-batch optimization based on hybrid parametric/nonparametric models.

    Science.gov (United States)

    Teixeira, Ana P; Clemente, João J; Cunha, António E; Carrondo, Manuel J T; Oliveira, Rui

    2006-01-01

    This paper presents a novel method for iterative batch-to-batch dynamic optimization of bioprocesses. The relationship between process performance and control inputs is established by means of hybrid grey-box models combining parametric and nonparametric structures. The bioreactor dynamics are defined by material balance equations, whereas the cell population subsystem is represented by an adjustable mixture of nonparametric and parametric models. Thus optimizations are possible without detailed mechanistic knowledge concerning the biological system. A clustering technique is used to supervise the reliability of the nonparametric subsystem during the optimization. Whenever the nonparametric outputs are unreliable, the objective function is penalized. The technique was evaluated with three simulation case studies. The overall results suggest that the convergence to the optimal process performance may be achieved after a small number of batches. The model unreliability risk constraint along with sampling scheduling are crucial to minimize the experimental effort required to attain a given process performance. In general terms, it may be concluded that the proposed method broadens the application of the hybrid parametric/nonparametric modeling technique to "newer" processes with higher potential for optimization.

  14. Glucoamylase production in batch, chemostat and fed-batch cultivations by an industrial strain of Aspergillus niger

    DEFF Research Database (Denmark)

    Pedersen, Henrik; Beyer, Michael; Nielsen, Jens

    2000-01-01

    The Aspergillus niger strain BO-1 was grown in batch, continuous (chemostat) and fed-batch cultivations in order to study the production of the extracellular enzyme glucoamylase under different growth conditions. In the pH range 2.5-6.0, the specific glucoamylase productivity and the specific...

  15. Fixed versus mixed RSA: Explaining visual representations by fixed and mixed feature sets from shallow and deep computational models.

    Science.gov (United States)

    Khaligh-Razavi, Seyed-Mahdi; Henriksson, Linda; Kay, Kendrick; Kriegeskorte, Nikolaus

    2017-02-01

    Studies of the primate visual system have begun to test a wide range of complex computational object-vision models. Realistic models have many parameters, which in practice cannot be fitted using the limited amounts of brain-activity data typically available. Task performance optimization (e.g. using backpropagation to train neural networks) provides major constraints for fitting parameters and discovering nonlinear representational features appropriate for the task (e.g. object classification). Model representations can be compared to brain representations in terms of the representational dissimilarities they predict for an image set. This method, called representational similarity analysis (RSA), enables us to test the representational feature space as is (fixed RSA) or to fit a linear transformation that mixes the nonlinear model features so as to best explain a cortical area's representational space (mixed RSA). Like voxel/population-receptive-field modelling, mixed RSA uses a training set (different stimuli) to fit one weight per model feature and response channel (voxels here), so as to best predict the response profile across images for each response channel. We analysed response patterns elicited by natural images, which were measured with functional magnetic resonance imaging (fMRI). We found that early visual areas were best accounted for by shallow models, such as a Gabor wavelet pyramid (GWP). The GWP model performed similarly with and without mixing, suggesting that the original features already approximated the representational space, obviating the need for mixing. However, a higher ventral-stream visual representation (lateral occipital region) was best explained by the higher layers of a deep convolutional network and mixing of its feature set was essential for this model to explain the representation. We suspect that mixing was essential because the convolutional network had been trained to discriminate a set of 1000 categories, whose frequencies

  16. Improvement in the clinical practicability of roentgen stereophotogrammetric analysis (RSA): free from the use of the dual X-ray equipment.

    Science.gov (United States)

    Shih, Kao-Shang; Lee, Chian-Her; Syu, Ci-Bin; Lai, Jiing-Yih; Chen, Kuo-Jen; Lin, Shang-Chih

    2012-10-01

    After total knee replacement, the monitoring of the prosthetic performance is often done by roentgenographic examination. However, the two-dimensional (2D) roentgen images only provide information about the projection onto the anteroposterior (AP) and mediolateral (ML) planes. Historically, the model-based roentgen stereophotogrammetric analysis (RSA) technique has been developed to predict the spatial relationship between prostheses by iteratively comparing the projective data for the prosthetic models and the roentgen images. During examination, the prosthetic poses should be stationary. This should be ensured, either by the use of dual synchronized X-ray equipment or by the use of a specific posture. In practice, these methods are uncommon or technically inconvenient during follow-up examination. This study aims to develop a rotation platform to improve the clinical applicability of the model-based RSA technique. The rotation platform allows the patient to assume a weight-bearing posture, while being steadily rotated so that both AP and ML knee images can be obtained. This study uses X-ray equipment with a single source and flat panel detectors (FPDs). Four tests are conducted to evaluate the quality of the FPD images, steadiness of the rotation platform, and accuracy of the RSA results. The results show that the distortion-induced error of the FPD image is quite minor, and the prosthetic size can be cautiously calibrated by means of the scale ball(s). The rotation platform should be placed closer to the FPD and orthogonal to the projection axis of the X-ray source. Image overlap of the prostheses can be avoided by adjusting both X-ray source and knee posture. The device-induced problems associated with the rotation platform include the steadiness of the platform operation and the balance of the rotated subject. Sawbone tests demonstrate that the outline error, due to the platform, is of the order of the image resolution (= 0.145 mm). In conclusion, the rotation

  17. CONVERSION OF PINEAPPLE JUICE WASTE INTO LACTIC ACID IN BATCH AND FED – BATCH FERMENTATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Abdullah Mochamad Busairi

    2012-01-01

    Full Text Available Pineapple juice waste contains valuable components, which are mainly sucrose, glucose, and fructose. Recently, lactic acid has been considered to be an important raw material for the production of biodegradable lactide polymer. The fermentation experiments were carried out in a 3 litres fermentor (Biostat B Model under anaerobic condition with stirring speed of 50 rpm, temperature at 40oC, and pH of 6.00. Effect of feed concentration on lactic acid production, bacterial growth, substrate utilisation and productivity was studied. The results obtained from fed- batch culture fermentation showed that the maximum lactic acid productivity was 0.44 g/L.h for feed concentration of 90 g/L at 48 hours. Whereas the lactic acid productivity obtained from fed-batch culture was twice and half fold higher than that of batch culture productivity.  Buangan jus nanas mengandung komponen yang berharga terutama sukrosa, glukosa, dan fruktosa. Asam laktat adalah bahan baku yang terbaru dan penting untuk dibuat sebagai polimer laktat yang dapat terdegradasi oleh lingkungan. Percobaan dilakukan pada fermentor 3 liter (Model Biostat B di bawah kondisi anaerob dengan kecepatan pengadukan 50 rpm, temperatur 40oC, dan pH 6,00. Pengaruh konsentrasi umpan terhadap produksi asam laktat, pertumbuhan mikroba, pengggunaan substrat dan produktivitas telah dipelajari. Hasil yang didapatkan pada fermentasi dengan menggunakan sistem fed-batch menunjukkan bahwa produktivitas asam laktat maksimum adalah 0.44 g/L,jam dengan konsentrasi umpan, 90 g/L pada waktu 48 jam. Bahkan produktivitas asam laktat yang didapat pada kultur fed-batch lebih tinggi 2,5 kali dari pada proses menggunakan sistem batch

  18. Passing in Command Line Arguments and Parallel Cluster/Multicore Batching in R with batch.

    Science.gov (United States)

    Hoffmann, Thomas J

    2011-03-01

    It is often useful to rerun a command line R script with some slight change in the parameters used to run it - a new set of parameters for a simulation, a different dataset to process, etc. The R package batch provides a means to pass in multiple command line options, including vectors of values in the usual R format, easily into R. The same script can be setup to run things in parallel via different command line arguments. The R package batch also provides a means to simplify this parallel batching by allowing one to use R and an R-like syntax for arguments to spread a script across a cluster or local multicore/multiprocessor computer, with automated syntax for several popular cluster types. Finally it provides a means to aggregate the results together of multiple processes run on a cluster.

  19. On-line Scheduling Of Multi-Server Batch Operations

    NARCIS (Netherlands)

    van der Zee, D.J.; van Harten, A.; Schuur, P.C.

    1999-01-01

    Batching jobs in a manufacturing system is a very common policy in most industries. Main reasons for batching are avoidance of setups and/or facilitation of material handling. Good examples of batch-wise production systems are ovens found in aircraft industry and in semiconductor manufacturing.

  20. [Batch release of immunoglobulin and monoclonal antibody products].

    Science.gov (United States)

    Gross, S

    2014-10-01

    The Paul-Ehrlich Institute (PEI) is an independent institution of the Federal Republic of Germany responsible for performing official experimental batch testing of sera. The institute decides about the release of each batch and performs experimental research in the field. The experimental quality control ensures the potency of the product and also the absence of harmful impurities. For release of an immunoglobulin batch the marketing authorization holder has to submit the documentation of the manufacture and the results of quality control measures together with samples of the batch to the PEI. Experimental testing is performed according to the approved specifications regarding the efficacy and safety. Since implementation of the 15th German drug law amendment, the source of antibody is not defined anymore. According to § 32 German drug law, all batches of sera need to be released by an official control laboratory. Sera are medicinal products, which contain antibodies, antibody fragments or fusion proteins with a functional antibody portion. Therefore, all batches of monoclonal antibodies and derivatives must also be released by the PEI and the marketing authorization holder has to submit a batch release application. Under certain circumstances a waiver for certain products can be issued with regard to batch release. The conditions for such a waiver apply to the majority of monoclonal antibodies.

  1. LSF usage for batch at CERN

    CERN Multimedia

    Schwickerath, Ulrich

    2007-01-01

    Contributed poster to the CHEP07. Original abstract: LSF 7, the latest version of Platform's batch workload management system, addresses many issues which limited the ability of LSF 6.1 to support large scale batch farms, such as the lxbatch service at CERN. In this paper we will present the status of the evaluation and deployment of LSF 7 at CERN, including issues concerning the integration of LSF 7 with the gLite grid middleware suite and, in particular, the steps taken to endure an efficient reporting of the local batch system status and usage to the Grid Information System

  2. Family based dispatching with batch availability

    NARCIS (Netherlands)

    van der Zee, D.J.

    2013-01-01

    Family based dispatching rules seek to lower set-up frequencies by grouping (batching) similar types of jobs for joint processing. Hence shop flow times may be improved, as less time is spent on set-ups. Motivated by an industrial project we study the control of machines with batch availability,

  3. On-line scheduling of multi-server batch operations

    NARCIS (Netherlands)

    Zee, Durk Jouke van der; Harten, Aart van; Schuur, Peter

    The batching of jobs in a manufacturing system is a very common policy in many industries. The main reasons for batching are the avoidance of setups and/or facilitation of material handling. Good examples of batch-wise production systems are the ovens that are found in the aircraft industry and in

  4. Batching System for Superior Service

    Science.gov (United States)

    2001-01-01

    Veridian's Portable Batch System (PBS) was the recipient of the 1997 NASA Space Act Award for outstanding software. A batch system is a set of processes for managing queues and jobs. Without a batch system, it is difficult to manage the workload of a computer system. By bundling the enterprise's computing resources, the PBS technology offers users a single coherent interface, resulting in efficient management of the batch services. Users choose which information to package into "containers" for system-wide use. PBS also provides detailed system usage data, a procedure not easily executed without this software. PBS operates on networked, multi-platform UNIX environments. Veridian's new version, PBS Pro,TM has additional features and enhancements, including support for additional operating systems. Veridian distributes the original version of PBS as Open Source software via the PBS website. Customers can register and download the software at no cost. PBS Pro is also available via the web and offers additional features such as increased stability, reliability, and fault tolerance.A company using PBS can expect a significant increase in the effective management of its computing resources. Tangible benefits include increased utilization of costly resources and enhanced understanding of computational requirements and user needs.

  5. Batch-To-Batch Rational Feedforward Control : From Iterative Learning to Identification Approaches, with Application to a Wafer Stage

    NARCIS (Netherlands)

    Blanken, L.; Boeren, F.A.J.; Bruijnen, D.J.H.; Oomen, T.A.E.

    2017-01-01

    Feedforward control enables high performance for industrial motion systems that perform nonrepeating motion tasks. Recently, learning techniques have been proposed that improve both performance and flexibility to nonrepeating tasks in a batch-To-batch fashion by using a rational parameterization in

  6. Biometrics based key management of double random phase encoding scheme using error control codes

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  7. Lipid production in batch and fed-batch cultures of Rhodosporidium toruloides from 5 and 6 carbon carbohydrates

    Directory of Open Access Journals (Sweden)

    Wiebe Marilyn G

    2012-05-01

    Full Text Available Abstract Background Microbial lipids are a potential source of bio- or renewable diesel and the red yeast Rhodosporidium toruloides is interesting not only because it can accumulate over 50% of its dry biomass as lipid, but also because it utilises both five and six carbon carbohydrates, which are present in plant biomass hydrolysates. Methods R. toruloides was grown in batch and fed-batch cultures in 0.5 L bioreactors at pH 4 in chemically defined, nitrogen restricted (C/N 40 to 100 media containing glucose, xylose, arabinose, or all three carbohydrates as carbon source. Lipid was extracted from the biomass using chloroform-methanol, measured gravimetrically and analysed by GC. Results Lipid production was most efficient with glucose (up to 25 g lipid L−1, 48 to 75% lipid in the biomass, at up to 0.21 g lipid L−1 h−1 as the sole carbon source, but high lipid concentrations were also produced from xylose (36 to 45% lipid in biomass. Lipid production was low (15–19% lipid in biomass with arabinose as sole carbon source and was lower than expected (30% lipid in biomass when glucose, xylose and arabinose were provided simultaneously. The presence of arabinose and/or xylose in the medium increased the proportion of palmitic and linoleic acid and reduced the proportion of oleic acid in the fatty acids, compared to glucose-grown cells. High cell densities were obtained in both batch (37 g L−1, with 49% lipid in the biomass and fed-batch (35 to 47 g L−1, with 50 to 75% lipid in the biomass cultures. The highest proportion of lipid in the biomass was observed in cultures given nitrogen during the batch phase but none with the feed. However, carbohydrate consumption was incomplete when the feed did not contain nitrogen and the highest total lipid and best substrate consumption were observed in cultures which received a constant low nitrogen supply. Conclusions Lipid production in R. toruloides was lower from arabinose and mixed

  8. Evaluation of vitrification factors from DWPF's macro-batch 1

    International Nuclear Information System (INIS)

    Edwards, T.B.

    2000-01-01

    The Defense Waste Processing Facility (DWPF) is evaluating new sampling and analytical methods that may be used to support future Slurry Mix Evaporator (SME) batch acceptability decisions. This report uses data acquired during DWPF's processing of macro-batch 1 to determine a set of vitrification factors covering several SME and Melter Feed Tank (MFT) batches. Such values are needed for converting the cation measurements derived from the new methods to a ''glass'' basis. The available data from macro-batch 1 were used to examine the stability of these vitrification factors, to estimate their uncertainty over the course of a macro-batch, and to provide a recommendation on the use of a single factor for an entire macro-batch. The report is in response to Technical Task Request HLW/DWPF/TTR-980015

  9. CYP2E1 Rsa Ι/Pst Ι polymorphism and lung cancer susceptibility: a meta-analysis involving 10,947 subjects.

    Science.gov (United States)

    Shen, Ze-Tian; Wu, Xin-Hu; Li, Bing; Shen, Jun-shu; Wang, Zhen; Li, Jing; Zhu, Xi-Xu

    2015-09-01

    Many studies have examined the association between the CYP2E1 Rsa Ι/Pst Ι (rs3813867) polymorphism gene polymorphisms and lung cancer risk in various populations, but their results have been inconsistent. The PubMed and CNKI database was searched for case-control studies published up to October 2013. Data were extracted and pooled odds ratios (OR) with 95% confidence intervals (CI) were calculated. In this meta-analysis, we assessed 23 published studies involving comprising 4727 lung cancer cases and 6220 controls of the association between CYP2E1 Rsa Ι/Pst Ι polymorphism and lung cancer risk. For the homozygote c2/c2 and c2 allele carriers (c1/c2 + c2/c2), the pooled ORs for all studies were 0.73(95% CI = 0.62-0.84; P = 0.005 for heterogeneity) and 0.84 (95% CI = 0.77-0.92; P = 0.001 for heterogeneity) when compared with the homozygous wild-type genotype (c1/c1). In the stratified analysis by ethnicity, the same significantly risks were found among Asians and mixed population for both the c2 allele carriers and homozygote c2/c2. However, no significant associations were found in Caucasian population all genetic models. This updated meta-analysis suggests that CYP2E1 Rsa Ι/Pst Ι c2 allele is a decreased risk factor for the developing lung cancer among Asians and mixed population. © 2015 The Authors. Journal of Cellular and Molecular Medicine published by John Wiley & Sons Ltd and Foundation for Cellular and Molecular Medicine.

  10. Sojourn time distributions in a Markovian G-queue with batch arrival and batch removal

    Directory of Open Access Journals (Sweden)

    Yang Woo Shin

    1999-01-01

    Full Text Available We consider a single server Markovian queue with two types of customers; positive and negative, where positive customers arrive in batches and arrivals of negative customers remove positive customers in batches. Only positive customers form a queue and negative customers just reduce the system congestion by removing positive ones upon their arrivals. We derive the LSTs of sojourn time distributions for a single server Markovian queue with positive customers and negative customers by using the first passage time arguments for Markov chains.

  11. Queue Length and Server Content Distribution in an Infinite-Buffer Batch-Service Queue with Batch-Size-Dependent Service

    Directory of Open Access Journals (Sweden)

    U. C. Gupta

    2015-01-01

    Full Text Available We analyze an infinite-buffer batch-size-dependent batch-service queue with Poisson arrival and arbitrarily distributed service time. Using supplementary variable technique, we derive a bivariate probability generating function from which the joint distribution of queue and server content at departure epoch of a batch is extracted and presented in terms of roots of the characteristic equation. We also obtain the joint distribution of queue and server content at arbitrary epoch. Finally, the utility of analytical results is demonstrated by the inclusion of some numerical examples which also includes the investigation of multiple zeros.

  12. Polynomial Batch Codes for Efficient IT-PIR

    Directory of Open Access Journals (Sweden)

    Henry Ryan

    2016-10-01

    Full Text Available Private information retrieval (PIR is a way for clients to query a remote database without the database holder learning the clients’ query terms or the responses they generate. Compelling applications for PIR are abound in the cryptographic and privacy research literature, yet existing PIR techniques are notoriously inefficient. Consequently, no such PIRbased application to date has seen real-world at-scale deployment. This paper proposes new “batch coding” techniques to help address PIR’s efficiency problem. The new techniques exploit the connection between ramp secret sharing schemes and efficient information-theoretically secure PIR (IT-PIR protocols. This connection was previously observed by Henry, Huang, and Goldberg (NDSS 2013, who used ramp schemes to construct efficient “batch queries” with which clients can fetch several database records for the same cost as fetching a single record using a standard, non-batch query. The new techniques in this paper generalize and extend those of Henry et al. to construct “batch codes” with which clients can fetch several records for only a fraction the cost of fetching a single record using a standard non-batch query over an unencoded database. The batch codes are highly tuneable, providing a means to trade off (i lower server-side computation cost, (ii lower server-side storage cost, and/or (iii lower uni- or bi-directional communication cost, in exchange for a comparatively modest decrease in resilience to Byzantine database servers.

  13. Citric acid production from hydrolysate of pretreated straw cellulose by Yarrowia lipolytica SWJ-1b using batch and fed-batch cultivation.

    Science.gov (United States)

    Liu, Xiaoyan; Lv, Jinshun; Zhang, Tong; Deng, Yuanfang

    2015-01-01

    In this study, crude cellulase produced by Trichoderma reesei Rut-30 was used to hydrolyze pretreated straw. After the compositions of the hydrolysate of pretreated straw were optimized, the study showed that natural components of pretreated straw without addition of any other components such as (NH4)2SO4, KH2PO4, or Mg(2+) were suitable for citric acid production by Yarrowia lipolytica SWJ-1b, and the optimal ventilatory capacity was 10.0 L/min/L medium. Batch and fed-batch production of citric acid from the hydrolysate of pretreated straw by Yarrowia lipolytica SWJ-1b has been investigated. In the batch cultivation, 25.4 g/L and 26.7 g/L citric acid were yields from glucose and hydrolysate of straw cellulose, respectively, while the cultivation time was 120 hr. In the three-cycle fed-batch cultivation, citric acid (CA) production was increased to 42.4 g/L and the cultivation time was extended to 240 hr. However, iso-citric acid (ICA) yield in fed-batch cultivation (4.0 g/L) was similar to that during the batch cultivation (3.9 g/L), and only 1.6 g/L of reducing sugar was left in the medium at the end of fed-batch cultivation, suggesting that most of the added carbon was used in the cultivation.

  14. Batch and multi-step fed-batch enzymatic saccharification of Formiline-pretreated sugarcane bagasse at high solid loadings for high sugar and ethanol titers.

    Science.gov (United States)

    Zhao, Xuebing; Dong, Lei; Chen, Liang; Liu, Dehua

    2013-05-01

    Formiline pretreatment pertains to a biomass fractionation process. In the present work, Formiline-pretreated sugarcane bagasse was hydrolyzed with cellulases by batch and multi-step fed-batch processes at 20% solid loading. For wet pulp, after 144 h incubation with cellulase loading of 10 FPU/g dry solid, fed-batch process obtained ~150 g/L glucose and ~80% glucan conversion, while batch process obtained ~130 g/L glucose with corresponding ~70% glucan conversion. Solid loading could be further increased to 30% for the acetone-dried pulp. By fed-batch hydrolysis of the dried pulp in pH 4.8 buffer solution, glucose concentration could be 247.3±1.6 g/L with corresponding 86.1±0.6% glucan conversion. The enzymatic hydrolyzates could be well converted to ethanol by a subsequent fermentation using Saccharomices cerevisiae with ethanol titer of 60-70 g/L. Batch and fed-batch SSF indicated that Formiline-pretreated substrate showed excellent fermentability. The final ethanol concentration was 80 g/L with corresponding 82.7% of theoretical yield. Copyright © 2012 Elsevier Ltd. All rights reserved.

  15. Suppressor mutations identify amino acids in PAA-1/PR65 that facilitate regulatory RSA-1/B″ subunit targeting of PP2A to centrosomes in C. elegans.

    Science.gov (United States)

    Lange, Karen I; Heinrichs, Jeffrey; Cheung, Karen; Srayko, Martin

    2013-01-15

    Protein phosphorylation and dephosphorylation is a key mechanism for the spatial and temporal regulation of many essential developmental processes and is especially prominent during mitosis. The multi-subunit protein phosphatase 2A (PP2A) enzyme plays an important, yet poorly characterized role in dephosphorylating proteins during mitosis. PP2As are heterotrimeric complexes comprising a catalytic, structural, and regulatory subunit. Regulatory subunits are mutually exclusive and determine subcellular localization and substrate specificity of PP2A. At least 3 different classes of regulatory subunits exist (termed B, B', B″) but there is no obvious similarity in primary sequence between these classes. Therefore, it is not known how these diverse regulatory subunits interact with the same holoenzyme to facilitate specific PP2A functions in vivo. The B″ family of regulatory subunits is the least understood because these proteins lack conserved structural domains. RSA-1 (regulator of spindle assembly) is a regulatory B″ subunit required for mitotic spindle assembly in Caenorhabditis elegans. In order to address how B″ subunits interact with the PP2A core enzyme, we focused on a conditional allele, rsa-1(or598ts), and determined that this mutation specifically disrupts the protein interaction between RSA-1 and the PP2A structural subunit, PAA-1. Through genetic screening, we identified a putative interface on the PAA-1 structural subunit that interacts with a defined region of RSA-1/B″. In the context of previously published results, these data propose a mechanism of how different PP2A B-regulatory subunit families can bind the same holoenzyme in a mutually exclusive manner, to perform specific tasks in vivo.

  16. Suppressor mutations identify amino acids in PAA-1/PR65 that facilitate regulatory RSA-1/B″ subunit targeting of PP2A to centrosomes in C. elegans

    Directory of Open Access Journals (Sweden)

    Karen I. Lange

    2012-11-01

    Protein phosphorylation and dephosphorylation is a key mechanism for the spatial and temporal regulation of many essential developmental processes and is especially prominent during mitosis. The multi-subunit protein phosphatase 2A (PP2A enzyme plays an important, yet poorly characterized role in dephosphorylating proteins during mitosis. PP2As are heterotrimeric complexes comprising a catalytic, structural, and regulatory subunit. Regulatory subunits are mutually exclusive and determine subcellular localization and substrate specificity of PP2A. At least 3 different classes of regulatory subunits exist (termed B, B′, B″ but there is no obvious similarity in primary sequence between these classes. Therefore, it is not known how these diverse regulatory subunits interact with the same holoenzyme to facilitate specific PP2A functions in vivo. The B″ family of regulatory subunits is the least understood because these proteins lack conserved structural domains. RSA-1 (regulator of spindle assembly is a regulatory B″ subunit required for mitotic spindle assembly in Caenorhabditis elegans. In order to address how B″ subunits interact with the PP2A core enzyme, we focused on a conditional allele, rsa-1(or598ts, and determined that this mutation specifically disrupts the protein interaction between RSA-1 and the PP2A structural subunit, PAA-1. Through genetic screening, we identified a putative interface on the PAA-1 structural subunit that interacts with a defined region of RSA-1/B″. In the context of previously published results, these data propose a mechanism of how different PP2A B-regulatory subunit families can bind the same holoenzyme in a mutually exclusive manner, to perform specific tasks in vivo.

  17. Batch Computed Tomography Analysis of Projectiles

    Science.gov (United States)

    2016-05-01

    ARL-TR-7681 ● MAY 2016 US Army Research Laboratory Batch Computed Tomography Analysis of Projectiles by Michael C Golt, Chris M...Laboratory Batch Computed Tomography Analysis of Projectiles by Michael C Golt and Matthew S Bratcher Weapons and Materials Research...values to account for projectile variability in the ballistic evaluation of armor. 15. SUBJECT TERMS computed tomography , CT, BS41, projectiles

  18. A canned food scheduling problem with batch due date

    Science.gov (United States)

    Chung, Tsui-Ping; Liao, Ching-Jong; Smith, Milton

    2014-09-01

    This article considers a canned food scheduling problem where jobs are grouped into several batches. Jobs can be sent to the next operation only when all the jobs in the same batch have finished their processing, i.e. jobs in a batch, have a common due date. This batch due date problem is quite common in canned food factories, but there is no efficient heuristic to solve the problem. The problem can be formulated as an identical parallel machine problem with batch due date to minimize the total tardiness. Since the problem is NP hard, two heuristics are proposed to find the near-optimal solution. Computational results comparing the effectiveness and efficiency of the two proposed heuristics with an existing heuristic are reported and discussed.

  19. Prunus dulcis, Batch

    African Journals Online (AJOL)

    STORAGESEVER

    2010-06-07

    Jun 7, 2010 ... almond (Prunus dulcis, Batch) genotypes as revealed by PCR analysis. Yavar Sharafi1*, Jafar Hajilou1, Seyed AbolGhasem Mohammadi2, Mohammad Reza Dadpour1 and Sadollah Eskandari3. 1Department of Horticulture, Faculty of Agriculture, University of Tabriz, Tabriz, 5166614766, Iran.

  20. Supervision of Fed-Batch Fermentations

    DEFF Research Database (Denmark)

    Gregersen, Lars; Jørgensen, Sten Bay

    1999-01-01

    Process faults may be detected on-line using existing measurements based upon modelling that is entirely data driven. A multivariate statistical model is developed and used for fault diagnosis of an industrial fed-batch fermentation process. Data from several (25) batches are used to develop...... a model for cultivation behaviour. This model is validated against 13 data sets and demonstrated to explain a significant amount of variation in the data. The multivariate model may directly be used for process monitoring. With this method faults are detected in real time and the responsible measurements...

  1. 40 CFR 63.1408 - Aggregate batch vent stream provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Aggregate batch vent stream provisions... § 63.1408 Aggregate batch vent stream provisions. (a) Emission standards. Owners or operators of aggregate batch vent streams at a new or existing affected source shall comply with either paragraph (a)(1...

  2. Small and similar amounts of micromotion in an anatomical stem and a customized cementless femoral stem in regular-shaped femurs. A 5-year follow-up randomized RSA study.

    Science.gov (United States)

    Nysted, Mona; Foss, Olav A; Klaksvik, Jomar; Benum, Pål; Haugan, Kristin; Husby, Otto Schnell; Aamodt, Arild

    2014-04-01

    High primary stability is important for long-term survival of uncemented femoral stems. Different stem designs are currently in use. The ABG-I is a well-documented anatomical stem with a press-fit design. The Unique stem is designed for a tight customized fit to the cortical bone of the upper femur. This implant was initially developed for patients with abnormal anatomy, but the concept can also be used in patients with normal femoral anatomy. We present 5-year radiostereometric analysis (RSA) results from a randomized study comparing the ABG-I anatomical stem with the Unique femoral stem. 100 hips with regular upper femur anatomy were randomized to either the ABG-I stem or the Unique femoral stem. RSA measurements were performed postoperatively and after 3, 6, 12, 24, and 60 months. RSA measurements from 80 hips were available for analysis at the 5-year follow-up. Small amounts of movement were observed for both stems, with no statistically significant differences between the 2 types. No improvement in long-term stability was found from using a customized stem design. However, no patients with abnormal geometry of the upper femur were included in this study.

  3. The polymorphism of CYP2E1 Rsa I/Pst I gene and susceptibility to respiratory system cancer: a systematic review and meta-analysis of 34 studies.

    Science.gov (United States)

    Xu, Li; Yang, Mingyuan; Zhao, Tiejun; Jin, Hai; Xu, Zhiyun; Li, Ming; Chen, Hezhong

    2014-12-01

    The purpose of this articles is to determine whether the cytochrome P450 2E1 (CYP2E1) Rsa I/Pst I gene polymorphism is correlated with respiratory system cancers. Respiratory system cancers included lung cancer, laryngeal cancer, nasopharyngeal cancer, and cancers of other respiratory organs, which are the most common malignant tumors worldwide; the significant relationship between CYP2E1 Rsa I/Pst I gene polymorphism and some respiratory system cancer have been reported, but results of some other studies are controversial. The pooled odds ratio (OR) with 95% confidence interval (CI) was calculated to assess the association. PubMed, EMBASE, Cochrane Library Databases, China National Knowledge Infrastructure, and Wanfang Database (up to July 20, 2014) were searched for all case-control studies those mainly studied the relationship between CYP2E1 Rsa I/Pst I gene polymorphism and the susceptibility of respiratory system cancer. A total of 332 articles were collected, among which 34 studies that involved 7028 cases and 9822 controls fulfilled the inclusion criteria after being assessed by 2 reviewers. When stratified by cancer site, the C2/C2 polymorphism could increase the risk of nasopharyngeal cancer under the homozygote model (C2C2 vs C1C1: OR = 1.85, 95% CI = 1.20-2.85, P = 0.005) and recessive model (C2C2 vs C1C2/C1C1: OR = 1.89, 95% CI = 1.23-2.89, P = 0.003). Protection effect was found in lung cancer in heterozygote model (C1C2 vs C1C1: OR = 0.82, 95% CI = 0.74-0.91, P Rsa I/Pst I gene polymorphism may reduce the risk of respiratory system cancer. Furthermore, significant association was also found in Asian populations.

  4. Effect of glass-batch makeup on the melting process

    International Nuclear Information System (INIS)

    Hrma, Pavel R.; Schweiger, Michael J.; Humrickhouse, Carissa J.; Moody, J. Adam; Tate, Rachel M.; Rainsdon, Timothy T.; Tegrotenhuis, Nathan E.; Arrigoni, Benjamin M.; Marcial, Jose; Rodriguez, Carmen P.; Tincher, Benjamin

    2010-01-01

    The response of a glass batch to heating is determined by the batch makeup and in turn determines the rate of melting. Batches formulated for a high-alumina nuclear waste to be vitrified in an all-electric melter were heated at a constant temperature-increase rate to determine changes in melting behavior in response to the selection of batch chemicals and silica grain-size as well as the addition of heat-generating reactants. The type of batch materials and the size of silica grains determine how much, if any, primary foam occurs during melting. Small quartz grains, 5 (micro)m in size, caused extensive foaming because their major portion dissolved at temperatures 800 C when batch gases no longer evolved. The exothermal reaction of nitrates with sucrose was ignited at a temperature as low as 160 C and caused a temporary jump in temperature of several hundred degrees. Secondary foam, the source of which is oxygen from redox reactions, occurred in all batches of a limited composition variation involving five oxides, B 2 O 3 , CaO, Li 2 O, MgO, and Na 2 O. The foam volume at the maximum volume-increase rate was a weak function of temperature and melt basicity. Neither the batch makeup nor the change in glass composition had a significant impact on the dissolution of silica grains. The impacts of primary foam generation on glass homogeneity and the rate of melting in large-scale continuous furnaces have yet to be established via mathematical modeling and melter experiments.

  5. Effect Of Glass-Batch Makeup On The Melting Process

    International Nuclear Information System (INIS)

    Kruger, A.A.; Hrma, P.

    2010-01-01

    The response of a glass batch to heating is determined by the batch makeup and in turn determines the rate of melting. Batches formulated for a high-alumina nuclear waste to be vitrified in an all-electric melter were heated at a constant temperature-increase rate to determine changes in melting behavior in response to the selection of batch chemicals and silica grain-size as well as the addition of heat-generating reactants. The type of batch materials and the size of silica grains determine how much, if any, primary foam occurs during melting. Small quartz grains, 5 (micro)m in size, caused extensive foaming because their major portion dissolved at temperatures 800 C when batch gases no longer evolved. The exothermal reaction of nitrates with sucrose was ignited at a temperature as low as 160 C and caused a temporary jump in temperature of several hundred degrees. Secondary foam, the source of which is oxygen from redox reactions, occurred in all batches of a limited composition variation involving five oxides, B 2 O 3 , CaO, Li 2 O, MgO, and Na 2 O. The foam volume at the maximum volume-increase rate was a weak function of temperature and melt basicity. Neither the batch makeup nor the change in glass composition had a significant impact on the dissolution of silica grains. The impacts of primary foam generation on glass homogeneity and the rate of melting in large-scale continuous furnaces have yet to be established via mathematical modeling and melter experiments.

  6. Spatial and interannual variability in Baltic sprat batch fecundity

    DEFF Research Database (Denmark)

    Haslob, H.; Tomkiewicz, Jonna; Hinrichsen, H.H.

    2011-01-01

    in the central Baltic Sea, namely the Bornholm Basin, Gdansk Deep and Southern Gotland Basin. Environmental parameters such as hydrography, fish condition and stock density were tested in order to investigate the observed variability in sprat fecundity. Absolute batch fecundity was found to be positively related...... to fish length and weight. Significant differences in absolute and relative batch fecundity of Baltic sprat among areas and years were detected, and could partly be explained by hydrographic features of the investigated areas. A non-linear multiple regression model taking into account fish length...... and ambient temperature explained 70% of variability in absolute batch fecundity. Oxygen content and fish condition were not related to sprat batch fecundity. Additionally, a negative effect of stock size on sprat batch fecundity in the Bornholm Basin was revealed. The obtained data and results are important...

  7. Fuzzy batch controller for granular materials

    OpenAIRE

    Zamyatin Nikolaj; Smirnov Gennadij; Fedorchuk Yuri; Rusina Olga

    2018-01-01

    The paper focuses on batch control of granular materials in production of building materials from fluorine anhydrite. Batching equipment is intended for smooth operation and timely feeding of supply hoppers at a required level. Level sensors and a controller of an asynchronous screw drive motor are used to control filling of the hopper with industrial anhydrite binders. The controller generates a required frequency and ensures required productivity of a feed conveyor. Mamdani-type fuzzy infer...

  8. Research on AO/FO batch management technology in aircraft production

    Directory of Open Access Journals (Sweden)

    Yin Haijun

    2018-01-01

    Full Text Available Based on the analysis of the characteristics and significance of AO/FO in the process of aircraft production, this paper analyzes the format rules of AO/FO batch management from the perspective of technology realization, and details the AO/FO The change of the query and the change status tracking, introduces the AO/FO single-stand status display in the batch management, increases the structure definition of the attribute table in the batch management, and designs the relevant algorithm to store and calculate the batch information. Finally, based on the above theory support AO/FO batch management system successfully used in the production of a machine.

  9. Equally good fixation of cemented and uncemented cups in total trapeziometacarpal joint prostheses. A randomized clinical RSA study with 2-year follow-up.

    Science.gov (United States)

    Hansen, Torben Baek; Stilling, Maiken

    2013-02-01

    Cup failure is a recognized problem in total trapeziometacarpal (TM) joint prostheses; it may be related to poor fixation, which can be revealed by radiostereometric analysis (RSA). We compared the early implant migration of cemented trapezium cups to that of uncemented screw cups. In a prospective, parallel-group, randomized patient-blinded clinical trial, we included 32 hands in 28 patients (5 males) with a mean age of 58 (40-77) years and with Eaton stage-2 or -3 osteoarthritis of the trapeziometacarpal joint. Patients were randomized to surgery with a cemented DLC all-polyethylene cup (C) (n = 16) or an uncemented hydroxyapatite-coated chrome-cobalt Elektra screw cup (UC) (n = 16). Uncemented cups were inserted without threading of the bone. Stereoradiographs for evaluation of cup migration (primary effect size) and DASH and pain scores were obtained during 2 years of follow-up. The 2-year total translation (TT) was similar (p = 0.2): 0.24 mm (SD 0.10) for the C (n = 11) and 0.19 mm (SD 0.16) for the UC (n = 11). Variances were similar (p = 0.4). Judged by RSA, 2 UC cups and 1 C cup became loose (TT > 1 mm). Both UC cups were found to be loose at revision. Grip strength, pain, and DASH scores were similar between groups at all measurement points. Early implant fixation and clinical outcome were equally good with both cup designs. This is the first clinical RSA study on trapezium cups, and the method appears to be clinically useful for detection of loose implants.

  10. RSRP: A Robust Secure Routing Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Sinha Ditipriya

    2014-05-01

    Full Text Available In this paper, we propose a novel algorithm RSRP to build a robust secure routing protocol in mobile ad-hoc networks (MANETs. This algorithm is based on some basic schemes such as RSA_CRT for encryption and decryption of messages; CRT for safety key generation, Shamir’s secret sharing principle for generation of secure routes. Those routes which are free from any malicious node and which belong to the set of disjoint routes between a source-destination pair are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to obtain secure routes. Finally, most trustworthy and stable route is selected among those secure routes. Selection of the final route depends on some criteria of the nodes present in a route e.g.: battery power, mobility and trust value. In addition, complexity of key generation is reduced to a large extent by using RSA-CRT instead of RSA. In turn, the routing becomes less expensive and most secure and robust one. Performance of this routing protocol is then compared with non-secure routing protocols (AODV and DSR, secure routing scheme using secret sharing, security routing protocol using ZRP and SEAD depending on basic characteristics of these protocols. All such comparisons show that RSRP shows better performance in terms of computational cost, end-to-end delay and packet dropping in presence of malicious nodes in the MANET, keeping the overhead in terms of control packets same as other secure routing protocols.

  11. Variance bias analysis for the Gelbard's batch method

    Energy Technology Data Exchange (ETDEWEB)

    Seo, Jae Uk; Shim, Hyung Jin [Seoul National Univ., Seoul (Korea, Republic of)

    2014-05-15

    In this paper, variances and the bias will be derived analytically when the Gelbard's batch method is applied. And then, the real variance estimated from this bias will be compared with the real variance calculated from replicas. Variance and the bias were derived analytically when the batch method was applied. If the batch method was applied to calculate the sample variance, covariance terms between tallies which exist in the batch were eliminated from the bias. With the 2 by 2 fission matrix problem, we could calculate real variance regardless of whether or not the batch method was applied. However as batch size got larger, standard deviation of real variance was increased. When we perform a Monte Carlo estimation, we could get a sample variance as the statistical uncertainty of it. However, this value is smaller than the real variance of it because a sample variance is biased. To reduce this bias, Gelbard devised the method which is called the Gelbard's batch method. It has been certificated that a sample variance get closer to the real variance when the batch method is applied. In other words, the bias get reduced. This fact is well known to everyone in the MC field. However, so far, no one has given the analytical interpretation on it.

  12. 40 CFR 63.1322 - Batch process vents-reference control technology.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Batch process vents-reference control technology. 63.1322 Section 63.1322 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Batch process vents—reference control technology. (a) Batch process vents. The owner or operator of a...

  13. Secure Data Encryption Through a Combination of AES, RSA and HMAC

    Directory of Open Access Journals (Sweden)

    E. S. I. Harba

    2017-08-01

    Full Text Available Secure file transfer based upon well-designed file encryption and authorization systems expend considerable effort to protect passwords and other credentials from being stolen. Transferring and storing passwords in plaintext form leaves them at risk of exposure to attackers, eavesdroppers and spyware. In order to avoid such exposure, powerful encryption/authentication systems use various mechanisms to minimize the possibility that unencrypted credentials will be exposed, as well as be sure that any authentication data that does get transmitted and stored will be of minimal use to an attacker. In this paper we proposed a method to protect data transferring by three hybrid encryption techniques: symmetric AES algorithm used to encrypt files, asymmetric RSA used to encrypt AES password and HMAC to encrypt symmetric password and/or data to ensure a secure transmitting between server-client or client-client from verifying in-between client and server and make it hard to attack by common attacked methods.

  14. Batch-to-Batch Quality Consistency Evaluation of Botanical Drug Products Using Multivariate Statistical Analysis of the Chromatographic Fingerprint

    OpenAIRE

    Xiong, Haoshu; Yu, Lawrence X.; Qu, Haibin

    2013-01-01

    Botanical drug products have batch-to-batch quality variability due to botanical raw materials and the current manufacturing process. The rational evaluation and control of product quality consistency are essential to ensure the efficacy and safety. Chromatographic fingerprinting is an important and widely used tool to characterize the chemical composition of botanical drug products. Multivariate statistical analysis has showed its efficacy and applicability in the quality evaluation of many ...

  15. Fuzzy batch controller for granular materials

    Directory of Open Access Journals (Sweden)

    Zamyatin Nikolaj

    2018-01-01

    Full Text Available The paper focuses on batch control of granular materials in production of building materials from fluorine anhydrite. Batching equipment is intended for smooth operation and timely feeding of supply hoppers at a required level. Level sensors and a controller of an asynchronous screw drive motor are used to control filling of the hopper with industrial anhydrite binders. The controller generates a required frequency and ensures required productivity of a feed conveyor. Mamdani-type fuzzy inference is proposed for controlling the speed of the screw that feeds mixture components. As related to production of building materials based on fluoride anhydrite, this method is used for the first time. A fuzzy controller is proven to be effective in controlling the filling level of the supply hopper. In addition, the authors determined optimal parameters of the batching process to ensure smooth operation and production of fluorine anhydrite materials of specified properties that can compete with gypsum-based products.

  16. The first interdisciplinary experiments at the IMP high energy microbeam

    Energy Technology Data Exchange (ETDEWEB)

    Du, Guanghua; Guo, Jinlong; Wu, Ruqun; Guo, Na; Liu, Wenjing; Ye, Fei; Sheng, Lina; Li, Qiang [Institute of Modern Physics (IMP), Chinese Academy of Sciences, Lanzhou (China); Li, Huiyun [Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen (China)

    2015-04-01

    The high energy beam of tens to hundred MeV/u ions possesses mm-to-cm penetration depth in materials and can be easily extracted into air without significant energy loss and beam scattering. Combination of high energy ions and microbeam technology facilitates the microprobe application to many practical studies in large scale samples. The IMP heavy ion microbeam facility has recently been integrated with microscopic positioning and targeting irradiation system. This paper introduced the first interdisciplinary experiments performed at the IMP microbeam facility using the beam of 80.5 MeV/u carbon ions. Bystander effect induction via medium transferring was not found in the micro-irradiation study using HeLa cells. The mouse irradiation experiment demonstrated that carbon irradiation of 10 Gy dose to its tuberomammillary nucleus did not impair the sleep nerve system. The fault injection attack on RSA (Rivest–Shamir–Adleman) decryption proved that the commercial field-programmable gate array chip is vulnerable in single event effect to low linear-energy-transfer carbon irradiation, and the attack can cause the leakage of RSA private key. This work demonstrates the potential of high energy microbeam in its application to biology, biomedical, radiation hardness, and information security studies.

  17. Intellectual property rights vs. public access rights: ethical aspects of the DeCSS decryptation program

    Directory of Open Access Journals (Sweden)

    Robert Vaagan

    2005-01-01

    Full Text Available Introduction. In 1999-2000, a Norwegian youth cracked a DVD-access code and published a decryptation program on the Internet. He was sued by the US DVD Copy Control Association (DVD-CCA and the Norwegian Motion Picture Association (MAP, allies of the US Motion Picture Association of America (MPAA, arrested by Norwegian police and charged with data crime. Two Norwegian court rulings in 2003 unanimously ruled that the program did not amount to a breach of Norwegian law, and he was fully acquitted. In the US, there have been related cases, some with other outcomes. Method. Based on a theoretical framework developed by Zwass, the paper discusses these court rulings and the wider issues of intellectual property rights versus public access rights. Analysis. The DVD-Jon case illustrates that intellectual property rights can conflict with public access rights, as the struggle between proprietary software and public domain software, as well as the SPARC and Open Archives Initiative reflect. Results. An assessment of the DVD-Jon case based on the Zwass framework does not give a clear information ethics answer. The analysis depends on whether one ascribes to consequentialist (e.g., utilitarian or de-ontological reflection, and also on which side of the digital gap is to be accorded most weight. Conclusion. While copyright interests are being legally strengthened, there may be ethically- grounded access rights that outweigh property rights.

  18. History based batch method preserving tally means

    International Nuclear Information System (INIS)

    Shim, Hyung Jin; Choi, Sung Hoon

    2012-01-01

    In the Monte Carlo (MC) eigenvalue calculations, the sample variance of a tally mean calculated from its cycle-wise estimates is biased because of the inter-cycle correlations of the fission source distribution (FSD). Recently, we proposed a new real variance estimation method named the history-based batch method in which a MC run is treated as multiple runs with small number of histories per cycle to generate independent tally estimates. In this paper, the history-based batch method based on the weight correction is presented to preserve the tally mean from the original MC run. The effectiveness of the new method is examined for the weakly coupled fissile array problem as a function of the dominance ratio and the batch size, in comparison with other schemes available

  19. Three Year RSA Evaluation of Vitamin E Diffused Highly Cross-linked Polyethylene Liners and Cup Stability

    DEFF Research Database (Denmark)

    Sillesen, Nanna H; Greene, Meridith E; Nebergall, Audrey K

    2015-01-01

    10-year RSA. This is the first evaluation of the multicenter cohort after 3-years. All patients received E-XLPE liners (E1, Biomet) and porous-titanium coated cups (Regenerex, Biomet). There was no difference (P=0.450) in median femoral head penetration into the E-XLPE liners at 3-years comparing...... cobalt-chrome heads (-0.028mm; inter-quartile range (IQR) - 0.065 to 0.047) with ceramic heads (-0.043mm, IQR - 0.143to0.042). The 3-year follow-up indicates minimal E-XLPE liner penetration regardless of head material and minimal early cup movement....

  20. Kinetics of sugars consumption and ethanol inhibition in carob pulp fermentation by Saccharomyces cerevisiae in batch and fed-batch cultures.

    Science.gov (United States)

    Lima-Costa, Maria Emília; Tavares, Catarina; Raposo, Sara; Rodrigues, Brígida; Peinado, José M

    2012-05-01

    The waste materials from the carob processing industry are a potential resource for second-generation bioethanol production. These by-products are small carob kibbles with a high content of soluble sugars (45-50%). Batch and fed-batch Saccharomyces cerevisiae fermentations of high density sugar from carob pods were analyzed in terms of the kinetics of sugars consumption and ethanol inhibition. In all the batch runs, 90-95% of the total sugar was consumed and transformed into ethanol with a yield close to the theoretical maximum (0.47-0.50 g/g), and a final ethanol concentration of 100-110 g/l. In fed-batch runs, fresh carob extract was added when glucose had been consumed. This addition and the subsequent decrease of ethanol concentrations by dilution increased the final ethanol production up to 130 g/l. It seems that invertase activity and yeast tolerance to ethanol are the main factors to be controlled in carob fermentations. The efficiency of highly concentrated carob fermentation makes it a very promising process for use in a second-generation ethanol biorefinery.

  1. Batch calculations in CalcHEP

    International Nuclear Information System (INIS)

    Pukhov, A.

    2003-01-01

    CalcHEP is a clone of the CompHEP project which is developed by the author outside of the CompHEP group. CompHEP/CalcHEP are packages for automatic calculations of elementary particle decay and collision properties in the lowest order of perturbation theory. The main idea prescribed into the packages is to make available passing on from the Lagrangian to the final distributions effectively with a high level of automation. According to this, the packages were created as a menu driven user friendly programs for calculations in the interactive mode. From the other side, long-time calculations should be done in the non-interactive regime. Thus, from the beginning CompHEP has a problem of batch calculations. In CompHEP 33.23 the batch session was realized by mean of interactive menu which allows to the user to formulate the task for batch. After that the not-interactive session was launched. This way is too restricted, not flexible, and leads to doubling in programming. In this article I discuss another approach how one can force an interactive program to work in non-interactive mode. This approach was realized in CalcHEP 2.1 disposed on http://theory.sinp.msu.ru/~pukhov/calchep.html

  2. Numerical modeling of batch formation in waste incineration plants

    Directory of Open Access Journals (Sweden)

    Obroučka Karel

    2015-03-01

    Full Text Available The aim of this paper is a mathematical description of algorithm for controlled assembly of incinerated batch of waste. The basis for formation of batch is selected parameters of incinerated waste as its calorific value or content of pollutants or the combination of both. The numerical model will allow, based on selected criteria, to compile batch of wastes which continuously follows the previous batch, which is a prerequisite for optimized operation of incinerator. The model was prepared as for waste storage in containers, as well as for waste storage in continuously refilled boxes. The mathematical model was developed into the computer program and its functionality was verified either by practical measurements or by numerical simulations. The proposed model can be used in incinerators for hazardous and municipal waste.

  3. Monitoring a PVC batch process with multivariate statistical process control charts

    NARCIS (Netherlands)

    Tates, A. A.; Louwerse, D. J.; Smilde, A. K.; Koot, G. L. M.; Berndt, H.

    1999-01-01

    Multivariate statistical process control charts (MSPC charts) are developed for the industrial batch production process of poly(vinyl chloride) (PVC). With these MSPC charts different types of abnormal batch behavior were detected on-line. With batch contribution plots, the probable causes of these

  4. Authentication and Encryption Using Modified Elliptic Curve Cryptography with Particle Swarm Optimization and Cuckoo Search Algorithm

    Science.gov (United States)

    Kota, Sujatha; Padmanabhuni, Venkata Nageswara Rao; Budda, Kishor; K, Sruthi

    2018-05-01

    Elliptic Curve Cryptography (ECC) uses two keys private key and public key and is considered as a public key cryptographic algorithm that is used for both authentication of a person and confidentiality of data. Either one of the keys is used in encryption and other in decryption depending on usage. Private key is used in encryption by the user and public key is used to identify user in the case of authentication. Similarly, the sender encrypts with the private key and the public key is used to decrypt the message in case of confidentiality. Choosing the private key is always an issue in all public key Cryptographic Algorithms such as RSA, ECC. If tiny values are chosen in random the security of the complete algorithm becomes an issue. Since the Public key is computed based on the Private Key, if they are not chosen optimally they generate infinity values. The proposed Modified Elliptic Curve Cryptography uses selection in either of the choices; the first option is by using Particle Swarm Optimization and the second option is by using Cuckoo Search Algorithm for randomly choosing the values. The proposed algorithms are developed and tested using sample database and both are found to be secured and reliable. The test results prove that the private key is chosen optimally not repetitive or tiny and the computations in public key will not reach infinity.

  5. Look-ahead strategies for controlling batch operations in industry - An overview

    NARCIS (Netherlands)

    Zee, Durk-Jouke van der; Chick, SE; Sanchez, PJ; Ferrin, D; Morrice, DJ

    2003-01-01

    Batching jobs in a manufacturing system is a very common policy in most industries. Main reasons for batching are avoidance of set ups and/or facilitation of material handling. Examples of batch-wise production systems are ovens found in aircraft industry and in semiconductor manufacturing. Starting

  6. A Factor Analytic Investigation of the Person-in-Recovery and Provider Versions of the Revised Recovery Self-Assessment (RSA-R).

    Science.gov (United States)

    Konkolÿ Thege, Barna; Ham, Elke; Ball, Laura C

    2017-12-01

    Recovery is understood as living a life with hope, purpose, autonomy, productivity, and community engagement despite a mental illness. The aim of this study was to provide further information on the psychometric properties of the Person-in-Recovery and Provider versions of the Revised Recovery Self-Assessment (RSA-R), a widely used measure of recovery orientation. Data from 654 individuals were analyzed, 519 of whom were treatment providers (63.6% female), while 135 were inpatients (10.4% female) of a Canadian tertiary-level psychiatric hospital. Confirmatory and exploratory techniques were used to investigate the factor structure of both versions of the instrument. Results of the confirmatory factor analyses showed that none of the four theoretically plausible models fit the data well. Principal component analyses could not replicate the structure obtained by the scale developers either and instead resulted in a five-component solution for the Provider and a four-component solution for the Person-in-Recovery version. When considering the results of a parallel analysis, the number of components to retain dropped to two for the Provider version and one for the Person-in-Recovery version. We can conclude that the RSA-R requires further revision to become a psychometrically sound instrument for assessing recovery-oriented practices in an inpatient mental health-care setting.

  7. Solving a chemical batch scheduling problem by local search

    NARCIS (Netherlands)

    Brucker, P.; Hurink, Johann L.

    1999-01-01

    A chemical batch scheduling problem is modelled in two different ways as a discrete optimization problem. Both models are used to solve the batch scheduling problem in a two-phase tabu search procedure. The method is tested on real-world data.

  8. Acceptance Test Data for Candidate AGR-5/6/7 TRISO Particle Batches BWXT Coater Batches 93165 93172 Defective IPyC Fraction and Pyrocarbon Anisotropy

    Energy Technology Data Exchange (ETDEWEB)

    Helmreich, Grant W. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hunn, John D. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Skitt, Darren J. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Dyer, John A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Schumacher, Austin T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-03-01

    Coated particle fuel batches J52O-16-93165, 93166, 93168, 93169, 93170, and 93172 were produced by Babcock and Wilcox Technologies (BWXT) for possible selection as fuel for the Advanced Gas Reactor Fuel Development and Qualification (AGR) Program’s AGR-5/6/7 irradiation test in the Idaho National Laboratory (INL) Advanced Test Reactor (ATR). Some of these batches may alternately be used as demonstration coated particle fuel for other experiments. Each batch was coated in a 150-mm-diameter production-scale fluidized-bed chemical vapor deposition (CVD) furnace. Tristructural isotropic (TRISO) coatings were deposited on 425-μm-nominal-diameter spherical kernels from BWXT lot J52R-16-69317 containing a mixture of 15.5%-enriched uranium carbide and uranium oxide (UCO). The TRISO coatings consisted of four consecutive CVD layers: a ~50% dense carbon buffer layer with 100-μm-nominal thickness, a dense inner pyrolytic carbon (IPyC) layer with 40-μm-nominal thickness, a silicon carbide (SiC) layer with 35-μm-nominal thickness, and a dense outer pyrolytic carbon (OPyC) layer with 40-μmnominal thickness. The TRISO-coated particle batches were sieved to upgrade the particles by removing over-sized and under-sized material, and the upgraded batches were designated by appending the letter A to the end of the batch number (e.g., 93165A).

  9. PROOF on a Batch System

    International Nuclear Information System (INIS)

    Behrenhoff, W; Ehrenfeld, W; Samson, J; Stadie, H

    2011-01-01

    The 'parallel ROOT facility' (PROOF) from the ROOT framework provides a mechanism to distribute the load of interactive and non-interactive ROOT sessions on a set of worker nodes optimising the overall execution time. While PROOF is designed to work on a dedicated PROOF cluster, the benefits of PROOF can also be used on top of another batch scheduling system with the help of temporary per user PROOF clusters. We will present a lightweight tool which starts a temporary PROOF cluster on a SGE based batch cluster or, via a plugin mechanism, e.g. on a set of bare desktops via ssh. Further, we will present the result of benchmarks which compare the data throughput for different data storage back ends available at the German National Analysis Facility (NAF) at DESY.

  10. Comparative study of trapping parameters of LiF(TLD-100) from different production batches

    Energy Technology Data Exchange (ETDEWEB)

    Bos, A.J.J.; Piters, T.M.; Vries, W. de; Hoogenboom, J.E. (Delft Univ. of Technology (Netherlands). Interfaculty Reactor Institute)

    1990-01-01

    Computerised glow curve analysis has been used to determine the trapping parameters of the main peaks of the thermoluminescent (TL) material LiF(TLD-100). The TL material (solid state chips) originated from six different production batches with at least 19 chips per batch. The maxima of glow peaks 2 to 5 are found at the same temperature within very small limits. The activation energy and frequency factor of the main glow peak (peak 5) of TLD-100 originating from two batches differ significantly from those of the other four investigated batches. Nevertheless, the sensitivity of glow peak 5 is more or less the same for all batches. The trapping parameters of glow peaks 2 to 4 of TLD-100 vary little from batch to batch. The measured half-life of peak 2 differed strongly from batch to batch. For all investigated peaks no correlation has been found between glow peak sensitivity and trapping parameters. The results of this study suggest that both defect concentration and nature of the trapping centres vary from batch to batch. It would appear that as a consequence of selection by the manufacturer, the differences between the batches in terms of total light output are small. (author).

  11. From Fed-batch to Continuous Enzymatic Biodiesel Production

    DEFF Research Database (Denmark)

    Price, Jason Anthony; Nordblad, Mathias; Woodley, John M.

    2015-01-01

    In this this paper, we use mechanistic modelling to guide the development of acontinuous enzymatic process that is performed as a fed-batch operation. In this workwe use the enzymatic biodiesel process as a case study. A mechanistic model developedin our previous work was used to determine...... measured components (triglycerides, diglycerides, monoglycerides, free fatty acid and fatty acid methyl esters(biodiesel)) much better than using fed-batch data alone given the smaller residuals. We also observe a reduction in the correlation between the parameters.The model was then used to predict that 5...... reactors are required (with a combined residence time of 30 hours) to reach a final biodiesel concentration within 2 % of the95.6 mass % achieved in a fed-batch operation, for 24 hours....

  12. Design modifications of the uncemented Furlong hip stem result in minor early subsidence but do not affect further stability: a randomized controlled RSA study with 5-year follow-up.

    Science.gov (United States)

    Weber, Erik; Sundberg, Martin; Flivik, Gunnar

    2014-12-01

    Even small design modifications of uncemented hip stems may alter the postoperative 3-D migration pattern. The Furlong Active is an uncemented femoral stem which, in terms of design, is based on its precursor-the well-proven Furlong HAC-but has undergone several design changes. The collar has been removed on the Active stem along with the lateral fin; it is shorter and has more rounded edges in the proximal part. We compared the migration patterns of the uncemented Furlong HAC stem and the modified Furlong Active stem in a randomized, controlled trial over 5 years using radiostereometry (RSA). 50 patients with primary osteoarthritis were randomized to receive either the HAC stem or the Active stem. The patients underwent repeated RSA examinations (postoperatively, at 3 months, and after 1, 2, and 5 years) and conventional radiography, and they also filled out hip-specific questionnaires. During the first 3 months, the collarless Active stem subsided to a greater extent than the collar-fitted HAC stem (0.99 mm vs. 0.31 mm, p=0.05). There were, however, no other differences in movement measured by RSA or in clinical outcome between the 2 stems. After 3 months, both stem types had stabilized and almost no further migration was seen. The Active stem showed no signs of unfavorable migration. Our results suggest that the osseointegration is not compromised by the new design features.

  13. Inorganic fouling mitigation by salinity cycling in batch reverse osmosis

    OpenAIRE

    Maswadeh, Laith A.; Warsinger, David Elan Martin; Tow, Emily W.; Connors, Grace B.; Swaminathan, Jaichander; Lienhard, John H

    2018-01-01

    Enhanced fouling resistance has been observed in recent variants of reverse osmosis (RO) desalination which use time-varying batch or semi-batch processes, such as closed-circuit RO (CCRO) and pulse flow RO (PFRO). However, the mechanisms of batch processes' fouling resistance are not well-understood, and models have not been developed for prediction of their fouling performance. Here, a framework for predicting reverse osmosis fouling is developed by comparing the fluid residence time in bat...

  14. Dynamic Scheduling Of Batch Operations With Non-Identical Machines

    NARCIS (Netherlands)

    van der Zee, D.J.; van Harten, A.; Schuur, P.C.

    1997-01-01

    Batch-wise production is found in many industries. A good example of production systems which process products batch-wise are the ovens found in aircraft industry and in semiconductor manufacturing. These systems mostly consist of multiple machines of different types, given the range and volumes of

  15. Dynamic scheduling of batch operations with non-identical machines

    NARCIS (Netherlands)

    van der Zee, D.J.; van Harten, Aart; Schuur, Peter

    1997-01-01

    Batch-wise production is found in many industries. A good example of production systems which process products batch-wise are the ovens found in aircraft industry and in semiconductor manufacturing. These systems mostly consist of multiple machines of different types, given the range and volumes of

  16. Some performance measures for vacation models with a batch Markovian arrival process

    Directory of Open Access Journals (Sweden)

    Sadrac K. Matendo

    1994-01-01

    Full Text Available We consider a single server infinite capacity queueing system, where the arrival process is a batch Markovian arrival process (BMAP. Particular BMAPs are the batch Poisson arrival process, the Markovian arrival process (MAP, many batch arrival processes with correlated interarrival times and batch sizes, and superpositions of these processes. We note that the MAP includes phase-type (PH renewal processes and non-renewal processes such as the Markov modulated Poisson process (MMPP.

  17. Surface roughness when diamond turning RSA 905 optical aluminium

    Science.gov (United States)

    Otieno, T.; Abou-El-Hossein, K.; Hsu, W. Y.; Cheng, Y. C.; Mkoko, Z.

    2015-08-01

    Ultra-high precision machining is used intensively in the photonics industry for the production of various optical components. Aluminium alloys have proven to be advantageous and are most commonly used over other materials to make various optical components. Recently, the increasing demand from optical systems for optical aluminium with consistent material properties has led to the development of newly modified grades of aluminium alloys produced by rapid solidification in the foundry process. These new aluminium grades are characterised by their finer microstructures and refined mechanical and physical properties. However the machining database of these new optical aluminium grades is limited and more research is still required to investigate their machinability performance when they are diamond turned in ultrahigh precision manufacturing environment. This work investigates the machinability of rapidly solidified aluminium RSA 905 by varying a number of diamond-turning cutting parameters and measuring the surface roughness over a cutting distance of 4 km. The machining parameters varied in this study were the cutting speed, feed rate and depth of cut. The results showed a common trend of decrease in surface roughness with increasing cutting distance. The lowest surface roughness Ra result obtained after 4 km in this study was 3.2 nm. This roughness values was achieved using a cutting speed of 1750 rpm, feed rate of 5 mm/min and depth of cut equal to 25 μm.

  18. 21 CFR 80.37 - Treatment of batch pending certification.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Treatment of batch pending certification. 80.37 Section 80.37 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL COLOR ADDITIVE CERTIFICATION Certification Procedures § 80.37 Treatment of batch pending certification...

  19. Influence of coal batch preparation on the quality of metallurgical соkе

    Directory of Open Access Journals (Sweden)

    Катерина Олегівна Шмельцер

    2015-10-01

    Full Text Available To study the influence of coal batch properties on coke strength we have considered the quality of the coke produced at the plant in Krivoy Rog from 2008 till 2012. Such factors as the large number of coal suppliers, imprecise selection of the optimal degree of batch crushing result in the decline in coke quality, the batch density and contents of the lean class (<0,5 mm are not optimum; poor blending of the batch after crushing; increased moisture and ash content of the coking batch; and extreme fluctuation in the coal and batch characteristics. It was found that high humidity of coal batch and its large fluctuations has most profound effect on the mechanical properties of coke. Under deteriorating resource base the quality of the coking batch preparation is important, To have batch of proper quality the following key aspects must be taken into account: the batch must be crushed to an optimum degree that will result in leaning components decrease and increased contents of vitrivite in it which improves the sinterability and coking, and hence the quality of coke; the degree of mixing of the coking batch in all indices must be up to 98-99%, for uneven distribution in the coal chamber worsens the quality of coke

  20. Information security system based on virtual-optics imaging methodology and public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  1. Beyond Batch Processing: Towards Real-Time and Streaming Big Data

    OpenAIRE

    Shahrivari, Saeed; Jalili, Saeed

    2014-01-01

    Today, big data is generated from many sources and there is a huge demand for storing, managing, processing, and querying on big data. The MapReduce model and its counterpart open source implementation Hadoop, has proven itself as the de facto solution to big data processing. Hadoop is inherently designed for batch and high throughput processing jobs. Although Hadoop is very suitable for batch jobs but there is an increasing demand for non-batch processes on big data like: interactive jobs, r...

  2. Following an Optimal Batch Bioreactor Operations Model

    DEFF Research Database (Denmark)

    Ibarra-Junquera, V.; Jørgensen, Sten Bay; Virgen-Ortíz, J.J.

    2012-01-01

    The problem of following an optimal batch operation model for a bioreactor in the presence of uncertainties is studied. The optimal batch bioreactor operation model (OBBOM) refers to the bioreactor trajectory for nominal cultivation to be optimal. A multiple-variable dynamic optimization of fed...... as the master system which includes the optimal cultivation trajectory for the feed flow rate and the substrate concentration. The “real” bioreactor, the one with unknown dynamics and perturbations, is considered as the slave system. Finally, the controller is designed such that the real bioreactor...

  3. Limiting factors in Escherichia colifed-batch production of recombinant proteins

    DEFF Research Database (Denmark)

    Sanden, A.M.; Prytz, I.; Tubelekas, I.

    2003-01-01

    recombinant protein production, fed-batch, specific growth rate, feed profile, induction, mRNA, transcription, translation, acetic acid formation......recombinant protein production, fed-batch, specific growth rate, feed profile, induction, mRNA, transcription, translation, acetic acid formation...

  4. Modelling and Simulation of the Batch Hydrolysis of Acetic ...

    African Journals Online (AJOL)

    The kinetic modelling of the batch synthesis of acetic acid from acetic anhydride was investigated. The kinetic data of the reaction was obtained by conducting the hydrolysis reaction in a batch reactor. A dynamic model was formulated for this process and simulation was carried out using gPROMS® an advanced process ...

  5. 40 CFR 63.1326 - Batch process vents-recordkeeping provisions.

    Science.gov (United States)

    2010-07-01

    ....1325(e) for aggregate batch vent streams; (ii) For a boiler or process heater, a description of the location at which the vent stream is introduced into the boiler or process heater; (iii) For a boiler or... process vents or halogenated aggregate batch vent streams, the percent reduction of total hydrogen halides...

  6. Simulation of kefiran production of Lactobacillus kefiranofaciens JCM6985 in fed-batch reactor

    Directory of Open Access Journals (Sweden)

    Benjamas Cheirsilp

    2006-09-01

    Full Text Available Kinetics of kefiran production by Lactobacillus kefiranofaciens JCM6985 has been investigated. A mathematical model taking into account the mechanism of exopolysaccharides production has been developed. Experiments were carried out in batch mode in order to obtain kinetic model parameters that were further applied to simulate fed-batch processes. A simplification of parameter fitting was also introduced for complicated model. The fed-batch mode allows more flexibility in the control of the substrate concentration as well as product concentration in the culture medium. Based on the batch mathematical model, a fed-batch model was developed and simulations were done. Simulation study in fed-batch reactor resulted that substrate concentration should be controlled at 20 g L-1 to soften the product inhibition and also to stimulate utilization of substrate and its hydrolysate. From simulation results of different feeding techniques, it was found that constant feeding at 0.01 L h-1 was most practically effective feeding profile for exopolysaccharides production in fed-batch mode.

  7. Use of single-representative reverse-engineered surface-models for RSA does not affect measurement accuracy and precision.

    Science.gov (United States)

    Seehaus, Frank; Schwarze, Michael; Flörkemeier, Thilo; von Lewinski, Gabriela; Kaptein, Bart L; Jakubowitz, Eike; Hurschler, Christof

    2016-05-01

    Implant migration can be accurately quantified by model-based Roentgen stereophotogrammetric analysis (RSA), using an implant surface model to locate the implant relative to the bone. In a clinical situation, a single reverse engineering (RE) model for each implant type and size is used. It is unclear to what extent the accuracy and precision of migration measurement is affected by implant manufacturing variability unaccounted for by a single representative model. Individual RE models were generated for five short-stem hip implants of the same type and size. Two phantom analyses and one clinical analysis were performed: "Accuracy-matched models": one stem was assessed, and the results from the original RE model were compared with randomly selected models. "Accuracy-random model": each of the five stems was assessed and analyzed using one randomly selected RE model. "Precision-clinical setting": implant migration was calculated for eight patients, and all five available RE models were applied to each case. For the two phantom experiments, the 95%CI of the bias ranged from -0.28 mm to 0.30 mm for translation and -2.3° to 2.5° for rotation. In the clinical setting, precision is less than 0.5 mm and 1.2° for translation and rotation, respectively, except for rotations about the proximodistal axis (RSA can be achieved and are not biased by using a single representative RE model. At least for implants similar in shape to the investigated short-stem, individual models are not necessary. © 2015 Orthopaedic Research Society. Published by Wiley Periodicals, Inc. J Orthop Res 34:903-910, 2016. © 2015 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  8. Does hydroxyapatite coating enhance ingrowth and improve longevity of a Zweymuller type stem? A double-blinded randomised RSA trial.

    Science.gov (United States)

    Hoornenborg, Daniel; Sierevelt, Inger N; Spuijbroek, Joost A; Cheung, John; van der Vis, Harm M; Beimers, Lijkele; Haverkamp, Daniel

    2017-09-11

    An ongoing discussion is whether using a hydroxyapatite coating enhances the ingrowth and longevity of a femoral stem in total hip arthroplasty. The best way to predict speed of ingrowth and long-term outcome is by evaluating micromotion by radiostereometric analysis. To study the effect of hydroxyapatite (HA) coating on the migration of the SL-PLUS hip stem, we performed a prospective double blind randomised controlled trial comparing the early migration of the hydroxyapatite (HA)-coated SL-PLUS stem compared to the Standard (non-coated) SL-PLUS stem. 51 patients were randomly assigned to receive either an uncoated or a HA-coated femoral component during total hip replacement. RSA images were obtained direct postoperatively and at 6 weeks, 12 weeks, 6 months, 12 months and 24 months. HOOS scores were obtained preoperative and at final follow-up. RSA evaluation demonstrated significant migration up to 3 months postoperatively in both groups. After initial setting no significant migration was observed. There was no significant difference in migration between the HA-coated group and the uncoated group.Both Harris Hip Score (HHS) and HOOS domain scores (pain and ADL) significantly improved compared to baseline at 24 months after surgery in both treatment groups (p<0.001 for all comparisons). Improvement did not differ significantly between the 2 groups. At 2 years follow-up, the HA-coated and uncoated Zweymuller type, distal fitting stem do not show different migration patterns.

  9. 40 CFR 63.487 - Batch front-end process vents-reference control technology.

    Science.gov (United States)

    2010-07-01

    ... § 63.487 Batch front-end process vents—reference control technology. (a) Batch front-end process vents... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Batch front-end process vents-reference control technology. 63.487 Section 63.487 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY...

  10. Meeting report: batch-to-batch variability in estrogenic activity in commercial animal diets--importance and approaches for laboratory animal research.

    Science.gov (United States)

    Heindel, Jerrold J; vom Saal, Frederick S

    2008-03-01

    We report information from two workshops sponsored by the National Institutes of Health that were held to a) assess whether dietary estrogens could significantly impact end points in experimental animals, and b) involve program participants and feed manufacturers to address the problems associated with measuring and eliminating batch-to-batch variability in rodent diets that may lead to conflicting findings in animal experiments within and between laboratories. Data were presented at the workshops showing that there is significant batch-to-batch variability in estrogenic content of commercial animal diets, and that this variability results in differences in experimental outcomes. A combination of methods were proposed to determine levels of total estrogenic activity and levels of specific estrogenic constituents in soy-containing, casein-containing, and other soy-free rodent diets. Workshop participants recommended that researchers pay greater attention to the type of diet being used in animal studies and choose a diet whose estrogenic activity (or lack thereof) is appropriate for the experimental model and end points of interest. Information about levels of specific phytoestrogens, as well as estrogenic activity caused by other contaminants and measured by bioassay, should be disclosed in scientific publications. This will require laboratory animal diet manufacturers to provide investigators with information regarding the phytoestrogen content and other estrogenic compounds in commercial diets used in animal research.

  11. Dynamic Extensions of Batch Systems with Cloud Resources

    International Nuclear Information System (INIS)

    Hauth, T; Quast, G; Büge, V; Scheurer, A; Kunze, M; Baun, C

    2011-01-01

    Compute clusters use Portable Batch Systems (PBS) to distribute workload among individual cluster machines. To extend standard batch systems to Cloud infrastructures, a new service monitors the number of queued jobs and keeps track of the price of available resources. This meta-scheduler dynamically adapts the number of Cloud worker nodes according to the requirement profile. Two different worker node topologies are presented and tested on the Amazon EC2 Cloud service.

  12. Tier 3 batch system data locality via managed caches

    Science.gov (United States)

    Fischer, Max; Giffels, Manuel; Jung, Christopher; Kühn, Eileen; Quast, Günter

    2015-05-01

    Modern data processing increasingly relies on data locality for performance and scalability, whereas the common HEP approaches aim for uniform resource pools with minimal locality, recently even across site boundaries. To combine advantages of both, the High- Performance Data Analysis (HPDA) Tier 3 concept opportunistically establishes data locality via coordinated caches. In accordance with HEP Tier 3 activities, the design incorporates two major assumptions: First, only a fraction of data is accessed regularly and thus the deciding factor for overall throughput. Second, data access may fallback to non-local, making permanent local data availability an inefficient resource usage strategy. Based on this, the HPDA design generically extends available storage hierarchies into the batch system. Using the batch system itself for scheduling file locality, an array of independent caches on the worker nodes is dynamically populated with high-profile data. Cache state information is exposed to the batch system both for managing caches and scheduling jobs. As a result, users directly work with a regular, adequately sized storage system. However, their automated batch processes are presented with local replications of data whenever possible.

  13. An order batching algorithm for wave picking in a parallel-aisle warehouse

    NARCIS (Netherlands)

    Gademann, A.J.R.M.; Berg, van den J.P.; Hoff, van der H.H.

    2001-01-01

    In this paper we address the problem of batching orders in a parallel-aisle warehouse, with the objective to minimize the maximum lead time of any of the batches. This is a typical objective for a wave picking operation. Many heuristics have been suggested to solve order batching problems. We

  14. Fed-batch coculture of Lactobacillus kefiranofaciens with Saccharomyces cerevisiae for effective production of kefiran.

    Science.gov (United States)

    Tada, Shiori; Katakura, Yoshio; Ninomiya, Kazuaki; Shioya, Suteaki

    2007-06-01

    In a batch coculture of kefiran-producing lactic acid bacteria Lactobacillus kefiranofaciens and lactate-assimilating yeast Saccharomyces cerevisiae, lactate accumulation in the medium was observed, which inhibited kefiran production. To enhance kefiran productivity by preventing lactate accumulation, we conducted lactose-feeding batch operation with feedforward/feedback control during the coculture, so that the lactate production rate of L. kefiranofaciens was balanced with the lactate consumption rate of S. cerevisiae. The lactate concentration was maintained at less than 6 g l(-1) throughout the fed-batch coculture using a 5 l jar fermentor, although the concentration reached 33 g l(-1) in the batch coculture. Kefiran production was increased to 6.3 g in 102 h in the fed-batch coculture, whereas 4.5 g kefiran was produced in 97 h in the batch coculture. The kefiran yield on lactose basis was increased up to 0.033 g g(-1) in the fed-batch coculture, whereas that in the batch coculture was 0.027 g g(-1).

  15. Exploring the Transition From Batch to Online

    DEFF Research Database (Denmark)

    Jørgensen, Anker Helms

    2010-01-01

    of the truly interactive use of computers known today. The transition invoked changes in a number of areas: technological, such as hybrid forms between batch and online; organisational such as decentralization; and personal as users and developers alike had to adopt new technology, shape new organizational...... structures, and acquire new skills. This work-in-progress paper extends an earlier study of the transition from batch to online, based on oral history interviews with (ex)-employees in two large Danish Service Bureaus. The paper takes the next step by ana-lyzing a particular genre: the commercial computer...

  16. Comparison of the release of constituents from granular materials under batch and column testing.

    Science.gov (United States)

    Lopez Meza, Sarynna; Garrabrants, Andrew C; van der Sloot, Hans; Kosson, David S

    2008-01-01

    Column leaching testing can be considered a better basis for assessing field impact data than any other available batch test method and thus provides a fundamental basis from which to estimate constituent release under a variety of field conditions. However, column testing is time-intensive compared to the more simplified batch testing, and may not always be a viable option when making decisions for material reuse. Batch tests are used most frequently as a simple tool for compliance or quality control reasons. Therefore, it is important to compare the release that occurs under batch and column testing, and establish conservative interpretation protocols for extrapolation from batch data when column data are not available. Five different materials (concrete, construction debris, aluminum recycling residue, coal fly ash and bottom ash) were evaluated via batch and column testing, including different column flow regimes (continuously saturated and intermittent unsaturated flow). Constituent release data from batch and column tests were compared. Results showed no significant difference between the column flow regimes when constituent release data from batch and column tests were compared. In most cases batch and column testing agreed when presented in the form of cumulative release. For arsenic in carbonated materials, however, batch testing underestimates the column constituent release for most LS ratios and also on a cumulative basis. For cases when As is a constituent of concern, column testing may be required.

  17. Optimization of the Production of Polygalacturonase from Aspergillus kawachii Cloned in Saccharomyces cerevisiae in Batch and Fed-Batch Cultures

    Directory of Open Access Journals (Sweden)

    Diego Jorge Baruque

    2011-01-01

    Full Text Available Polygalacturonases (PG; EC 3.2.1.15 catalyze the hydrolysis of pectin and/or pectic acid and are useful for industrial applications such as juice clarification and pectin extraction. Growth and heterologous expression of recombinant Saccharomyces cerevisiae which expresses an acidic PG from Aspergillus kawachii has been studied in batch and fed-batch cultures. Kinetics and stoichiometric parameters of the recombinant yeast were determined in batch cultures in a synthetic medium. In these cultures, the total biomass concentration, protein concentration, and enzyme activity achieved were 2.2 g/L, 10 mg/L, and 3 U/mL, respectively, to give a productivity of 0.06 U/(mL·h. In fed-batch cultures, various strategies for galactose feeding were used: (i after a glucose growth phase, the addition of a single pulse of galactose which gave a productivity of 0.19 U/(mL·h; (ii after a glucose growth phase, a double pulse of galactose at the same final concentration was added, resulting in a productivity of 0.21 U/(mL·h; (iii a simultaneous feeding of glucose and galactose, yielding a productivity of 1.32 U/(mL·h. Based on these results, the simultaneous feeding of glucose and galactose was by far the most suitable strategy for the production of this enzyme. Moreover, some biochemical characteristics of the recombinant enzyme such as a molecular mass of ~60 kDa, an isoelectric point of 3.7 and its ability to hydrolyze polygalacturonic acid at pH=2.5 were determined.

  18. A Model of Batch Scheduling for a Single Batch Processor with Additional Setups to Minimize Total Inventory Holding Cost of Parts of a Single Item Requested at Multi-due-date

    Science.gov (United States)

    Hakim Halim, Abdul; Ernawati; Hidayat, Nita P. A.

    2018-03-01

    This paper deals with a model of batch scheduling for a single batch processor on which a number of parts of a single items are to be processed. The process needs two kinds of setups, i. e., main setups required before processing any batches, and additional setups required repeatedly after the batch processor completes a certain number of batches. The parts to be processed arrive at the shop floor at the times coinciding with their respective starting times of processing, and the completed parts are to be delivered at multiple due dates. The objective adopted for the model is that of minimizing total inventory holding cost consisting of holding cost per unit time for a part in completed batches, and that in in-process batches. The formulation of total inventory holding cost is derived from the so-called actual flow time defined as the interval between arrival times of parts at the production line and delivery times of the completed parts. The actual flow time satisfies not only minimum inventory but also arrival and delivery just in times. An algorithm to solve the model is proposed and a numerical example is shown.

  19. Simulated Batch Production of Penicillin

    Science.gov (United States)

    Whitaker, A.; Walker, J. D.

    1973-01-01

    Describes a program in applied biology in which the simulation of the production of penicillin in a batch fermentor is used as a teaching technique to give students experience before handling a genuine industrial fermentation process. Details are given for the calculation of minimum production cost. (JR)

  20. Analysis and modelling of the energy consumption of chemical batch plants

    Energy Technology Data Exchange (ETDEWEB)

    Bieler, P.S.

    2004-07-01

    This report for the Swiss Federal Office of Energy (SFOE) describes two different approaches for the energy analysis and modelling of chemical batch plants. A top-down model consisting of a linear equation based on the specific energy consumption per ton of production output and the base consumption of the plant is postulated. The model is shown to be applicable to single and multi-product batches for batch plants with constant production mix and multi-purpose batch plants in which only similar chemicals are produced. For multipurpose batch plants with highly varying production processes and changing production mix, the top-down model produced inaccurate results. A bottom-up model is postulated for such plants. The results obtained are discussed that show that the electricity consumption for infrastructure equipment was significant and responsible for about 50% of total electricity consumption. The specific energy consumption for the different buildings was related to the degree of automation and the production processes. Analyses of the results of modelling are presented. More detailed analyses of the energy consumption of this apparatus group show that about 30 to 40% of steam energy is lost and thus a large potential for optimisation exists. Various potentials for making savings, ranging from elimination of reflux conditions to the development of a new heating/cooling-system for a generic batch reactor, are identified.

  1. Response variation in a batch of TLDS

    International Nuclear Information System (INIS)

    Burrage, J.; Campbell, A.

    2004-01-01

    Full text: At Royal Perth Hospital, LiF thermoluminescent dosimeter rods (TLDs) are handled in batches of 50. Rods in each batch are always annealed together to ensure the same thermal history and an individual batch is used with the same type and energy of radiation. A subset of a batch is used for calibration purposes by exposing them to a range of known doses and their output is used to calculate the dose received by other rods used for a dose measurement. Variation in TLD response is addressed by calculating 95% certainty levels from the calibration rods and applying this to the dose measurement rods. This approach relies on the sensitivity of rods within each batch being similar. This work investigates the validity of this assumption and considers possible benefits of applying individual rod sensitivities. The variation in response of TLD rods was assessed using 25 TLD-100 rods (Harshaw/Bicron) which were uniformly exposed to 1 Gy using 6 MeV photons in a linear accelerator on 5 separate occasions. Rods were read with a Harshaw 5500 reader. During the read process the Harshaw reader periodically checks for noise and PMT gain drift and the data were corrected for these parameters. Replicate exposure data were analysed using 1-way Analysis of Variance (ANOVA) to determine whether the between rod variations were significantly different to the variations within a single rod. A batch of 50 rods was also exposed on three occasions using the above technique. Individual TLD rod sensitivity values were determined using the rod responses from 2 exposures and these values were applied to correct charges on a rod-by-rod basis for the third exposure. ANOVA results on the 5 exposures of 25 rods showed the variance between rods was significantly greater than the within rod variance (p < 0.001). The precision of an individual rod was estimated to have a standard deviation of 2.8%. This suggests that the 95% confidence limits for repeated measurements using the same dose and

  2. Dose and batch-dependent hepatobiliary toxicity of 10 nm silver nanoparticles

    Directory of Open Access Journals (Sweden)

    Marcella De Maglie

    2015-07-01

    Full Text Available Silver nanoparticles (AgNPs are widely used because of their antimicrobial properties in medical devices and in a variety of consumer products. The extensive use of AgNPs raises concerns about their potential toxicity, although it is still difficult to draw definite conclusions about their toxicity based on published data. Our preliminary studies performed to compare the effect of the AgNPs size (10-40-100 nm on toxicity, demonstrated that the smallest AgNPs determine the most severe toxicological effects. In order to best investigate the impact of physicochemical characteristics of 10 nm AgNPs on toxicity, we compare three different batches of 10 nm AgNPs slightly different in size distribution (Batch A: 8.8±1.7 nm; Batch B: 9.4±1.7 nm; Batch C: 10.0±1.8 nm. Mice were intravenously treated with two doses (5 and 10 mg/kg of the 3 AgNPs. 24 hours after the treatment, mice were euthanized and underwent complete necropsy. Tissues were collected for histopathological examination and total silver content was determined in tissues by inductively coupled plasma mass spectrometry (ICP-MS. All batches induced severe hepatobiliary lesions, i.e. marked hepatocellular necrosis and massive hemorrhage of the gall bladder. The toxicity was dose-dependent and interestingly, the toxic effects were more severe in mice treated with batches A and B that contained smaller AgNPs. Since the total silver mass concentration was similar, the observed batch-dependent toxicity suggest that even subtle differences in size may contribute to relevant changes in the toxicological outcomes, confirming the fundamental involvement of physicochemical features with respect to toxicity.

  3. Аналог системы шифрования RSA на платформе m2(Zn)

    OpenAIRE

    Агеенко, А.

    2009-01-01

    Строится аналог системы RSA на платформе M2(Zn). Предлагается улучшенный вариант RSA' системы шифрования RSA', в котором ключ дешифрования определяется не по функции Эйлера ϕ (n), а по периоду мультипликативной группы Zn*.

  4. Cloning, multicopy expression and fed-batch production of Rhodotorula araucariae epoxide hydrolase in yarrowia lipolytica

    CSIR Research Space (South Africa)

    Ramduth, D

    2008-05-01

    Full Text Available demonstrated a 4 fold enhanced EH activity over the transformant. The transformant was then evaluated in batch and fed batch fermentations, where the batch fermentations resulted in - 50% improved EH activity from flask evaluations. In fed batch fermentations...

  5. Simple approximations for the batch-arrival MX/G/1 queue

    NARCIS (Netherlands)

    van Ommeren, Jan C.W.

    1990-01-01

    In this paper we consider the MX/G/I queueing system with batch arrivals. We give simple approximations for the waiting-time probabilities of individual customers. These approximations are checked numerically and they are found to perform very well for a wide variety of batch-size and service-timed

  6. 2-year follow-up report on micromotion of a short tibia stem. A prospective, randomized RSA study of 59 patients.

    Science.gov (United States)

    Molt, Mats; Toksvig-Larsen, Sören

    2015-01-01

    A shortened tibial stem could influence the early prosthetic fixation. We therefore compared the short stem to the standard-length stem using radiostereometric analysis (RSA) as primary outcome measure. 60 patients were randomized to receive a cemented Triathlon total knee arthroplasty (TKA) with a tibial tray of either standard or short stem length. The patients were blinded regarding treatment allocation. The micromotion of the tibial component was measured by RSA postoperatively, at 3 months, and after 1 and 2 years; clinical outcome was measured with the American Knee Society score (AKSS) and the knee osteoarthritis and injury outcome score (KOOS). The maximum total point motion (MTPM) for the standard stem was 0.36 (SD 0.16) mm at 3 months, 0.51 (SD 0.27) mm at 1 year, and 0.54 (SD 0.28) mm at 2 years. For the short stem, it was 0.42 (0.24) mm, 0.59 (0.43) mm, and 0.61 (0.39) mm. 4 short-stemmed components and 2 standard-stemmed components had more than 0.2 mm of migration between the first- and second-year follow-up, and were classified as continuously migrating. The short-stemmed cemented tibial prosthesis showed an early prosthetic migratory pattern similar to that of the standard-stemmed cemented Triathlon knee prosthesis. The number of continuously migrating tibial plates in each group is predictive of a lower revision rate than 5% at 10 years.

  7. Look-ahead strategies for controlling batch operations in industry - overview, comparison and exploration

    NARCIS (Netherlands)

    Zee, D.J. van der; Harten, A. van; Schuur, P.C.; Joines, JA; Barton, RR; Kang, K; Fishwick, PA

    2000-01-01

    Batching jobs in a manufacturing system is a very common policy in most industries. The main reasons for batching are avoidance of set ups and/or facilitation of material handling. Good examples of batch-wise production systems are ovens found in aircraft industry and in semiconductor manufacturing.

  8. Kinetic studies on batch cultivation of Trichoderma reesei and application to enhance cellulase production by fed-batch fermentation.

    Science.gov (United States)

    Ma, Lijuan; Li, Chen; Yang, Zhenhua; Jia, Wendi; Zhang, Dongyuan; Chen, Shulin

    2013-07-20

    Reducing the production cost of cellulase as the key enzyme for cellulose hydrolysis to fermentable sugars remains a major challenge for biofuel production. Because of the complexity of cellulase production, kinetic modeling and mass balance calculation can be used as effective tools for process design and optimization. In this study, kinetic models for cell growth, substrate consumption and cellulase production in batch fermentation were developed, and then applied in fed-batch fermentation to enhance cellulase production. Inhibition effect of substrate was considered and a modified Luedeking-Piret model was developed for cellulase production and substrate consumption according to the growth characteristics of Trichoderma reesei. The model predictions fit well with the experimental data. Simulation results showed that higher initial substrate concentration led to decrease of cellulase production rate. Mass balance and kinetic simulation results were applied to determine the feeding strategy. Cellulase production and its corresponding productivity increased by 82.13% after employing the proper feeding strategy in fed-batch fermentation. This method combining mathematics and chemometrics by kinetic modeling and mass balance can not only improve cellulase fermentation process, but also help to better understand the cellulase fermentation process. The model development can also provide insight to other similar fermentation processes. Copyright © 2013 Elsevier B.V. All rights reserved.

  9. Efectos de 2 Tipos de Entrenamiento Interválico de Alta Intensidad en la Habilidad para Realizar Esfuerzos Máximos (RSA Durante una Pretemporada de Fútbol

    Directory of Open Access Journals (Sweden)

    Alejandro Rodríguez Fernández

    2014-01-01

    Full Text Available El trabajo de pretemporada persigue mejorar el rendimiento del futbolista tanto en lo referente a la habilidad para realizar esfuerzos máximos como a su capacidad aeróbica y de recuperación. El objetivo de este estudio fue comparar durante una pretemporada los efectos de 2 programas de entrenamiento interválicos con series de diferente duración en la habilidad de repetir sprints (RSA. Diecinueve jugadores de fútbol con valores medios ± SD de 20,9 ± 1,6 años de edad; 68,8 ± 5,1 Kg de peso; 176,1 ± 5,1 cm de altura; y 9,6 ± 2,4% de grasa corporal fueron asignados al azar al grupo de Speed Endurance Training (SET para realizar 2x10 min con 10, 15 y 20 s al 100% con 30, 45 y 60 s de recuperación (n = 9, o al grupo High Interval Training (HIT para realizar 4x4 min al 95% FCmax (n = 10. Un test RSA de 8x30 m con 25 s de recuperación activa fue realizado antes y después de la intervención (10 sesiones de entrenamiento junto con un Yo-Yo Intermittent Recovery Test level 1 en la evaluación inicial. Tanto SET como HIT ven incrementado su rendimiento de forma significativa (p < 0,05 en RSAmejor (3,12% y 3,59% respectivamente y muy significativamente (p < 0,01 en RSAmedia (3,00% y 3,91% y RSAtotal (3,12% y 4,08%, pero sin cambios significativos en los índices de fatiga (Sdec y Change. Estos resultados demuestran que tanto la intervención SET como HIT se han mostrado útiles para aumentar el rendimiento en algunas de las variables determinantes en el test RSA, durante el periodo de pretemporada.

  10. 40 CFR 1065.245 - Sample flow meter for batch sampling.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Sample flow meter for batch sampling... Sample flow meter for batch sampling. (a) Application. Use a sample flow meter to determine sample flow... difference between a diluted exhaust sample flow meter and a dilution air meter to calculate raw exhaust flow...

  11. Farm batch system and Fermi inter-process communication and synchronization toolkit

    International Nuclear Information System (INIS)

    Mandrichenko, I.V.

    2001-01-01

    Farms Batch System (FBS) was developed as a batch process management system for off-line Run II data processing at Fermilab. FBS will manage PC farms composed of up to 250 nodes and scalable to 1000 nodes with disk capacity of up to several TB. FBS allows users to start arrays of parallel processes on multiple computers. It uses a simplified resource counting method load balancing. FBS has been successfully used for more than a year at Fermilab by fixed target experiments and will be used for collider experiment off-line data processing. Fermi Inter-Process Communication toolkit (FIPC) was designed as a supplement product for FBS that helps establish synchronization and communication between processes running in a distributed batch environment. However, FIPC is an independent package, and can be used with other batch systems, as well as in a non-batch environment. FIPC provides users with a variety of global distributed objects such as semaphores, queues and string variables. Other types of objects can be easily added to FIPC. FIPC has been running on several PC farms at Fermilab for half a year and is going to be used by CDF for off-line data processing

  12. Removing batch effects for prediction problems with frozen surrogate variable analysis

    Directory of Open Access Journals (Sweden)

    Hilary S. Parker

    2014-09-01

    Full Text Available Batch effects are responsible for the failure of promising genomic prognostic signatures, major ambiguities in published genomic results, and retractions of widely-publicized findings. Batch effect corrections have been developed to remove these artifacts, but they are designed to be used in population studies. But genomic technologies are beginning to be used in clinical applications where samples are analyzed one at a time for diagnostic, prognostic, and predictive applications. There are currently no batch correction methods that have been developed specifically for prediction. In this paper, we propose an new method called frozen surrogate variable analysis (fSVA that borrows strength from a training set for individual sample batch correction. We show that fSVA improves prediction accuracy in simulations and in public genomic studies. fSVA is available as part of the sva Bioconductor package.

  13. Adaptation to high throughput batch chromatography enhances multivariate screening.

    Science.gov (United States)

    Barker, Gregory A; Calzada, Joseph; Herzer, Sibylle; Rieble, Siegfried

    2015-09-01

    High throughput process development offers unique approaches to explore complex process design spaces with relatively low material consumption. Batch chromatography is one technique that can be used to screen chromatographic conditions in a 96-well plate. Typical batch chromatography workflows examine variations in buffer conditions or comparison of multiple resins in a given process, as opposed to the assessment of protein loading conditions in combination with other factors. A modification to the batch chromatography paradigm is described here where experimental planning, programming, and a staggered loading approach increase the multivariate space that can be explored with a liquid handling system. The iterative batch chromatography (IBC) approach is described, which treats every well in a 96-well plate as an individual experiment, wherein protein loading conditions can be varied alongside other factors such as wash and elution buffer conditions. As all of these factors are explored in the same experiment, the interactions between them are characterized and the number of follow-up confirmatory experiments is reduced. This in turn improves statistical power and throughput. Two examples of the IBC method are shown and the impact of the load conditions are assessed in combination with the other factors explored. Copyright © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Model Integrasi Penjadwalan Produksi Batch dan Penjadwalan Perawatan dengan Kendala Due Date

    Directory of Open Access Journals (Sweden)

    Zahedi .

    2014-01-01

    Full Text Available This paper discusses the integration model of batch production and preventive maintenance scheduling on a single machine producing an item to be delivered at a common due date. The machine is a deteriorating machine that requires preventive maintenance to ensure the availability of the machine at a desired service level. Decision variables of the model are the number of preventive maintenances, the schedule, length of production runs, as well as the number of batches, batch sizes and the production schedule of the resulting batches for each production run. The objective function of the model is to minimize the total cost consisting of inventory costs during parts processing, setup cost and cost of preventive maintenance. The results show three important points: First, the sequence of optimal batches always follows the SPT (short processing time. Second, variation of preventive maintenance unit cost does not influence the sequence of batches. Third, the first production run length from production starting time is smaller than the next production run length and this pattern continues until the due date. When in process inventory unit cost is increased, the pattern will continue until a specified cost limit, and beyond the limit the pattern will change to be the opposite pattern.

  15. PENENTUAN PRODUCTION LOT SIZES DAN TRANSFER BATCH SIZES DENGAN PENDEKATAN MULTISTAGE

    Directory of Open Access Journals (Sweden)

    Purnawan Adi W

    2012-02-01

    Full Text Available Pengendalian dan perawatan inventori merupakan suatu permasalahan yang sering dihadapi seluruh organisasi dalam berbagai sektor ekonomi. Salah satu tantangan yang yang harus dihadapi dalam pengendalian inventori adalah bagaimana menentukan ukuran lot yang optimal pada suatu sistem produksi dengan berbagai tipe. Analisis batch produksi (production lot dengan pendekatan hybrid simulasi analitik merupakan salah satu penelitian mengenai ukuran lot optimal. Penelitian tersebut menggunakan pendekatan sistem singlestage dimana tidak adanya hubungan antar proses di setiap stage atau dengan kata lain, proses yang satu independen terhadap proses yang lain. Dengan menggunakan objek penelitian yang sama dengan objek penelitian diatas, penelitian ini kemudian mengangkat permasalahan penentuan ukuran production lot dengan pendekatan multistage. Pertama, dengan menggunakan data-data yang sama dengan penelitian sebelumnya ditentukan ukuran production lot yang optimal dengan metode programa linier. Selanjutnya ukuran production lot digunakan sebegai input simulasi untuk menentukan ukuran transfer batch. Rata-rata panjang antrian dan waktu tunggu menjadi ukuran performansi yang digunakan sebagai acuan penentuan ukuran transfer batch dari beberapa alternatif ukuran yang ada. Pada penelitian ini, ukuran production lot yang dihasilkan sama besarnya dengan demand tiap periode. Sedangkan untuk ukuran transfer batch, hasil penentuan dengan menggunakan simulasi kemudian dimplementasikan ke dalam model. Hasilnya adalah adanya penurunan inventori yang terjadi sebesar 76,35% untuk produk connector dan 50,59% untuk produk box connector dari inventori yang dihasilkan dengan pendekatan singlestage. Kata kunci : multistage, production lot, transfer batch     Abstract   Inventory maintenance and inventory control is a problem that often faced by all organization in many economic sectors. One of challenges that must be faced in inventory control is how to determine the

  16. Pollution prevention applications in batch manufacturing operations

    Science.gov (United States)

    Sykes, Derek W.; O'Shaughnessy, James

    2004-02-01

    Older, "low-tech" batch manufacturing operations are often fertile grounds for gains resulting from pollution prevention techniques. This paper presents a pollution prevention technique utilized for wastewater discharge permit compliance purposes at a batch manufacturer of detergents, deodorants, and floor-care products. This manufacturer generated industrial wastewater as a result of equipment rinses required after each product batch changeover. After investing a significant amount of capital on end of pip-line wastewater treatment technology designed to address existing discharge limits, this manufacturer chose to investigate alternate, low-cost approaches to address anticipated new permit limits. Mass balances using spreadsheets and readily available formulation and production data were conducted on over 300 products to determine how each individual product contributed to the total wastewater pollutant load. These mass balances indicated that 22 products accounted for over 55% of the wastewater pollutant. Laboratory tests were conducted to determine whether these same products could accept their individual changeover rinse water as make-up water in formulations without sacrificing product quality. This changeover reuse technique was then implement at the plant scale for selected products. Significant reductions in wastewater volume (25%) and wastewater pollutant loading (85+%) were realized as a direct result of this approach.

  17. Study on the impact of transition from 3-batch to 4-batch loading at Loviisa NPP on the long-term decay heat and activity inventory

    Energy Technology Data Exchange (ETDEWEB)

    Lahtinen, Tuukka [Fortum Power and Heat Ltd., Fortum (Finland)

    2017-09-15

    The fuel economy of Loviisa NPP was improved by implementing a transition from 3-batch to 4-batch loading scheme between 2009 and 2013. Equilibrium cycle length as well as all process parameters were retained unchanged while the increase of fuel enrichment enabled to reduce the annual reload batch size from 102 to 84 assemblies. The fuel cycle transition obviously had an effect on the long-term decay heat and activity inventory. However, due to simultaneous change in several quantities the net effect over the relevant cooling time region is not self-evident. In this study the effect is analyzed properly, i. e. applying consistent calculation models and detailed description of assembly-wise irradiation histories. The study concludes that for the cooling time, foreseen typical prior to encapsulation of assemblies, the decay heat of discharge batch increases 2 - 3%. It is also concluded that, in order to maintain 100% filling degree of final disposal canisters, the cooling time prior to encapsulation needs to be prolonged by 10 - 15 years.

  18. Retardation characteristics of radionuclides in geologic media through batch and packed column experiments

    International Nuclear Information System (INIS)

    Park, Hun Hwee; Han, Kyung Won; Han, Pil Soo; Lee, Jae Owan; Park, Chung Kyun; Yang, Ho Yeon

    1988-03-01

    Batch and packed column experiments are performed to investigate the retardation characteristics of radionuclide,i.e, Cs-137 in geologic media. In batch experiment, the effects of important parameters on the sorption of radionuclide in geologic media, such as nuclide concentration, pH, and particle size are examined. The Kd value obtained from breakthrough curve was compared with that from the batch sorption experiment to investigate the applicability of the Kd value from batch experiment to prediction of radionuclide migration in dynamic flow through porous media. The proposed model of radionuclide migration in porous media is also verified using the experimental results. (Author)

  19. Monitoring and Characterization of Crystal Nucleation and Growth during Batch Crystallization

    NARCIS (Netherlands)

    Kadam, S.S.

    2012-01-01

    Batch crystallization is commonly used in pharmaceutical, agrochemical, specialty and fine chemicals industry. The advantages of batch crystallization lie in its ease of operation and the relatively simple equipment that can be used. On the other hand a major disadvantage associated with it is the

  20. Optimal operation of batch membrane processes

    CERN Document Server

    Paulen, Radoslav

    2016-01-01

    This study concentrates on a general optimization of a particular class of membrane separation processes: those involving batch diafiltration. Existing practices are explained and operational improvements based on optimal control theory are suggested. The first part of the book introduces the theory of membrane processes, optimal control and dynamic optimization. Separation problems are defined and mathematical models of batch membrane processes derived. The control theory focuses on problems of dynamic optimization from a chemical-engineering point of view. Analytical and numerical methods that can be exploited to treat problems of optimal control for membrane processes are described. The second part of the text builds on this theoretical basis to establish solutions for membrane models of increasing complexity. Each chapter starts with a derivation of optimal operation and continues with case studies exemplifying various aspects of the control problems under consideration. The authors work their way from th...

  1. Application of gain scheduling to the control of batch bioreactors

    Science.gov (United States)

    Cardello, Ralph; San, Ka-Yiu

    1987-01-01

    The implementation of control algorithms to batch bioreactors is often complicated by the inherent variations in process dynamics during the course of fermentation. Such a wide operating range may render the performance of fixed gain PID controllers unsatisfactory. In this work, a detailed study on the control of batch fermentation is performed. Furthermore, a simple batch controller design is proposed which incorporates the concept of gain-scheduling, a subclass of adaptive control, with oxygen uptake rate as an auxiliary variable. The control of oxygen tension in the biorector is used as a vehicle to convey the proposed idea, analysis and results. Simulation experiments indicate significant improvement in controller performance can be achieved by the proposed approach even in the presence of measurement noise.

  2. Look-ahead strategies for controlling batch operations in industry : basic insights in rule construction

    NARCIS (Netherlands)

    van der Zee, D.J.; Sullivan, W.A.; Ahmad, M.M.; Fichtner, D.; Sauer, W.; Weigert, G.; Zerna, T.

    2002-01-01

    Batching jobs in a manufacturing system is a very common policy in most industries. Main reasons for batching are avoidance of set ups and/or facilitation of material handling. Examples of batch-wise production systems are ovens found in aircraft industry and in semiconductor manufacturing. Starting

  3. Control of polymer network topology in semi-batch systems

    Science.gov (United States)

    Wang, Rui; Olsen, Bradley; Johnson, Jeremiah

    Polymer networks invariably possess topological defects: loops of different orders. Since small loops (primary loops and secondary loops) both lower the modulus of network and lead to stress concentration that causes material failure at low deformation, it is desirable to greatly reduce the loop fraction. We have shown that achieving loop fraction close to zero is extremely difficult in the batch process due to the slow decay of loop fraction with the polymer concentration and chain length. Here, we develop a modified kinetic graph theory that can model network formation reactions in semi-batch systems. We demonstrate that the loop fraction is not sensitive to the feeding policy if the reaction volume maintains constant during the network formation. However, if we initially put concentrated solution of small junction molecules in the reactor and continuously adding polymer solutions, the fractions of both primary loop and higher-order loops will be significantly reduced. There is a limiting value (nonzero) of loop fraction that can be achieved in the semi-batch system in condition of extremely slow feeding rate. This minimum loop fraction only depends on a single dimensionless variable, the product of concentration and with single chain pervaded volume, and defines an operating zone in which the loop fraction of polymer networks can be controlled through adjusting the feeding rate of the semi-batch process.

  4. Monitoring of batch processes using spectroscopy

    NARCIS (Netherlands)

    Gurden, S. P.; Westerhuis, J. A.; Smilde, A. K.

    2002-01-01

    There is an increasing need for new techniques for the understanding, monitoring and the control of batch processes. Spectroscopy is now becoming established as a means of obtaining real-time, high-quality chemical information at frequent time intervals and across a wide range of industrial

  5. Production of tea vinegar by batch and semicontinuous fermentation

    OpenAIRE

    Kaur, Pardeep; Kocher, G. S.; Phutela, R. P.

    2010-01-01

    The fermented tea vinegar combines the beneficial properties of tea and vinegar. The complete fermentation takes 4 to 5 weeks in a batch culture and thus can be shortened by semi continuous/ continuous fermentation using immobilized bacterial cells. In the present study, alcoholic fermentation of 1.0 and 1.5% tea infusions using Saccharomyces cerevisae G was carried out that resulted in 84.3 and 84.8% fermentation efficiency (FE) respectively. The batch vinegar fermentation of these wines wit...

  6. Ethanol production from Sorghum bicolor using both separate and simultaneous saccharification and fermentation in batch and fed batch systems

    DEFF Research Database (Denmark)

    Mehmood, Sajid; Gulfraz, M.; Rana, N. F.

    2009-01-01

    The objective of this work was to find the best combination of different experimental conditions during pre-treatment, enzymatic saccharification, detoxification of inhibitors and fermentation of Sorghum bicolor straw for ethanol production. The optimization of pre-treatment using different...... were used in order to increase the monomeric sugar during enzymatic hydrolysis and it has been observed that the addition of these surfactants contributed significantly in cellulosic conversion but no effect was shown on hemicellulosic hydrolysis. Fermentability of hydrolyzate was tested using...... Saccharomyces cerevisiae Ethanol Red (TM) and it was observed that simultaneous saccharification and fermentation ( SSF) with both batch and fed batch resulted in better ethanol yield as compared to separate hydrolysis and fermentation ( SHF). Detoxification of furan during SHF facilitated reduction...

  7. Optimal Operation of Industrial Batch Crystallizers : A Nonlinear Model-based Control Approach

    NARCIS (Netherlands)

    Mesbah, A.

    2010-01-01

    Batch crystallization is extensively employed in the chemical, pharmaceutical, and food industries to separate and purify high value-added chemical substances. Despite their widespread application, optimal operation of batch crystallizers is particularly challenging. The difficulties primarily

  8. Three-batch reloading scheme for IRIS reactor extended cycles

    International Nuclear Information System (INIS)

    Jecmenica, R.; Pevec, D.; Grgic, D.

    2004-01-01

    To fully exploit the IRIS reactor optimized maintenance, and at the same time improve fuel utilization, a core design enabling a 4-year operating cycle together with a three-batch reloading scheme is desirable. However, this requires not only the increased allowed burnup but also use of fuel with uranium oxide enriched beyond 5%. This paper considers three-batch reloading scheme for a 4-year operating cycle with the assumptions of increased discharge burnup and fuel enrichment beyond 5%. Calculational model of IRIS reactor core has been developed based on FER FA2D code for group constants generation and NRC's PARCS nodal code for global core analysis. Studies have been performed resulting in a preliminary design of a three-batch core configuration for the first cycle. It must be emphasized that this study is outside the current IRIS licensing efforts, which rely on the present fuel technology (enrichment below 5%), but it is of long-term interest for potential future IRIS design upgrades. (author)

  9. Results on testing pilot industrial batch of SC magnets for the UNK

    International Nuclear Information System (INIS)

    Ageev, A.I.; Andreev, N.I.; Balbekov, V.I.; Chirkov, P.N.; Dolzhenkov, V.I.; Gertsev, K.F.; Gridasov, V.I.; Myznikov, K.P.; Smirnov, N.L.; Sychev, V.A.

    1992-01-01

    IHEP has developed and studied the superconducting dipoles and quadrupoles of the regular part of the UNK main ring which satisfy the requirements imposed on them. The pilot-industrial batch of the UNK SC magnets has been produced now. The reproducibility of the magnet characteristics is studied and the mass production technology is optimized with this batch. The results of the cryogenic tests and the magnetic field measurements for the UNK SC dipoles of the pilot-industrial batch are presented. (author) 5 refs.; 6 figs.; 1 tab

  10. Modeling of oxide reduction in repeated-batch pyroprocessing

    International Nuclear Information System (INIS)

    Lee, Hyo Jik; Im, Hun Suk; Park, Geun Il

    2016-01-01

    Highlights: • Pyroprocessing is a complicated batch-type operation. • Discrete event system modeling was used to create an integrated operation model. • Simulation showed that could be accomplished. • The dynamic material flow helps us understand the process operation. • We showed that complex material flow could be simulated in terms of mass balance. - Abstract: Pyroprocessing is a complicated batch-type operation, involving a highly complex material flow logic with a huge number of unit processes. Discrete event system modeling was used to create an integrated operation model for which simulation showed that dynamic material flow could be accomplished to provide considerable insight into the process operation. In the model simulation, the amount of material transported upstream and downstream in the process satisfies a mass balance equation while considering the hold-up incurred by every batch operation. This study also simulated, in detail, an oxide reduction group process embracing electrolytic reduction, cathode processing, and salt purification. Based on the default operation scenario, it showed that complex material flows could be precisely simulated in terms of the mass balance. Specifically, the amount of high-heat elements remaining in the molten salt bath is analyzed to evaluate the operation scenario.

  11. Comparison of Batch Assay and Random Assay Using Automatic Dispenser in Radioimmunoassay

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Seung Hwan; Jang, Su Jin; Kang, Ji Yeon; Lee, Dong Soo; Chung, June Key; Lee, Myung Chul [Seoul Metropolitan Government Seoul National University Boramae Medical Center, Seoul (Korea, Republic of); Lee, Ho Young; Shin, Sun Young; Min, Gyeong Sun; Lee, Hyun Joo [Seoul National University college of Medicine, Seoul (Korea, Republic of)

    2009-08-15

    Radioimmunoassay (RIA) was usually performed by the batch assay. To improve the efficiency of RIA without increase of the cost and time, random assay could be a choice. We investigated the possibility of the random assay using automatic dispenser by assessing the agreement between batch assay and random assay. The experiments were performed with four items; Triiodothyronine (T3), free thyroxine (fT4), Prostate specific antigen (PSA), Carcinoembryonic antigen (CEA). In each item, the sera of twenty patients, the standard, and the control samples were used. The measurements were done 4 times with 3 hour time intervals by random assay and batch assay. The coefficient of variation (CV) of the standard samples and patients' data in T3, fT4, PSA, and CEA were assessed. ICC (Intraclass correlation coefficient) and coefficient of correlation were measured to assessing the agreement between two methods. The CVs (%) of T3, fT4, PSA, and CEA measured by batch assay were 3.2+-1.7%, 3.9+-2.1%, 7.1+-6.2%, 11.2+-7.2%. The CVs by random assay were 2.1+-1.7%, 4.8+-3.1%, 3.6+-4.8%, and 7.4+-6.2%. The ICC between the batch assay and random assay were 0.9968 (T3), 0.9973 (fT4), 0.9996 (PSA), and 0.9901 (CEA). The coefficient of correlation between the batch assay and random assay were 0.9924(T3), 0.9974 (fT4), 0.9994 (PSA), and 0.9989 (CEA) (p<0.05). The results of random assay showed strong agreement with the batch assay in a day. These results suggest that random assay using automatic dispenser could be used in radioimmunoassay

  12. Comparison of Batch Assay and Random Assay Using Automatic Dispenser in Radioimmunoassay

    International Nuclear Information System (INIS)

    Moon, Seung Hwan; Jang, Su Jin; Kang, Ji Yeon; Lee, Dong Soo; Chung, June Key; Lee, Myung Chul; Lee, Ho Young; Shin, Sun Young; Min, Gyeong Sun; Lee, Hyun Joo

    2009-01-01

    Radioimmunoassay (RIA) was usually performed by the batch assay. To improve the efficiency of RIA without increase of the cost and time, random assay could be a choice. We investigated the possibility of the random assay using automatic dispenser by assessing the agreement between batch assay and random assay. The experiments were performed with four items; Triiodothyronine (T3), free thyroxine (fT4), Prostate specific antigen (PSA), Carcinoembryonic antigen (CEA). In each item, the sera of twenty patients, the standard, and the control samples were used. The measurements were done 4 times with 3 hour time intervals by random assay and batch assay. The coefficient of variation (CV) of the standard samples and patients' data in T3, fT4, PSA, and CEA were assessed. ICC (Intraclass correlation coefficient) and coefficient of correlation were measured to assessing the agreement between two methods. The CVs (%) of T3, fT4, PSA, and CEA measured by batch assay were 3.2±1.7%, 3.9±2.1%, 7.1±6.2%, 11.2±7.2%. The CVs by random assay were 2.1±1.7%, 4.8±3.1%, 3.6±4.8%, and 7.4±6.2%. The ICC between the batch assay and random assay were 0.9968 (T3), 0.9973 (fT4), 0.9996 (PSA), and 0.9901 (CEA). The coefficient of correlation between the batch assay and random assay were 0.9924(T3), 0.9974 (fT4), 0.9994 (PSA), and 0.9989 (CEA) (p<0.05). The results of random assay showed strong agreement with the batch assay in a day. These results suggest that random assay using automatic dispenser could be used in radioimmunoassay

  13. Robust Selection Algorithm (RSA) for Multi-Omic Biomarker Discovery; Integration with Functional Network Analysis to Identify miRNA Regulated Pathways in Multiple Cancers.

    Science.gov (United States)

    Sehgal, Vasudha; Seviour, Elena G; Moss, Tyler J; Mills, Gordon B; Azencott, Robert; Ram, Prahlad T

    2015-01-01

    MicroRNAs (miRNAs) play a crucial role in the maintenance of cellular homeostasis by regulating the expression of their target genes. As such, the dysregulation of miRNA expression has been frequently linked to cancer. With rapidly accumulating molecular data linked to patient outcome, the need for identification of robust multi-omic molecular markers is critical in order to provide clinical impact. While previous bioinformatic tools have been developed to identify potential biomarkers in cancer, these methods do not allow for rapid classification of oncogenes versus tumor suppressors taking into account robust differential expression, cutoffs, p-values and non-normality of the data. Here, we propose a methodology, Robust Selection Algorithm (RSA) that addresses these important problems in big data omics analysis. The robustness of the survival analysis is ensured by identification of optimal cutoff values of omics expression, strengthened by p-value computed through intensive random resampling taking into account any non-normality in the data and integration into multi-omic functional networks. Here we have analyzed pan-cancer miRNA patient data to identify functional pathways involved in cancer progression that are associated with selected miRNA identified by RSA. Our approach demonstrates the way in which existing survival analysis techniques can be integrated with a functional network analysis framework to efficiently identify promising biomarkers and novel therapeutic candidates across diseases.

  14. Hierarchical Bayesian models to assess between- and within-batch variability of pathogen contamination in food.

    Science.gov (United States)

    Commeau, Natalie; Cornu, Marie; Albert, Isabelle; Denis, Jean-Baptiste; Parent, Eric

    2012-03-01

    Assessing within-batch and between-batch variability is of major interest for risk assessors and risk managers in the context of microbiological contamination of food. For example, the ratio between the within-batch variability and the between-batch variability has a large impact on the results of a sampling plan. Here, we designed hierarchical Bayesian models to represent such variability. Compatible priors were built mathematically to obtain sound model comparisons. A numeric criterion is proposed to assess the contamination structure comparing the ability of the models to replicate grouped data at the batch level using a posterior predictive loss approach. Models were applied to two case studies: contamination by Listeria monocytogenes of pork breast used to produce diced bacon and contamination by the same microorganism on cold smoked salmon at the end of the process. In the first case study, a contamination structure clearly exists and is located at the batch level, that is, between batches variability is relatively strong, whereas in the second a structure also exists but is less marked. © 2012 Society for Risk Analysis.

  15. Establishing column batch repeatability according to Quality by Design (QbD) principles using modeling software.

    Science.gov (United States)

    Rácz, Norbert; Kormány, Róbert; Fekete, Jenő; Molnár, Imre

    2015-04-10

    Column technology needs further improvement even today. To get information of batch-to-batch repeatability, intelligent modeling software was applied. Twelve columns from the same production process, but from different batches were compared in this work. In this paper, the retention parameters of these columns with real life sample solutes were studied. The following parameters were selected for measurements: gradient time, temperature and pH. Based on calculated results, batch-to-batch repeatability of BEH columns was evaluated. Two parallel measurements on two columns from the same batch were performed to obtain information about the quality of packing. Calculating the average of individual working points at the highest critical resolution (R(s,crit)) it was found that the robustness, calculated with a newly released robustness module, had a success rate >98% among the predicted 3(6) = 729 experiments for all 12 columns. With the help of retention modeling all substances could be separated independently from the batch and/or packing, using the same conditions, having high robustness of the experiments. Copyright © 2015 Elsevier B.V. All rights reserved.

  16. Fructose production by Zymomonas mobilis in fed-batch culture with minimal sorbitol formation

    Energy Technology Data Exchange (ETDEWEB)

    Edye, L A; Johns, M R; Ewings, K N

    1989-08-01

    Fed-batch cultures of Zymomonas mobilis (UQM 2864), a mutant unable to metabolise fructose, grown on diluted sugar cane syrup (200 g/l sucrose) achieved yields of 90.5 g/l fructose and 48.3 g/l ethanol with minimal sorbitol formation and complete utilization of the substrate. The effect of inoculum size on sorbitol formation in the batch stage of fed-batch fermentation are reported. Fermentation of sucrose (350 g/l) supplemented with nutrients yielded 142 g/l fructose and 76.5 g/l ethanol. Some fructose product loss at high fructose concentrations was observed. The fed-batch fermentation process offers a method for obtaining high concentrations of fructose and ethanol from sucrose materials. (orig.).

  17. From batch to continuous extractive distillation using thermodynamic insight: class 1.0-2 case B

    OpenAIRE

    Shen, Weifeng; Benyounes, Hassiba; Gerbaud, Vincent

    2011-01-01

    A systematic feasibility analysis is presented for the separation azeotropic mixtures by batch and continuous extractive distillation. Based on batch feasibility knowledge, batch and continuous separation feasibility is studied under reflux ratio and entrainer flow-rate for the ternary system chloroform-vinyl acetate-butyl acetate, which belongs to the class 1.0-2 separating maximum boiling temperature azeotropes using a heavy entrainer. How information on feasibility of batch mode could be e...

  18. Fed-batch CHO cell culture for lab-scale antibody production

    DEFF Research Database (Denmark)

    Fan, Yuzhou; Ley, Daniel; Andersen, Mikael Rørdam

    2017-01-01

    Fed-batch culture is the most commonly used upstream process in industry today for recombinant monoclonal antibody production using Chinese hamster ovary cells. Developing and optimizing this process in the lab is crucial for establishing process knowledge, which enable rapid and predictable tech......-transfer to manufacturing scale. In this chapter, we will describe stepwise how to carry out fed-batch CHO cell culture for lab-scale antibody production....

  19. Improving cellulase productivity of Penicillium oxalicum RE-10 by repeated fed-batch fermentation strategy.

    Science.gov (United States)

    Han, Xiaolong; Song, Wenxia; Liu, Guodong; Li, Zhonghai; Yang, Piao; Qu, Yinbo

    2017-03-01

    Medium optimization and repeated fed-batch fermentation were performed to improve the cellulase productivity by P. oxalicum RE-10 in submerged fermentation. First, Plackett-Burman design (PBD) and central composite design (CCD) were used to optimize the medium for cellulase production. PBD demonstrated wheat bran and NaNO 3 had significant influences on cellulase production. The CCD results showed the maximum filter paper activity (FPA) production of 8.61U/mL could be achieved in Erlenmeyer flasks. The maximal FPA reached 12.69U/mL by submerged batch fermentation in a 7.5-L stirred tank, 1.76-fold higher than that on the original medium. Then, the repeated fed-batch fermentation strategy was performed successfully for increasing the cellulase productivity from 105.75U/L/h in batch fermentation to 158.38U/L/h. The cellulase activity and the glucan conversion of delignined corn cob residue hydrolysis had no significant difference between the enzymes sampled from different cycles of the repeated fed-batch fermentation and that from batch culture. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Optimization of heat-liberating batches for ash residue stabilization

    International Nuclear Information System (INIS)

    Karlina, O.K.; Varlackova, G.A.; Ojovan, M.I.; Tivansky, V.M.; Dmitriev, S.A.

    1999-01-01

    The ash residue obtained after incineration of solid radioactive waste is a dusting poly-dispersed powder like material that contains radioactive nuclides ( 137 Cs, 90 Sr, 239 Pu, hor ( ellipsis)). Specific radioactivity of the ash can be about 10 5 --10 7 Bq/kg. In order to dispose of the ash, residue shall be stabilized by producing a monolith material. The ash residue can be either vitrified or stabilized into a ceramic matrix. For this purpose the ash residue is mixed with fluxing agents followed by melting of obtained composition in the different type melters. As a rule this requires both significant energy consumption and complex melting equipment. A stabilization technology of ash residue was proposed recently by using heat liberating batches-compositions with redox properties. The ash residue is melted due to exothermic chemical reactions in the mixture with heat-liberating batch that occur with considerable release of heat. Stabilization method has three stages: (1) preparation of a mixture of heating batch and ash residue with or without glass forming batch (frit); (2) ignition and combustion of mixed composition; (3) cooling (quenching) of obtained vitreous material. Combustion of mixed composition occurs in the form of propagation of reacting wave. The heat released during exothermic chemical reactions provides melting of ash residue components and production of glass-like phase. The final product consists of a glass like matrix with embedded crystalline inclusions of infusible ash residue components

  1. Production of carotenoids and lipids by Rhodococcus opacus PD630 in batch and fed-batch culture.

    Science.gov (United States)

    Thanapimmetha, Anusith; Suwaleerat, Tharatron; Saisriyoot, Maythee; Chisti, Yusuf; Srinophakun, Penjit

    2017-01-01

    Production of carotenoids by Rhodococcus opacus PD630 is reported. A modified mineral salt medium formulated with glycerol as an inexpensive carbon source was used for the fermentation. Ammonium acetate was the nitrogen source. A dry cell mass concentration of nearly 5.4 g/L could be produced in shake flasks with a carotenoid concentration of 0.54 mg/L. In batch culture in a 5 L bioreactor, without pH control, the maximum dry biomass concentration was ~30 % lower than in shake flasks and the carotenoids concentration was 0.09 mg/L. Both the biomass concentration and the carotenoids concentration could be raised using a fed-batch operation with a feed mixture of ammonium acetate and acetic acid. With this strategy, the final biomass concentration was 8.2 g/L and the carotenoids concentration was 0.20 mg/L in a 10-day fermentation. A control of pH proved to be unnecessary for maximizing the production of carotenoids in this fermentation.

  2. A CATASTROPHIC-CUM-RESTORATIVE QUEUING SYSTEM WITH CORRELATED BATCH ARRIVALS AND VARIABLE CAPACITY

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar

    2008-07-01

    Full Text Available In this paper, we study a catastrophic-cum-restorative queuing system with correlated batch arrivals and service in batches of variable sizes. We perform the transient analysis of the queuing model. We obtain the Laplace Transform of the probability generating function of system size. Finally, some particular cases of the model have been derived and discussed. Keywords: Queue length, Catastrophes, Correlated batch arrivals, Broadband services, Variable service capacity, and Restoration.

  3. A Job Monitoring and Accounting Tool for the LSF Batch System

    International Nuclear Information System (INIS)

    Sarkar, Subir; Taneja, Sonia

    2011-01-01

    This paper presents a web based job monitoring and group-and-user accounting tool for the LSF Batch System. The user oriented job monitoring displays a simple and compact quasi real-time overview of the batch farm for both local and Grid jobs. For Grid jobs the Distinguished Name (DN) of the Grid users is shown. The overview monitor provides the most up-to-date status of a batch farm at any time. The accounting tool works with the LSF accounting log files. The accounting information is shown for a few pre-defined time periods by default. However, one can also compute the same information for any arbitrary time window. The tool already proved to be an extremely useful means to validate more extensive accounting tools available in the Grid world. Several sites have already been using the present tool and more sites running the LSF batch system have shown interest. We shall discuss the various aspects that make the tool essential for site administrators and end-users alike and outline the current status of development as well as future plans.

  4. Batch variation between branchial cell cultures: An analysis of variance

    DEFF Research Database (Denmark)

    Hansen, Heinz Johs. Max; Grosell, M.; Kristensen, L.

    2003-01-01

    We present in detail how a statistical analysis of variance (ANOVA) is used to sort out the effect of an unexpected batch-to-batch variation between cell cultures. Two separate cultures of rainbow trout branchial cells were grown on permeable filtersupports ("inserts"). They were supposed...... and introducing the observed difference between batches as one of the factors in an expanded three-dimensional ANOVA, we were able to overcome an otherwisecrucial lack of sufficiently reproducible duplicate values. We could thereby show that the effect of changing the apical medium was much more marked when...... the radioactive lipid precursors were added on the apical, rather than on the basolateral, side. Theinsert cell cultures were obviously polarized. We argue that it is not reasonable to reject troublesome experimental results, when we do not know a priori that something went wrong. The ANOVA is a very useful...

  5. Conjugated Polymers Via Direct Arylation Polymerization in Continuous Flow: Minimizing the Cost and Batch-to-Batch Variations for High-Throughput Energy Conversion

    DEFF Research Database (Denmark)

    Gobalasingham, Nemal S.; Carlé, Jon Eggert; Krebs, Frederik C

    2017-01-01

    of high-performance materials. To demonstrate the usefulness of the method, DArP-prepared PPDTBT via continuous flow synthesis is employed for the preparation of indium tin oxide (ITO)-free and flexible roll-coated solar cells to achieve a power conversion efficiency of 3.5% for 1 cm2 devices, which...... is comparable to the performance of PPDTBT polymerized through Stille cross coupling. These efforts demonstrate the distinct advantages of the continuous flow protocol with DArP avoiding use of toxic tin chemicals, reducing the associated costs of polymer upscaling, and minimizing batch-to-batch variations...

  6. One-Time Pad as a nonlinear dynamical system

    Science.gov (United States)

    Nagaraj, Nithin

    2012-11-01

    The One-Time Pad (OTP) is the only known unbreakable cipher, proved mathematically by Shannon in 1949. In spite of several practical drawbacks of using the OTP, it continues to be used in quantum cryptography, DNA cryptography and even in classical cryptography when the highest form of security is desired (other popular algorithms like RSA, ECC, AES are not even proven to be computationally secure). In this work, we prove that the OTP encryption and decryption is equivalent to finding the initial condition on a pair of binary maps (Bernoulli shift). The binary map belongs to a family of 1D nonlinear chaotic and ergodic dynamical systems known as Generalized Luröth Series (GLS). Having established these interesting connections, we construct other perfect secrecy systems on the GLS that are equivalent to the One-Time Pad, generalizing for larger alphabets. We further show that OTP encryption is related to Randomized Arithmetic Coding - a scheme for joint compression and encryption.

  7. Comparação entre o sistema Petrifilm RSA® e a metodologia convencional para a enumeração de estafilococos coagulase positiva em alimentos Comparison of Petrifilm RSA system with the traditional methodology for the enumeration of coagulase-positive Staphylococcus in foods

    Directory of Open Access Journals (Sweden)

    Anderson de Souza Sant'ana

    2005-09-01

    Full Text Available A pesquisa de estafilococos coagulase positiva em alimentos é feita através de sua detecção e enumeração em meios seletivos e diferenciais e posterior caracterização pelos testes de coagulase, termonuclease, Gram e catalase. Estes testes podem requerer até quatro dias para obtenção dos resultados finais, além do tempo e material dispensados ao seu uso. As placas Petrfilm® RSA são uma alternativa a esta metodologia. No presente estudo, foram analisadas 62 amostras de diferentes alimentos comparando-se a metodologia tradicional (ABP, seguido dos testes de coagulaseou Staphytect Plus e o sistema Petrifilm. O sistema Petrifilm® RSA diferiu significativamente da metodologia tradicional, dando médias de contagem superiores. Ao se considerar colônias típicas e atípicas, o ABP seguido de confirmação pelo Staphytect Plus diferiu significativamente dos demais métodos testados. O Petrifilm RSA é uma alternativa para a enumeração de estafilococos coagulase positivos em alimentos, em virtude do menor tempo (aproximadamente 31 horas, para obter-se resultados realmente quantitativos. Deve-se testar tanto colônias típicas quanto atípicas crescidas no ABP, para se evitar falhas na quantificação dos resultados. Esta contagem é mais significativa ao se usar o teste de aglutinação em látex (Staphytect Plus. A análise de estafilococos em alimentos apresenta diversas limitações.Foods are examined for the presence of coagulase-positive staphylococci using selective and differential media followed by characterization for coagulase, thermoestable nuclease, Gram and catalase tests. These tests may require up to four days to obtain the results, besides time and material used. The Petrifilm® rapid S.aureus count plate is a alternative to traditional methodology. In this study, 62 samples of several foods were analysed comparing the BPA method followed by coagulase or latex agglutination tests and Petrifilm® RSA method. The Petrifilm

  8. Die godsdiensneutraliteitsbeginsel van die Amerikaanse demokrasie - implikasie vir onderwys in die RSA

    Directory of Open Access Journals (Sweden)

    J.G. van Staden

    1995-03-01

    Full Text Available The principle of religious neutrality in the American democracy - implications for education in the RSA In a changing, democratic educational dispensation the accommodation of various religious convictions and religious needs of the heterogenous South African population is a matter that has to be dealt with with great circumspection. Valuable lessons that can prevent distress and disruption may be learnt from the way in which the American hyper-democracy has handled the situation. Democracy is the American's predominant pre-occupation. Any attempt of any group (e.g. a religious group to grant a monopoly in state schools to religious values in special learning content and religious ceremonies and practices has always been opposed. This approach has eventually led to total neutrality as regards traditional religious convictions and practices in American state schools, resulting in the establishment of another conviction (secular humanism in state schools. Thus it seems that neutrality as regards religious convictions is not possible. Absolutism of the principle of neutrality as regards traditional religions has resulted in a degeneration of moral values. If all the religious convictions cannot be accommodated in the South African public education system, it may for South Africa, as bastion of Christian civilization, be a danger sign as has been the case in the USA.

  9. Detection and identification of the atypical bovine pestiviruses in commercial foetal bovine serum batches.

    Directory of Open Access Journals (Sweden)

    Hongyan Xia

    Full Text Available The recently emerging atypical bovine pestiviruses have been detected in commercial foetal bovine serum (FBS of mainly South American origin so far. It is unclear how widely the viruses are presented in commercial FBS of different geographic origins. To further investigate the possible pestivirus contamination of commercially available FBS batches, 33 batches of FBS were obtained from ten suppliers and analysed in this study for the presence of both the recognised and the atypical bovine pestiviruses. All 33 batches of FBS were positive by real-time RT-PCR assays for at least one species of bovine pestiviruses. According to the certificate of analysis that the suppliers claimed for each batch of FBS, BVDV-1 was detected in all 11 countries and BVDV-2 was detected exclusively in the America Continent. The atypical pestiviruses were detected in 13 batches claimed to originate from five countries. Analysis of partial 5'UTR sequences showed a high similarity among these atypical bovine pestiviruses. This study has demonstrated, for the first time that commercial FBS batches of different geographic origins are contaminated not only with the recognised species BVDV-1 and BVDV-2, but also with the emerging atypical bovine pestiviruses.

  10. Application of the fuzzy theory to simulation of batch fermentation

    Energy Technology Data Exchange (ETDEWEB)

    Filev, D P; Kishimoto, M; Sengupta, S; Yoshida, T; Taguchi, H

    1985-12-01

    A new approach for system identification with a linguistic model of batch fermentation processes is proposed. The fuzzy theory was applied in order to reduce the uncertainty of quantitative description of the processes by use of qualitative characteristics. An example of fuzzy modeling was illustrated in the simulation of batch ethanol production from molasses after interpretation of the new method, and extension of the fuzzy model was also discussed for several cases of different measurable variables.

  11. Design of common heat exchanger network for batch processes

    International Nuclear Information System (INIS)

    Anastasovski, Aleksandar

    2014-01-01

    Heat integration of energy streams is very important for the efficient energy recovery in production systems. Pinch technology is a very useful tool for heat integration and maximizing energy efficiency. Creating of heat exchangers network as a common solution for systems in batch mode that will be applicable in all existing time slices is very difficult. This paper suggests a new methodology for design of common heat exchanger network for batch processes. Heat exchanger network designs were created for all determined repeatable and non-repeatable time periods – time slices. They are the basis for creating the common heat exchanger network. The common heat exchanger network as solution, satisfies all heat-transfer needs for each time period and for every existing combination of selected streams in the production process. This methodology use split of some heat exchangers into two or more heat exchange units or heat exchange zones. The reason for that is the multipurpose use of heat exchangers between different pairs of streams in different time periods. Splitting of large heat exchangers would maximize the total heat transfer usage of heat exchange units. Final solution contains heat exchangers with the minimum heat load as well as the minimum need of heat transfer area. The solution is applicable for all determined time periods and all existing stream combinations. - Highlights: •Methodology for design of energy efficient systems in batch processes. •Common Heat Exchanger Network solution based on designs with Pinch technology. •Multipurpose use of heat exchangers in batch processes

  12. Systematic Methodology for Reproducible Optimizing Batch Operation

    DEFF Research Database (Denmark)

    Bonné, Dennis; Jørgensen, Sten Bay

    2006-01-01

    This contribution presents a systematic methodology for rapid acquirement of discrete-time state space model representations of batch processes based on their historical operation data. These state space models are parsimoniously parameterized as a set of local, interdependent models. The present...

  13. Early subsidence of shape-closed hip arthroplasty stems is associated with late revision. A systematic review and meta-analysis of 24 RSA studies and 56 survival studies.

    Science.gov (United States)

    van der Voort, Paul; Pijls, Bart G; Nieuwenhuijse, Marc J; Jasper, Jorrit; Fiocco, Marta; Plevier, Josepha W M; Middeldorp, Saskia; Valstar, Edward R; Nelissen, Rob G H H

    2015-01-01

    Few studies have addressed the association between early migration of femoral stems and late aseptic revision in total hip arthroplasty. We performed a meta-regression analysis on 2 parallel systematic reviews and meta-analyses to determine the association between early migration and late aseptic revision of femoral stems. Of the 2 reviews, one covered early migration data obtained from radiostereometric analysis (RSA) studies and the other covered long-term aseptic revision rates obtained from survival studies with endpoint revision for aseptic loosening. Stems were stratified according to the design concept: cemented shape-closed, cemented force-closed, and uncemented. A weighted regression model was used to assess the association between early migration and late aseptic revision, and to correct for confounders. Thresholds for acceptable and unacceptable migration were determined in accordance with the national joint registries (≤ 5% revision at 10 years) and the NICE criteria (≤ 10% revision at 10 years). 24 studies (731 stems) were included in the RSA review and 56 studies (20,599 stems) were included in the survival analysis review. Combining both reviews for the 3 design concepts showed that for every 0.1-mm increase in 2-year subsidence, as measured with RSA, there was a 4% increase in revision rate for the shape-closed stem designs. This association remained after correction for age, sex, diagnosis, hospital type, continent, and study quality. The threshold for acceptable migration of shape-closed designs was defined at 0.15 mm; stems subsiding less than 0.15 mm in 2 years had revision rates of less than 5% at 10 years, while stems exceeding 0.15 mm subsidence had revision rates of more than 5%. There was a clinically relevant association between early subsidence of shape-closed femoral stems and late revision for aseptic loosening. This association can be used to assess the safety of shape-closed stem designs. The published research is not sufficient

  14. The development of an industrial-scale fed-batch fermentation simulation.

    Science.gov (United States)

    Goldrick, Stephen; Ştefan, Andrei; Lovett, David; Montague, Gary; Lennox, Barry

    2015-01-10

    This paper describes a simulation of an industrial-scale fed-batch fermentation that can be used as a benchmark in process systems analysis and control studies. The simulation was developed using a mechanistic model and validated using historical data collected from an industrial-scale penicillin fermentation process. Each batch was carried out in a 100,000 L bioreactor that used an industrial strain of Penicillium chrysogenum. The manipulated variables recorded during each batch were used as inputs to the simulator and the predicted outputs were then compared with the on-line and off-line measurements recorded in the real process. The simulator adapted a previously published structured model to describe the penicillin fermentation and extended it to include the main environmental effects of dissolved oxygen, viscosity, temperature, pH and dissolved carbon dioxide. In addition the effects of nitrogen and phenylacetic acid concentrations on the biomass and penicillin production rates were also included. The simulated model predictions of all the on-line and off-line process measurements, including the off-gas analysis, were in good agreement with the batch records. The simulator and industrial process data are available to download at www.industrialpenicillinsimulation.com and can be used to evaluate, study and improve on the current control strategy implemented on this facility. Crown Copyright © 2014. Published by Elsevier B.V. All rights reserved.

  15. Integrating Preventive Maintenance Scheduling As Probability Machine Failure And Batch Production Scheduling

    Directory of Open Access Journals (Sweden)

    Zahedi Zahedi

    2016-06-01

    Full Text Available This paper discusses integrated model of batch production scheduling and machine maintenance scheduling. Batch production scheduling uses minimize total actual flow time criteria and machine maintenance scheduling uses the probability of machine failure based on Weibull distribution. The model assumed no nonconforming parts in a planning horizon. The model shows an increase in the number of the batch (length of production run up to a certain limit will minimize the total actual flow time. Meanwhile, an increase in the length of production run will implicate an increase in the number of PM. An example was given to show how the model and algorithm work.

  16. Capacity Planning for Batch and Perfusion Bioprocesses Across Multiple Biopharmaceutical Facilities

    OpenAIRE

    Siganporia, Cyrus C; Ghosh, Soumitra; Daszkowski, Thomas; Papageorgiou, Lazaros G; Farid, Suzanne S

    2014-01-01

    Production planning for biopharmaceutical portfolios becomes more complex when products switch between fed-batch and continuous perfusion culture processes. This article describes the development of a discrete-time mixed integer linear programming (MILP) model to optimize capacity plans for multiple biopharmaceutical products, with either batch or perfusion bioprocesses, across multiple facilities to meet quarterly demands. The model comprised specific features to account for products with fe...

  17. Continuous Heterogeneous Photocatalysis in Serial Micro-Batch Reactors.

    Science.gov (United States)

    Pieber, Bartholomäus; Shalom, Menny; Antonietti, Markus; Seeberger, Peter H; Gilmore, Kerry

    2018-01-29

    Solid reagents, leaching catalysts, and heterogeneous photocatalysts are commonly employed in batch processes but are ill-suited for continuous-flow chemistry. Heterogeneous catalysts for thermal reactions are typically used in packed-bed reactors, which cannot be penetrated by light and thus are not suitable for photocatalytic reactions involving solids. We demonstrate that serial micro-batch reactors (SMBRs) allow for the continuous utilization of solid materials together with liquids and gases in flow. This technology was utilized to develop selective and efficient fluorination reactions using a modified graphitic carbon nitride heterogeneous catalyst instead of costly homogeneous metal polypyridyl complexes. The merger of this inexpensive, recyclable catalyst and the SMBR approach enables sustainable and scalable photocatalysis. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Leaching behavior of mineral processing waste: Comparison of batch and column investigations

    Energy Technology Data Exchange (ETDEWEB)

    Al-Abed, Souhail R. [National Risk Management Research Laboratory, U.S. Environmental Protection Agency, 26 West Martin Luther King Drive, Cincinnati, OH 45268 (United States)], E-mail: al-abed.souhail@epa.gov; Jegadeesan, G. [Pegasus Technical Services Inc., 46 East Hollister Street, Cincinnati, OH 45219 (United States); Purandare, J. [Englandgeosystem Inc., 15375 Barranca Pkwy, Suite F-106, Irvine, CA 92618 (United States); Allen, D. [National Risk Management Research Laboratory, U.S. Environmental Protection Agency, 26 West Martin Luther King Drive, Cincinnati, OH 45268 (United States)

    2008-05-30

    In this study, a comparison of laboratory batch and column experiments on metal release profile from a mineral processing waste (MPW) is presented. Batch (equilibrium) and column (dynamic) leaching tests were conducted on ground MPW at different liquid-solid ratios (LS) to determine the mechanisms controlling metal release. Additionally, the effect of pH on metal release is also discussed. It was observed that acidic pH conditions induced dissolution of As, Zn and Cu. Negligible leaching at alkaline pH was observed. However, Se depicted amphoteric behavior with high release at low and high pH. The batch and column data showed that As and Se release increased with LS ratio, while that of Cu and Zn increased initially and tapered towards equilibrium values at high LS ratios. The results on metal release from the MPW suggested that dissolution of the metal was the controlling mechanism. Leaching profiles from the batch and column data corresponded well for most LS ratios. This is most likely due to the acidic character of the waste, minimal changes in pH during the column operation and granular structure of the waste. From a waste management perspective, low cost batch equilibrium studies in lieu of high cost column experiments can be used for decision making on its disposal only when the waste exhibits characteristics similar to the mineral processing waste.

  19. Leaching behavior of mineral processing waste: Comparison of batch and column investigations

    International Nuclear Information System (INIS)

    Al-Abed, Souhail R.; Jegadeesan, G.; Purandare, J.; Allen, D.

    2008-01-01

    In this study, a comparison of laboratory batch and column experiments on metal release profile from a mineral processing waste (MPW) is presented. Batch (equilibrium) and column (dynamic) leaching tests were conducted on ground MPW at different liquid-solid ratios (LS) to determine the mechanisms controlling metal release. Additionally, the effect of pH on metal release is also discussed. It was observed that acidic pH conditions induced dissolution of As, Zn and Cu. Negligible leaching at alkaline pH was observed. However, Se depicted amphoteric behavior with high release at low and high pH. The batch and column data showed that As and Se release increased with LS ratio, while that of Cu and Zn increased initially and tapered towards equilibrium values at high LS ratios. The results on metal release from the MPW suggested that dissolution of the metal was the controlling mechanism. Leaching profiles from the batch and column data corresponded well for most LS ratios. This is most likely due to the acidic character of the waste, minimal changes in pH during the column operation and granular structure of the waste. From a waste management perspective, low cost batch equilibrium studies in lieu of high cost column experiments can be used for decision making on its disposal only when the waste exhibits characteristics similar to the mineral processing waste

  20. Integration of virtualized worker nodes in standard batch systems

    International Nuclear Information System (INIS)

    Buege, Volker; Kunze, Marcel; Oberst, Oliver; Quast, Guenter; Scheurer, Armin; Hessling, Hermann; Kemp, Yves; Synge, Owen

    2010-01-01

    Current experiments in HEP only use a limited number of operating system flavours. Their software might only be validated on one single OS platform. Resource providers might have other operating systems of choice for the installation of the batch infrastructure. This is especially the case if a cluster is shared with other communities, or communities that have stricter security requirements. One solution would be to statically divide the cluster into separated sub-clusters. In such a scenario, no opportunistic distribution of the load can be achieved, resulting in a poor overall utilization efficiency. Another approach is to make the batch system aware of virtualization, and to provide each community with its favoured operating system in a virtual machine. Here, the scheduler has full flexibility, resulting in a better overall efficiency of the resources. In our contribution, we present a lightweight concept for the integration of virtual worker nodes into standard batch systems. The virtual machines are started on the worker nodes just before jobs are executed there. No meta-scheduling is introduced. We demonstrate two prototype implementations, one based on the Sun Grid Engine (SGE), the other using Maui/Torque as a batch system. Both solutions support local job as well as Grid job submission. The hypervisors currently used are Xen and KVM, a port to another system is easily envisageable. To better handle different virtual machines on the physical host, the management solution VmImageManager is developed. We will present first experience from running the two prototype implementations. In a last part, we will show the potential future use of this lightweight concept when integrated into high-level (i.e. Grid) work-flows.

  1. Heterogeneous batch distillation processes for waste solvent recovery in pharmaceutical industry

    OpenAIRE

    Rodriguez-Donis, Ivonne; Gerbaud, Vincent; Arias-Barreto, Alien; Joulia, Xavier

    2009-01-01

    A summary about our experiences in the introduction of heterogeneous entrainers in azeotropic and extractive batch distillation is presented in this work. Essential advantages of the application of heterogeneous entrainers are showed by rigorous simulation and experimental verification in a bench batch distillation column for separating several azeotropic mixtures such as acetonitrile – water, n hexane – ethyl acetate and chloroform – methanol, commonly found in pharmaceutical industry.

  2. Treatment of slaughterhouse wastewater in anaerobic sequencing batch reactors

    Energy Technology Data Exchange (ETDEWEB)

    Masse, D. I.; Masse, L. [Agriculture and Agri-Food Canada, Lennoxville, PQ (Canada)

    2000-09-01

    Slaughterhouse waste water was treated in anaerobic sequencing batch reactors operated at 30 degrees C. Two of the batch reactors were seeded with anaerobic granular sludge from a milk processing plant reactor; two others received anaerobic non-granulated sludge from a municipal waste water treatment plant. Influent total chemical oxygen demand was reduced by 90 to 96 per cent at organic loading rates ranging from 2.07 kg to 4.93 kg per cubic meter. Reactors seeded with municipal sludge performed slightly better than those containing sludge from the milk processing plant. The difference was particularly noticeable during start-up, but the differences between the two sludges were reduced with time. The reactors produced a biogas containing 75 per cent methane. About 90.5 per cent of the chemical oxygen demand removed was methanized; volatile suspended solids accumulation was determined at 0.068 kg per kg of chemical oxygen demand removed. The high degree of methanization suggests that most of the soluble and suspended organic material in slaughterhouse waste water was degraded during the treatment in the anaerobic sequencing batch reactors. 30 refs., 1 tab., 6 figs.

  3. Fault Diagnosis of Batch Reactor Using Machine Learning Methods

    Directory of Open Access Journals (Sweden)

    Sujatha Subramanian

    2014-01-01

    Full Text Available Fault diagnosis of a batch reactor gives the early detection of fault and minimizes the risk of thermal runaway. It provides superior performance and helps to improve safety and consistency. It has become more vital in this technical era. In this paper, support vector machine (SVM is used to estimate the heat release (Qr of the batch reactor both normal and faulty conditions. The signature of the residual, which is obtained from the difference between nominal and estimated faulty Qr values, characterizes the different natures of faults occurring in the batch reactor. Appropriate statistical and geometric features are extracted from the residual signature and the total numbers of features are reduced using SVM attribute selection filter and principle component analysis (PCA techniques. artificial neural network (ANN classifiers like multilayer perceptron (MLP, radial basis function (RBF, and Bayes net are used to classify the different types of faults from the reduced features. It is observed from the result of the comparative study that the proposed method for fault diagnosis with limited number of features extracted from only one estimated parameter (Qr shows that it is more efficient and fast for diagnosing the typical faults.

  4. DEVELOPMENT OF AN AUTOMATED BATCH-PROCESS SOLAR ...

    African Journals Online (AJOL)

    One of the shortcomings of solar disinfection of water (SODIS) is the absence of a feedback mechanism indicating treatment completion. This work presents the development of an automated batch-process water disinfection system aimed at solving this challenge. Locally sourced materials in addition to an Arduinomicro ...

  5. Optimization of fed-batch fermentation for xylitol production by Candida tropicalis.

    Science.gov (United States)

    Kim, J-H; Han, K-C; Koh, Y-H; Ryu, Y-W; Seo, J-H

    2002-07-01

    Xylitol, a functional sweetener, was produced from xylose by biological conversion using Candida tropicalis ATCC 13803. Based on a two-substrate fermentation using glucose for cell growth and xylose for xylitol production, fed-batch fermentations were undertaken to increase the final xylitol concentration. The effects of xylose and xylitol on xylitol production rate were studied to determine the optimum concentrations for fed-batch fermentation. Xylose concentration in the medium (100 g l(-1)) and less than 200 g l(-1) total xylose plus xylitol concentration were determined as optimum for maximum xylitol production rate and xylitol yield. Increasing the concentrations of xylose and xylitol decreased the rate and yield of xylitol production and the specific cell growth rate, probably because of an increase in osmotic stress that would interfere with xylose transport, xylitol flux to secretion to cell metabolism. The feeding rate of xylose solution during the fed-batch mode of operation was determined by using the mass balance equations and kinetic parameters involved in the equations in order to increase final xylitol concentration without affecting xylitol and productivity. The optimized fed-batch fermentation resulted in 187 g l(-1) xylitol concentration, 0.75 g xylitol g xylose(-1) xylitol yield and 3.9 g xylitol l(-1) h(-1) volumetric productivity.

  6. Optimum heat storage design for heat integrated multipurpose batch plants

    CSIR Research Space (South Africa)

    Stamp, J

    2011-01-01

    Full Text Available procedure is presented tha journal homepage: www All rights reserved. ajozi T, Optimum heat storage grated multipurpose batch plants , South Africa y usage in multipurpose batch plants has been in published literature most present methods, time... � 2pL?u?kins ? 1 h3A3?u?cu?U (36) The internal area for heat loss by convection from the heat transfer medium is given by Constraint (37) and the area for convective heat transfer losses to the environment is given in Constraint (38). A1?u? ? 2...

  7. Mathematical models for a batch scheduling problem to minimize earliness and tardiness

    Directory of Open Access Journals (Sweden)

    Basar Ogun

    2018-05-01

    Full Text Available Purpose: Today’s manufacturing facilities are challenged by highly customized products and just in time manufacturing and delivery of these products. In this study, a batch scheduling problem is addressed to provide on-time completion of customer orders in the environment of lean manufacturing. The problem is to optimize partitioning of product components into batches and scheduling of the resulting batches where each customer order is received as a set of products made of various components. Design/methodology/approach: Three different mathematical models for minimization of total earliness and tardiness of customer orders are developed to provide on-time completion of customer orders and also, to avoid from inventory of final products. The first model is a non-linear integer programming model while the second is a linearized version of the first. Finally, to solve larger sized instances of the problem, an alternative linear integer model is presented. Findings: Computational study using a suit set of test instances showed that the alternative linear integer model is able to solve all test instances in varying sizes within quite shorter computer times comparing to the other two models. It was also showed that the alternative model can solve moderate sized real-world problems. Originality/value: The problem under study differentiates from existing batch scheduling problems in the literature since it includes new circumstances which may arise in real-world applications. This research, also, contributes the literature of batch scheduling problem by presenting new optimization models.

  8. Study on Batch Culture Growth Model for Lactococcus lactis IO-1

    OpenAIRE

    Ishizaki, Ayaaki; Ohta, Tomomi; Kobayashi, Genta; 石崎, 文彬; 太田, 智美; 小林, 元太

    1991-01-01

    L-lactate fermentation employing Lactncoccus lactis IO-1 demonstrated a typical end product inhibition. By numerical analysis of fermentation results of the batch culture of this microorganism, the specific rates for cell growth, substrate consumption and product formation were clearly expressed by the end product inhibition formulae. All constants for those formulae were determined by the fermentation results. A mathematical model for batch culture growth of this microorganism in which the n...

  9. Role of batch depletion of broiler houses on the occurrence of Campylobacter spp. in chicken flocks

    DEFF Research Database (Denmark)

    Hald, Birthe; Rattenborg, Erik; Madsen, Mogens

    2001-01-01

    Aims: The effect of batch depletion of broiler houses for campylobacter occurrence in broiler flocks was estimated in 10 flocks, each comprising a separate female and male batch. Methods and Results: The chicks were sampled first bq; cloacal swabs in the broiler houses before the start...... that batch depletion of broiler houses increased the prevalence of Campylobacter spp.-infected broilers in the flocks, that the introduction occurred a hen catching the first batch, and that campylobacter spreads through the entire flock within a week. Significance and Impact of the Study: The results from...

  10. Dissipation of hydrological tracers and the herbicide S-metolachlor in batch and continuous-flow wetlands.

    Science.gov (United States)

    Maillard, Elodie; Lange, Jens; Schreiber, Steffi; Dollinger, Jeanne; Herbstritt, Barbara; Millet, Maurice; Imfeld, Gwenaël

    2016-02-01

    Pesticide dissipation in wetland systems with regard to hydrological conditions and operational modes is poorly known. Here, we investigated in artificial wetlands the impact of batch versus continuous-flow modes on the dissipation of the chiral herbicide S-metolachlor (S-MET) and hydrological tracers (bromide, uranine and sulforhodamine B). The wetlands received water contaminated with the commercial formulation Mercantor Gold(®) (960 g L(-1) of S-MET, 87% of the S-enantiomer). The tracer mass budget revealed that plant uptake, sorption, photo- and presumably biodegradation were prominent under batch mode (i.e. characterized by alternating oxic-anoxic conditions), in agreement with large dissipation of S-MET (90%) under batch mode. Degradation was the main dissipation pathway of S-MET in the wetlands. The degradate metolachlor oxanilic acid (MOXA) mainly formed under batch mode, whereas metolachlor ethanesulfonic acid (MESA) prevailed under continuous-flow mode, suggesting distinct degradation pathways in each wetland. R-enantiomer was preferentially degraded under batch mode, which indicated enantioselective biodegradation. The release of MESA and MOXA by the wetlands as well as the potential persistence of S-MET compared to R-MET under both oxic and anoxic conditions may be relevant for groundwater and ecotoxicological risk assessment. This study shows the effect of batch versus continuous modes on pollutant dissipation in wetlands, and that alternate biogeochemical conditions under batch mode enhance S-MET biodegradation. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Batched Triangular Dense Linear Algebra Kernels for Very Small Matrix Sizes on GPUs

    KAUST Repository

    Charara, Ali; Keyes, David E.; Ltaief, Hatem

    2017-01-01

    Batched dense linear algebra kernels are becoming ubiquitous in scientific applications, ranging from tensor contractions in deep learning to data compression in hierarchical low-rank matrix approximation. Within a single API call, these kernels are capable of simultaneously launching up to thousands of similar matrix computations, removing the expensive overhead of multiple API calls while increasing the occupancy of the underlying hardware. A challenge is that for the existing hardware landscape (x86, GPUs, etc.), only a subset of the required batched operations is implemented by the vendors, with limited support for very small problem sizes. We describe the design and performance of a new class of batched triangular dense linear algebra kernels on very small data sizes using single and multiple GPUs. By deploying two-sided recursive formulations, stressing the register usage, maintaining data locality, reducing threads synchronization and fusing successive kernel calls, the new batched kernels outperform existing state-of-the-art implementations.

  12. Batched Triangular Dense Linear Algebra Kernels for Very Small Matrix Sizes on GPUs

    KAUST Repository

    Charara, Ali

    2017-03-06

    Batched dense linear algebra kernels are becoming ubiquitous in scientific applications, ranging from tensor contractions in deep learning to data compression in hierarchical low-rank matrix approximation. Within a single API call, these kernels are capable of simultaneously launching up to thousands of similar matrix computations, removing the expensive overhead of multiple API calls while increasing the occupancy of the underlying hardware. A challenge is that for the existing hardware landscape (x86, GPUs, etc.), only a subset of the required batched operations is implemented by the vendors, with limited support for very small problem sizes. We describe the design and performance of a new class of batched triangular dense linear algebra kernels on very small data sizes using single and multiple GPUs. By deploying two-sided recursive formulations, stressing the register usage, maintaining data locality, reducing threads synchronization and fusing successive kernel calls, the new batched kernels outperform existing state-of-the-art implementations.

  13. Decreased cell survival and DNA repair capacity after UVC irradiation in association with down-regulation of GRP78/BiP in human RSa cells

    International Nuclear Information System (INIS)

    Zhai Ling; Kita, Kazuko; Wano, Chieko; Wu Yuping; Sugaya, Shigeru; Suzuki, Nobuo

    2005-01-01

    In contrast to extensive studies on the roles of molecular chaperones, such as heat shock proteins, there are only a few reports about the roles of GRP78/BiP, an endoplasmic reticulum (ER) stress-induced molecular chaperone, in mammalian cell responses to DNA-damaging stresses. To investigate whether GRP78/BiP is involved in resistance to a DNA-damaging agent, UVC (principally 254 nm in wavelength), we established human cells with down-regulation of GRP78/BiP by transfection of human RSa cells with antisense cDNA for GRP78/BiP. We found that the transfected cells showed higher sensitivity to UVC-induced cell death than control cells transfected with the vector alone. In the antisense-cDNA transfected cells, the removal capacities of the two major types of UVC-damaged DNA (thymine dimers and (6-4) photoproducts) in vivo and DNA synthesis activity of whole cell extracts to repair UVC-irradiated plasmids in vitro were remarkably decreased compared with those in the control cells. Furthermore, the antisense-cDNA transfected cells also showed slightly higher sensitivity to cisplatin-induced cell death than the control cells. Cisplatin-induced DNA damage is primarily repaired by nucleotide excision repair, like UVC-induced DNA damage. The present results suggest that GRP78/BiP plays a protective role against UVC-induced cell death possibly via nucleotide excision repair, at least in the human RSa cells tested

  14. Fed-batch and perfusion culture processes: economic, environmental, and operational feasibility under uncertainty.

    Science.gov (United States)

    Pollock, James; Ho, Sa V; Farid, Suzanne S

    2013-01-01

    This article evaluates the current and future potential of batch and continuous cell culture technologies via a case study based on the commercial manufacture of monoclonal antibodies. The case study compares fed-batch culture to two perfusion technologies: spin-filter perfusion and an emerging perfusion technology utilizing alternating tangential flow (ATF) perfusion. The operational, economic, and environmental feasibility of whole bioprocesses based on these systems was evaluated using a prototype dynamic decision-support tool built at UCL encompassing process economics, discrete-event simulation and uncertainty analysis, and combined with a multi-attribute decision-making technique so as to enable a holistic assessment. The strategies were compared across a range of scales and titres so as to visualize how their ranking changes in different industry scenarios. The deterministic analysis indicated that the ATF perfusion strategy has the potential to offer cost of goods savings of 20% when compared to conventional fed-batch manufacturing processes when a fivefold increase in maximum viable cell densities was assumed. Savings were also seen when the ATF cell density dropped to a threefold increase over the fed-batch strategy for most combinations of titres and production scales. In contrast, the fed-batch strategy performed better in terms of environmental sustainability with a lower water and consumable usage profile. The impact of uncertainty and failure rates on the feasibility of the strategies was explored using Monte Carlo simulation. The risk analysis results demonstrated the enhanced robustness of the fed-batch process but also highlighted that the ATF process was still the most cost-effective option even under uncertainty. The multi-attribute decision-making analysis provided insight into the limited use of spin-filter perfusion strategies in industry. The resulting sensitivity spider plots enabled identification of the critical ratio of weightings of

  15. Batch statistical process control of a fluid bed granulation process using in-line spatial filter velocimetry and product temperature measurements.

    Science.gov (United States)

    Burggraeve, A; Van den Kerkhof, T; Hellings, M; Remon, J P; Vervaet, C; De Beer, T

    2011-04-18

    Fluid bed granulation is a batch process, which is characterized by the processing of raw materials for a predefined period of time, consisting of a fixed spraying phase and a subsequent drying period. The present study shows the multivariate statistical modeling and control of a fluid bed granulation process based on in-line particle size distribution (PSD) measurements (using spatial filter velocimetry) combined with continuous product temperature registration using a partial least squares (PLS) approach. Via the continuous in-line monitoring of the PSD and product temperature during granulation of various reference batches, a statistical batch model was developed allowing the real-time evaluation and acceptance or rejection of future batches. Continuously monitored PSD and product temperature process data of 10 reference batches (X-data) were used to develop a reference batch PLS model, regressing the X-data versus the batch process time (Y-data). Two PLS components captured 98.8% of the variation in the X-data block. Score control charts in which the average batch trajectory and upper and lower control limits are displayed were developed. Next, these control charts were used to monitor 4 new test batches in real-time and to immediately detect any deviations from the expected batch trajectory. By real-time evaluation of new batches using the developed control charts and by computation of contribution plots of deviating process behavior at a certain time point, batch losses or reprocessing can be prevented. Immediately after batch completion, all PSD and product temperature information (i.e., a batch progress fingerprint) was used to estimate some granule properties (density and flowability) at an early stage, which can improve batch release time. Individual PLS models relating the computed scores (X) of the reference PLS model (based on the 10 reference batches) and the density, respectively, flowabililty as Y-matrix, were developed. The scores of the 4 test

  16. Yields from pyrolysis of refinery residue using a batch process

    Directory of Open Access Journals (Sweden)

    S. Prithiraj

    2017-12-01

    Full Text Available Batch pyrolysis was a valuable process of assessing the potential of recovering and characterising products from hazardous waste materials. This research explored the pyrolysis of hydrocarbon-rich refinery residue, from crude oil processes, in a 1200 L electrically-heated batch retort. Furthermore, the off-gases produced were easily processed in compliance with existing regulatory emission standards. The methodology offers a novel, cost-effective and environmentally compliant method of assessing recovery potential of valuable products. The pyrolysis experiments yielded significant oil (70% with high calorific value (40 MJ/kg, char (14% with carbon content over 80% and non-condensable gas (6% with significant calorific value (240 kJ/mol. The final gas stream was subjected to an oxidative clean-up process with continuous on-line monitoring demonstrating compliance with South African emission standards. The gas treatment was overall economically optimal as only a smaller portion of the original residue was subjected to emission-controlling steps. Keywords: Batch pyrolysis, Volatiles, Oil yields, Char, Emissions, Oil recovery

  17. Repeated batch production of ethanol from Jerusalem artichoke tubers using recycled immobilized cells of Kluyveromyces fragilis

    Energy Technology Data Exchange (ETDEWEB)

    Margaritis, A.; Bajpai, P.

    1981-01-01

    Recycled immobilized cells of K. fragilis ATCC 28244 were used for repeated batch production of EtOH from the inulin sugars derived from Jerusalem artichoke tubers. Using 10% initial sugar concentration, a maximum EtOH concentration of 48 g/l was achieved in 7 h when the immobilized cell concentration in the Ca alginate beads was 72 g dry weight immobilized cell/l bioreactor vol.-h. The same Ca alginate beads containing the cells were used repeatedly for 11 batch runs starting with fresh medium at the beginning of each run. The EtOH yield was almost constant at 96% of the theoretical for all 11 batch runs, while the maximum EtOH production rate during the last batch run was 70% of the original EtOH rate obtained in the 1st batch run.

  18. JOSHUA-SYSTEM, Data Base Management System for Batch and Interactive Operation

    International Nuclear Information System (INIS)

    Honeck, H.C.; Boyce, R.L. Jr. and others

    1982-01-01

    1 - Description of problem or function: JOSHUA is a scientific, modular data-based system for batch and terminal operation. Large volumes of data can be stored and retrieved for computation and display. 2 - Method of solution: The JOSHUA Operating System facilitates the execution of problems by the preservation of conveniently reusable da- ta and programs that are stored on-line. The data may be used in batch operation by computational programs and created and displayed on IBM 3270 terminals

  19. Comparison of neptunium sorption results using batch and column techniques

    International Nuclear Information System (INIS)

    Triay, I.R.; Furlano, A.C.; Weaver, S.C.; Chipera, S.J.; Bish, D.L.

    1996-08-01

    We used crushed-rock columns to study the sorption retardation of neptunium by zeolitic, devitrified, and vitric tuffs typical of those at the site of the potential high-level nuclear waste repository at Yucca Mountain, Nevada. We used two sodium bicarbonate waters (groundwater from Well J-13 at the site and water prepared to simulate groundwater from Well UE-25p No. 1) under oxidizing conditions. It was found that values of the sorption distribution coefficient, Kd, obtained from these column experiments under flowing conditions, regardless of the water or the water velocity used, agreed well with those obtained earlier from batch sorption experiments under static conditions. The batch sorption distribution coefficient can be used to predict the arrival time for neptunium eluted through the columns. On the other hand, the elution curves showed dispersivity, which implies that neptunium sorption in these tuffs may be nonlinear, irreversible, or noninstantaneous. As a result, use of a batch sorption distribution coefficient to calculate neptunium transport through Yucca Mountain tuffs would yield conservative values for neptunium release from the site. We also noted that neptunium (present as the anionic neptunyl carbonate complex) never eluted prior to tritiated water, which implies that charge exclusion does not appear to exclude neptunium from the tuff pores. The column experiments corroborated the trends observed in batch sorption experiments: neptunium sorption onto devitrified and vitric tuffs is minimal and sorption onto zeolitic tuffs decreases as the amount of sodium and bicarbonate/carbonate in the water increases

  20. Automation of gamwave batch irradiator in Natal, South Africa

    International Nuclear Information System (INIS)

    Basson, J.K.; Basson, R.A.; Botha, J.

    1995-01-01

    High Energy Processing (HEPRO) has operated a Nordion JS 8200 Batch Irradiator for several years at Gamwave in Durban, South Africa. Product is loaded into aluminium totes and manually transported on trolleys into the irradiation chamber. Unirradiated totes are then exchanged with all the irradiated totes in the product pass mechanism, after which the source is raised and the batch irradiation process is started. Due to the inefficient Cobalt utilization experienced in this type of plant, it was decided to upgrade and automate the facility. This was done in what we believe is a simple and unique solution to the problem facing the future of such batch facilities. The design concept used for the Gamwave irradiator was based on irradiating product in carbons or bags of variable dimensions as per customer requirements. The intention was to convey product automatically in and out of the irradiation chamber eliminating the product change over downtime and thereby increasing source up utilization. Minor extensions were carried out to the Bioshield with the existing irradiator in full operation awaiting installation of the new source pass mechanism and conveyor system. Total plant shutdown for conversion to automation, including source reload and safety checks, was estimated to take ten days to fit the equipment. (author)

  1. Impact of Sterile Compounding Batch Frequency on Pharmaceutical Waste.

    Science.gov (United States)

    Abbasi, Ghalib; Gay, Evan

    2017-01-01

    Purpose: To measure the impact of increasing sterile compounding batch frequency on pharmaceutical waste as it relates to cost and quantity. Methods: Pharmaceutical IV waste at a tertiary care hospital was observed and recorded for 7 days. The batching frequency of compounded sterile products (CSPs) was then increased from twice daily to 4 times daily. After a washout period, pharmaceutical IV waste was then recorded for another 7 days. The quantity of units wasted and the cost were compared between both phases to determine the impact that batching frequency has on IV waste, specifically among high- and low-cost drugs. Results: Patient days increased from 2,459 during phase 1 to 2,617 during phase 2. The total number of CSPs wasted decreased from 3.6 to 2.7 doses per 100 patient days. Overall cost was reduced from $4,585.36 in phase 1 to $4,453.88 in phase 2. The value of wasted high-cost drugs per 100 patient days increased from $146 in phase 1 to $149 in phase 2 ( p > .05). The value of wasted low cost drugs per 100 patient days decreased from $41 in phase 1 to $21 in phase 2 ( p waste quantity and cost. The highest impact of the intervention was observed among low-cost CSPs.

  2. Estimating animal abundance in ground beef batches assayed with molecular markers.

    Directory of Open Access Journals (Sweden)

    Xin-Sheng Hu

    Full Text Available Estimating animal abundance in industrial scale batches of ground meat is important for mapping meat products through the manufacturing process and for effectively tracing the finished product during a food safety recall. The processing of ground beef involves a potentially large number of animals from diverse sources in a single product batch, which produces a high heterogeneity in capture probability. In order to estimate animal abundance through DNA profiling of ground beef constituents, two parameter-based statistical models were developed for incidence data. Simulations were applied to evaluate the maximum likelihood estimate (MLE of a joint likelihood function from multiple surveys, showing superiority in the presence of high capture heterogeneity with small sample sizes, or comparable estimation in the presence of low capture heterogeneity with a large sample size when compared to other existing models. Our model employs the full information on the pattern of the capture-recapture frequencies from multiple samples. We applied the proposed models to estimate animal abundance in six manufacturing beef batches, genotyped using 30 single nucleotide polymorphism (SNP markers, from a large scale beef grinding facility. Results show that between 411∼1367 animals were present in six manufacturing beef batches. These estimates are informative as a reference for improving recall processes and tracing finished meat products back to source.

  3. Batch and flow-injection methods for the spectrophotometric determination of olanzapine

    Energy Technology Data Exchange (ETDEWEB)

    Jasinska, A.; Nalewajko, E

    2004-04-22

    An indirect batch spectrophotometric and direct flow-injection (FI) visible spectrophotometric methods have been developed for the determination of the novel anti-psychotic drug olanzapine (OLA). The batch method is based on the oxidation of olanzapine by a known excess of potassium hexacyanoferrate(III) in the presence of the mixture of sulphuric and phosphoric acids (1:1 (v/v)). The absorbance of unreacted oxidant is measured at 425 nm. The absorbance decreases linearly with increasing concentration of the assayed drug. The FI method with detection at 540 nm is based on the direct oxidation of olanzapine one of two oxidants, cerium(IV) sulphate or potassium hexacyanoferrate(III) in acidic medium. The calibration graph were linear over the range of 2.5-40 {mu}g ml{sup -1} in the batch method and 0.05-300 and 0.5-250 {mu}g ml{sup -1} in the FI methods, used cerium (IV) sulphate and potassium hexacyanoferrate (III) respectively. Both FI methods gave similar results in terms of precision and accuracy. The relative standard deviation (R.S.D.), was <1%. The accuracy, obtained from recovery experiments, was 97.9-99.4%. The batch method gave slightly higher R.S.D. values (up to 2.3%) and lower values of accuracy (the recovery was between 96.5 and 96.6%). The methods developed were applied to the determination of olanzapine in a pharmaceutical product.

  4. Experimental Verification of Dynamic Operation of Continuous and Multivessel Batch Distillation

    Energy Technology Data Exchange (ETDEWEB)

    Wittgens, Bernd

    1999-07-01

    This thesis presents a rigorous model based on first principles for dynamic simulation of the composition dynamics of a staged high-purity continuous distillation columns and experiments performed to verify it. The thesis also demonstrates the importance of tray hydraulics to obtain good agreement between simulation and experiment and derives analytic expressions for dynamic time constants for use in simplified and vapour dynamics. A newly developed multivessel batch distillation column consisting of a reboiler, intermediate vessels and a condenser vessel provides a generalization of previously proposed batch distillation schemes. The total reflux operation of this column was presented previously and the present thesis proposes a simple feedback control strategy for its operation based on temperature measurements. The feasibility of this strategy is demonstrated by simulations and verified by laboratory experiments. It is concluded that the multivessel column can be easily operated with simple temperature controllers, where the holdups are only controlled indirectly. For a given set of temperature setpoints, the final product compositions are independent of the initial feed composition. When the multivessel batch distillation column is compared to a conventional batch column, both operated under feedback control, it is found that the energy required to separate a multicomponent mixture into highly pure products is much less for the multivessel system. This system is also the simplest one to operate.

  5. Dissolution of intact UO2 pellet in batch and rotary dissolver conditions

    International Nuclear Information System (INIS)

    Jayendra Kumar Gelatar; Bijendra Kumar; Sampath, M.; Shekhar Kumar; Kamachi Mudali, U.; Natarajan, R.

    2015-01-01

    Comparative dissolution of intact un-irradiated UO 2 pellet of PHWR fuel dimensions was performed in batch and dynamic rotary dissolver conditions in aqueous nitric acid solutions at elevated temperatures. The extent of dissolution was estimated by determining the uranium concentration of the resulting aqueous solution. It was observed that rate of dissolution was much faster in dynamic conditions as compared to static batch conditions. (author)

  6. Stochastic growth logistic model with aftereffect for batch fermentation process

    Energy Technology Data Exchange (ETDEWEB)

    Rosli, Norhayati; Ayoubi, Tawfiqullah [Faculty of Industrial Sciences and Technology, Universiti Malaysia Pahang, Lebuhraya Tun Razak, 26300 Gambang, Pahang (Malaysia); Bahar, Arifah; Rahman, Haliza Abdul [Department of Mathematical Sciences, Faculty of Science, Universiti Teknologi Malaysia, 81310 Johor Bahru, Johor (Malaysia); Salleh, Madihah Md [Department of Biotechnology Industry, Faculty of Biosciences and Bioengineering, Universiti Teknologi Malaysia, 81310 Johor Bahru, Johor (Malaysia)

    2014-06-19

    In this paper, the stochastic growth logistic model with aftereffect for the cell growth of C. acetobutylicum P262 and Luedeking-Piret equations for solvent production in batch fermentation system is introduced. The parameters values of the mathematical models are estimated via Levenberg-Marquardt optimization method of non-linear least squares. We apply Milstein scheme for solving the stochastic models numerically. The effciency of mathematical models is measured by comparing the simulated result and the experimental data of the microbial growth and solvent production in batch system. Low values of Root Mean-Square Error (RMSE) of stochastic models with aftereffect indicate good fits.

  7. Stochastic growth logistic model with aftereffect for batch fermentation process

    Science.gov (United States)

    Rosli, Norhayati; Ayoubi, Tawfiqullah; Bahar, Arifah; Rahman, Haliza Abdul; Salleh, Madihah Md

    2014-06-01

    In this paper, the stochastic growth logistic model with aftereffect for the cell growth of C. acetobutylicum P262 and Luedeking-Piret equations for solvent production in batch fermentation system is introduced. The parameters values of the mathematical models are estimated via Levenberg-Marquardt optimization method of non-linear least squares. We apply Milstein scheme for solving the stochastic models numerically. The effciency of mathematical models is measured by comparing the simulated result and the experimental data of the microbial growth and solvent production in batch system. Low values of Root Mean-Square Error (RMSE) of stochastic models with aftereffect indicate good fits.

  8. Stochastic growth logistic model with aftereffect for batch fermentation process

    International Nuclear Information System (INIS)

    Rosli, Norhayati; Ayoubi, Tawfiqullah; Bahar, Arifah; Rahman, Haliza Abdul; Salleh, Madihah Md

    2014-01-01

    In this paper, the stochastic growth logistic model with aftereffect for the cell growth of C. acetobutylicum P262 and Luedeking-Piret equations for solvent production in batch fermentation system is introduced. The parameters values of the mathematical models are estimated via Levenberg-Marquardt optimization method of non-linear least squares. We apply Milstein scheme for solving the stochastic models numerically. The effciency of mathematical models is measured by comparing the simulated result and the experimental data of the microbial growth and solvent production in batch system. Low values of Root Mean-Square Error (RMSE) of stochastic models with aftereffect indicate good fits

  9. Estimation of the Maximum Theoretical Productivity of Fed-Batch Bioreactors

    Energy Technology Data Exchange (ETDEWEB)

    Bomble, Yannick J [National Renewable Energy Laboratory (NREL), Golden, CO (United States); St. John, Peter C [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Crowley, Michael F [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-10-18

    A key step towards the development of an integrated biorefinery is the screening of economically viable processes, which depends sharply on the yields and productivities that can be achieved by an engineered microorganism. In this study, we extend an earlier method which used dynamic optimization to find the maximum theoretical productivity of batch cultures to explicitly include fed-batch bioreactors. In addition to optimizing the intracellular distribution of metabolites between cell growth and product formation, we calculate the optimal control trajectory of feed rate versus time. We further analyze how sensitive the productivity is to substrate uptake and growth parameters.

  10. Fed-batch fermentation dealing with nitrogen limitation in microbial transglutaminase production by Streptoverticillium mobaraense

    NARCIS (Netherlands)

    Rinzema, A; Tramper, J; de Bruin, E; Bol, J

    In the later stages of a batch fermentation for microbial transglutaminase production by Streptoverticillium mobaraense the availability of a nitrogen source accessible to the microorganism becomes critical. Fed-batch fermentation is investigated with the aim of avoiding this substrate limitation.

  11. Selecting local constraint for alignment of batch process data with dynamic time warping

    DEFF Research Database (Denmark)

    Spooner, Max Peter; Kold, David; Kulahci, Murat

    2017-01-01

    ” may be interpreted as a progress signature of the batch which may be appended to the aligned data for further analysis. For the warping function to be a realistic reflection of the progress of a batch, it is necessary to impose some constraints on the dynamic time warping algorithm, to avoid...

  12. Mini-batch optimized full waveform inversion with geological constrained gradient filtering

    Science.gov (United States)

    Yang, Hui; Jia, Junxiong; Wu, Bangyu; Gao, Jinghuai

    2018-05-01

    High computation cost and generating solutions without geological sense have hindered the wide application of Full Waveform Inversion (FWI). Source encoding technique is a way to dramatically reduce the cost of FWI but subject to fix-spread acquisition setup requirement and slow convergence for the suppression of cross-talk. Traditionally, gradient regularization or preconditioning is applied to mitigate the ill-posedness. An isotropic smoothing filter applied on gradients generally gives non-geological inversion results, and could also introduce artifacts. In this work, we propose to address both the efficiency and ill-posedness of FWI by a geological constrained mini-batch gradient optimization method. The mini-batch gradient descent optimization is adopted to reduce the computation time by choosing a subset of entire shots for each iteration. By jointly applying the structure-oriented smoothing to the mini-batch gradient, the inversion converges faster and gives results with more geological meaning. Stylized Marmousi model is used to show the performance of the proposed method on realistic synthetic model.

  13. SU-E-T-386: Evaluation of EBT3 Film Response in Different Batches

    Energy Technology Data Exchange (ETDEWEB)

    Escarcia, F [Universidad Nacional Autonoma de Mexico, Mexico Df, DF (Mexico); Herrera, J; Garcia, O [Instituto Nacional de Neurologia y Neurocirugia, Mexico Df, DF (Mexico)

    2015-06-15

    Purpose: To investigate the uniformity of film response of EBT3 film of two different film batches. It has been reported that the response of the EBT film family is not homogenous between film batches. The later may have an impact in the dosimetry of small radiotherapy beams. Methods: A solid water phantom was used for dosimetric measurements. EBT3 film irradiation was performed with a 6 MV photon beam at 5 cm depth with a SAD of 100 cm. All irradiations were performed perpendicularly to the film plane covering the dose range 1 to 10 Gy. Three square field sizes were used to analyze the film response energy dependence: 10, 5 and 1 cm{sup 2}. Two batches of film EBT3 were used #A03181302 (B1) and #03031403 (B2). Film read out was carrying out with an Epson Perfection V750-Pro flatbed scanner in transmission mode with a spatial resolution of 72 dpi, with all post-processing and colour management options turned off, using 48 bits RGB colour depth. The scans were analyzed with the red channel. Results: The results shown that there were differences between the film response for each batch. The differences between batches for 1 Gy were 2%, 6% and 12% for 10, 5 and 1 cm2 square field sizes, respectively. The differences found for 10 Gy were 13%, 14% and 13% for 10, 5 and 1 cm{sup 2} square field sizes, respectively. It can be observed that the dependence with field size dismissed for higher doses. The later may be due to film response saturation at 10 Gy. Conclusion: The EBT3 film -as its predecessors-, it suffer for inter-batch variability in the film response. Further research is required to assess the possible impact in small beam dosimetry.

  14. SU-E-T-386: Evaluation of EBT3 Film Response in Different Batches

    International Nuclear Information System (INIS)

    Escarcia, F; Herrera, J; Garcia, O

    2015-01-01

    Purpose: To investigate the uniformity of film response of EBT3 film of two different film batches. It has been reported that the response of the EBT film family is not homogenous between film batches. The later may have an impact in the dosimetry of small radiotherapy beams. Methods: A solid water phantom was used for dosimetric measurements. EBT3 film irradiation was performed with a 6 MV photon beam at 5 cm depth with a SAD of 100 cm. All irradiations were performed perpendicularly to the film plane covering the dose range 1 to 10 Gy. Three square field sizes were used to analyze the film response energy dependence: 10, 5 and 1 cm 2 . Two batches of film EBT3 were used #A03181302 (B1) and #03031403 (B2). Film read out was carrying out with an Epson Perfection V750-Pro flatbed scanner in transmission mode with a spatial resolution of 72 dpi, with all post-processing and colour management options turned off, using 48 bits RGB colour depth. The scans were analyzed with the red channel. Results: The results shown that there were differences between the film response for each batch. The differences between batches for 1 Gy were 2%, 6% and 12% for 10, 5 and 1 cm2 square field sizes, respectively. The differences found for 10 Gy were 13%, 14% and 13% for 10, 5 and 1 cm 2 square field sizes, respectively. It can be observed that the dependence with field size dismissed for higher doses. The later may be due to film response saturation at 10 Gy. Conclusion: The EBT3 film -as its predecessors-, it suffer for inter-batch variability in the film response. Further research is required to assess the possible impact in small beam dosimetry

  15. A Conceptual Model for Production Leveling (Heijunka) Implementation in Batch Production Systems

    OpenAIRE

    De Araujo , Luciano Fonseca; De Queiroz , Abelardo Alves

    2009-01-01

    International audience; This paper explains an implementation model for a new method for Production Leveling designed for batch production system. The main structure of this model is grounded on three constructs: traditional framework for Operations Planning, Lean Manufacturing concepts for Production Leveling and case study guidelines. By combining the first and second construct, a framework for Production Leveling has been developed for batch production systems. Then, case study guidelines ...

  16. State and parameter estimation in biotechnical batch reactors

    NARCIS (Netherlands)

    Keesman, K.J.

    2000-01-01

    In this paper the problem of state and parameter estimation in biotechnical batch reactors is considered. Models describing the biotechnical process behaviour are usually nonlinear with time-varying parameters. Hence, the resulting large dimensions of the augmented state vector, roughly > 7, in

  17. Progressing batch hydrolysis process

    Science.gov (United States)

    Wright, J.D.

    1985-01-10

    A progressive batch hydrolysis process is disclosed for producing sugar from a lignocellulosic feedstock. It comprises passing a stream of dilute acid serially through a plurality of percolation hydrolysis reactors charged with feed stock, at a flow rate, temperature and pressure sufficient to substantially convert all the cellulose component of the feed stock to glucose. The cooled dilute acid stream containing glucose, after exiting the last percolation hydrolysis reactor, serially fed through a plurality of pre-hydrolysis percolation reactors, charged with said feedstock, at a flow rate, temperature and pressure sufficient to substantially convert all the hemicellulose component of said feedstock to glucose. The dilute acid stream containing glucose is cooled after it exits the last prehydrolysis reactor.

  18. The use of fed batch approaches to maximise yields in bacterial fermentation and protein expression

    International Nuclear Information System (INIS)

    McLean, A.

    2001-01-01

    A fermentation facility for the scale up of bacterial and yeast fermentations has been set up at the University of Queensland under the auspices of the ARC Special Research Centre for Functional and Applied Genomics. A major application is the production of recombinant proteins for determination of tertiary structures by X-ray crystallography or nuclear magnetic resonance. For this purpose, large amounts of protein arc needed and the yield from a single fermentation run is crucial to success within constrained laboratory budgets. To achieve maximal yields we are optimising fed batch approaches in bacterial fermentation. Fed batch offers many advantages over batch cultures. Coupled with the ability to monitor online the internal conditions of the fermentation including pH and dissolved oxygen and stirrer cascading functions it is possible to ensure that the nutritional environment of the microorganism is optimised for its growth and or for optimal protein expression. The poster will describe some of our experience in setting up fed batch fermentations and successful applications of fed batches to increasing protein yield. It will also outline services that are available to academic groups outside the University of Queensland For structure determination and functional studies, the production of radiolabelled proteins can also be an advantage. We will describe initial experiments aimed at coupling the principles of fed batch fermentation to the introduction of carbon or nitrogen isotopes into the recombinant protein

  19. Scheduling by positional completion times: analysis of a two-stage flow shop problem with a batching machine

    NARCIS (Netherlands)

    Hoogeveen, J.A.; Velde, van de S.L.

    1998-01-01

    We consider a scheduling problem introduced by Ahmadi et al., Batching and scheduling jobs on batch and discrete processors, Operation Research 40 (1992) 750–763, in which each job has to be prepared before it can be processed. The preparation is performed by a batching machine; it can prepare at

  20. A fast approach to determine a fed batch feeding profile for recombinant Pichia pastoris strains

    Directory of Open Access Journals (Sweden)

    Herwig Christoph

    2011-10-01

    Full Text Available Abstract Background The microorganism Pichia pastoris is a commonly used microbial host for the expression of recombinant proteins in biotechnology and biopharmaceutical industry. To speed up process development, a fast methodology to determine strain characteristic parameters, which are needed to subsequently set up fed batch feeding profiles, is required. Results Here, we show the general applicability of a novel approach to quantify a certain minimal set of bioprocess-relevant parameters, i.e. the adaptation time of the culture to methanol, the specific substrate uptake rate during the adaptation phase and the maximum specific substrate uptake rate, based on fast and easy-to-do batch cultivations with repeated methanol pulses in a batch culture. A detailed analysis of the adaptation of different P. pastoris strains to methanol was conducted and revealed that each strain showed very different characteristics during adaptation, illustrating the need of individual screenings for an optimal parameter definition during this phase. Based on the results obtained in batch cultivations, dynamic feeding profiles based on the specific substrate uptake rate were employed for different P. pastoris strains. In these experiments the maximum specific substrate uptake rate, which had been defined in batch experiments, also represented the upper limit of methanol uptake, underlining the validity of the determined process-relevant parameters and the overall experimental strategy. Conclusion In this study, we show that a fast approach to determine a minimal set of strain characteristic parameters based on easy-to-do batch cultivations with methanol pulses is generally applicable for different P. pastoris strains and that dynamic fed batch strategies can be designed on the specific substrate uptake rate without running the risk of methanol accumulation.

  1. Fed-batch production of vanillin by Bacillus aryabhattai BA03.

    Science.gov (United States)

    Paz, Alicia; Outeiriño, David; Pinheiro de Souza Oliveira, Ricardo; Domínguez, José Manuel

    2018-01-25

    Bacillus aryabhattai BA03, a strain isolated in our laboratory, has interesting properties related to the production of natural aromas and flavors. Specifically, we have found that it was able to produce vanillin from ferulic acid (FA). Furthermore, this strain produces high amounts of 4-vinylguaiacol in only 14h, this being the only intermediate metabolite observed in the process. FA is an inexpensive feedstock for the production of natural value-added compounds when extracted from lignocellulosic wastes. In this study, we optimized the operational conditions (temperature, pH and agitation), medium composition and bioconversion technology (batch or fed-batch) to produce vanillin. In a fed-batch process conducted with just one additional supplementation after 24h, the maximal concentration of vanillin (147.1±0.9mg/L) was observed after 216h (Q V =0.681mg/Lh; Y V/fFA =0.082mg/mg) after degrading 90.3% FA. In view of our data, we postulate that Bacillus aryabhattai BA03 carries out a decarboxylation of ferulic acid as a metabolic pathway. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Analyzing data flows of WLCG jobs at batch job level

    Science.gov (United States)

    Kuehn, Eileen; Fischer, Max; Giffels, Manuel; Jung, Christopher; Petzold, Andreas

    2015-05-01

    With the introduction of federated data access to the workflows of WLCG, it is becoming increasingly important for data centers to understand specific data flows regarding storage element accesses, firewall configurations, as well as the scheduling of batch jobs themselves. As existing batch system monitoring and related system monitoring tools do not support measurements at batch job level, a new tool has been developed and put into operation at the GridKa Tier 1 center for monitoring continuous data streams and characteristics of WLCG jobs and pilots. Long term measurements and data collection are in progress. These measurements already have been proven to be useful analyzing misbehaviors and various issues. Therefore we aim for an automated, realtime approach for anomaly detection. As a requirement, prototypes for standard workflows have to be examined. Based on measurements of several months, different features of HEP jobs are evaluated regarding their effectiveness for data mining approaches to identify these common workflows. The paper will introduce the actual measurement approach and statistics as well as the general concept and first results classifying different HEP job workflows derived from the measurements at GridKa.

  3. Increasing the production of desulfurizing biocatalysts by means of fed - batch culture

    International Nuclear Information System (INIS)

    Berdugo, C I; Mena, J A; Acero, J R; Mogollon, L

    2001-01-01

    Over the past years, environmental regulations have driven a lot of effort for the development of new technologies for the upgrading of fossil fuels. Biotechnology offers an alternative way to process fossil fuels by means of a biodesulfurization technology where the production of the biocatalyst is one of the key topics. Traditionally, the production is carried out in batch culture where the maximum cellular concentration is restricted by inherent limitations of the culture type and the microorganism growth rate. This work addresses the production of two desulfurizing microorganisms: Rhodococcus erythropolis IGTS8 and gordona rubropertinctus ICP172 using fed-batch culture. Fed-batch cultures were conducted in a 12 L fermentor using ICP 4 medium containing glucose and DMSO as carbon and sulfur sources. As a result, cell concentration was increased 1.5 and 3 times with fed-batch cultures using constant and exponential flow respectively, achieving a maximum cell concentration of 7.3 g DCW/L of biocatalyst igts8 and 12.85 gGDCW/L of the new biocatalyst ICP172. Both biocatalysts presented biodesulfurization activity in a spiked matrix DBT/HXD and in diesel matrix with the detection of 2-HBP which is the end-product of DBT degradation pathway

  4. Modeling of Fusarium redolens Dzf2 mycelial growth kinetics and optimal fed-batch fermentation for beauvericin production.

    Science.gov (United States)

    Xu, Li-Jian; Liu, Yuan-Shuai; Zhou, Li-Gang; Wu, Jian-Yong

    2011-09-01

    Beauvericin (BEA) is a cyclic hexadepsipeptide mycotoxin with notable phytotoxic and insecticidal activities. Fusarium redolens Dzf2 is a highly BEA-producing fungus isolated from a medicinal plant. The aim of the current study was to develop a simple and valid kinetic model for F. redolens Dzf2 mycelial growth and the optimal fed-batch operation for efficient BEA production. A modified Monod model with substrate (glucose) and product (BEA) inhibition was constructed based on the culture characteristics of F. redolens Dzf2 mycelia in a liquid medium. Model parameters were derived by simulation of the experimental data from batch culture. The model fitted closely with the experimental data over 20-50 g l(-1) glucose concentration range in batch fermentation. The kinetic model together with the stoichiometric relationships for biomass, substrate and product was applied to predict the optimal feeding scheme for fed-batch fermentation, leading to 54% higher BEA yield (299 mg l(-1)) than in the batch culture (194 mg l(-1)). The modified Monod model incorporating substrate and product inhibition was proven adequate for describing the growth kinetics of F. redolens Dzf2 mycelial culture at suitable but not excessive initial glucose levels in batch and fed-batch cultures.

  5. Removing Batch Effects from Longitudinal Gene Expression - Quantile Normalization Plus ComBat as Best Approach for Microarray Transcriptome Data.

    Directory of Open Access Journals (Sweden)

    Christian Müller

    Full Text Available Technical variation plays an important role in microarray-based gene expression studies, and batch effects explain a large proportion of this noise. It is therefore mandatory to eliminate technical variation while maintaining biological variability. Several strategies have been proposed for the removal of batch effects, although they have not been evaluated in large-scale longitudinal gene expression data. In this study, we aimed at identifying a suitable method for batch effect removal in a large study of microarray-based longitudinal gene expression. Monocytic gene expression was measured in 1092 participants of the Gutenberg Health Study at baseline and 5-year follow up. Replicates of selected samples were measured at both time points to identify technical variability. Deming regression, Passing-Bablok regression, linear mixed models, non-linear models as well as ReplicateRUV and ComBat were applied to eliminate batch effects between replicates. In a second step, quantile normalization prior to batch effect correction was performed for each method. Technical variation between batches was evaluated by principal component analysis. Associations between body mass index and transcriptomes were calculated before and after batch removal. Results from association analyses were compared to evaluate maintenance of biological variability. Quantile normalization, separately performed in each batch, combined with ComBat successfully reduced batch effects and maintained biological variability. ReplicateRUV performed perfectly in the replicate data subset of the study, but failed when applied to all samples. All other methods did not substantially reduce batch effects in the replicate data subset. Quantile normalization plus ComBat appears to be a valuable approach for batch correction in longitudinal gene expression data.

  6. Quality control for 12 batch of DTPA-Sn

    International Nuclear Information System (INIS)

    Isaac, M.; Gamboa, R.; Leyva, R.; Hernandez, I.; Turino, D.

    1994-01-01

    The quality control is carry out at 12 batch of DTPA-Sn for labeling with 99 m Tc. The instrumental methods of analysis and control charts were discussed in order to find a warranty time for the product. (author). 2 refs, 3 figs, 1 tab

  7. Production Leveling (Heijunka) Implementation in a Batch Production System: A Case Study

    OpenAIRE

    Araujo , Luciano Fonseca; Queiroz , Abelardo Alves

    2009-01-01

    International audience; This paper presents a case study of an implementation of a new method for Production Leveling designed for batch production. It includes prioritizing criteria of products and level production plan. Moreover, it was applied on a subsidiary of a multinational enterprise located on Brazil, which manufacturing processes comprise batch production in a make-to-stock policy. Regarding a qualitative assessment, evidences show that the company had deficient practices related to...

  8. Batch chemical microreactors: Reversible, in-situ UHV sealing of a microcavity

    DEFF Research Database (Denmark)

    Monkowski, Adam; Johansson, Martin; Nielsen, Jane Hvolbæk

    2009-01-01

    We propose a new type of microreactor to study heterogeneous catalytic systems. The proposed device operates using a batch reactor scheme, in which catalyst and reactant are introduced in one step and analyzed in a subsequent step. This differs from a flow microreactor in which reaction and analy......We propose a new type of microreactor to study heterogeneous catalytic systems. The proposed device operates using a batch reactor scheme, in which catalyst and reactant are introduced in one step and analyzed in a subsequent step. This differs from a flow microreactor in which reaction...

  9. A high-yielding, generic fed-batch process for recombinant antibody production of GS-engineered cell lines

    DEFF Research Database (Denmark)

    Fan, Li; Zhao, Liang; Sun, Yating

    2009-01-01

    An animal component-free and chemically defined fed-batch process for GS-engineered cell lines producing recombinant antibodies has been developed. The fed-batch process relied on supplying sufficient nutrients to match their consumption, simultaneously minimizing the accumulation of byproducts....... This generic and high-yielding fed-batch process would shorten development time, and ensure process stability, thereby facilitating the manufacture of therapeutic antibodies by GS-engineered cell lines....

  10. Optimization of cyclosporin A production by Beauveria nivea in continuous fed-batch fermentation

    Directory of Open Access Journals (Sweden)

    Dong Huijun

    2011-01-01

    Full Text Available To develop the effective control method for fed-batch culture of cyclosporin A production, we chose fructose, L-valine and (NH42HPO4 as feeding nutrients and compared their productivities in relation to different concentrations. The feeding rate of three kinds of feeding materials was controlled to maintain the suitable residual concentration. The fed-batch fermentation results indicated that the optimal concentrations of fructose, L-valine and (NH42HPO4 were about 20 g/L, 0.5 g/L and 0.6 g/L for cyclosporin A production, respectively. The cultivation of Beauveria nivea could produce cyclosporin A up to 6.2 g/L for 240 hrs through a continuous feeding-rate-controlled-batch process under the optimal feeding conditions.

  11. Towards Provably Secure Efficiently Searchable Encryption

    NARCIS (Netherlands)

    Sedghi, S.

    2012-01-01

    Traditional encryption systems are designed in such a way that either the whole data is decrypted, if the encryption and decryption keys match, or nothing is decrypted otherwise. However, there are applications that require a more flexible encryption system which supports decrypting data partially.

  12. Batch distillation column modeling for quality control program

    NARCIS (Netherlands)

    Betlem, Bernardus H.L.

    2000-01-01

    For batch distillation, the dynamic composition behaviour can be described by the dominant time constant and the bottom exhaustion. Its magnitude is determined by the change of the composition distribution and is maximal when the inflection point of the molar fraction profile is located in the

  13. Batching alternatives for Phase I retrieval wastes to be processed in WRAP Module 1

    International Nuclear Information System (INIS)

    Mayancsik, B.A.

    1994-01-01

    During the next two decades, the transuranic (TRU) waste now stored in the 200 Area burial trenches and storage buildings is to be retrieved, processed in the Waste Receiving and Processing (WRAP) Module 1 facility, and shipped to a final disposal facility. The purpose of this document is to identify the criteria that can be used to batch suspect TRU waste, currently in retrievable storage, for processing through the WRAP Module 1 facility. These criteria are then used to generate a batch plan for Phase 1 Retrieval operations, which will retrieve the waste located in Trench 4C-04 of the 200 West Area burial ground. The reasons for batching wastes for processing in WRAP Module 1 include reducing the exposure of workers and the environment to hazardous material and ionizing radiation; maximizing the efficiency of the retrieval, processing, and disposal processes by reducing costs, time, and space throughout the process; reducing analytical sampling and analysis; and reducing the amount of cleanup and decontamination between process runs. The criteria selected for batching the drums of retrieved waste entering WRAP Module 1 are based on the available records for the wastes sent to storage as well as knowledge of the processes that generated these wastes. The batching criteria identified in this document include the following: waste generator; type of process used to generate or package the waste; physical waste form; content of hazardous/dangerous chemicals in the waste; radiochemical type and quantity of waste; drum weight; and special waste types. These criteria were applied to the waste drums currently stored in Trench 4C-04. At least one batching scheme is shown for each of the criteria listed above

  14. Batch extractive distillation for high purity methanol

    International Nuclear Information System (INIS)

    Zhang Weijiang; Ma Sisi

    2006-01-01

    In this paper, the application in chemical industry and microelectronic industry, market status and the present situation of production of high purity methanol at home and abroad were introduced firstly. Purification of industrial methanol for high purity methanol is feasible in china. Batch extractive distillation is the best separation technique for purification of industrial methanol. Dimethyl sulfoxide was better as an extractant. (authors)

  15. Batch Adsorption Study of Methylene Blue in Aqueous Solution ...

    African Journals Online (AJOL)

    PROF HORSFALL

    of methylene blue (azo dye) from the synthetic industrial wastewater was investigated in a batch system. Rice husk and coconut shell were ... the textiles, rubber, paper, plastics, cosmetic, and .... wastewater by. Fenton's oxidation: Kinetic study.

  16. 40 CFR 63.462 - Batch cold cleaning machine standards.

    Science.gov (United States)

    2010-07-01

    .... (a) Each owner or operator of an immersion batch cold solvent cleaning machine shall comply with the... cleaning machine complying with paragraph (a)(2) or (b) of this section shall comply with the work and...

  17. Design and Construction of a Batch Oven for Investigation of Industrial Continuous

    DEFF Research Database (Denmark)

    Stenby, Mette; Nielsen, Brian; Risum, Jørgen

    2011-01-01

    A new batch oven has been designed and build to model baking processes as seen in large scale tunnel ovens. In order to simulate the conditions found in tunnel ovens a number of critical parameters are controllable: The temperature, the humidity and the air velocity. The band movement is simulated...... by moving the two air ducts above and below the products; in this way it is possible to keep the baking tray steady for continuous measurements of the product weight. During baking the shape and colour of the product can be monitored visually through a window. The simultaneous measuring of mass and visual...... aspects is a unique feature of this batch oven. Initial experiments of reproducing tunnel oven baking in the batch oven have shown good results, based on comparisons of weight loss, dry matter content and surface colour. The measured quality parameters did not differ significantly. Even though a few...

  18. High solid fed-batch butanol fermentation with simultaneous product recovery: part II - process integration.

    Science.gov (United States)

    In these studies liquid hot water (LHW) pretreated and enzymatically hydrolyzed Sweet Sorghum Bagasse (SSB) hydrolyzates were fermented in a fed-batch reactor. As reported in the preceding paper, the culture was not able to ferment the hydrolyzate I in a batch process due to presence of high level o...

  19. E-cigarette liquids: Constancy of content across batches and accuracy of labeling.

    Science.gov (United States)

    Etter, Jean-François; Bugey, Aurélie

    2017-10-01

    To assess whether bottles of refill liquids for e-cigarettes were filled true to label, whether their content was constant across two production batches, and whether they contained impurities. In 2013, we purchased on the Internet 18 models from 11 brands of e-liquids. We purchased a second sample of the same models 4months later. We analyzed their content in nicotine, anabasine, propylene glycol, glycerol, ethylene glycol and diethylene glycol, and tested their pH. The median difference between the nicotine value on the labels and the nicotine content in the bottles was 0.3mg/mL (range -5.4 to +3.5mg/mL, i.e. -8% to +30%). For 82% of the samples, the actual nicotine content was within 10% of the value on the labels. All models contained glycerol (median 407mg/mL), and all but three models contained propylene glycol (median 650mg/mL). For all samples, levels of anabasine, ethylene glycol and diethylene glycol were below our limits of detection. The pH of all the e-liquids was alkaline (median pH=9.1; range 8.1 to 9.9). The measured content of two batches of the same model varied by a median of 0% across batches for propylene glycol, 1% for glycerol, 0% for pH, and 0.5% for nicotine (range -15% to +21%; 5th and 95th percentiles: -15% and +10%). The nicotine content of these e-liquids matched the labels on the bottles, and was relatively constant across production batches. The content of propylene glycol and glycerol was also stable across batches, as was the pH. Copyright © 2017. Published by Elsevier Ltd.

  20. development of an automated batch-process solar water disinfection

    African Journals Online (AJOL)

    user

    This work presents the development of an automated batch-process water disinfection system ... Locally sourced materials in addition to an Arduinomicro processor were used to control ..... As already mentioned in section 3.1.1, a statistical.

  1. Application of ''Confirm tank T is an appropriate feed source for High-Level waste feed batch X'' to specific feed batches

    International Nuclear Information System (INIS)

    JO, J.

    1999-01-01

    This document addresses the characterization needs of tanks as set forth in the Data Quality Objectives for TWRS Privatization Phase I: Confirm Tank T is an Appropriate Feed Source for High-Level Waste Feed Batch X (Crawford et al. 1998). The primary purpose of this document is to collect existing data and identify the data needed to determine whether or not the feed source(s) are appropriate for a specific batch. To answer these questions, the existing tank data must be collected and a detailed review performed. If the existing data are insufficient to complete a full comparison, additional data must be obtained from the feed source(s). Additional information requirements need to be identified and formally documented, then the source tank waste must be sampled or resampled and analyzed. Once the additional data are obtained, the data shall be incorporated into the existing database for the source tank and a reevaluation of the data against the Data Quality Objective (DQO) must be made

  2. Application of ''Confirm tank T is an appropriate feed source for Low-Activity waste feed batch X'' to specific feed batches

    International Nuclear Information System (INIS)

    JO, J.

    1999-01-01

    This document addresses the characterization needs of tanks as set forth in the ''Confirm Tank T is an Appropriate Feed Source for Low-Activity Waste Feed Batch X'' Data Quality Objective (DQO) (Certa and Jo 1998). The primary purpose of this document is to collect existing data and identify the data needed to determine whether or not the feed source(s) are appropriate for a specific batch before transfer is made to the feed staging tanks. To answer these questions, the existing tank data must be collected and a detailed review performed. If the existing data are insufficient to complete a full comparison, additional data must be obtained from the feed source(s). Additional information requirements need to be identified and formally documented, then the source tank waste must be sampled or resampled and analyzed. Once the additional data are obtained, the data shall be incorporated into the existing database for the source tank and a reevaluation of the data against the DQO must be made

  3. [A MULTIDISCIPLINARY BIOPSYCHOSOCIAL INTEGRATED APPROACH IN ORGANIZATION OF REHABILITATIVE ACTIVITY IN NURSING HOMES (RSA)].

    Science.gov (United States)

    Panella, Lorenzo; Piccioni, Davide; Borcescu, Lidia; Isella, Celeste; Callegari, Camilla

    2015-01-01

    Objectives, social role and organization of Italian nursing homes (RSA) are characterized by a pronounced regional differentiation that causes situations which are difficult to compare about expected outcomes. The definition of a functional outcome is particularly difficult in institutionalized patients and this is due to the failure of a conclusive moment of the rehabilitative treatment. Furthermore we often take care of patients who have already been admitted to intensive and/or extensive rehabilitation units time after time, without further functional profit margin. The inconstant presence of professional figures of rehabilitation in nursing homes' staff makes difficult the drafting of an adequate rehabilitative project, especially for the multiple needs of frail old people. Starting with these assumptions, authors hypothesize and adopt a model of sanitary organization to consent a correct allocation of available resources, according to the patient's needs. They stratified all nursing home patients, using the Multidimensional Prognostic Index (MPI) and "Scheda di osservazione intermedia assistenza" (SOSIA), and measured the residual function. They concluded that a multidimensional evaluation of patients allows to identify wellness (of the sick person and of caregivers) as the main objective; nursing home organization could be think as a "complex supportive prosthesis for old people", made by the interaction among structure, operators and activities.

  4. Actual waste demonstration of the nitric-glycolic flowsheet for sludge batch 9 qualification

    Energy Technology Data Exchange (ETDEWEB)

    Newell, D. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Pareizs, J. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Martino, C. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Reboul, S. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Coleman, C. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Edwards, T. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Johnson, F. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2017-03-09

    For each sludge batch that is processed in the Defense Waste Processing Facility (DWPF), the Savannah River National Laboratory (SRNL) performs qualification testing to demonstrate that the sludge batch is processable. Based on the results of this actual-waste qualification and previous simulant studies, SRNL recommends implementation of the nitric-glycolic acid flowsheet in DWPF. Other recommendations resulting from this demonstration are reported in section 5.0.

  5. Batched Triangular DLA for Very Small Matrices on GPUs

    KAUST Repository

    Charara, Ali; Keyes, David E.; Ltaief, Hatem

    2017-01-01

    linear algebra operations on very small matrix sizes (usually less than 100). Batched dense linear algebra kernels are becoming ubiquitous for such scientific computations. Within a single API call, these kernels are capable of simultaneously launching a

  6. Effects of region, demography, and protection from fishing on batch fecundity of common coral trout ( Plectropomus leopardus)

    Science.gov (United States)

    Carter, Alex B.; Davies, Campbell R.; Mapstone, Bruce D.; Russ, Garry R.; Tobin, Andrew J.; Williams, Ashley J.

    2014-09-01

    Batch fecundity of female Plectropomus leopardus, a coral reef fish targeted by commercial and recreational fishing, was compared between reefs open to fishing and reefs within no-take marine reserves within three regions of the Great Barrier Reef (GBR), Australia. Length, weight, and age had positive effects on batch fecundity of spawners from northern and central reefs but negligible effects on spawners from southern reefs. Females were least fecund for a given length, weight, and age in the southern GBR. Batch fecundity of a 500-mm fork length female was 430 % greater on central reefs and 207 % greater on northern reefs than on southern reefs. The effects of length and age on batch fecundity did not differ significantly between reserve and fished reefs in any region, but weight-specific fecundity was 100 % greater for large 2.0 kg females on reserve reefs compared with fished reefs in the central GBR. We hypothesize that regional variation in batch fecundity is likely driven by water temperature and prey availability. Significant regional variation in batch fecundity highlights the need for understanding spatial variation in reproductive output where single conservation or fishery management strategies cover large, potentially diverse, spatial scales.

  7. Production of alpha-amylase in batch and chemostat culture by bacillus stearothermophilus

    Energy Technology Data Exchange (ETDEWEB)

    Davis, P E; Cohen, D L; Whitaker, A

    1980-01-01

    The production of alpha-amylase by a strain of B.stearothermophilus isolated from leaf litter was investigated in a tryptone-maltose medium at 55 degrees in batch and chemostat culture. Amylase production was growth-limited and restricted to the exponential phase in batch culture. The enzyme yield was reduced by 40% when the culture pH was maintained at pH 7.2. Amylase production in chemostat culture was influenced by the growth rate throughout the dilution rate range used.

  8. Bagasse hydrolyzates from Agave tequilana as substrates for succinic acid production by Actinobacillus succinogenes in batch and repeated batch reactor.

    Science.gov (United States)

    Corona-González, Rosa Isela; Varela-Almanza, Karla María; Arriola-Guevara, Enrique; Martínez-Gómez, Álvaro de Jesús; Pelayo-Ortiz, Carlos; Toriz, Guillermo

    2016-04-01

    The aim of this work was to obtain fermentable sugars by enzymatic or acid hydrolyses of Agave tequilana Weber bagasse in order to produce succinic acid with Actinobacillus succinogenes. Hydrolyses were carried out with mineral acids (sulfuric and hydrochloric acids) or a commercial cellulolytic enzyme, and were optimized statistically by a response surface methodology, having as factors the concentration of acid/enzyme and time of hydrolysis. The concentration of sugars obtained at optimal conditions for each hydrolysis were 21.7, 22.4y 19.8g/L for H2SO4, HCl and the enzymatic preparation respectively. Concerning succinic acid production, the enzymatic hydrolyzates resulted in the highest yield (0.446g/g) and productivity (0.57g/Lh) using A. succinogenes in a batch reactor system. Repeated batch fermentation with immobilized A. succinogenes in agar and with the enzymatic hydrolyzates resulted in a maximum concentration of succinic acid of 33.6g/L from 87.2g/L monosaccharides after 5 cycles in 40h, obtaining a productivity of 1.32g/Lh. Copyright © 2016. Published by Elsevier Ltd.

  9. Change in hyphal morphology of Aspergillus Oryzae during fed-batch cultivation

    DEFF Research Database (Denmark)

    Haack, Martin Brian; Olsson, Lisbeth; Hansen, K

    2006-01-01

    the batch phase from 2.8-2.9 up to 4.0-4.4 mu m. The diameter of the hyphal elements remained constant, around 4 mu m, after the feed was started. However, the diameter of the immediate hyphal tip, where the enzyme secretion is thought to take place, increased dramatically with up to a factor 2.5 during......Industrial enzymes are often produced by filamentous fungi in fed-batch cultivations. During cultivation, the different morphological forms displayed by the fungi have an impact on the overall production. The morphology of a recombinant lipase producing Aspergillus oryzae strain was investigated...

  10. Oocyte batch development and enumeration in the European anchovy (Engraulis encrasicolus

    Directory of Open Access Journals (Sweden)

    R. FERRERI

    2016-09-01

    Full Text Available An alternative method to the traditional hydrated oocyte (HO method has been evaluated for the Sicilian anchovy, Engraulis encrasicolus. The method is based on the processing of ovarian whole mount images and the identification of the spawning batch in oocyte size frequency distributions and shows the advantage that it can be applied to various oocyte stages rather than strictly to the HO stage. Despite the peculiar elliptical shape of anchovy oocytes, this image analysis technique was fully successful since the yolked stage appeared to perform equally to the HO stage for anchovy batch fecundity measurements.

  11. Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

    Science.gov (United States)

    Soelistijanto, B.; Muliadi, V.

    2018-03-01

    Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

  12. Mediated Encryption: Analysis and Design

    Directory of Open Access Journals (Sweden)

    I. Elashry1

    2015-01-01

    Full Text Available Boneh, Ding and Tsudik presented identity-based mediated RSA encryption and signature systems in which the users are not allowed to decrypt/sign messages without the authorisation of a security mediator.We show that ID-MRSA is not secure and we present a secure modified version of it which is as efficient as the original system. We also propose a generic mediated encryption that translates any identity based encryption to a mediated version of this IBE. It envelops an IBE encrypted message using a user’s identity into an IBE envelope using the identity of the SEM. We present two security models based on the role of the adversary whether it is a revoked user or a hacked SEM. We prove that GME is as secure as the SEM’s IBE against a revoked user and as secure as the user’s IBE against a hacked SEM. We also present two implementations of GME based on Boneh-Franklin FullIBE system which is a pairing-based system and Boneh, Gentry and Hamburg (BGH system which is pairing-free system.

  13. A fixed-size batch service queue with vacations

    Directory of Open Access Journals (Sweden)

    Ho Woo Lee

    1996-01-01

    Full Text Available The paper deals with batch service queues with vacations in which customers arrive according to a Poisson process. Decomposition method is used to derive the queue length distributions both for single and multiple vacation cases. The authors look at other decomposition techniques and discuss some related open problems.

  14. Laboratory shake flask batch tests can predict field biodegradation of aniline in the Rhine

    DEFF Research Database (Denmark)

    Toräng, Lars; Reuschenbach, P.; Müller, B.

    2001-01-01

    .7 degreesC, respectively. This field rate estimate was compared with results from 38 laboratory shake flask batch tests with Rhine water which averaged 1.5 day(-1) at 15 degreesC and 2.0 day(-1) at 20 degreesC. These results indicate that laboratory shake flask batch tests with low concentrations of test...

  15. Automated batch emulsion copolymerization of styrene and butyl acrylate

    NARCIS (Netherlands)

    Mballa Mballa, M.A.; Schubert, U.S.; Heuts, J.P.A.; Herk, van A.M.

    2011-01-01

    This article describes a method for carrying out emulsion copolymerization using an automated synthesizer. For this purpose, batch emulsion copolymerizations of styrene and butyl acrylate were investigated. The optimization of the polymerization system required tuning the liquid transfer method,

  16. Procedures for Separations within Batches of Values, 1. The Orderly Tool Kit and Some Heuristics

    Science.gov (United States)

    1989-03-01

    separations within batches of values, I. The orderly tool kit and some heuristics by Thu Hoang* and John W. Tukey** *Universite Rene Descartes ...separations with batches of values, . The orderly tool kit and heuristics Thu Hoang* and John W. Tukey** *Universite Rene Descartes Laboratoire de

  17. Use of carbamylated charge standards for testing batches of ampholytes used in two-dimensional elecrophoresis

    Energy Technology Data Exchange (ETDEWEB)

    Tollaksen, S L; Edwards, J J; Anderson, N G

    1981-01-01

    A method of testing batches of ampholytes is presented. By using carbamylated charge standards to co-electrophorese with the protein sample in the first-dimension isoelectric focusing gel, one can monitor, after running and staining the second-dimension sodium dodecyl sulfate (SDS) slab gel, the continuity of the pH gradient. Charge standards can also be used to check the reproducibility of the pH gradient among batches of ampholytes and to modify the new batch with a small amount of a narrow range ampholyte to assure reproducibility of experiments. Ampholytes for comparison were obtained from three major manufacturers. 5 figures.

  18. [A SAS marco program for batch processing of univariate Cox regression analysis for great database].

    Science.gov (United States)

    Yang, Rendong; Xiong, Jie; Peng, Yangqin; Peng, Xiaoning; Zeng, Xiaomin

    2015-02-01

    To realize batch processing of univariate Cox regression analysis for great database by SAS marco program. We wrote a SAS macro program, which can filter, integrate, and export P values to Excel by SAS9.2. The program was used for screening survival correlated RNA molecules of ovarian cancer. A SAS marco program could finish the batch processing of univariate Cox regression analysis, the selection and export of the results. The SAS macro program has potential applications in reducing the workload of statistical analysis and providing a basis for batch processing of univariate Cox regression analysis.

  19. Acceptance Test Data for BWXT Coated Particle Batches 93172B and 93173B—Defective IPyC and Pyrocarbon Anisotropy

    Energy Technology Data Exchange (ETDEWEB)

    Hunn, John D. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Helmreich, Grant W. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Dyer, John A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Schumacher, Austin T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Skitt, Darren J. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-08-01

    Coated particle batches J52O-16-93172B and J52O-16-93173B were produced by Babcock and Wilcox Technologies (BWXT) as part of the production campaign for the Advanced Gas Reactor Fuel Development and Qualification (AGR) Program’s AGR-5/6/7 irradiation test in the Idaho National Laboratory (INL) Advanced Test Reactor (ATR), but were not used in the final fuel composite. However, these batches may be used as demonstration production-scale coated particle fuel for other experiments. Each batch was coated in a 150-mm-diameter production-scale fluidized-bed chemical vapor deposition (CVD) furnace. Tristructural isotropic (TRISO) coatings were deposited on 425-μm-nominal-diameter spherical kernels from BWXT lot J52R-16-69317 containing a mixture of 15.5%-enriched uranium carbide and uranium oxide (UCO). The TRISO coatings consisted of four consecutive CVD layers: a ~50% dense carbon buffer layer with 100-μm-nominal thickness, a dense inner pyrolytic carbon (IPyC) layer with 40-μm-nominal thickness, a silicon carbide (SiC) layer with 35-μm-nominal thickness, and a dense outer pyrolytic carbon (OPyC) layer with 40-μm-nominal thickness. The TRISO-coated particle batches were sieved to upgrade the particles by removing over-sized and under-sized material, and the upgraded batches were designated by appending the letter A to the end of the batch number (e.g., 93172A). Secondary upgrading by sieving was performed on the A-designated batches to remove particles with missing or very-thin buffer layers that were identified during previous analysis of the individual batches for defective IPyC, as reported in the acceptance test data report for the AGR-5/6/7 production batches [Hunn et al. 2017b]. The additionally-upgraded batches were designated by appending the letter B to the end of the batch number (e.g., 93172B).

  20. Shell of Planet Earth – Global Batch Bioreactor.

    Czech Academy of Sciences Publication Activity Database

    Hanika, Jiří; Šolcová, Olga; Kaštánek, P.

    2017-01-01

    Roč. 40, č. 11 (2017), s. 1959-1965 ISSN 0930-7516 R&D Projects: GA TA ČR TE01020080 Institutional support: RVO:67985858 Keywords : critical raw materials * global batch bioreactor * planet earth Subject RIV: CI - Industrial Chemistry, Chemical Engineering OBOR OECD: Chemical process engineering Impact factor: 2.051, year: 2016

  1. High cell density fed-batch fermentations for lipase production: feeding strategies and oxygen transfer.

    Science.gov (United States)

    Salehmin, M N I; Annuar, M S M; Chisti, Y

    2013-11-01

    This review is focused on the production of microbial lipases by high cell density fermentation. Lipases are among the most widely used of the enzyme catalysts. Although lipases are produced by animals and plants, industrial lipases are sourced almost exclusively from microorganisms. Many of the commercial lipases are produced using recombinant species. Microbial lipases are mostly produced by batch and fed-batch fermentation. Lipases are generally secreted by the cell into the extracellular environment. Thus, a crude preparation of lipases can be obtained by removing the microbial cells from the fermentation broth. This crude cell-free broth may be further concentrated and used as is, or lipases may be purified from it to various levels. For many large volume applications, lipases must be produced at extremely low cost. High cell density fermentation is a promising method for low-cost production: it allows a high concentration of the biomass and the enzyme to be attained rapidly and this eases the downstream recovery of the enzyme. High density fermentation enhances enzyme productivity compared with the traditional submerged culture batch fermentation. In production of enzymes, a high cell density is generally achieved through fed-batch operation, not through perfusion culture which is cumbersome. The feeding strategies used in fed-batch fermentations for producing lipases and the implications of these strategies are discussed. Most lipase-producing microbial fermentations require oxygen. Oxygen transfer in such fermentations is discussed.

  2. Cold-walled UHV/CVD batch reactor for the growth of Si1_x/Gex layers

    DEFF Research Database (Denmark)

    Thomsen, Erik Vilain; Christensen, Carsten; Andersen, C.R.

    1997-01-01

    A novel cold-walled, lamp-heated, ultrahigh vacuum chemical vapor deposition (UHV/CVD) batch system for the growth of SiGe layers is presented. This system combines the batch capability of the standard UHV/CVD furnace with the temperature processing available in rapid thermal processing (Rm...

  3. Development of a three-component batching system for fuel refabrication

    International Nuclear Information System (INIS)

    Marmo, A.R.; Limpert, J.C.

    1979-01-01

    The traditional approach to preparing mixed-oxide powder blends is to manually weigh homogenized, small portions of each blend component. For commercial large-scale production of recycled plutonium fuel, large batches must be rapidly and accurately prepared in a remote operating mode. The Westinghouse Nuclear Fuel Division, under the sponsorship of the US Department of Energy, has designed and demonstrated the capability to satisfy the stringent requirements imposed on such large-scale systems in a highly radioactive operating environment. Weighing accuracy and precision were shown to be well within acceptable limits to meet the final blend fissile tolerances; batching cycles were on the order of a 30-min duration; residual material levels were relatively low; and semiremote maintenance was successfully demonstrated

  4. Random assay in radioimmunoassay: Feasibility and application compared with batch assay

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung Min; Lee, Hwan Hee; Park, Sohyun; Kim, Tae Sung; Kim, Seok Ki [Dept. of Nuclear MedicineNational Cancer Center, Goyang (Korea, Republic of)

    2016-12-15

    The batch assay has been conventionally used for radioimmunoassay (RIA) because of its technical robustness and practical convenience. However, it has limitations in terms of the relative lag of report time due to the necessity of multiple assays in a small number of samples compared with the random assay technique. In this study, we aimed to verify whether the random assay technique can be applied in RIA and is feasible in daily practice. The coefficients of variation (CVs) of eight standard curves within a single kit were calculated in a CA-125 immunoradiometric assay (IRMA) for the reference of the practically ideal CV of the CA-125 kit. Ten standard curves of 10 kits from 2 prospectively collected lots (pLot) and 85 standard curves of 85 kits from 3 retrospectively collected lots (Lot) were obtained. Additionally, the raw measurement data of both 170 control references and 1123 patients' sera were collected retrospectively between December 2015 and January 2016. A standard curve of the first kit of each lot was used as a master standard curve for a random assay. The CVs of inter-kits were analyzed in each lot, respectively. All raw measurements were normalized by decay and radioactivity. The CA-125 values from control samples and patients' sera were compared using the original batch assay and random assay. In standard curve analysis, the CVs of inter-kits in pLots and Lots were comparable to those within a single kit. The CVs from the random assay with normalization were similar to those from the batch assay in the control samples (CVs % of low/high concentration; Lot1 2.71/1.91, Lot2 2.35/1.83, Lot3 2.83/2.08 vs. Lot1 2.05/1.21, Lot2 1.66/1.48, Lot3 2.41/2.14). The ICCs between the batch assay and random assay using patients' sera were satisfactory (Lot1 1.00, Lot2 0.999, Lot3 1.00). The random assay technique could be successfully applied to the conventional CA-125 IRMA kits. The random assay showed strong agreement with the batch assay. The

  5. Explicit Constructions and Bounds for Batch Codes with Restricted Size of Reconstruction Sets

    OpenAIRE

    Thomas, Eldho K.; Skachek, Vitaly

    2017-01-01

    Linear batch codes and codes for private information retrieval (PIR) with a query size $t$ and a restricted size $r$ of the reconstruction sets are studied. New bounds on the parameters of such codes are derived for small values of $t$ or of $r$ by providing corresponding constructions. By building on the ideas of Cadambe and Mazumdar, a new bound in a recursive form is derived for batch codes and PIR codes.

  6. Over Batch Analysis for the LLNL Plutonium Packaging System (PuPS)

    International Nuclear Information System (INIS)

    Riley, D.; Dodson, K.

    2007-01-01

    This document addresses the concern raised in the Savannah River Site (SRS) Acceptance Criteria (Reference 1, Section 6.a.3) about receiving an item that is over batched by 1.0 kg of fissile materials. This document shows that the occurrence of this is incredible. Some of the Department of Energy Standard 3013 (DOE-STD-3013) requirements are described in Section 2.1. The SRS requirement is discussed in Section 2.2. Section 2.3 describes the way fissile materials are handled in the Lawrence Livermore National Laboratory (LLNL) Plutonium Facility (B332). Based on the material handling discussed in Section 2.3, there are only three errors that could result in a shipping container being over batched. These are: incorrect measurement of the item, selecting the wrong item to package, and packaging two items into a single shipping container. The analysis in Section 3 shows that the first two events are incredible because of the controls that exist at LLNL. The third event is physically impossible. Therefore, it is incredible for an item to be shipped to SRS that is more than 1.0 kg of fissile materials over batched

  7. Over Batch Analysis for the LLNL DOE-STD-3013 Packaging System

    International Nuclear Information System (INIS)

    Riley, D.C.; Dodson, K.

    2009-01-01

    This document addresses the concern raised in the Savannah River Site (SRS) Acceptance Criteria about receiving an item that is over batched by 1.0 kg of fissile materials. This document shows that the occurrence of this is incredible. Some of the Department of Energy Standard 3013 (DOE-STD-3013) requirements are described in Section 2.1. The SRS requirement is discussed in Section 2.2. Section 2.3 describes the way fissile materials are handled in the Lawrence Livermore National Laboratory (LLNL) Plutonium Facility (B332). Based on the material handling discussed in Section 2.3, there are only three errors that could result in a shipping container being over batched. These are: incorrect measurement of the item, selecting the wrong item to package, and packaging two items into a single shipping container. The analysis in Section 3 shows that the first two events are incredible because of the controls that exist at LLNL. The third event is physically impossible. Therefore, it is incredible for an item to be shipped to SRS that is more than 1.0 kg of fissile materials over batched.

  8. The overpressure protection for the chemical reactors: the batch-size approach

    International Nuclear Information System (INIS)

    Dellavedova, M.; Gigante, L.; Lunghi, A.; Pasturenzi, C.; Cardillo, P.; Gerosa, N.P.; Rota, R.

    2008-01-01

    Small and medium enterprises (SMEs) main feature is to run batch and semi-batch processes, working on job orders. They generally have multi propose reactors with an emergency relief system (ERS) already installed. These are normally sized when the reactor is designed, assuming as worst incidental scenario a single phase vapour flow generated by a fire developed outside the apparatus. These assumptions can lead to a big underestimation of the vent area if the actual flow is two-phase and besides generated by a runaway reaction. ERS sizing is particularly hazardous and complex for small mills, as for example fine chemicals and pharmaceutical companies. These factories have usually narrow financial and personal resources, moreover they often use fast processes turnovers. In many cases a complete safety study or the replacement of the ERS is not possible and it can lead to not sustainable costs. The batch-size approach is focused on discontinuous process conditions: aim of this approach is to find the reactor fill level that can lead a vapour single phase flow whether an incident occurs, this condition is considered safe that the ERS installed on the reactor can protect the plant from explosions [it

  9. Experimental investigation of pyrolysis of rice straw using bench-scale auger, batch and fluidized bed reactors

    International Nuclear Information System (INIS)

    Nam, Hyungseok; Capareda, Sergio C.; Ashwath, Nanjappa; Kongkasawan, Jinjuta

    2015-01-01

    Energy conversion efficiencies of three pyrolysis reactors (bench-scale auger, batch, and fluidized bed) were investigated using rice straw as the feedstock at a temperature of 500 °C. The highest bio-oil yield of 43% was obtained from the fluidized bed reactor, while the maximum bio-char yield of 48% was obtained from the batch reactor. Similar bio-oil yields were obtained from the auger and batch type reactors. The GCMS and FTIR were used to evaluate the liquid products from all reactors. The best quality bio-oil and bio-char from the batch reactor was determined to have a heating value of 31 MJ/kg and 19 MJ/kg, respectively. The highest alkali mineral was found in the bio-char produced from the auger reactor. The energy conversion efficiencies of the three reactors indicated that the majority of the energy (50–64%) was in the bio-char products from the auger and batch reactors, while the bio-oil from the fluidized bed reactor contained the highest energy (47%). A Sankey diagram has been produced to show the flows of product energy from each pyrolysis process. The result will help determine which conversion process would be optimal for producing specific products of bio-char, bio-oil, and gas depending on the needs. - Highlights: • Pyrolysis products from auger, batch, and fluidized bed reactor were examined. • O/C ratios of bio-oils stayed in specific ranges depending on the process reactors. • The largest quantity of bio-oil from fluidized, while the best quality from batch. • The highest alkali concentration of 37 g/kg included in the auger based bio-char. • Sankey diagram was used to understand the energy distribution from reactors.

  10. Oxidative stability of frozen mackerel batches ― A multivariate data analysis approach

    DEFF Research Database (Denmark)

    Helbo Ekgreen, M.; Frosch, Stina; Baron, Caroline Pascale

    2011-01-01

    deterioration and texture changes. The aim was to investigate the correlation between the raw material history and the quality loss observed during frozen storage using relevant multivariate data analysis such as Principal Component Analysis (PCA) and Partial Least Square Analysis (PLS). Preliminary results...... showed that it was possible to differentiate between the different batches depending on their history and that some batches were more oxidised than others. Furthermore, based on the results from the data analysis, critical control points in the entire production chain will be identified and strategies...

  11. THE EFFECT OF THE ADDITION OF INVERT SUGAR ON THE PRODUCTION OF CEPHALOSPORIN C IN A FED-BATCH BIOREACTOR

    Directory of Open Access Journals (Sweden)

    A.S. Silva

    1998-12-01

    Full Text Available Cephalosporin C, a b -lactam antibiotic, is the starting molecule for industrial production of semi-synthetic cephalosporins. The bioprocess for its production is carried out in batch stirred and aerated tank reactors utilizing strains of the filamentous fungus Cephalosporium acremonium. In this work a comparison was made between the processes of production of cephalosporin C in a conventional batch bioreactor, with synthetic medium containing glucose and sucrose, and in a fed-batch reactor at several flowrates of supplementary medium containing invert sucrose. In general, the fed-batch process was shown to be more efficient than the conventional batch one, and the process in which the lowest supplementation flowrate was used presented an antibiotic production significantly higher than those obtained under the other conditions.

  12. Development of Production Control in Small Batch Production

    Directory of Open Access Journals (Sweden)

    Németh Péter

    2016-01-01

    Full Text Available Our aim with this paper is to develop a new performance measurement and control system for small batch production in the automotive industry. For this reason, we present our previous research results for warehouse performance measurement and adopt its methodology to production control. The proposed method is based on artificial intelligence (neural networks.

  13. A new statistic for identifying batch effects in high-throughput genomic data that uses guided principal component analysis.

    Science.gov (United States)

    Reese, Sarah E; Archer, Kellie J; Therneau, Terry M; Atkinson, Elizabeth J; Vachon, Celine M; de Andrade, Mariza; Kocher, Jean-Pierre A; Eckel-Passow, Jeanette E

    2013-11-15

    Batch effects are due to probe-specific systematic variation between groups of samples (batches) resulting from experimental features that are not of biological interest. Principal component analysis (PCA) is commonly used as a visual tool to determine whether batch effects exist after applying a global normalization method. However, PCA yields linear combinations of the variables that contribute maximum variance and thus will not necessarily detect batch effects if they are not the largest source of variability in the data. We present an extension of PCA to quantify the existence of batch effects, called guided PCA (gPCA). We describe a test statistic that uses gPCA to test whether a batch effect exists. We apply our proposed test statistic derived using gPCA to simulated data and to two copy number variation case studies: the first study consisted of 614 samples from a breast cancer family study using Illumina Human 660 bead-chip arrays, whereas the second case study consisted of 703 samples from a family blood pressure study that used Affymetrix SNP Array 6.0. We demonstrate that our statistic has good statistical properties and is able to identify significant batch effects in two copy number variation case studies. We developed a new statistic that uses gPCA to identify whether batch effects exist in high-throughput genomic data. Although our examples pertain to copy number data, gPCA is general and can be used on other data types as well. The gPCA R package (Available via CRAN) provides functionality and data to perform the methods in this article. reesese@vcu.edu

  14. Medium optimization for protopectinase production by batch culture of

    African Journals Online (AJOL)

    Medium optimization for protopectinase production by batch culture of. C Fan, Z Liu, L Yao. Abstract. Optimization of medium compositions for protopectinase production by Aspergillus terreus in submerged culture was carried out. The medium components having significant effect on protopectinase production were reported ...

  15. Dynamic encryption method

    DEFF Research Database (Denmark)

    2013-01-01

    algorithm for on provision of a specific key, decrypting cipher data and reproduce plain data; encrypting the first data package comprising plain data, using a first encryption program implementing the first encryption algorithm of said first encryption technique, creating a first encrypted data package...... comprising cipher data; obtaining a first decryption program; and transmitting said first decryption program and said first encrypted data package to a receiver, wherein the first decryption, upon provision of the specific key and the first encrypted data package, will decrypt the cipher data in the first...

  16. Performance of the Subsurface Flow Wetland in Batch Flow for Municipal Wastewater Treatment

    Directory of Open Access Journals (Sweden)

    Abolfazle Rahmani sani

    2009-06-01

    Full Text Available Subsurface flow wetlands are one of the natural treatment methods used for municipal and industrial wastewater treatment that are economical in terms of energy consumption and cost-effectiveness. Much research has been conducted on wetland operation with continuous flow but not enough information is available on batch flow. This study investigates wetland efficiency in batch flow. For the purposes of this research, two pretreatment units of the anaerobic pond type with digestion pits and two subsurface flow wetlands with a 2-day detention time were built on the pilot scale. The cells were charged with sand of 5 mm effective size, uniformity coefficient of 1.5, and a porosity of 35%. One wetland cell and one pretreatment unit were used as control. The municipal wastewater selected to be monitored for the one-year study period had a flow rate of 26 m3/day and average BOD5 of 250mg/l, TSS of 320mg/l, TKN of 35mg/l, TP of 12mg/l and TC of 2×108 MPN/100ml from Sabzevar Wastewater Treatment Plant. The average removal efficiencies of BOD5,TSS,TKN,TP, and TC in the continuous flow for the combined control pretreatment and wetland cell were 77.2%, 92%, 91%, 89%, 96.5% while the same values for the batch flow for the combined experimental pretreatment and wetland cell were 92%, 97%, 97.5%, 97%, and 99.75%, respectively. The removal efficiency in the subsurface flow wetlands in the batch flow was higher than that of the continuous flow. Thus, for wastewaters with a high pollution level, the batch flow can be used in cell operation in cases where there is not enough land for spreading the wetland cell.

  17. Actual distribution of Cronobacter spp. in industrial batches of powdered infant formula and consequences for performance of sampling strategies.

    Science.gov (United States)

    Jongenburger, I; Reij, M W; Boer, E P J; Gorris, L G M; Zwietering, M H

    2011-11-15

    The actual spatial distribution of microorganisms within a batch of food influences the results of sampling for microbiological testing when this distribution is non-homogeneous. In the case of pathogens being non-homogeneously distributed, it markedly influences public health risk. This study investigated the spatial distribution of Cronobacter spp. in powdered infant formula (PIF) on industrial batch-scale for both a recalled batch as well a reference batch. Additionally, local spatial occurrence of clusters of Cronobacter cells was assessed, as well as the performance of typical sampling strategies to determine the presence of the microorganisms. The concentration of Cronobacter spp. was assessed in the course of the filling time of each batch, by taking samples of 333 g using the most probable number (MPN) enrichment technique. The occurrence of clusters of Cronobacter spp. cells was investigated by plate counting. From the recalled batch, 415 MPN samples were drawn. The expected heterogeneous distribution of Cronobacter spp. could be quantified from these samples, which showed no detectable level (detection limit of -2.52 log CFU/g) in 58% of samples, whilst in the remainder concentrations were found to be between -2.52 and 2.75 log CFU/g. The estimated average concentration in the recalled batch was -2.78 log CFU/g and a standard deviation of 1.10 log CFU/g. The estimated average concentration in the reference batch was -4.41 log CFU/g, with 99% of the 93 samples being below the detection limit. In the recalled batch, clusters of cells occurred sporadically in 8 out of 2290 samples of 1g taken. The two largest clusters contained 123 (2.09 log CFU/g) and 560 (2.75 log CFU/g) cells. Various sampling strategies were evaluated for the recalled batch. Taking more and smaller samples and keeping the total sampling weight constant, considerably improved the performance of the sampling plans to detect such a type of contaminated batch. Compared to random sampling

  18. Batch production of microchannel plate photo-multipliers

    Energy Technology Data Exchange (ETDEWEB)

    Frisch, Henry J.; Wetstein, Matthew; Elagin, Andrey

    2018-03-06

    In-situ methods for the batch fabrication of flat-panel micro-channel plate (MCP) photomultiplier tube (PMT) detectors (MCP-PMTs), without transporting either the window or the detector assembly inside a vacuum vessel are provided. The method allows for the synthesis of a reflection-mode photocathode on the entrance to the pores of a first MCP or the synthesis of a transmission-mode photocathode on the vacuum side of a photodetector entrance window.

  19. Perfusion cell culture decreases process and product heterogeneity in a head-to-head comparison with fed-batch.

    Science.gov (United States)

    Walther, Jason; Lu, Jiuyi; Hollenbach, Myles; Yu, Marcella; Hwang, Chris; McLarty, Jean; Brower, Kevin

    2018-05-30

    In this study, we compared the impacts of fed-batch and perfusion platforms on process and product attributes for IgG1- and IgG4-producing cell lines. A "plug-and-play" approach was applied to both platforms at bench scale, using commercially available basal and feed media, a standard feed strategy for fed-batch, and ATF filtration for perfusion. Product concentration in fed-batch was 2.5 times greater than perfusion, while average productivity in perfusion was 7.5 times greater than fed-batch. PCA revealed more variability in the cell environment and metabolism during the fed-batch run. LDH measurements showed that exposure of product to cell lysate was 7-10 times greater in fed-batch. Product analysis shows larger abundances of neutral species in perfusion, likely due to decreased bioreactor residence times and extracellular exposure. The IgG1 perfusion product also had higher purity and lower half-antibody. Glycosylation was similar across both culture modes. The first perfusion harvest slice for both product types showed different glycosylation than subsequent harvests, suggesting that product quality lags behind metabolism. In conclusion, process and product data indicate that intra-lot heterogeneity is decreased in perfusion cultures. Additional data and discussion is required to understand the developmental, clinical and commercial implications, and in what situations increased uniformity would be beneficial. This article is protected by copyright. All rights reserved.

  20. An Integer Batch Scheduling Model for a Single Machine with Simultaneous Learning and Deterioration Effects to Minimize Total Actual Flow Time

    Science.gov (United States)

    Yusriski, R.; Sukoyo; Samadhi, T. M. A. A.; Halim, A. H.

    2016-02-01

    In the manufacturing industry, several identical parts can be processed in batches, and setup time is needed between two consecutive batches. Since the processing times of batches are not always fixed during a scheduling period due to learning and deterioration effects, this research deals with batch scheduling problems with simultaneous learning and deterioration effects. The objective is to minimize total actual flow time, defined as a time interval between the arrival of all parts at the shop and their common due date. The decision variables are the number of batches, integer batch sizes, and the sequence of the resulting batches. This research proposes a heuristic algorithm based on the Lagrange Relaxation. The effectiveness of the proposed algorithm is determined by comparing the resulting solutions of the algorithm to the respective optimal solution obtained from the enumeration method. Numerical experience results show that the average of difference among the solutions is 0.05%.