WorldWideScience

Sample records for batch rsa decryption

  1. A Practical SSL Server Performance Improvement Algorithm Based on Batch RSA Decryption

    Institute of Scientific and Technical Information of China (English)

    LI Shi-qun; WU Yong-dong; ZHOU Jian-ying; CHEN Ke-fei

    2008-01-01

    The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptious when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and opti-mizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance,the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b=4.

  2. A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption

    CERN Document Server

    Pateriya, R K; Shrivastava, S C; Patel, Jaideep

    2009-01-01

    Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement...

  3. Research of an Efficient Variant of Batch RSA Algorithm%一种有效的Batch RSA算法的研究

    Institute of Scientific and Technical Information of China (English)

    李云飞; 柳青; 李彤; 郝林

    2011-01-01

    提出了一种改进的Batch RSA算法来提升Batch RSA算法的解密性能.该改进算法结合了负载转移技术和Multi-Power RSA技术,在Batch RSA算法的指数计算阶段提升Batch RSA算法的解密性能.实验结果和理论分析表明,该改进算法使得Batch RSA算法的解密性能得到显著提升,且易于并行实现,可使基于多核平台的Batch RSA算法的整体性能得到进一步提升.%This paper aimed at speeding up Batch RSA decryption. An efficient variant of Batch RSA was proposed to improve the Batch RSA decryption performance. The improved Batch RSA variant speeds up decryption by combining the load transferring technique and multi-power RSA technique in the exponentiation phase. The experimental result and the theoretical values show that the speed of the decryption is substantially improved and the variant can be efficiently implemented in parallel and parallel implementation of the variant on multi-core devices can further improve the overall performance of Batch RSA algorithm.

  4. Research of efficient variant of the Batch RSA based on Multi- Power%基于Multi-Power的批处理RSA算法的研究

    Institute of Scientific and Technical Information of China (English)

    李云飞; 柳青; 李彤; 郝林

    2011-01-01

    提出一种改进的Batch RSA算法来提升Batch RSA算法的解密性能.该改进算法结合了批处理技术和Multi-Power RSA技术,在Batch RSA算法的指数计算阶段来提升Batch RSA算法的解密性能.实验结果和理论分析表明该改进算法使得Batch RSA算法的解密性能得到显著提升.%This paper aims at speeding up Batch RSA decryption.An efficient variant of Batch RSA is proposed to improve the Batch RSA decryption performance.The improved Batch RSA variant speeds up decryption by combining the batch technique and multi - power RSA technique in the exponentiation phase.The experimental result and the theoretical values show that the speed of the decryption has been substantially improved.

  5. VLSI design of an RSA encryption/decryption chip using systolic array based architecture

    Science.gov (United States)

    Sun, Chi-Chia; Lin, Bor-Shing; Jan, Gene Eu; Lin, Jheng-Yi

    2016-09-01

    This article presents the VLSI design of a configurable RSA public key cryptosystem supporting the 512-bit, 1024-bit and 2048-bit based on Montgomery algorithm achieving comparable clock cycles of current relevant works but with smaller die size. We use binary method for the modular exponentiation and adopt Montgomery algorithm for the modular multiplication to simplify computational complexity, which, together with the systolic array concept for electric circuit designs effectively, lower the die size. The main architecture of the chip consists of four functional blocks, namely input/output modules, registers module, arithmetic module and control module. We applied the concept of systolic array to design the RSA encryption/decryption chip by using VHDL hardware language and verified using the TSMC/CIC 0.35 m 1P4 M technology. The die area of the 2048-bit RSA chip without the DFT is 3.9 × 3.9 mm2 (4.58 × 4.58 mm2 with DFT). Its average baud rate can reach 10.84 kbps under a 100 MHz clock.

  6. Batch Private Keys Generation for RSA in Security Communication Systems

    Institute of Scientific and Technical Information of China (English)

    CHEN Yun; CHEN Xin

    2005-01-01

    RSA public key cryptosystem is extensively used in information security systems.However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.

  7. Research of batch RSA based on multi-prime%基于多素数的批处理RSA算法的研究

    Institute of Scientific and Technical Information of China (English)

    柳青; 李云飞; 周保林; 彭华

    2011-01-01

    针对提升batch RSA算法的解密性能,提出了一种改进的batch RSA算法.该改进算法结合了批处理技术和多素数技术,使得batch RSA算法指数计算阶段的大数模幂运算的指数和模数的位数减少.实验结果和理论分析表明,该改进算法使得批处理RSA算法的解密性能得到显著提升.%This paper proposed a new batch RSA variant to improve the batch RSA decryption performance.The improved batch RSA variant speeded up decryption by combining the batch technique and multi-prime technique to reduce modules and private exponents in modular exponentiation in the exponentiation phase.The experimental result and the theoretical values show that the speed of the decryption has been substantially improved.

  8. k-PARTY SHARED RSA KEY GENERATION

    Institute of Scientific and Technical Information of China (English)

    HeMingxing; FanPingzhi; 等

    2003-01-01

    This Ietter presents a k-party RSA key sharing scheme and the related algorithms are pressented.It is shown that the shared key can be generated in such a collaborative way that the RSA modulus is pubicly known but none of the parties is able to decrypt the enciphered message individually.

  9. Twin RSA

    OpenAIRE

    Lenstra, Arjen K.; Weger, de, B.M.M.; Benjamin, M M

    2005-01-01

    We introduce Twin RSA, pairs of RSA moduli (n, n+ 2), and formulate several questions related to it. Our main questions are: is Twin RSA secure, and what is it good for? © Springer-Verlag Berlin Heidelberg 2005.

  10. On the Efficiency of Fast RSA Variants in Modern Mobile Phones

    Directory of Open Access Journals (Sweden)

    Klaus Hansen

    2009-12-01

    Full Text Available Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public-key cryptosystem RSA. It is, however, well-known that public-key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on modern mobile phones. In this paper, we explore the efficiency on modern mobile phones of variants of the RSA cryptosystem, covering CRT, Multi-Prime RSA, Multi-Power RSA, Rebalanced RSA and R-Prime RSA by comparing the encryption and decryption time using a simple Java implementation and a typical RSA setup.Keywords—Public-key cryptography; RSA; software; mobile phones;

  11. A New Approach for Complex Encrypting and Decrypting Data

    Directory of Open Access Journals (Sweden)

    Obaida Mohammad Awad Al-Hazaimeh

    2013-04-01

    Full Text Available During the last decades, information security has become a major issue. Encrypting and decrypting datahave recently been widely investigated and developed because there is a demand for a stronger encryptionand decryption which is very hard to crack. Cryptography plays major roles to fulfilment these demands.Nowadays, many of researchers have proposed many of encryption and decryption algorithms such as AES,DES, RSA, and others. But most of the proposed algorithms encountered some problems such as lack ofrobustness and significant amount of time added to packet delay to maintain the security on thecommunication channel between the terminals. In this paper, the security goals were enhanced via "A NewApproach for Complex Encrypting and Decrypting Data" which maintains the security on thecommunication channels by making it difficult for attacker to predicate a pattern as well as speed of theencryption / decryption scheme.

  12. Data Security With Colors Using Rsa

    Directory of Open Access Journals (Sweden)

    G. Sankara Rao,

    2014-04-01

    Full Text Available Data Security with Colors using RSA technique that integrates the RGB Color model with the well-known public key cryptographic algorithm RSA (Rivest, Shamir and Adleman. This model provides both confidentiality and authentication to the data sent across the network. RSA algorithm uses public key and private key to encrypt and decrypt the data and thus provides confidentiality. But the public key is known to everyone and so anyone can encrypt the data and send the message. Hence authentication of users is needed. In this technique we use RGB color model to provide authentication. Every user will have a unique color assigned to him. A sender must know the receiver’s color to send a message. The color value is encrypted using a key which is used as a password while decrypting the message. To decrypt the message, the receiver must provide his color values. If the decrypted color values and his color values are equal then the sender and receiver are send to be authentic. The data encryption and decryption follows RSA procedure. Thus both authentication and confidentiality are provided for the data.

  13. On the Efficiency of Fast RSA Variants in Modern Mobile Phones

    CERN Document Server

    Hansen, Klaus; Olsen, Kim

    2010-01-01

    Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public key cryptosystem RSA. It is, however, well known that public key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on modern mobile phones. In this paper, we explore the efficiency on modern mobile phones of variants of the RSA cryptosystem, covering CRT, MultiPrime RSA, MultiPower RSA, Rebalanced RSA and R Prime RSA by comparing the encryption and decryption time using a simple Java implementation and a typical RSA setup.

  14. Penambahan Chinese Reminder Theorem Untuk Mempercepat Proses Enkripsi Dan Dekripsi Pada RSA

    OpenAIRE

    Hasibuan, Andi Hazri

    2015-01-01

    Many methods are used to protect digital data stored or transmitted via electronic media. One way is to use a cryptographic algorithm RSA (Rivest-Shamir-Adleman). Standard RSA uses modular arithmetic to perform the encryption and decryption. In this thesis discussed the addition of Chinese Remainder Theorem to speed up the RSA. 100823021

  15. On the Efficiency of Fast RSA Variants in Modern Mobile Phones

    DEFF Research Database (Denmark)

    Hansen, Klaus; Larsen, Troels; Olsen, Kim

    2009-01-01

    Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public-key cryptosystem RSA. It is, however, well-known that public-key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA...... decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on modern mobile phones....

  16. On the Efficiency of Fast RSA Variants in Modern Mobile Phones

    OpenAIRE

    Klaus Hansen; Troels Larsen; Kim Olsen

    2009-01-01

    Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public-key cryptosystem RSA. It is, however, well-known that public-key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on modern mobile phones. In this paper, we explore the efficiency on modern mobile phones of variants o...

  17. Revisiting Fermat's Factorization for the RSA Modulus

    CERN Document Server

    Gupta, Sounak

    2009-01-01

    We revisit Fermat's factorization method for a positive integer $n$ that is a product of two primes $p$ and $q$. Such an integer is used as the modulus for both encryption and decryption operations of an RSA cryptosystem. The security of RSA relies on the hardness of factoring this modulus. As a consequence of our analysis, two variants of Fermat's approach emerge. We also present a comparison between the two methods' effective regions. Though our study does not yield a new state-of-the-art algorithm for integer factorization, we believe that it reveals some interesting observations that are open for further analysis.

  18. Broadcast encryption schemes based on RSA

    Institute of Scientific and Technical Information of China (English)

    MU Ning-bo; HU Yu-pu; OU Hai-wen

    2009-01-01

    Three broadcast schemes for small receiver set using the property of RSA modulus are presented. They can solve the problem of data redundancy when the size of receiver set is small. In the proposed schemes, the center uses one key to encrypt the message and can revoke authorization conveniently. Every authorized user only needs to store one decryption key of a constant size. Among these three schemes, the first one has indistinguishability against adaptive chosen ciphertext attack (IND-CCA2) secure, and any collusion of authorized users cannot produce a new decryption key but the sizes of encryption modulus and ciphertext are linear in the number of receivers. In the second scheme, the size of ciphertext is half of the first one and any two authorized users can produce a new decryption key, but the center can identify them using the traitor tracing algorithm. The third one is the most efficient but the center cannot identify the traitors exactly.

  19. Range Scheduling Aid (RSA)

    Science.gov (United States)

    Logan, J. R.; Pulvermacher, M. K.

    1991-01-01

    Range Scheduling Aid (RSA) is presented in the form of the viewgraphs. The following subject areas are covered: satellite control network; current and new approaches to range scheduling; MITRE tasking; RSA features; RSA display; constraint based analytic capability; RSA architecture; and RSA benefits.

  20. Polarisation Encryption/Decryption Module

    DEFF Research Database (Denmark)

    2002-01-01

    A polarisation encryption/decryption module comprising at least two array based modulating devices, preferably spatial light modulators (SLMs), at least one array based intensity detector, and at least one source of electromagnetic radiation. A local region of information displayed on a first of ...... rapidly. May be used for real time encryption/decryption of motion pictures. Further, a method of polarisation encrypting and decrypting information. The encryption/decryption is performed optically while the communication is performed electronically.......A polarisation encryption/decryption module comprising at least two array based modulating devices, preferably spatial light modulators (SLMs), at least one array based intensity detector, and at least one source of electromagnetic radiation. A local region of information displayed on a first...... of the modulating devices has corresponding local regions on each of the other modulating devices and on each of the detectors. Preferably uses XOR operations. The module is compact in size and capable of performing encryption as well as decryption. Provides fast encryption/decryption because the key may be changed...

  1. An efficient and secure RSA--like cryptosystem exploiting R\\'edei rational functions over conics

    OpenAIRE

    Bellini, Emanuele; Murru, Nadir

    2015-01-01

    We define an isomorphism between the group of points of a conic and the set of integers modulo a prime equipped with a non-standard product. This product can be efficiently evaluated through the use of R\\'edei rational functions. We then exploit the isomorphism to construct a novel RSA-like scheme. We compare our scheme with classic RSA and with RSA-like schemes based on the cubic or conic equation. The decryption operation of the proposed scheme turns to be two times faster than RSA, and inv...

  2. A New Factorization Method to Factorize RSA Public Key Encryption

    OpenAIRE

    Bhagvant Ram Ambedkar; Sarabjeet Singh Bedi

    2011-01-01

    The security of public key encryption such as RSA scheme relied on the integer factoring problem. The security of RSA algorithm is based on positive integer N, because each transmitting node generates pair of keys such as public and private. Encryption and decryption of any message depends on N. Where, N is the product of two prime numbers and pair of key generation is dependent on these prime numbers. The factorization of N is very intricate. In this paper a New Factorization method is propo...

  3. Strategies and performances of Soft Input Decryption

    OpenAIRE

    Zivic, Natasa

    2009-01-01

    This paper analyzes performance aspects of Soft Input Decryption and L values. Soft Input Decryption is a novel method which uses L values (soft output) of a SISO channel decoder for the correction of input of Soft Input Decryption (SID blocks) which have been modified during the transmission over a noisy channel. The method is based on the combination of cryptography and channel coding improving characteristics of both of them. The algorithm, strategies and scenarios of Soft Input Decryption...

  4. An RSA Encryption Hardware Algorithm using a Single DSP Block and a Single Block RAM on the FPGA

    Directory of Open Access Journals (Sweden)

    Koji Nakano

    2011-07-01

    Full Text Available The main contribution of this paper is to present an efficient hardware algorithm for RSA encryption/decryption based on Montgomery multiplication. Modern FPGAs have a number of embedded DSP blocks (DSP48E1 and embedded memory blocks (BRAM. Our hardware algorithm supporting 2048-bit RSA encryption/decryption is designed to be implemented using one DSP48E1, one BRAM and few logic blocks (slices in the Xilinx Virtex-6 family FPGA. The implementation results showed that our RSA module for 2048-bit RSA encryption/decryption runs in 277.26ms. Quite surprisingly, the multiplier in DSP48E1 used to compute Montgomery multiplication works in more than 97% clock cycles over all clock cycles. Hence, our implementation is close to optimal in the sense that it has only less than 3% overhead in multiplication and no further improvement is possible as long as Montgomery multiplication based algorithm is used. Also, since our circuit uses only one DSP48E1 block and one Block RAM, we can implement a number of RSA modules in an FPGA that can work in parallel to attain high throughput RSA encryption/decryption.

  5. The deduction of the accelerated formula and the efficiency estimating in a number of primes in RSA decryption algorithm with Chinese remainder theorem%有关中国剩余定理在多个素数的RSA解密运算中的加速公式的论证以及加速效率的估算

    Institute of Scientific and Technical Information of China (English)

    刘承彬; 耿也; 舒奎; 高真香子

    2012-01-01

    RSA algorithms play an important role in the public key cryptography. Its computational efficiency have an immediately correlation with the efficiency of modular exponentiation implementation. In this paper the general formula for multiple primes of RSA algorithm were given by reducing the number of modular exponentiation, recover the original simply and fast. A formula for estimating efficiency also was given to calculate the efficiency of acceleration by estimating, which can provide the basis for the most appropriate numbers for RSA.%RSA算法在公钥密码体制中占有重要的地位,它的计算效率与模幂运算的实现效率有着直接关联.本实验在基于使用中国剩余定理简化的RSA解密算法的条件下,给出多个素数情况下的解密通用公式,通过减少大量的模幂运算,迅速简单地恢复出原文.并给出了效率提升估算公式,通过估算求出加速效率,为确定使用多少个素数最为合适提供依据.

  6. A New Factorization Method to Factorize RSA Public Key Encryption

    Directory of Open Access Journals (Sweden)

    Bhagvant Ram Ambedkar

    2011-11-01

    Full Text Available The security of public key encryption such as RSA scheme relied on the integer factoring problem. The security of RSA algorithm is based on positive integer N, because each transmitting node generates pair of keys such as public and private. Encryption and decryption of any message depends on N. Where, N is the product of two prime numbers and pair of key generation is dependent on these prime numbers. The factorization of N is very intricate. In this paper a New Factorization method is proposed to obtain the factor of positive integer N. The proposed work focuses on factorization of all trivial and nontrivial integer numbers and requires fewer steps for factorization process of RSA modulus N. The New Factorization method is based on Pollard rho factorization method. Experimental results shown that factorization speed is fast as compare existing methods.

  7. Research on the Safe Parameter of RSA Algorithm%RSA算法的安全参数研究

    Institute of Scientific and Technical Information of China (English)

    赵进宏

    2012-01-01

    RSA算法是一个非对称密钥加密算法。文章系统地介绍了RSA公钥密码算法的基本原理及利用RSA算法进行数据加密的过程:对RSA公钥密码算法安全参数的选择进行分析,并探讨了安全参数的选择对RSA公钥密码算法的安全性影响及重要性。%The RSA algorithm is an asymmetric key cryptographic algorithm.The paper introduces the working principle of RSA system in a system way, besides that it perform encryption and decryption in RSA algorithm,and study how to choose the safe parameter of RSA system,and then analyze the importance of a proper parameter in maintaining secudty of the RSA system.

  8. Dual-Layer Video Encryption using RSA Algorithm

    Science.gov (United States)

    Chadha, Aman; Mallik, Sushmit; Chadha, Ankit; Johar, Ravdeep; Mani Roja, M.

    2015-04-01

    This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two layers of encryption to ensure a reasonable level of security. Encryption of the video component involves applying the RSA algorithm followed by the PN-based encryption. Similarly, the audio component is first encrypted using PN and further subjected to encryption using the Discrete Cosine Transform. Combining these techniques, an efficient system, invulnerable to security breaches and attacks with favorable values of parameters such as encryption/decryption speed, encryption/decryption ratio and visual degradation; has been put forth. For applications requiring encryption of sensitive data wherein stringent security requirements are of prime concern, the system is found to yield negligible similarities in visual perception between the original and the encrypted video sequence. For applications wherein visual similarity is not of major concern, we limit the encryption task to a single level of encryption which is accomplished by using RSA, thereby quickening the encryption process. Although some similarity between the original and encrypted video is observed in this case, it is not enough to comprehend the happenings in the video.

  9. Decryption of pure-position permutation algorithms

    Institute of Scientific and Technical Information of China (English)

    赵晓宇; 陈刚; 张亶; 王肖虹; 董光昌

    2004-01-01

    Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown.

  10. Image-decrypting common path interferometer

    Science.gov (United States)

    Glueckstad, Jesper

    1999-03-01

    A new scheme for parallel optical decryption and the display of encrypted image information is presented. The scheme is based on a common path interferometer configuration providing a simple and robust optical setup. Images are encrypted directly during recording by use of a combined phase encoding and phase scrambling method. The encoding and encryption does not require sophisticated, iterative and time consuming optimization algorithms. Pixels are independently encoded and encrypted by use of a simple look-up table technique that can be performed in milliseconds on a standard personal computer. Optical decryption can subsequently be implemented in the common path interferometer by use of single phase or if desired a combined phase/amplitude key. An advantage of the presented method is that the encrypted image may selectively require recording and decryption of phase values or amplitude values or a combination thereof. Another advantage is that decryption is performed in a plane adjacent to the encrypted mask or an equivalent plane whereby generation of speckles in the decrypted image is strongly suppressed. Finally, there is no requirement of positioning a decrypting mask or spatial light modulator in the optical Fourier plane whereby an accurate three dimensional positioning requirement can be avoided.

  11. Threshold Decryption Scheme with Multiple Policies

    Institute of Scientific and Technical Information of China (English)

    FEI Ru-chun; WANG Li-na

    2005-01-01

    Based on the difficulty in computing discrete logarithm and square root on some special conditions, we propose a basic threshold secret sharing scheme for multiple secrets with multiple policies, which allows a group of users to share multiple secret keys and only one secret shadow to be kept by each user. An efficient threshold decryption scheme with multiple policies is designed on the basis of the basic threshold scheme. This decryption scheme allows multiple secret keys to be shared among a group of users, and each user to keep only one secret shadow. Different public keys can be used to encrypt documents. If and only if the number of cooperated users who keep the secret shadows is greater than or equal to the threshold value of the corresponding secret key,they can cooperate to decrypt the documents. It is proved that the proposed scheme has very strong security, unless the attackers can solve the discrete logarithm problem and the square root problem.

  12. Decryption of pure-position permutation algorithms

    Institute of Scientific and Technical Information of China (English)

    赵晓宇; 陈刚; 张亶; 王肖虹; 董光昌

    2004-01-01

    Pure position permutation image encryption algorithms,commonly used as image encryption investigated in this work are unfortunately frail under known-text attack.In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms.First,a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices.Then,by using probability theory and algebraic principles,the decryption probability of pure-position permutation algorithms is verified theoretically; and then,by defining the operation system of fuzzy ergodic matrices,we improve a specific decryption algorithm.Finally,some simulation results are shown.

  13. New Weak Keys in RSA

    Institute of Scientific and Technical Information of China (English)

    WANG Baocang; LIU Shuanggen; HU Yupu

    2006-01-01

    The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown that the RSA number n=pq can be easily factored if p and q have the special form of p=as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).

  14. Robust RSA for Digital Signature

    OpenAIRE

    Virendra Kumar; Puran Krishen Koul

    2011-01-01

    The RSA cryptosystem is currently used in a wide variety of products, platforms, and industries around the world. It is found in many commercial software products and is planned to be in many more. In hardware, the RSA algorithm can be found in secure telephones, on ethernet network cards, and on smart cards.It offers encryption and digital signatures (authentication). In this paper we will illustrate the application and problem associated with RSA Algorithm.

  15. 加密算法之RSA算法%Encryption Algorithm of the RSA Algorithm

    Institute of Scientific and Technical Information of China (English)

    盛仲飙

    2012-01-01

    RSA algorithm is one of the most widely used non-symmetric cipher system. On the base of the study of RSA algorithm theory,principle, algorithm description and so on,the paper further studies the details of the problems in the implementation of RSA algorithm that should be paid attention and its application in the encryption/ decryption, digital signatures, key exchange. Finally, the paper proposes a kind of private key power module operation improvement scheme. The scheme improved the speed of RSA algorithm in the decryption.%RSA算法是使用最广泛的一种非对称密码体制.在对RSA算法的理论基础、原理、算法描述等进行研究的基础上,近一步研究了RSA算法在实现时应注意的问题以及它在数字签名、密钥交换等方面的应用.最后提出了一种对私有密钥进行幂模运算的改进方案,提高了RSA算法在解密时的运算速度.

  16. Enhanced NTRU cryptosystem eliminating decryption failures

    Institute of Scientific and Technical Information of China (English)

    Yao Jun; Zeng Guihua

    2006-01-01

    An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU.

  17. Decrypted secrets methods and maxims of cryptology

    CERN Document Server

    Bauer, Friedrich L

    2006-01-01

    A reference work on cryptology offering technical and biographical details. This book reviews secret codes and their uses - the foundations of cryptography. It also deals with the process of covertly decrypting a secret code - cryptanalysis, and gives particular advice on assessing methods.

  18. Additively homomorphic encryption with a double decryption mechanism, revisited

    NARCIS (Netherlands)

    Peter, A.; Kronberg, M.; Trei, W.; Katzenbeisser, S.

    2012-01-01

    We revisit the notion of additively homomorphic encryption with a double decryption mechanism (DD-PKE), which allows for additions in the encrypted domain while having a master decryption procedure that can decrypt all properly formed ciphertexts by using a special master secret. This type of encryp

  19. H1 in RSA galaxies

    Science.gov (United States)

    Richter, OTTO-G.

    1993-01-01

    The original Revised Shapley-Ames (RSA) galaxy sample of almost 1300 galaxies has been augmented with further bright galaxies from the RSA appendix as well as newer galaxy catalogs. A complete and homogeneous, strictly magnitude-limited all-sky sample of 2345 galaxies brighter than 13.4 in apparent blue magnitude was formed. New 21 cm H1 line observations for more than 600 RSA galaxies have been combined with all previously available H1 data from the literature. This new extentise data act allows detailed tests of widely accepted 'standard' reduction and analysis techniques.

  20. Multi-Prime RSA Over Galois Approach

    OpenAIRE

    Rawal, Swati

    2016-01-01

    Many variants of RSA cryptosystem exist in the literature. One of them is RSA over polynomials based on Galois approach. In standard RSA modulus is product of two large primes whereas in the Galois approach author considered the modulus as a product of two irriduciable polynomials. We use this idea and extend Multi-prime RSA over polynomials.

  1. SEB teams up with RSA

    Index Scriptorium Estoniae

    2011-01-01

    Globaalne kindlustusgrupp RSA ja SEB Pank teatasid 19. aprillil, et alustavad koostööd varakindlustustoodete pakkumisel SEB klientidele Eestis, mis tähendab seda, et RSAst saab ainus varakindlustuse pakkuja pangas

  2. Extending Algorithm of RSA Algorithm%基于RSA算法的扩展算法

    Institute of Scientific and Technical Information of China (English)

    张延招

    2011-01-01

    The security of RSA is designed on the basis of the difficulty of large integer decomposition.In the RSA public key encryption system the public key n is the product of two large prime number,aiming at the large integer n decomposition of the form n=pq(in which p,q as large prime number).The paper describes the encryption and decryption theory of extending RSA algorithm,aiming at the large integer n decomposition to the form n=p1,p2,…,pr(in which p1,p2,…,pr as large prime number).The addition of prime number could enhance the security of RSA algorithm.Compared to RSA algorithm,the extending RSA algorithm could be applied to both digital encryption/decryption and digital signature.Digital signature algorithm based on extending RSA algorithm is also of high security and reliability.%RSA的安全性是依据大整数分解的困难性而设计的。RSA公开密钥加密体制中n为2个大素数的乘积,即针对n=pq(p,q为大素数)的大整数分解,这里介绍了RSA算法的扩展算法的加密和解密原理,即针对n=p1,p2,…,pr(p1,p2,…,pr为大素数)的大整数分解。通过扩展素因子的个数达到RSA算法的安全性。比较RSA算法,扩展的RSA算法不仅可用于数据加密解密,也可用于数字签名。利用扩展的RSA算法实现数字签名也具有较高的安全性和可靠性。

  3. Factorization of a 768-bit RSA modulus

    OpenAIRE

    Kleinjung, T; Aoki, K.; Franke, J.; Lenstra, A.K.; Thomee, E; Bos, Joppe,; Gaudry, P.; Kruppa, Alexander; Montgomery, P. L.; Osvik, D.A.; Riele, te, H.; Timofeev, Andrey; Zimmermann, P; Rabin, T.

    2010-01-01

    The original publication is available at www.springerlink.com International audience This paper reports on the factorization of the 768-bit number RSA-768 by the number field sieve factoring method and discusses some implications for RSA.

  4. An Optical Encryption and Decryption Method and System

    DEFF Research Database (Denmark)

    2000-01-01

    (Xm, Ym) with the encoded phase value a (Xm, Ym). The method of decrypting comprises the steps of decrypting the mask by radiating electromagnetic radiation towards the mask and inserting into the path of the electromagnetic radiation a complex spatial electromagnetic radiation modulator comprising...

  5. EFFICIENT ASIC ARCHITECTURE OF RSA CRYPTOSYSTEM

    OpenAIRE

    Varun Nehru; H.S. Jattana

    2014-01-01

    This paper presents a unified architecture design of the RSA cryptosystem i.e. RSA cryptoaccelerator along with key-pair generation. A structural design methodology for the same is proposed and implemented. The purpose is to design a complete cryptosystem efficiently with reduced hardware redundancy. Individual modular architectures of RSA, Miller-Rabin Test and Extended Binary GCD algorithm are presented and then they are integrated. Standard algorithm for RSA has been used. T...

  6. Generating RSA moduli with a predetermined portion

    OpenAIRE

    Lenstra, Arjen K.

    1998-01-01

    This paper reviews and generalizes a method to generate RSA moduli with a predetermined portion. The potential advantages of the resulting methods are discussed. Both the storage and the computational requirements of the RSA cryptosystem can be considerably reduced. The constructions are as efficient as generation of regular RSA moduli, and the resulting moduli do not seem to offer less security than regular RSA moduli

  7. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  8. EFFICIENT ASIC ARCHITECTURE OF RSA CRYPTOSYSTEM

    Directory of Open Access Journals (Sweden)

    Varun Nehru

    2014-05-01

    Full Text Available This paper presents a unified architecture design of the RSA cryptosystem i.e. RSA cryptoaccelerator along with key-pair generation. A structural design methodology for the same is proposed and implemented. The purpose is to design a complete cryptosystem efficiently with reduced hardware redundancy. Individual modular architectures of RSA, Miller-Rabin Test and Extended Binary GCD algorithm are presented and then they are integrated. Standard algorithm for RSA has been used. The RSA datapath has further been transformed into DPA resistant design. The simulation and implementation results using 180nm technology are shown and prove the validity of the architecture.

  9. Improved RSA cryptosystem based on the study of number theory and public key cryptosystems

    Directory of Open Access Journals (Sweden)

    Israt Jahan

    2015-01-01

    Full Text Available Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In asymmetric key cryptography, also called Public Key cryptography, two different keys (which form a key pair are used. One key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message – not even the original (i.e. the first key used for encryption. In this paper, we have proposed an improved approach of RSA algorithm using two public key pairs and using some mathematical logic rather than sending one public key d irectly.Because if an attacker has an opportunity of getting the public key componet they can find private key value by brute force search. General Terms: Cryptography, network security

  10. Analyzing standards for RSA integers

    CERN Document Server

    Loebenberger, Daniel

    2011-01-01

    The key-generation algorithm for the RSA cryptosystem is specified in several standards, such as PKCS#1, IEEE 1363-2000, FIPS 186-3, ANSI X9.44, or ISO/IEC 18033-2. All of them substantially differ in their requirements. This indicates that for computing a "secure" RSA modulus it does not matter how exactly one generates RSA integers. In this work we show that this is indeed the case to a large extend: First, we give a theoretical framework that will enable us to easily compute the entropy of the output distribution of the considered standards and show that it is comparatively high. To do so, we compute for each standard the number of integers they define (up to an error of very small order) and discuss different methods of generating integers of a specific form. Second, we show that factoring such integers is hard, provided factoring a product of two primes of similar size is hard.

  11. Cryptanalysis of Dual CRT-RSA

    OpenAIRE

    Santanu, Sarkar; Maitra, Subhamoy

    2011-01-01

    International audience Several schemes under the framework of Dual RSA have been proposed by Sun et al (IEEE-IT, August 2007). We here concentrate on the Dual CRT-RSA scheme and present certain range of parameters for which this is insecure. As a corollary of our work, we prove that the Dual Generalized Rebalanced-RSA (Scheme III of Sun et al) can be e ciently broken for a signi cant region where the scheme has been claimed to be secure.

  12. Factorization of a 512-bit RSA modulus

    OpenAIRE

    Cavallar, S.H.; Lioen, W.M.; Riele, te, H.; Dodson, B.; Lenstra, A.K.; Montgomery, P. L.; Murphy, B.

    2000-01-01

    On August 22, 1999, we completed the factorization of the 512--bit 155--digit number RSA--155 with the help of the Number Field Sieve factoring method (NFS). This is a new record for factoring general numbers. Moreover, 512--bit RSA keys are frequently used for the protection of electronic commerce---at least outside the USA---so this factorization represents a breakthrough in research on RSA--based systems. The previous record, factoring the 140--digit number RSA--140, was established on Feb...

  13. RSA Monitoring Redesign Initiative Informational Booklet #1

    Science.gov (United States)

    US Department of Education, 2005

    2005-01-01

    This informational booklet contains background materials regarding the Rehabilitation Services Administration (RSA) initiative to redesign its monitoring system. The booklet is intended to expand the knowledge and understanding of those individuals selected to participate in the RSA-sponsored monitoring conference that was held August 24 and 25,…

  14. Factorization of a 512-bit RSA modulus

    NARCIS (Netherlands)

    Cavallar, S.H.; Lioen, W.M.; Riele, H.J.J. te; Dodson, B.; Lenstra, A.K.; Montgomery, P.L.; Murphy, B.

    2000-01-01

    On August 22, 1999, we completed the factorization of the 512--bit 155--digit number RSA--155 with the help of the Number Field Sieve factoring method (NFS). This is a new record for factoring general numbers. Moreover, 512--bit RSA keys are frequently used for the protection of electronic commerce-

  15. SRI RAMSHALAKA: A VEDIC METHOD OF TEXT ENCRYPTION AND DECRYPTION

    Directory of Open Access Journals (Sweden)

    Rajkishore Prasad

    2013-07-01

    Full Text Available This paper investigates usability of SriRamshalakha, a vedic tool used in Indian Astrology, in the encryption and decryption of plain English text. Sri Ram Shalaka appears in Sri RamChartmanas, one of the very popular sacred epic of Hindu religion, written by great Saint Tulsidasji. SriRamshalakha is used to fetch/infer the approximate answer of questions/decisions by the believers. Basically, the said shalaka embed nine philosophical verses from Sri RamCharitmanas in a matrix form based on which answers to queries are inferred and ingrained. However, none of the verses are visible and directly readable. Thus here we take SriRamshalakha as the ancient Indian method of text encryption and decryption and based on the same algorithms for the encryption and decryption of plain English text areproposed. The developed algorithms are presented with examples and possibility of its use in steganography and text to image transformation are also discussed.

  16. Homomorphism Key Agreement Based on RSA

    Institute of Scientific and Technical Information of China (English)

    XIANG Guangli; ZHU Ping; ZHANG Junhong; MA Jie

    2006-01-01

    This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphic encryption scheme in the integer ring. The homomorphism key agreement based on RSA is presented. Compared with Diffie-Hellman protocol, its operation speed is more quickly; Compared with key agreement protocol based on password, it has better security. The protocol can use the public key of RSA to create the contributory, forward secrecy the session key. Finally, the security of the protocol is proved by BAN logic.

  17. Combinations of resting RSA and RSA reactivity impact maladaptive mood repair and depression symptoms

    OpenAIRE

    Yaroslavsky, Ilya; Bylsma, Lauren M.; Rottenberg, Jonathan; Kovacs, Maria

    2013-01-01

    We examined whether the combined indices of respiratory sinus arrhythmia at rest (resting RSA) and in response to a sad film (RSA reactivity) predict effective and ineffective responses to reduce sadness (adaptive vs. maladaptive mood repair) in women with histories of juvenile-onset depression (n = 74) and no history of major mental disorders (n = 75). Structural equation models were used to estimate latent resting RSA, depression, and adaptive and maladaptive mood repair and to test the stu...

  18. On the factorization of RSA-120

    OpenAIRE

    Denny, T; Dodson, B.; Lenstra, Arjen K.; Manasse, M. S.

    1994-01-01

    We present data concerning the factorization of the 120-digit number RSA-120, which we factored on July 9, 1993, using the quadratic sieve method. The factorization took approximately 825 MIPS years and was completed within three months real time. At the time of writing RSA-120 is the largest integer ever factored by a general purpose factoring algorithm. We also present some conservative extrapolations to estimate the difficulty of factoring even larger numbers, using either the quadratic si...

  19. Simple optical decryption based on a modified joint transform correlator technique

    Institute of Scientific and Technical Information of China (English)

    WANG Huai-bin; WANG Tian-zuo; YUAN Xiao-cong

    2006-01-01

    A new encryption/decryption system for optical information security is proposed in this paper. We used an iterative Fourier transform algorithm to optimize the encrypted hologram as well as the decryption key as phase-only elements. The optical decryption was implemented by superimposing the encrypted hologram and the decryption key in a simple optical setup. Numerical simulation and optical experiment have confirmed the proposed technique as a simple and easy implementation for optical decryption, demonstrating potential applications in optical information security verification.

  20. Perancangan Aplikasi Rsa Dengan Pembangkit Bilangan Prima Lehmann Dan Pembangkit Bilangan Acak Berbasis Rsa

    OpenAIRE

    Rahayu, Dini

    2014-01-01

    Securityandconfidentiality ofthe messageisa veryimportantaspectin the exchangeof information. This paperwillofferaprocess ofencodinga messageusing theRSA-Lehmann-CSPRNGwhichcanincreasethe security ofthe message. Inthis paperthe input data designisin the form ofa textfile. RSA algorithmwill be appliedonasoftware designedandcreatedusingthe VisualBasicprogramming languageBasic 6.0as a meanstoincreasemessaging security. 071402002

  1. Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2013-01-01

    Full Text Available In these days there are plenty of signature schemes such as the threshold proxy signature scheme (Kumar and Verma 2010. The network is a shared medium so that the weakness security attacks such as eavesdropping, replay attack, and modification attack. Thus, we have to establish a common key for encrypting/decrypting our communications over an insecure network. In this scheme, a threshold proxy signature scheme based on RSA, any or more proxy signers can cooperatively generate a proxy signature while or fewer of them cannot do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers (Rivest et al., 1978. Comparison is done on the basis of time complexity, space complexity, and communication overhead. We compare the performance of four schemes (Hwang et al. (2003, Kuo and Chen (2005, Yong-Jun et al. (2007, and Li et al. (2007, with the performance of a scheme that has been proposed earlier by the authors of this paper. In the proposed scheme, both the combiner and the secret share holder can verify the correctness of the information that they are receiving from each other. Therefore, the enhanced threshold proxy signature scheme is secure and efficient against notorious conspiracy attacks.

  2. On the Performance of Joint Fingerprint Embedding and Decryption Scheme

    CERN Document Server

    Lian, Shiguo; Ren, Zhen; Wang, Haila

    2007-01-01

    Till now, few work has been done to analyze the performances of joint fingerprint embedding and decryption schemes. In this paper, the security of the joint fingerprint embedding and decryption scheme proposed by Kundur et al. is analyzed and improved. The analyses include the security against unauthorized customer, the security against authorized customer, the relationship between security and robustness, the relationship between secu-rity and imperceptibility and the perceptual security. Based these analyses, some means are proposed to strengthen the system, such as multi-key encryp-tion and DC coefficient encryption. The method can be used to analyze other JFD schemes. It is expected to provide valuable information to design JFD schemes.

  3. Encryption-Decryption RGB Color Image Using Matrix Multiplication

    Directory of Open Access Journals (Sweden)

    Mohamad M.AL-Laham

    2015-10-01

    Full Text Available An enhanced technique of color image encryption based on random matrix key encoding is proposed. To encrypt the color image a separation into Red Green and Blue (R, G, B channels will applied. Each channel is encrypted using a technique called double random matrix key encoding then three new coding image matrices are constructed. To obtain the reconstructed image that is the same as the original image in the receipted side; simple extracted and decryption operations can be maintained. The results shown that the proposed technique is powerful for color image encryption and decryption and a MATLAB and simulations were used to get the results. The proposed technique has high security features because each color component is separately treated using its own double random matrix key which is generated randomly and make the process of hacking the three keys very difficult

  4. Encryption-Decryption RGB Color Image Using Matrix Multiplication

    OpenAIRE

    Mohamad M.AL-Laham

    2015-01-01

    An enhanced technique of color image encryption based on random matrix key encoding is proposed. To encrypt the color image a separation into Red Green and Blue (R, G, B) channels will applied. Each channel is encrypted using a technique called double random matrix key encoding then three new coding image matrices are constructed. To obtain the reconstructed image that is the same as the original image in the receipted side; simple extracted and decryption operations can be mainta...

  5. 基于C语言的RSA算法的实现%The realization of RSA algorithm based on C language

    Institute of Scientific and Technical Information of China (English)

    戚娜

    2015-01-01

    RSA算法是现代公钥密码体制事实上的标准,既能用于数据加密解密也能用于数字签名。本文重点介绍RSA的算法原理,研究在数字签名和密钥交换方面的应用,分析RSA存在的安全问题以及RSA在C语言中具体的实现过程,并针对RSA算法中存在的缺点进行深入的分析研究。%The RSA algorithm is a standard of modern cryptography and is considered a better security key system that can be used for not only for data encryption and decryption but also can be used for digital signature. This paper focuses on algorithm principle, researches on the applications in the digital signature and key exchange, analyses the safety problems in RSA,the specific implementation process in the C language, and analyses the shortcoming that exist for the RSA algorithm in-depth.

  6. Hardware modules of the RSA algorithm

    Directory of Open Access Journals (Sweden)

    Škobić Velibor

    2014-01-01

    Full Text Available This paper describes basic principles of data protection using the RSA algorithm, as well as algorithms for its calculation. The RSA algorithm is implemented on FPGA integrated circuit EP4CE115F29C7, family Cyclone IV, Altera. Four modules of Montgomery algorithm are designed using VHDL. Synthesis and simulation are done using Quartus II software and ModelSim. The modules are analyzed for different key lengths (16 to 1024 in terms of the number of logic elements, the maximum frequency and speed.

  7. On Fixed Points of Order K of RSA

    OpenAIRE

    Zhang, Shaohua

    2009-01-01

    In this paper, we gave a preliminary dynamical analysis on the RSA cryptosystem and obtained a computational formulae of the number of the fixed points of $k$ order of the RSA. Thus, the problem in [8, 9] has been solved.

  8. Hiding Information in BMP based on RSA and LSB Algorithm%基于 RSA 与 LSB 算法的信息隐藏

    Institute of Scientific and Technical Information of China (English)

    吴少华; 宋致虎; 胡勇

    2014-01-01

    信息隐藏技术将特定信息嵌入数字化宿主信息中,由于宿主信息呈现变化不大,不会引起监控者的注意和重视,从而减少了被攻击的可能性。为了提高信息隐藏效率与在非授权情况下提取信息的难度,提出将信息加密后进行隐藏,具有更高的安全性。在信息隐藏前对敏感信息进行了信息分割、RSA 加密预处理;将控制信息也嵌入到 BMP 文件的图像数据区;实现了改进的 LSB 算法,并通过实验进行了验证。%Information hiding technology could make secret or private information be embedded in host in-formation media. Because the host information has no change, the monitor could not be aware of informa-tion hiding. The cryptography and information hiding technology is studied, and through the human visual redundancy, information hiding and restoring in the 24-bit bitmap image file are achieved. Separating and encrypting the information would make higher security before hiding it. Through improved information of the hiding algorithm, the integrated use of RSA, LSB and data partitioning technology enables encryption /decryption system. The test results show that the system can effectively achieve the hiding secret informa-tion, and the irreversibility greatly enhanced, the content of the hidden information is not limited.

  9. Analysis of RSA Algorithm using GPU Programming

    Directory of Open Access Journals (Sweden)

    Sonam Mahajan

    2014-07-01

    Full Text Available Modern-day computer security relies heavily on cry ptography as a means to protect the data that we ha ve become increasingly reliant on. The main researc h in computer security domain is how to enhance the speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo value that can process large power of numbers w hich otherwise are not supported by built-in data t ypes. First the traditional algorithm is studied. Secondl y, the parallelized RSA algorithm is designed using CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large pr ime number . As a result the main fundamental problem of RSA algorithm such as speed and use of poo r or small prime numbers that has led to significant s ecurity holes, despite the RSA algorithm's mathemat ical soundness can be alleviated by this algorithm

  10. RSA Monitoring Redesign Initiative Informational Booklet #2

    Science.gov (United States)

    US Department of Education, 2005

    2005-01-01

    The U.S. Department of Education's Rehabilitation Services Administration (RSA) is undertaking a major initiative to substantially redesign its program monitoring and improvement system. The overriding goal is to improve vocational rehabilitation (VR) services and employment outcomes for individuals with disabilities through the development of a…

  11. 基于参数优化批处理的TLS协议%Parameter Optimization-Based Batching TLS Protocol

    Institute of Scientific and Technical Information of China (English)

    齐芳; 贾维嘉; 鲍丰; 吴永东; 王国军

    2007-01-01

    TLS(transport layer security)协议的基本设计目标是为两个通信实体之间提供数据的保密性和完整性.由于在传输层安全握手协议中最耗费计算资源的步骤是服务器RSA解密运算,优化的批处理的RSA方法提出可以用于加速TLS会话的初始化.首先指出了以前的批处理方法由于要求多证书实现而实用性不强.然后提出了单一证书策略的方法,从而克服了这一问题.还提出结合用户对于因特网服务质量的要求优化了批处理参数.为了选择优化的批处理的参数,不仅考虑了服务器的性能,而且还考虑了客户可容忍的等待时间.通过分析并在阐述平均排队时间、批处理服务时间和系统稳定性的基础上提出了一种新颖的优化批处理调度算法,已部署在服务器上.最后通过分析和模拟两种方法验证了所提出方案的实用性和有效性.%The primary goal of the Transport Layer Security (TLS) protocol is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the TLS handshake protocol is the server's RSA decryption, it is introduced that optimal batch RSA can be used to speedup TLS session initialization. This paper first indicates that the previous batch method is impractical since it requires a multiple of certificates, then it proposes the unique certificate scheme to overcome the problem. It is also introduced that the batching parameter is optimized when integrating users' requirements for Internet Quality of Service (QoS). To select the optimal batching parameters, not only the server's performance but also the client's tolerable waiting time is considered. Based on the analysis of the mean queue time, batching service time and the stability of the system, a novel batch optimal scheduling algorithm which is deployed in a batching Web server is proposed. Finally, the proposed algorithm is evaluated to be practical and

  12. Securing Watermarked-Relational Data by Using Encryption and Decryption

    Directory of Open Access Journals (Sweden)

    Nagarjuna Settipalli

    2011-05-01

    Full Text Available Ownership rights on outsourced relational database are very crucial issue in today’s internet environment and in many content distribution applications, because the rapid growth of the internet and related technologies offered an unprecedented ability to access and redistribute digital content. In earlier existing systems the relational data will be watermarked and directly send to the client system, in these systems while sending relational data from server to client attacker easily copy the data and create same copy of relational data. Here there is no security to watermarked relational data. In our proposed system before sending the watermarked relational data to client side we encrypt the relational data and send it to the client side, at client side decryption will be done to get the original watermarked data. Because of using this encryption technique even an attacker copy the data he/she may not read the watermarked relational data.

  13. Dynamic RSA: Examining parasympathetic regulatory dynamics via vector-autoregressive modeling of time-varying RSA and heart period.

    Science.gov (United States)

    Fisher, Aaron J; Reeves, Jonathan W; Chi, Cyrus

    2016-07-01

    Expanding on recently published methods, the current study presents an approach to estimating the dynamic, regulatory effect of the parasympathetic nervous system on heart period on a moment-to-moment basis. We estimated second-to-second variation in respiratory sinus arrhythmia (RSA) in order to estimate the contemporaneous and time-lagged relationships among RSA, interbeat interval (IBI), and respiration rate via vector autoregression. Moreover, we modeled these relationships at lags of 1 s to 10 s, in order to evaluate the optimal latency for estimating dynamic RSA effects. The IBI (t) on RSA (t-n) regression parameter was extracted from individual models as an operationalization of the regulatory effect of RSA on IBI-referred to as dynamic RSA (dRSA). Dynamic RSA positively correlated with standard averages of heart rate and negatively correlated with standard averages of RSA. We propose that dRSA reflects the active downregulation of heart period by the parasympathetic nervous system and thus represents a novel metric that provides incremental validity in the measurement of autonomic cardiac control-specifically, a method by which parasympathetic regulatory effects can be measured in process.

  14. Dynamic RSA: Examining parasympathetic regulatory dynamics via vector-autoregressive modeling of time-varying RSA and heart period.

    Science.gov (United States)

    Fisher, Aaron J; Reeves, Jonathan W; Chi, Cyrus

    2016-07-01

    Expanding on recently published methods, the current study presents an approach to estimating the dynamic, regulatory effect of the parasympathetic nervous system on heart period on a moment-to-moment basis. We estimated second-to-second variation in respiratory sinus arrhythmia (RSA) in order to estimate the contemporaneous and time-lagged relationships among RSA, interbeat interval (IBI), and respiration rate via vector autoregression. Moreover, we modeled these relationships at lags of 1 s to 10 s, in order to evaluate the optimal latency for estimating dynamic RSA effects. The IBI (t) on RSA (t-n) regression parameter was extracted from individual models as an operationalization of the regulatory effect of RSA on IBI-referred to as dynamic RSA (dRSA). Dynamic RSA positively correlated with standard averages of heart rate and negatively correlated with standard averages of RSA. We propose that dRSA reflects the active downregulation of heart period by the parasympathetic nervous system and thus represents a novel metric that provides incremental validity in the measurement of autonomic cardiac control-specifically, a method by which parasympathetic regulatory effects can be measured in process. PMID:27045609

  15. The multi-dimension RSA and its low exponent security

    Institute of Scientific and Technical Information of China (English)

    曹珍富

    2000-01-01

    Using a well-known result of polynomial over the finite field , we show that the Euler-Fermat theorem holds in N[ x]. We present a multi-dimension RSA cryptosystem and point out that low exponent algorithm of attacking RSA is not suitable for the multi-dimension RSA. Therefore, it is believed that the security of the new cryptosystem is mainly based on the factorization of large integers.

  16. Factorisation of RSA-220 with CADO-NFS

    OpenAIRE

    Bai, Shi; Gaudry, Pierrick; Kruppa, Alexander; Thomé, Emmanuel; Zimmermann, Paul

    2016-01-01

    We give details of the factorization of RSA-220 with CADO-NFS. This is a new record computation with this open-source software. We report on the factorization of RSA-220 (220 decimal digits), which is the 3rd largest integer factorization with the General Number Field Sieve (GNFS), after the factorization of RSA-768 (232 digits) in December 2009 [3], and that of 3 697 + 1 (221 digits) in February 2015 by NFS@home.

  17. The multi-dimension RSA and its low exponent security

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Using a well-known result of polynomial over the finite field Fp, we show that the Euler-Fermat theorem holds in ZN[x]. We present a multi-dimension RSA cryptosystem and point out that low exponent algorithm of attacking RSA is not suitable for the multi-dimension RSA. Therefore, it is believed that the security of the new cryptosystem is mainly based on the factorization of large integers.

  18. Security Analysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2012-08-01

    Full Text Available An efficient threshold signature scheme solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. In these days there are plenty of signature schemes such as (t,n threshold proxy signature scheme. The network is a shared medium so that the weakness security attacks such as eavesdropping, replay attack and modification attack. Thus, we have to establish a common key for encrypting/decrypting our communications over an insecure network. In this scheme, a (t,n threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t-1 or fewer of them can’t do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers. Comparison is done on the basis of time complexity, space complexity and communication overhead. We compare the performance of four schemes: Hwang et al., Wen et al., Geng et al. and Fengying et al. with the performance of a scheme that has been proposed by the authors of this article earlier. In the proposed scheme, both the combiner and the secret share holder can verify the correctness of the information that they are receiving from each other. Therefore, the enhanced threshold proxy signature scheme is secure and efficient against notorious conspiracy attacks.

  19. Factorization of RSA-140 using the number field sieve

    OpenAIRE

    Cavallar, S.H.; Dodson, B.; Lenstra, A.K.; Leyland, P. C.; Lioen, W.M.; Montgomery, P. L.; Murphy, B.; Riele, te, H.; Zimmermann, P

    1999-01-01

    On February 2, 1999, we completed the factorization of the 140--digit number RSA--140 with the help of the Number Field Sieve factoring method (NFS). This is a new general factoring record. The previous record was established on April 10, 1996 by the factorization of the 130--digit number RSA--130, also with the help of NFS. The amount of computing time spent on RSA--140 was roughly twice that needed for RSA--130, about half of what could be expected from a straightforward extrapolation of th...

  20. Compensation for occupational diseases in the RSA.

    Science.gov (United States)

    Myers, J E; Garisch, D; Cornell, J E

    1987-03-01

    Compensation legislation for occupational disease in the RSA is at present complex and non-uniform, and the administrative bodies that process compensation claims are understaffed. In this setting occupational disease, particularly in migrant workers who are often ignorant of their rights under the law, frequently goes uncompensated. General practitioners and medical officers need to be aware of the basic provisions in the law, and how to submit claims in the best interests of their patients. Some case studies are included to illustrate problematic areas. The responsibilities of doctors in the diagnosis and compensation of occupational diseases are addressed.

  1. Privacy Protection in Cloud Using Rsa Algorithm

    Directory of Open Access Journals (Sweden)

    Amandeep Kaur

    2014-05-01

    Full Text Available The cloud computing architecture has been on high demand nowadays. The cloud has been successful over grid and distributed environment due to its cost and high reliability along with high security. However in the area of research it is observed that cloud computing still has some issues in security regarding privacy. The cloud broker provide services of cloud to general public and ensures that data is protected however they sometimes lag security and privacy. Thus in this work of research an architecture is developed to preserve the security in two phases that is by RSA algorithm and auto-backup policy. Keywords:-

  2. A New Batch Verifying Scheme for Identifying Illegal Signatures

    Institute of Scientific and Technical Information of China (English)

    Adrian Atanasiu

    2013-01-01

    The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signatures.In this article,we analyze the complexity of the batch verifying schemes defined by Li,Hwang and Chen in 2010,and propose a new batch verifying multiple digital signature scheme,in two variants:one for RSA-by completing the Harn's schema with an identifying illegal signatures algorithm,and the other adapted for a modified Elliptic Curve Digital Signature Algorithm protocol.

  3. DMAC-AN INTEGRATED ENCRYPTION SCHEME WITH RSA FOR AC TO OBSTRUCT INFERENCE ATTACKS

    Directory of Open Access Journals (Sweden)

    R. Jeeva

    2012-12-01

    Full Text Available The proposal of indistinguishable encryption in Randomized Arithmetic Coding(RAC doesn’t make the system efficient because it was not encrypting the messages it sends. It recomputes the cipher form of every messages it sends that increases not only the computational cost but also increases the response time.Floating point representation in cipher increases the difficulty in decryption side because of loss in precison.RAC doesn’t handle the inference attacks like Man-in-Middle attack,Third party attack etc. In our system, Dynamic Matrix Arithmetic Coding(DMAC using dynamic session matrix to encrypt the messages. The size of the matrix is deduced from the session key that contains ID of end users which proves the server authentication.Nonce values is represented as the public key of the opponents encrypted by the session key will be exchanged between the end users to provide mutual authentication. If the adversary try to compromise either server or end users,the other system won’t respond and the intrusion will be easily detected. we have increased the hacking complexity of AC by integrating with RSA upto 99%.

  4. High speed data encryption and decryption using stimulated Brillouin scattering effect in optical fiber

    Science.gov (United States)

    Yi, Lilin; Zhang, Tao; Hu, Weisheng

    2011-11-01

    A novel all-optical encryption/decryption method based on stimulated Brillouin scattering (SBS) effect in optical fiber is proposed for the first time. The operation principle is explained in detail and the encryption and decryption performance is experimentally evaluated. The encryption keys could be the SBS gain amplitude, bandwidth, central wavelength and spectral shape, which are configurable and flexibly controlled by the users. We experimentally demonstrate the SBS encryption/decryption process of a 10.86-Gb/s non-return-to-zero (NRZ) data by using both phase-modulated and current-dithered Brillouin pumps for proof-of-concept. Unlike the traditional optical encryption methods of chaotic communications and optical code-division-multiplexing access (OCDMA), the SBS based encryption/decryption technique can directly upgrade the current optical communication system to a secure communication system without changing the terminal transceivers, which is completely compatible with the current optical communication systems.

  5. Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts

    Institute of Scientific and Technical Information of China (English)

    Zhen-Chuan Chai; Zhen-Fu Cao; Yuan Zhou

    2007-01-01

    Multi-decrypter encryption is a typical application in multi-user cryptographic branches.In multi-decrypter encryption, a message is encrypted under multiple decrypters' public keys in the way that only when all the decrypters cooperate, can the message be read.However, trivial implementation of multi-decrypter encryption using standard ap-proaches leads to heavy computation costs and long ciphertext which grows as the receiver group expands.This consumes much precious bandwidth in wireless environment, such as mobile ad hoc network.In this paper, we propose an efficient identity based multi-decrypter encryption scheme, which needs only one or zero (if precomputed) pairing computation and the ciphertext contains only three group elements no matter how many the receivers are.Moreover, we give a formal security definition for the scheme, and prove the scheme to be chosen ciphertext secure in the random oracle model, and discuss how to modify the scheme to resist chosen ciphertext attack.

  6. The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock

    Directory of Open Access Journals (Sweden)

    Shengyong Li

    2009-11-01

    Full Text Available In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array. The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user’s password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.

  7. Preparing for a (RSA Digital Signature

    Directory of Open Access Journals (Sweden)

    Dragan Vidakovic

    2013-03-01

    Full Text Available Many people know the general story about RSA and large (probably prime numbers, without having an idea of how to perform arithmetic operations with the numbers of thousands of bits. Even if they want to develop their own tool for a digital signature, they give up because they think that special hardware-software offers are required for that. In this paper we want to show that even by using a very simple console application, the tools for signature can be developed. Those tools are not as powerful and functional as the products of renowned companies, but they are sufficient to stimulate the interest in cryptography (and the coding of known algorithms is the best way for that, and that is our overriding and permanent goal[3].

  8. Universally Composable Proactive Threshold RSA Signature

    Institute of Scientific and Technical Information of China (English)

    HONG Xuan; CHEN Ke-fei; LONG Yu

    2008-01-01

    Recently some efforts were made towards capturing the security requirements within the composable security framework.This modeling has some significant advantages in designing and analyzing complex systems.The threshold signature was discussed and a definition was given based on the universal composability framework,which is proved to be equivalent to the standard security definition.Furthermore,a simple,efficient and proactive threshold RSA signature protocol was presented.It is proved to be correct,consistent and unforgeable relative to the environment that at most t-1 parties are corrupted in each proactive stage.It is also secure under the universal composability framework.It is a UC based security and is proved to be equivalent to the standard security.

  9. DETERMIN LARGE PRIME NUMBERS TO COMPUTE RSA SYSTEM PARAMETERS

    Directory of Open Access Journals (Sweden)

    Ioan Mang

    2008-05-01

    Full Text Available Cryptography, the secret writing, is probably same old as writing itself and has applications in data security insurance. There are cryptosystems where the encipher algorithm can be public. These are public key algorithms. Research on public key algorithms has been concerned with security aspects. The results of this research have induced sufficient confidence to apply public key cryptography a larger scale. The most used and checked public key-based cryptosystem was find by Rivest, Shamir and Adleman, so called RSA system. This paper shows the RSA algorithm. We have realised a program that is able to determine prime numbers with over 100 digits and compute RSA system parameters.

  10. EFFICIENT ALGORITHM FOR RSA TEXT ENCRYPTION USING CUDA-C

    Directory of Open Access Journals (Sweden)

    Sonam Mahajan

    2014-05-01

    Full Text Available Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. The main research in computer security domain is how to enhance the speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo value that can process large power of numbers which otherwise are not supported by built-in data types. First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical soundness can be alleviated by this algorithm.

  11. RSA Opening Minds: A Curriculum for the 21st Century

    Science.gov (United States)

    Candy, Sara

    2011-01-01

    This article discusses the RSA Opening Minds competence framework, an innovative curriculum to meet the needs of young people as future employees, lifelong learners and as citizens of the twenty-first century.

  12. Analysis of RSA Encryption and Decryption Algorithm Based on Test Method%基于试探法对RSA加密解密算法的剖析

    Institute of Scientific and Technical Information of China (English)

    张智顺; 周丽; 任广伟

    2008-01-01

    基于网络技术的发展,信息安全性已成为亟待解决的问题,在此,主要利用了试探法,对信息安全技术中的公开密钥RSA算法进行了研究,并对随机素数的产生做了简要的介绍,进一步阐述了RSA算法的时间复杂性,也说明了RSA的一些不足,同时也从试探法的角度上更容易理解和体会Euclidean算法.

  13. Improved decryption quality and security of a joint transform correlator-based encryption system

    Science.gov (United States)

    Vilardy, Juan M.; Millán, María S.; Pérez-Cabré, Elisabet

    2013-02-01

    Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption-decryption process. Numerical results are presented and discussed.

  14. RSA-Based Password-Authenticated Key Exchange, Revisited

    Science.gov (United States)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.

  15. Study of Encryption and Decryption of Wave File in Image Formats

    OpenAIRE

    Rahul R Upadhyay

    2013-01-01

    This paper describes a novel method of encrypting wave files in popular image formats like JPEG, TIF and PNG along with retrieving them from these image files. MATLAB software is used to perform matrix manipulation to encrypt and decrypt sound files into and from image files. This method is not only a stenographic means but also a data compression technique.

  16. Study of Encryption and Decryption of Wave File in Image Formats

    Directory of Open Access Journals (Sweden)

    Rahul R Upadhyay

    2013-07-01

    Full Text Available This paper describes a novel method of encrypting wave files in popular image formats like JPEG, TIF and PNG along with retrieving them from these image files. MATLAB software is used to perform matrix manipulation to encrypt and decrypt sound files into and from image files. This method is not only a stenographic means but also a data compression technique.

  17. Data Hiding and Retrival Using Advanced Encryption and Decryption Algorithms Mamtha Shetty, Shreedhar. A. Joshi

    OpenAIRE

    Mamtha Shetty; Shreedhar. A. Joshi

    2014-01-01

    In this era of digital world, with the evolution of technology, there is an essential need for optimization of online digital data and information. Nowadays, Security and Authenticity of digital data has become a big challenge. This paper proposes an innovative method to authenticate the digital documents. A new method is introduced here, which allows multiple encryption and decryption of digital data.

  18. ECC Based Threshold Decryption Scheme and Its Application in Web Security

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xian-feng; ZHANG Feng; QIN Zhi-guang; LIU Jin-de

    2004-01-01

    The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test approach based on elliptic curve cryptography is designed. The application of these techniques in Web security is studied. Performance analysis shows that our scheme is characterized by excellent security as well as high efficiency.

  19. Security analysis of RSA cryptosystem algorithm and it's properties

    Science.gov (United States)

    Liu, Chenglian; Guo, Yongning; Lin, Juan

    2014-10-01

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  20. Efficient, Robust and Constant-Round Distributed RSA Key Generation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe

    2010-01-01

    We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one iteration of the underlying primality test on each candidate number.......We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one iteration of the underlying primality test on each candidate number....

  1. 对 Shor 算法破解 RSA 的探讨%Discussion on Cracking RSA With Shor Algorithm

    Institute of Scientific and Technical Information of China (English)

    凃玲英; 胡一凡; 张洪涛; 代永涛; 熊红梅

    2015-01-01

    Since the randomness of Shor algorithm could lead to low success rate in cracking RSA.By analyzing the prin-ciple of Shor algorithm,characteristics of RSA public key password system and lots of data,the view that the way for quantum functional in randomly selecting value is regular was putting forward .Verified by number theory and Monte Carlo method,the results showed that if takes a perfect square,the cycle probably can′t meet the requirements of Shor al-gorithm.It comes to a conclusion that take a non-perfect square can improve the success rate of Shor algorithm in cracking RSA.%针对 Shor 算法具有随机性,会导致破解 RSA 公钥密码体制成功率不高的问题,对 Shor 算法原理、RSA 公钥密码体制特点和大量计算结果进行分析,提出量子函数式 f (x)=ax mod n 对 a 值的随机选取是有规律的。结合数论知识和蒙特卡洛法证明,结果表明:随机数 a 取完全平方数,所求周期 r 很可能不满足 Shor算法要求;a 取非完全平方数可以提高 Shor 算法破解 RSA 的成功率。

  2. Batch Attribute-Based Encryption for Secure Clouds

    Directory of Open Access Journals (Sweden)

    Chen Yang

    2015-10-01

    Full Text Available Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext are associated with an access policy and an attribute set, respectively; in addition to holding a secret key, one can decrypt a ciphertext only if the associated attributes match the predetermined access policy, which allows one to enforce fine-grained access control on outsourced files. One issue in existing ABE schemes is that they are designed for the users of a single organization. When one wants to share the data with the users of different organizations, the owner needs to encrypt the messages to the receivers of one organization and then repeats this process for another organization. This situation is deteriorated with more and more mobile devices using cloud services, as the ABE encryption process is time consuming and may exhaust the power supplies of the mobile devices quickly. In this paper, we propose a batch attribute-based encryption (BABE approach to address this problem in a provably-secure way. With our approach, the data owner can outsource data in batches to the users of different organizations simultaneously. The data owner is allowed to decide the receiving organizations and the attributes required for decryption. Theoretical and experimental analyses show that our approach is more efficient than traditional encryption implementations in computation and communication.

  3. 50 CFR 648.207 - Herring Research Set-Aside (RSA).

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Herring Research Set-Aside (RSA). 648.207... Measures for the Atlantic Herring Fishery § 648.207 Herring Research Set-Aside (RSA). (a) NMFS shall... authorized to utilize RSA, based on the selection criteria described in the RFP. (d) NMFS shall consider...

  4. Cryptanalysis of a Type of CRT-Based RSA Algorithms

    Institute of Scientific and Technical Information of China (English)

    Bao-Dong Qini; Ming Li; Fan-Yu Kong

    2008-01-01

    It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is careless, an attacker can reveal some secret information by exploiting hardware fault cryptanalysis. In this paper, we present some fault attacks on a type of CRT-RSA algorithms namely BOS type schemes including the original BOS scheme proposed by Blomer, Otto, and Seifert at CCS 2003 and its modified scheme proposed by Liu et al. at DASC 2006. We first demonstrate that if some special signed messages such as m = 0, ±1 are dealt carelessly, they can be exploited by an adversary to completely break the security of both the BOS scheme and Liu et al.'s scheme. Then we present a new permanent fault attack on the BOS scheme with a success probability about 25%. Lastly, we propose a polynomial time attack on Liu et al.'s CRT-RSA algorithm, which combines physical fault injection and lattice reduction techniques when the public exponent is short.

  5. RSA/Legacy Wind Sensor Comparison. Part 2; Eastern Range

    Science.gov (United States)

    Short, David A.; Wheeler, Mark M.

    2006-01-01

    This report describes a comparison of data from ultrasonic and propeller-and-vane anemometers on 5 wind towers at Kennedy Space Center and Cape Canaveral Air Force Station. The ultrasonic sensors are scheduled to replace the Legacy propeller-and-vane sensors under the Range Standardization and Automation (RSA) program. Because previous studies have noted differences between peak wind speeds reported by mechanical and ultrasonic wind sensors, the latter having no moving parts, the 30th and 45th Weather Squadrons wanted to understand possible differences between the two sensor types. The period-of-record was 13-30 May 2005, A total of 357,626 readings of 1-minute average and peak wind speed/direction from each sensor type were used. Statistics of differences in speed and direction were used to identify 15 out of 19 RSA sensors having the most consistent performance, with respect to the Legacy sensors. RSA average wind speed data from these 15 showed a small positive bias of 0.38 kts. A slightly larger positive bias of 0.94 kts was found in the RSA peak wind speed.

  6. RSA/Legacy Wind Sensor Comparison. Part 1; Western Range

    Science.gov (United States)

    Short, David A.; Wheeler, Mark M.

    2006-01-01

    This report describes a comparison of data from ultrasonic and cup-and-vane anemometers on 5 wind towers at Vandenberg AFB. The ultrasonic sensors are scheduled to replace the Legacy cup-and-vane sensors under the Range Standardization and Automation (RSA) program. Because previous studies have noted differences between peak wind speeds reported by mechanical and ultrasonic wind sensors, the latter having no moving parts, the 30th and 45th Weather Squadrons wanted to understand possible differences between the two sensor types. The period-of-record was 13-30 May 2005. A total of 153,961 readings of I-minute average and peak wind speed/direction from each sensor type were used. Statistics of differences in speed and direction were used to identify 18 out of 34 RSA sensors having the most consistent performance, with respect to the Legacy sensors. Data from these 18 were used to form a composite comparison. A small positive bias in the composite RSA average wind speed increased from +0.5 kts at 15 kts, to +1 kt at 25 kts. A slightly larger positive bias in the RSA peak wind speed increased from +1 kt at 15 kts, to +2 kts at 30 kts.

  7. Combination of watermarking and joint watermarking-decryption for reliability control and traceability of medical images.

    Science.gov (United States)

    Bouslimi, D; Coatrieux, G; Cozic, M; Roux, Ch

    2014-01-01

    In this paper, we propose a novel crypto-watermarking system for the purpose of verifying the reliability of images and tracing them, i.e. identifying the person at the origin of an illegal distribution. This system couples a common watermarking method, based on Quantization Index Modulation (QIM), and a joint watermarking-decryption (JWD) approach. At the emitter side, it allows the insertion of a watermark as a proof of reliability of the image before sending it encrypted; at the reception, another watermark, a proof of traceability, is embedded during the decryption process. The scheme we propose makes interoperate such a combination of watermarking approaches taking into account risks of interferences between embedded watermarks, allowing the access to both reliability and traceability proofs. Experimental results confirm the efficiency of our system, and demonstrate it can be used to identify the physician at the origin of a disclosure even if the image has been modified.

  8. 基于嵌入式CPU的加解密子系统%Encryption and Decryption Subsystem Based on Embedded CPU

    Institute of Scientific and Technical Information of China (English)

    王剑非; 马德; 熊东亮; 陈亮; 黄凯; 葛海通

    2014-01-01

    针对信息安全等级和应用场合变化时IP级复用的片上系统( SoC)集成验证效率低的问题,提出一种基于嵌入式CPU的加解密子系统。子系统包括RSA,DES,AES等多种加解密模块,通过硬件上的参数配置,构造满足不同信息安全应用和等级的子系统;采用低功耗高性能的嵌入式CPU,作为SoC中主CPU的协处理器,控制各加解密模块的工作,可减少对主CPU的访问,以降低功耗。将经过验证的加解密子系统作为整体集成到SoC中,实现子系统复用,可减少SoC设计和集成工作量,降低SoC验证难度;利用门控时钟技术,根据各加解密模块的工作状态管理时钟,从而降低加解密子系统的功耗。采用CKSoC设计集成方法,在SoC集成工具平台上可快速集成不同配置下的基于嵌入式CPU的加解密子系统。实验结果表明,构造子系统后的SoC设计和验证工作量明显减少,提高了工作效率。%To improve the efficiency of System-on-Chip( SoC) integration and verification for different applications of information security,a complete and pre-verified encryption and decryption subsystem based on embedded CPU is proposed. The subsystem includes cryptography modules such as RSA,DES,AES and so on. It can satisfy applications of different requirements on security levels. The embedded CPU in subsystem is a low-power and high-performance CPU,as a coprocessor for main CPU in SoC. It is responsible for controlling the operation of cryptography modules, reducing both the computation load of the main CPU and the power of SoC greatly. Integrating the pre-verified encryption and decryption subsystem as a whole to SoC, significantly reduces SoC design and integration effort and lowers the difficulty of SoC verification. Using gated clock technology, which manages the clock of cryptography modules based on their states,reduces the power of subsystem effectively. According to the CKSoC Integration method, the subsystem based

  9. Data Hiding and Retrival Using Advanced Encryption and Decryption Algorithms Mamtha Shetty, Shreedhar. A. Joshi

    Directory of Open Access Journals (Sweden)

    Mamtha Shetty

    2014-04-01

    Full Text Available In this era of digital world, with the evolution of technology, there is an essential need for optimization of online digital data and information. Nowadays, Security and Authenticity of digital data has become a big challenge. This paper proposes an innovative method to authenticate the digital documents. A new method is introduced here, which allows multiple encryption and decryption of digital data.

  10. How Tippecanoe County is Improving a Local Intersection by Using an RSA and Federal Funds

    OpenAIRE

    Kuhl, Opal; Haltom, Greg; Poad, Doug

    2016-01-01

    Road safety audits can be an integral tool to support an application for HSIP funds. In this session we will present how an RSA is used to document the need for a project requesting an HSIP eligibility determination. Attendees will learn how to conduct an RSA, who is needed on the RSA review team, how safety concerns are identified and documented, and how an RSA is used as part of the application for eligibility determination of HSIP funds. A sample RSA will be presented.

  11. A Systematic Methodology for Multi-Images Encryption and Decryption Based on Single Chaotic System and FPGA Embedded Implementation

    OpenAIRE

    Hanzhong Zheng; Simin Yu; Xiangqian Xu

    2014-01-01

    A systematic methodology is developed for multi-images encryption and decryption and field programmable gate array (FPGA) embedded implementation by using single discrete time chaotic system. To overcome the traditional limitations that a chaotic system can only encrypt or decrypt one image, this paper initiates a new approach to design n-dimensional (n-D) discrete time chaotic controlled systems via some variables anticontrol, which can achieve multipath drive-response synchronization. To th...

  12. Adolescent RSA responses during an anger discussion task: Relations to emotion regulation and adjustment.

    Science.gov (United States)

    Cui, Lixian; Morris, Amanda Sheffield; Harrist, Amanda W; Larzelere, Robert E; Criss, Michael M; Houltberg, Benjamin J

    2015-06-01

    The current study examined associations between adolescent respiratory sinus arrhythmia (RSA) during an angry event discussion task and adolescents' emotion regulation and adjustment. Data were collected from 206 adolescents (10-18 years of age, M age = 13.37). Electrocardiogram (ECG) and respiration data were collected from adolescents, and RSA values and respiration rates were computed. Adolescents reported on their own emotion regulation, prosocial behavior, and aggressive behavior. Multilevel latent growth modeling was employed to capture RSA responses across time (i.e., linear and quadratic changes; time course approach), and adolescent emotion regulation and adjustment variables were included in the model to test their links to RSA responses. Results indicated that high RSA baseline was associated with more adolescent prosocial behavior. A pattern of initial RSA decreases (RSA suppression) in response to angry event recall and subsequent RSA increases (RSA rebound) were related to better anger and sadness regulation and more prosocial behavior. However, RSA was not significantly linked to adolescent aggressive behavior. We also compared the time course approach with the conventional linear approach and found that the time course approach provided more meaningful and rich information. The implications of adaptive RSA change patterns are discussed.

  13. Adolescent RSA responses during an anger discussion task: Relations to emotion regulation and adjustment.

    Science.gov (United States)

    Cui, Lixian; Morris, Amanda Sheffield; Harrist, Amanda W; Larzelere, Robert E; Criss, Michael M; Houltberg, Benjamin J

    2015-06-01

    The current study examined associations between adolescent respiratory sinus arrhythmia (RSA) during an angry event discussion task and adolescents' emotion regulation and adjustment. Data were collected from 206 adolescents (10-18 years of age, M age = 13.37). Electrocardiogram (ECG) and respiration data were collected from adolescents, and RSA values and respiration rates were computed. Adolescents reported on their own emotion regulation, prosocial behavior, and aggressive behavior. Multilevel latent growth modeling was employed to capture RSA responses across time (i.e., linear and quadratic changes; time course approach), and adolescent emotion regulation and adjustment variables were included in the model to test their links to RSA responses. Results indicated that high RSA baseline was associated with more adolescent prosocial behavior. A pattern of initial RSA decreases (RSA suppression) in response to angry event recall and subsequent RSA increases (RSA rebound) were related to better anger and sadness regulation and more prosocial behavior. However, RSA was not significantly linked to adolescent aggressive behavior. We also compared the time course approach with the conventional linear approach and found that the time course approach provided more meaningful and rich information. The implications of adaptive RSA change patterns are discussed. PMID:25642723

  14. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin

    2014-01-01

    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  15. Pro Spring Batch

    CERN Document Server

    Minella, Michael T

    2011-01-01

    Since its release, Spring Framework has transformed virtually every aspect of Java development including web applications, security, aspect-oriented programming, persistence, and messaging. Spring Batch, one of its newer additions, now brings the same familiar Spring idioms to batch processing. Spring Batch addresses the needs of any batch process, from the complex calculations performed in the biggest financial institutions to simple data migrations that occur with many software development projects. Pro Spring Batch is intended to answer three questions: *What? What is batch processing? What

  16. Efficient and Robust Two-Party RSA Key Generation

    Institute of Scientific and Technical Information of China (English)

    YANG Muxiang; HONG Fan; ZHENG Minghui; LI Jun

    2006-01-01

    An efficient two party RSA secret key sharing generation scheme based on a homomorphic encryption, which is semantically secure under the prime residuosity assumption, is proposed in this paper. At the stage of computing RSA modulo N, an initial distributed primality test protocol is used to reduce the computation complexity and increase the probability of N being a two-prime product. On the other aspect, the homomorphic encryption based sharing conversion protocols is devised and adopted in multi-party computing modulus N and secret key d. Comparing to any sharing conversion protocols based on oblivious transfer protocol, the homomorphic encryption based sharing conversion protocols are of high performance. Our scheme resists the passive attack and since a method of verifying the sharing was introduced in, the scheme can resists any cheating behaviors too. Security proof, computation complexity and communication complexity analysis are given at last.

  17. Meteosat Images Encryption based on AES and RSA Algorithms

    Directory of Open Access Journals (Sweden)

    Boukhatem Mohammed Belkaid

    2015-06-01

    Full Text Available Satellite image Security is playing a vital role in the field of communication system and Internet. This work is interested in securing transmission of Meteosat images on the Internet, in public or local networks. To enhance the security of Meteosat transmission in network communication, a hybrid encryption algorithm based on Advanced Encryption Standard (AES and Rivest Shamir Adleman (RSA algorithms is proposed. AES algorithm is used for data transmission because of its higher efficiency in block encryption and RSA algorithm is used for the encryption of the key of the AES because of its management advantages in key cipher. Our encryption system generates a unique password every new session of encryption. Cryptanalysis and various experiments have been carried out and the results were reported in this paper, which demonstrate the feasibility and flexibility of the proposed scheme.

  18. Implementasi Sistem Keamanan Data Menggunakan Algoritma RSA Dan Modified LSB

    OpenAIRE

    Anggraini, Siska

    2014-01-01

    Security and confidentiality are two important aspect of data communication. In maintaining security and confidentiality of important messages to be sent, previously message is firstly encrypted and hidden into the media. Media that is used in this study is a digital image format bitmap (.bmp) with 24 bit color depth. This study aims to build a system that can be used to improve data security that is important confidential messages. Cryptography algorithms used to encrypt is the RSA algorithm...

  19. AN APPROXIMATE EXPRESSION RELATED WITH RSA FIXED POINTS

    Institute of Scientific and Technical Information of China (English)

    YuXiuyuan

    2004-01-01

    Let T=T(n,e,a)be the number of fixed points of RSA(n,e)that are co-prime with n=pq,and A,B be sets of prime numbers in (1,x)and(1,y) respectively.An estimation on the mean-value M(A,B,e,a)=1/(#A)(#B)∑p∈A,q∈B,(p.q)=1 logT(pq,e,a)is given.

  20. Secure Three Prime RSA from Hardware Fault Attack

    OpenAIRE

    Ravi Rai Chaudhary; Prof. Deepali Kelkar; Vikas Arya

    2011-01-01

    RSA is the most widely deployed public key cryptosystem since it was proposed in 1978.It is used for securing web traffic, e-mail, and some wireless devices. Confidentiality of information has been particularly popularized with the explosive growth of the Internet. However from the user, the Internet was based on open network architecture with computer-based nodes and without network security, and thus was vulnerable to attackers and hackers. This paper is dedicated to the attack study of the...

  1. Simplified Threshold RSA with Adaptive and Proactive Security

    DEFF Research Database (Denmark)

    Almansa Guerra, Jesus Fernando; Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2006-01-01

    We present the currently simplest, most efficient, optimally resilient, adaptively secure, and proactive threshold RSA scheme. A main technical contribution is a new rewinding strategy for analysing threshold signature schemes. This new rewinding strategy allows to prove adaptive security...... of a proactive threshold signature scheme which was previously assumed to be only statically secure. As a separate contribution we prove that our protocol is secure in the UC framework....

  2. An Efficient Proactive RSA Scheme for Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Rui-shan; CHEN Ke-fei

    2007-01-01

    A proactive threshold signature scheme is very important to tolerate mobile attack in mobile ad hoc networks. In this paper, we propose an efficient proactive threshold RSA signature scheme for ad hoc networks. The scheme consists of three protocols: the initial secret share distribution protocol, the signature generation protocol and the secret share refreshing protocol. Our scheme has three advantages. First, the signature generation protocol is efficient. Second, the signature generation protocol is resilient. Third, the share refreshing protocol is efficient.

  3. Software and hardware implementation of the RSA public key cipher

    OpenAIRE

    Brady, Paul

    1988-01-01

    Cryptographic systems and their use in communications are presented. The advantages obtained by the use of a public key cipher and the importance of this in a commercial environment are stressed. Two two main public key ciphers are considered. The RSA public key cipher is introduced and various methods for implementing this cipher on a standard, nondedicated, 8 bit microprocessor are investigated. The performance of the different algorithms are evaluated and compared....

  4. Application and Implementation of RSA Algorithm%RSA算法的应用与实现

    Institute of Scientific and Technical Information of China (English)

    白晓; 蔡贵荣

    2013-01-01

    RSA 算法是使用最广泛的一种非对称密码体制.在对RSA 算法的原理、算法描述等进行研究的基础上,近一步研究了 RSA算法在数字签名、密钥交换等方面的应用.最后在.NET平台中使用C#语言进行编程,实现RSA数字签名算法。%RSA algorithm is one of the most widely used Public Key Cryptosystem.On the base of the study of RSA algorithm theory and algorithm description ,the paper further studies the application of RSA in the digital signatures ,key exchange and so on.Finally, RSA digital signature algorithm is realised by C# programming In the.NET platform.

  5. RsaI: a new sequence-specific endonuclease activity from Rhodopseudomonas sphaeroides.

    OpenAIRE

    Lynn, S P; Cohen, L K; Kaplan, S; Gardner, J F

    1980-01-01

    A new type II sequence-specific endonuclease, RsaI, has been identified from Rhodopseudomonas sphaeroides strain 28/5. An RsaI purification scheme that yields enzyme which is free of contaminating exonuclease and phosphatase activities after a single column fractionation has been developed. The enzyme recognized the tetranucleotide sequence 5'-GTAC-3' and cleaved between the T and A, thereby generating flush ends. RsaI should be extremely useful in deoxyribonucleic acid sequencing experiments.

  6. Kinerja Tanda Tangan Digital RSA 1024 bit pada Simulasi E-Voting Menggunakan Prosesor Multicore

    OpenAIRE

    Adnan, Adnan

    2014-01-01

    Paper ini menyajikan hasil pengujian kinerja program parallel algoritma tanda tangan digital RSA 1024 bit yang dimaksudkan untuk simulasi e-voting. Idenya adalah algoritma tanda tangan digital RSA diterapkan pada array bilangn big integer berdimensi 1024 1. Array ini mensimulasikan antrian surat suara hasil pemilihan umum. Dengan menyisipkan kode perulangan, komputasi algoritma tanda tangan digital RSA dilakukan sebanyak 600000. Perangkat lunak dikembangkan dengan me...

  7. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    OpenAIRE

    Kuang Tsan Lin; Sheng Lih Yeh

    2014-01-01

    The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matri...

  8. Lattice Based Attack on Common Private Exponent RSA

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Ravva

    2012-03-01

    Full Text Available Lattice reduction is a powerful concept for solving diverse problems involving point lattices. Lattice reduction has been successfully utilizing in Number Theory, Linear algebra and Cryptology. Not only the existence of lattice based cryptosystems of hard in nature, but also has vulnerabilities by lattice reduction techniques. In this paper, we show that Wieners small private exponent attack, when viewed as a heuristic lattice based attack, is extended to attack many instances of RSA when they have the same small private exponent.

  9. RSA2009参展厂商速递

    Institute of Scientific and Technical Information of China (English)

    王伟

    2009-01-01

    2009年RSA Conference参展商数量减少到了大约325个,但还是引入了一些新的板块和议题吸引参与者,如IN-NOVATION SANDBOX、物理安全和其他安全相关的热点讨论,参与这次展览的厂商涉及到从Physical Security、IT Security 到Policy Compliance的方方面面.

  10. Information-Theoretic Secure Verifiable Secret Sharing over RSA Modulus

    Institute of Scientific and Technical Information of China (English)

    QIU Gang; WANG Hong; WEI Shimin; XIAO Guozhen

    2006-01-01

    The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoretic verifiable secret sharing over RSA (Rivest,Shamir,Adleman) modulus and give the rigorous security proof. It is shown how to distribute a secret among a group such that any set of k parties get no information about the secret. The presented scheme is generally applied to constructions of secure distributed multiplication and threshold or forward-secure signature protocols.

  11. Про одну модифікацію алгоритму RSA шифрування – дешифрування півтонових зображень

    OpenAIRE

    Ковальчук, А.; Пелешко, Д.; Навитка, М.; Борзов, Ю.

    2012-01-01

    Описано застосування модифікації алгоритму RSA для шифрування – дешифрування зображень. Шифрування – дешифрування проводиться без і з додатковим зашумленням. We describe the use of modified RSA algorithm for encryption – decryption of images. Encryption – decryption is carried out without and with extra noisy.

  12. Spring batch essentials

    CERN Document Server

    Rao, P Raja Malleswara

    2015-01-01

    If you are a Java developer with basic knowledge of Spring and some experience in the development of enterprise applications, and want to learn about batch application development in detail, then this book is ideal for you. This book will be perfect as your next step towards building simple yet powerful batch applications on a Java-based platform.

  13. 47 CFR 22.969 - Cellular RSA licenses subject to competitive bidding.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Cellular RSA licenses subject to competitive bidding. 22.969 Section 22.969 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.969 Cellular RSA...

  14. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    DEFF Research Database (Denmark)

    Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal;

    2011-01-01

    The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with...... security against malicious behavior. Our second contribution is complete Paillier [Pai99] threshold encryption scheme in the two-party setting with security against malicious behavior. Furthermore, we describe how to extend our protocols to the multiparty setting with dishonest majority. Our RSA key...... generation is comprised of the following: (i) a distributed protocol for generation of an RSA composite, and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite as public key and is comprised of: (i) a distributed...

  15. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    DEFF Research Database (Denmark)

    Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal;

    2012-01-01

    The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with...... security against malicious behavior in the two party setting. Our second contribution is a complete Paillier [37] threshold encryption scheme in the two-party setting with security against malicious behavior. Our RSA key generation is comprised of the following: (i) a distributed protocol for generation of...... an RSA composite, and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite as public key and is comprised of: (i) a distributed generation of the corresponding secret-key shares and, (ii) a distributed...

  16. A Systematic Methodology for Multi-Images Encryption and Decryption Based on Single Chaotic System and FPGA Embedded Implementation

    Directory of Open Access Journals (Sweden)

    Hanzhong Zheng

    2014-01-01

    Full Text Available A systematic methodology is developed for multi-images encryption and decryption and field programmable gate array (FPGA embedded implementation by using single discrete time chaotic system. To overcome the traditional limitations that a chaotic system can only encrypt or decrypt one image, this paper initiates a new approach to design n-dimensional (n-D discrete time chaotic controlled systems via some variables anticontrol, which can achieve multipath drive-response synchronization. To that end, the designed n-dimensional discrete time chaotic controlled systems are used for multi-images encryption and decryption. A generalized design principle and the corresponding implementation steps are also given. Based on the FPGA embedded hardware system working platform with XUP Virtex-II type, a chaotic secure communication system for three digital color images encryption and decryption by using a 7D discrete time chaotic system is designed, and the related system design and hardware implementation results are demonstrated, with the related mathematical problems analyzed.

  17. Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface

    CERN Document Server

    Nyang, DaeHun; Kwon, Taekyoung; Kang, Brent; Stavrou, Angelos

    2011-01-01

    The design of authentication protocols, for online banking services in particular and any service that is of sensitive nature in general, is quite challenging. Indeed, enforcing security guarantees has overhead thus imposing additional computation and design considerations that do not always meet usability and user requirements. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users' trust in the system. In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of the authentication process. To that end, we propose a family of visualized authentication protocols, a visualized transaction verification, and a "decryptable to your eyes only" protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype o...

  18. Estimation of capacity of RSA module set, stable for cryptoanalysis

    OpenAIRE

    Селюх, П. В.

    2014-01-01

    Розглянуто аспекти практичної стійкості криптосистеми RSA, проаналізовано стандартизовані методи генерації параметрів криптосистеми, стійкість криптосистеми на практиці. Отримано кількісні оцінки множини стійких параметрів для застосування під час генерації параметрів криптосистеми. Висунуто гіпотезу про поліноміальну потужність множини надійних модулів RSA. This paper deals with aspects of practical security of RSA cryptosystem, analyzes standardized methods of generating cryptos...

  19. Children's Externalizing and Internalizing Symptoms over Time: The Role of Individual Differences in Patterns of RSA Responding

    Science.gov (United States)

    Hinnant, James Benjamin; El-Sheikh, Mona

    2009-01-01

    We examined associations between basal respiratory sinus arrhythmia (RSA) in conjunction with RSA regulation with the hypothesis that their interaction would explain unique variability in children's prospective adjustment 2 years later. Participants were 176 children (98 girls; 78 boys) in middle childhood. RSA regulation was assessed through…

  20. Generation of keys for image optical encryption in spatially incoherent light aimed at reduction of image decryption error

    Science.gov (United States)

    Cheremkhin, Pavel A.; Evtikhiev, Nikolay N.; Krasnov, Vitaly V.; Rodin, Vladislav G.; Starikov, Sergey N.

    2014-05-01

    At present time methods of optical encryption are actively developed. The majority of existing methods of optical encryption use not only light intensity distribution, easily registered with photosensors, but also its phase distribution which require application of complex holographic schemes in conjunction with spatially coherent light. This leads to complex optical schemes and low decryption quality. To eliminate these disadvantages it is possible to implement optical encryption using spatially incoherent illumination which requires registration of light intensity distribution only. However this applies new restrictions on encryption keys: Fourier spectrum amplitude distribution of encryption key should overlap Fourier spectrum amplitude distribution of image to be encrypted otherwise loss of information is unavoidable. Therefore it seems that best key should have white spectrum. On the other hand due to fact that only light intensity distribution is registered, spectra of image to be encrypted and encryption key always have peaks at zero frequency and their heights depend on corresponding total energy. Since encrypted image contains noise, ratio of its average spectrum energy to noise average energy determines signal to noise ratio of decrypted image. Therefore ratio of amplitude at zero frequency to average spectrum amplitude (RZA) of encryption key defines decrypted images quality. For generation of encryption keys with low RZA method of direct search with random trajectory (DSRT) was used. To estimate impact of key RZA on decrypted images error numerical experiments were conducted. For experiments keys with different RZA values but with same energy value were generated and used. Numerically simulated optical encryption and decryption of set of test images was conducted. Results of experiment demonstrate that application of keys with low RZA generated by DSRT method leads to up to 20% lower error in comparison to keys generated by means of uniform random

  1. ECC over RSA for Asymmetric Encryption-A Review

    Directory of Open Access Journals (Sweden)

    Kamlesh Gupta

    2011-05-01

    Full Text Available Cryptography is used to transmit the data securely in open network. This paper gives the survey of Elliptic Curve Cryptosystem (ECC used in many applications. ECC is a when compared to RSA and discrete logarithm systems, is a better option for the future. For this reason ECC is such an excellent choice for doing asymmetric cryptography in portable devices right now. The smaller ECC keys it turn makes the cryptographic operations that must be performed by the communicating devices to be embedded into considerably smaller hardware, so that software applications may complete cryptographic operations with fewer processor cycles, and operations can be performed much faster, while still retaining equivalent security. This means, in turn, reduced power consumption, less space consumed on the printed circuit board, and software applications that run more rapidly make lower memory demands. In brief, for communication using smaller devices and asymmetric cryptosystem we need ECC.

  2. Cryptanalysis and Improvement of Digital Multisignature Scheme Based on RSA

    Institute of Scientific and Technical Information of China (English)

    SU Li; CUI Guo-hua; CHEN Jing; YUAN Jun

    2007-01-01

    Zhang et al. proposed a sequential multisignature scheme based on RSA. The scheme has advantages of low computation and communication costs, and so on. However, we find a problem in their scheme that the verifier can not distinguish whether the multisignature is signed by all the signers of the group or only by the last signer. Thus, any single signature created by the last signer can be used as a multisignature created by the whole group members. This paper proposes an improved scheme that can overcome the defect. In the new scheme, the identity messages of all the signers are added in the multisignature and used in verification phase, so that the verifier can know the signature is generated by which signers. Performance analysis shows that the proposed scheme costs less computation than the original scheme in both signature and verification phases. Furthermore, each partial signature is based on the signer's identity certificate, which makes the scheme more secure.

  3. The RSA survey of dwarf galaxies, 1: Optical photometry

    Science.gov (United States)

    Vader, J. Patricia; Chaboyer, Brian

    1994-01-01

    We present detailed surface photometry, based on broad B-band charge coupled device (CCD) images, of about 80 dwarf galaxies. Our sample represents approximately 10% of all dwarf galaxies identified in the vicinity of Revised Shapley-Ames (RSA) galaxies on high resolution blue photographic plates, referred to as the RSA survey of dwarf galaxies. We derive global properties and radial surface brightness profiles, and examine the morphologies. The radial surface brightness profiles of dwarf galaxies, whether early or late type, display the same varieties in shape and complexity as those of classical giant galaxies. Only a few are well described by a pure r(exp 1/4) law. Exponential profiles prevail. Features typical of giant disk galaxies, such as exponential profiles with a central depression, lenses, and even, in one case (IC 2041), a relatively prominent bulge are also found in dwarf galaxies. Our data suggest that the central region evolves from being bulge-like, with an r(exp 1/4) law profile, in bright galaxies to a lens-like structure in dwarf galaxies. We prove detailed surface photometry to be a helpful if not always sufficient tool in investigating the structure of dwarf galaxies. In many cases kinematic information is needed to complete the picture. We find the shapes of the surface brightness profiles to be loosely associated with morphological type. Our sample contains several new galaxies with properties intermediate between those of giant and dwarf ellipticals (but no M32-like objects). This shows that such intermediate galaxies exist so that at least a fraction of early-type dwarf ellipticals is structurally related to early-type giants instead of belonging to a totally unrelated, disjunct family. This supports an origin of early-type dwarf galaxies as originally more massive systems that acquired their current morphology as a result of substantial, presumable supernova-driven, mass loss. On the other hand, several early-type dwarfs in our sample are

  4. Nurses as advocates between western and traditional wealth practices in RSA

    Directory of Open Access Journals (Sweden)

    Valerie Ehlers

    2000-02-01

    Full Text Available The RSA, like most African countries, have two health care systems. The most visible one is the Westernised hospital and/or clinic based treatment of diseases. This system was introduced by the colonisers and perpetuated by the current formal education programmes of most health care professionals in the RSA. Traditional African medicine has existed since time immemorial and continues to treat vast numbers of people. Both these health care systems will be briefly discussed. Then the role of nurses in the RSA's health care system(s will be examined. *Please note: This is a reduced version of the abstract. Please refer to PDF for full text.

  5. Hybrid Batch Bayesian Optimization

    CERN Document Server

    Azimi, Javad; Fern, Xiaoli

    2012-01-01

    Bayesian Optimization aims at optimizing an unknown non-convex/concave function that is costly to evaluate. We are interested in application scenarios where concurrent function evaluations are possible. Under such a setting, BO could choose to either sequentially evaluate the function, one input at a time and wait for the output of the function before making the next selection, or evaluate the function at a batch of multiple inputs at once. These two different settings are commonly referred to as the sequential and batch settings of Bayesian Optimization. In general, the sequential setting leads to better optimization performance as each function evaluation is selected with more information, whereas the batch setting has an advantage in terms of the total experimental time (the number of iterations). In this work, our goal is to combine the strength of both settings. Specifically, we systematically analyze Bayesian optimization using Gaussian process as the posterior estimator and provide a hybrid algorithm t...

  6. 基于硬件加密卡技术的RSA加密引擎的局部封装%The local package of RSA encryption engine based on hardware-based encryption card technology

    Institute of Scientific and Technical Information of China (English)

    徐敏

    2011-01-01

    目前主流的VPN是通过SSL协商进行认证的,其在调用Openssl的加密引擎过程中带来一个问题,即进行数据加密所使用的公钥不是自身的密钥,于是加密引擎不仅要有对私钥解密进行硬件实现,还要有对公钥加密实现原有算法调用的技术。本文介绍了目前主流的Openssl实现硬件RSA加密引擎仅对私钥解密数据进行调用,而对于公钥加密数据不调用的局部封装方法,有着重要的实用价值。%VPN is currently the mainstream for certification through the SSL negotiation, the encryption engine in the calling pro- cess Openssl creates a problem. Namely, the public key used to encrypt the data itself is not the key, so not only has a private key encryption engine decrypt the hardware implementation, but also for public key encryption algorithm to achieve the original call technology. This article describes the current mainstream hardware Openssl RSA encryption engine to decrypt the local data encapsulation methods in which private key data calls only, and does not call for public-key encryption. It has important practical value.

  7. A new distribution scheme of decryption keys used in optical verification system with multiple-wavelength information

    Institute of Scientific and Technical Information of China (English)

    Niu Chun-Hui; Zhang Yan; Gu Ben-Yuan

    2005-01-01

    A new distribution scheme of decryption keys used in optical verification systems is proposed. The encryption procedure is digitally implemented with the use of an iteration algorithm in computer. Three target images corresponding to three wavelengths are encoded into three sets of phase-only masks (POMs) by a special distributing method. These three sets of POMs are assigned to three authorized users as the personal identification. A lensless optical system is used as the verification system. In the verification procedure, every two of the three authorized users can pass the verification procedure cooperatively, but only one user cannot do. Numerical simulation shows that the proposed distribution scheme of decryption keys not only can improve the security level of verification system, but also can bring convenience and flexibility for authorized users.

  8. An Image Encryption and Decryption Algorithm Based on Chaos Sequence%基于混沌序列的图像加密解密算法

    Institute of Scientific and Technical Information of China (English)

    陈永红; 黄席樾

    2003-01-01

    In this paper, an image encryption and decryption algorithm based on chaos sequence is proposed. This algorithm provides low computational complexity, high security and no distortion. Finally, experimental results are satisfactory.

  9. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping

    Directory of Open Access Journals (Sweden)

    Musheer Ahmad

    2010-01-01

    Full Text Available The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryption of images is different from that of texts; therefore it is difficult to handle them by traditional encryption methods. In this communication, a new image encryption algorithm based on three different chaotic maps is proposed. In the proposed algorithm, the plain-image is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out using 2D Cat map. Further, the control parameters of shuffling are randomly generated by employing 2D coupled Logistic map. After that the shuffled image is encrypted using chaotic sequence generated by one-dimensional Logistic map. The experimental results show that the proposed algorithm can successfully encrypt/decrypt the images with same secret keys, and the algorithm has good encryption effect, large key space and high sensitivity to a small change in secret keys. Moreover, the simulation analysis also demonstrates that the encrypted images have good information entropy, very low correlation coefficients and the distribution of gray values of an encrypted image has random-like behavior.

  10. Intellectual property rights vs. public access rights: ethical aspects of the DeCSS decryptation program

    Directory of Open Access Journals (Sweden)

    Robert Vaagan

    2005-01-01

    Full Text Available Introduction. In 1999-2000, a Norwegian youth cracked a DVD-access code and published a decryptation program on the Internet. He was sued by the US DVD Copy Control Association (DVD-CCA and the Norwegian Motion Picture Association (MAP, allies of the US Motion Picture Association of America (MPAA, arrested by Norwegian police and charged with data crime. Two Norwegian court rulings in 2003 unanimously ruled that the program did not amount to a breach of Norwegian law, and he was fully acquitted. In the US, there have been related cases, some with other outcomes. Method. Based on a theoretical framework developed by Zwass, the paper discusses these court rulings and the wider issues of intellectual property rights versus public access rights. Analysis. The DVD-Jon case illustrates that intellectual property rights can conflict with public access rights, as the struggle between proprietary software and public domain software, as well as the SPARC and Open Archives Initiative reflect. Results. An assessment of the DVD-Jon case based on the Zwass framework does not give a clear information ethics answer. The analysis depends on whether one ascribes to consequentialist (e.g., utilitarian or de-ontological reflection, and also on which side of the digital gap is to be accorded most weight. Conclusion. While copyright interests are being legally strengthened, there may be ethically- grounded access rights that outweigh property rights.

  11. Early Adversity, RSA, and Inhibitory Control: Evidence of Children’s Neurobiological Sensitivity to Social Context

    OpenAIRE

    Skowron, Elizabeth A.; Cipriano-Essel, Elizabeth; Gatzke-Kopp, Lisa M.; Teti, Douglas M.; Ammerman, Robert T.

    2013-01-01

    This study examined parasympathetic physiology as a moderator of the effects of early adversity (i.e., child abuse and neglect) on children’s inhibitory control. Children’s respiratory sinus arrhythmia (RSA) was assessed during a resting baseline, two joint challenge tasks with mother, and an individual frustration task. RSA assessed during each of the joint parent–child challenge tasks moderated the effects of child maltreatment (CM) status on children’s independently-assessed inhibitory con...

  12. Modified Trial Division Algorithm Using KNJ-Factorization Method To Factorize RSA Public Key Encryption

    OpenAIRE

    Lal, Nidhi; Singh, Anurag Prakash; Kumar, Shishupal

    2015-01-01

    The security of RSA algorithm depends upon the positive integer N, which is the multiple of two precise large prime numbers. Factorization of such great numbers is a problematic process. There are many algorithms has been implemented in the past years. The offered KNJ -Factorization algorithm contributes a deterministic way to factorize RSA. The algorithm limits the search by only considering the prime values. Subsequently prime numbers are odd numbers accordingly it also requires smaller num...

  13. Adolescent RSA Responses during an Anger Discussion Task: Relations to Emotion Regulation and Adjustment

    OpenAIRE

    Cui, Lixian; Morris, Amanda Sheffield; Harrist, Amanda W.; Larzelere, Robert E; Criss, Michael M.; Houltberg, Benjamin J.

    2015-01-01

    The current study examined associations between adolescent respiratory sinus arrhythmia (RSA) during an angry event discussion task and adolescents’ emotion regulation and adjustment. Data were collected from 206 adolescents (10–18 years old, M age = 13.37). Electrocardiogram (ECG) and respiration data were collected from adolescents, and RSA values and respiration rates were computed. Adolescents reported on their own emotion regulation, prosocial behavior, and aggressive behavior. Multi-lev...

  14. Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks

    OpenAIRE

    Perin, Guilherme; Imbert, Laurent; Torres, Lionel; Maurine, Philippe

    2013-01-01

    International audience This paper analyzes the robustness of RSA countermeasures against electromagnetic analysis and collision attacks. The proposed RSA cryptosystem uses residue number systems (RNS) for fast executions of the modular calculi with large numbers. The parallel architecture is protected at arithmetic and algorithmic levels by using the Montgomery Ladder and the Leak Resistant Arithmetic countermeasures. Because the architecture can leak information through control and memory...

  15. Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable

    OpenAIRE

    Berzati, Alexandre; Canovas, Cécile; Dumas, Jean-Guillaume; Goubin, Louis

    2009-01-01

    International audience; After attacking the RSA by injecting fault and corresponding countermeasures, works appear now about the need for protecting RSA public elements against fault attacks. We provide here an extension of a recent attack based on the public modulus corruption. The difficulty to decompose the "Left-To-Right" exponentiation into partial multiplications is overcome by modifying the public modulus to a number with known factorization. This fault model is justified here by a com...

  16. An Encryption-Decryption Method Using XOR Gate Based on the XPM between O-Band and C-Band Light Waves

    Institute of Scientific and Technical Information of China (English)

    WANG Ya-Ping; WU Chong-Qing; WANG Zhi; WANG Yong-Jun; YANG Shuang-Shou

    2009-01-01

    An all-optical encryption-decryption method using an exclusive-or gate hazed on the cross-phase modulation between O-band and C-band light waves is proposed. The feasibility of the encryption-decryption technique is verified by handling binary signals at 2.5Gbps, with less than 3dB penalty of extinction ratio and 1 dB polarization dependent loss.

  17. A randomized RSA study concentrating especially on continuous migration.

    Science.gov (United States)

    Molt, Mats; Ryd, Leif; Toksvig-Larsen, Sören

    2016-06-01

    Background and purpose - There is a general call for phased introduction of new implants, and one step in the introduction is an early evaluation of micromotion. We compared the micromotion in the Triathlon and its predecessor, the Duracon total knee prosthesis, concentrating especially on continuous migration over 5 years of follow-up. Patients and methods - 60 patients were randomized to receive either a cemented Triathlon total knee prosthesis or a cemented Duracon total knee prosthesis. 3-D tibial component migration was measured by radiostereometric analysis (RSA) at 3 months and at 1, 2, and 5 years. Results - There was no statistically significant difference in maximum total point motion (MTPM) between the 2 groups (p = 0.1). The mean MTPM at 5 years for the Duracon was 1.10 (SD 1.21) mm and for the Triathlon it was 0.66 (SD 0.38) mm. The numbers of continuously migrating prostheses were similar in the groups at the fifth year of follow-up; 6 of 21 prostheses in the Duracon group and 3 of 21 in the Triathlon group had migrated more than 0.3 mm between the second year and the fifth year of follow-up (p = 0.2). Interpretation - The Triathlon has a micromotion pattern similar to that of the Duracon total knee system at both short-term and medium-term follow-up, and may therefore, over time, show the same good long-term mechanical stability. PMID:27088580

  18. Surface roughness when diamond turning RSA 905 optical aluminium

    Science.gov (United States)

    Otieno, T.; Abou-El-Hossein, K.; Hsu, W. Y.; Cheng, Y. C.; Mkoko, Z.

    2015-08-01

    Ultra-high precision machining is used intensively in the photonics industry for the production of various optical components. Aluminium alloys have proven to be advantageous and are most commonly used over other materials to make various optical components. Recently, the increasing demand from optical systems for optical aluminium with consistent material properties has led to the development of newly modified grades of aluminium alloys produced by rapid solidification in the foundry process. These new aluminium grades are characterised by their finer microstructures and refined mechanical and physical properties. However the machining database of these new optical aluminium grades is limited and more research is still required to investigate their machinability performance when they are diamond turned in ultrahigh precision manufacturing environment. This work investigates the machinability of rapidly solidified aluminium RSA 905 by varying a number of diamond-turning cutting parameters and measuring the surface roughness over a cutting distance of 4 km. The machining parameters varied in this study were the cutting speed, feed rate and depth of cut. The results showed a common trend of decrease in surface roughness with increasing cutting distance. The lowest surface roughness Ra result obtained after 4 km in this study was 3.2 nm. This roughness values was achieved using a cutting speed of 1750 rpm, feed rate of 5 mm/min and depth of cut equal to 25 μm.

  19. Improved Trial Division Technique for Primality Checking in RSA Algorithm

    Directory of Open Access Journals (Sweden)

    Kumarjit Banerjee

    2012-07-01

    Full Text Available The RSA cryptosystem, invented by Ron Rivest, Adi Shamir and Len Adleman was first publicized in the August 1977 issue of Scientific American. The security level of this algorithm very much depends on two large prime numbers. To check the primality of large number in personal computer is huge time consuming using the best known trial division algorithm. The time complexity for primality testing has been reduced using the representation of divisors in the form of 6n±1. According to the fundamental theorem of Arithmetic, every number has unique factorization. So to check primality, it is sufficient to check if the number is divisible by any prime below the square root of the number. The set of divisors obtained by 6n±1 form representation contains many composites. These composite numbers have been reduced by 30k approach. In this paper, the number of composites has been further reduced using 210k approach. A performance analysis in time complexity has been given between 210k approach and other prior applied methods. It has been observed that the time complexity for primality testing has been reduced using 210k approach.

  20. Dynamic Batch Bayesian Optimization

    CERN Document Server

    Azimi, Javad; Fern, Xiaoli

    2011-01-01

    Bayesian optimization (BO) algorithms try to optimize an unknown function that is expensive to evaluate using minimum number of evaluations/experiments. Most of the proposed algorithms in BO are sequential, where only one experiment is selected at each iteration. This method can be time inefficient when each experiment takes a long time and more than one experiment can be ran concurrently. On the other hand, requesting a fix-sized batch of experiments at each iteration causes performance inefficiency in BO compared to the sequential policies. In this paper, we present an algorithm that asks a batch of experiments at each time step t where the batch size p_t is dynamically determined in each step. Our algorithm is based on the observation that the sequence of experiments selected by the sequential policy can sometimes be almost independent from each other. Our algorithm identifies such scenarios and request those experiments at the same time without degrading the performance. We evaluate our proposed method us...

  1. Modelling of Batch Process Operations

    DEFF Research Database (Denmark)

    Abdul Samad, Noor Asma Fazli; Cameron, Ian; Gani, Rafiqul

    2011-01-01

    Here a batch cooling crystalliser is modelled and simulated as is a batch distillation system. In the batch crystalliser four operational modes of the crystalliser are considered, namely: initial cooling, nucleation, crystal growth and product removal. A model generation procedure is shown that s...

  2. The Pseudomonas Quorum-Sensing Regulator RsaL Belongs to the Tetrahelical Superclass of H-T-H Proteins▿

    OpenAIRE

    Rampioni, Giordano; Polticelli, Fabio; Bertani, Iris; Righetti, Karima; Venturi, Vittorio; Zennaro, Elisabetta; Leoni, Livia

    2006-01-01

    In the opportunistic human pathogen Pseudomonas aeruginosa, quorum sensing (QS) is crucial for virulence. The RsaL protein directly represses the transcription of lasI, the synthase gene of the main QS signal molecule. On the basis of sequence homology, RsaL cannot be predicted to belong to any class of characterized DNA-binding proteins. In this study, an in silico model of the RsaL structure was inferred showing that RsaL belongs to the tetrahelical superclass of helix-turn-helix proteins. ...

  3. The Quorum-Sensing Negative Regulator RsaL of Pseudomonas aeruginosa Binds to the lasI Promoter

    OpenAIRE

    Rampioni, Giordano; Bertani, Iris; Zennaro, Elisabetta; Polticelli, Fabio; Venturi, Vittorio; Leoni, Livia

    2006-01-01

    A mutation in the rsaL gene of Pseudomonas aeruginosa produces dramatically higher amounts of N-acyl homoserine lactone with respect to the wild type, highlighting the key role of this negative regulator in controlling quorum sensing (QS) in this opportunistic pathogen. The DNA binding site of the RsaL protein on the rsaL-lasI bidirectional promoter partially overlaps the binding site of the LasR protein, consistent with the hypothesis that RsaL and LasR could be in binding competition on thi...

  4. Longitudinal associations between temperament and socioemotional outcomes in young children: the moderating role of RSA and gender.

    Science.gov (United States)

    Morales, Santiago; Beekman, Charles; Blandon, Alysia Y; Stifter, Cynthia A; Buss, Kristin A

    2015-01-01

    Temperament is an important predictor of socioemotional adjustment, such as externalizing and internalizing symptoms. However, there is not a one-to-one correspondence between temperamental predispositions and these outcomes, implying that other factors also contribute to the development of internalizing and externalizing problems. Self-regulation is believed to interact with temperament, and has been studied as a predictor for later socioemotional outcomes. Respiratory sinus arrhythmia (RSA) is a psychophysiological measure of self-regulation that has been studied as a moderator of risk. The primary aim of the present study was to test if RSA baseline and RSA reactivity would moderate the link between temperament and socioemotional outcomes. Mothers reported the temperament of their infants (20 months; N = 154), RSA was collected at 24- and 42-months, and mothers reported externalizing and internalizing behaviors at kindergarten entry. RSA baseline and RSA reactivity moderated the relation between exuberant temperament and externalizing behaviors. However, these results were only significant for girls, such that high RSA baseline and greater RSA suppression predicted more externalizing behaviors when exuberance was high. Fearful temperament predicted later internalizing behaviors, but no moderation was present. These results are discussed in light of recent evidence regarding gender differences in the role of RSA as a protective factor for risk.

  5. Microstructure encryption and decryption techniques in optical variable and invariable devices in printed documents for security and forensic applications

    Science.gov (United States)

    Ambadiyil, Sajan; K. G, Jayan; Prabhu, Radhakrishna; Mahadevan Pillai, V. P.

    2015-05-01

    Today, document counterfeiting is a global menace because of the advanced technologies available at ever decreasing prices. Instead of eschew the paper documents; applying efficient cost effective security methodologies are the feasible solutions. This paper reports a novel cost effective and simple optical technique using micro text encrypted optical variable device (OVD) threads, ultra-violet (UV) based optical invariable device (OID) patterns and artistic fonts for secure preparation of the documents and its forensic application. Applying any one of the above technique or together can effectively enhance the level of security of the most valuable document. The genuineness of the documents can be verified using simple decryption techniques.

  6. Remarks on the bounds for cryptanalysis of low private key RSA

    Institute of Scientific and Technical Information of China (English)

    Haijian Zhou; Ping Luo; Daoshun Wang; Yiqi Dai

    2009-01-01

    Boneh and Durfee have developed a cryptanalytic algorithm on low private key RSA. The algorithm is based on lattice basis reduc-tion and breaks RSA with private key d < N0.292. Later on, an improved version by Blomer and May enhanced the efficiency, while reaching approximately this same upper bound. Unfortunately, in both the algorithms, there is a critical error in theoretical analysis, leading to the overestimated upper bound N0.292. In this paper we present a more precise analytical model, with which the theoretical upper bound on d is modified to approximately d < N0.277 for ordinary RSA systems with a 1024-bit public key (N, e).

  7. RSA 2010信息安全论坛在京举行

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    本刊讯10月21~22日,在RSA进入中国市场10周年之际。由美国RSA Conference(RSA大会)主办、中国电子学会承办的RSA 大会2010信息安全国际论坛在北京举行,标志着RSA Conference这一全球最权威的信息安全年度峰会首次进入中国。国家工业与信息化部有关领导出席论坛并讲话,对论坛的积极意义表示高度肯定。

  8. Security analysis of RSA cryptosystem algorithm and it’s properties

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  9. Column and Batch Experiments

    Directory of Open Access Journals (Sweden)

    Jorge L. Gardea-Torresdey

    2005-01-01

    Full Text Available Batch and column experiments were performed to determine the Cu(II binding capacity of silica-immobilized humin biomass. For column studies, 500 bed volumes of a 0.1 mM Cu(II solution were passed through humin packed columns at the flow rates of 1, 1.5, 2, and 3 mL/min. The biopolymer showed an average Cu binding capacity of 12 ± 1.5 mg/g and a Cu recovery of about 96.5 % ± 1.5. The breakthrough points for Cu(II alone were approximately 420, 390, 385, and 300 bed volumes for the flow rates of 1, 1.5, 2 and 3 mL/min, respectively. The interference studies demonstrated that at low concentrations, the hard cations Ca(II and Mg(II did not seem to represent a major interference on Cu(II binding to the humin biopolymer. The selectivity showed by this biopolymer was Cu(II>Ca(II>Mg(II. On the other hand, batch experiments showed that Ca(II + Mg(II at 100mM each reduced the Cu(II binding to 73 %. However, 1000 mM concentrations of Ca(II and Mg(II, separately and in mixture, reduced the Cu(II binding to 47 %, 44 % and 31 %, respectively. The results of this study showed that immobilized humin in a silica matrix could represent an inexpensive bio-source for Cu removal from contaminated water, even in the presence of low concentrations of the hard cations Ca(II and Mg(II.

  10. High-precision measurements of cementless acetabular components using model-based RSA: an experimental study

    DEFF Research Database (Denmark)

    Baad-Hansen, Thomas; Kold, Søren; Kaptein, Bart L;

    2007-01-01

    BACKGROUND: In RSA, tantalum markers attached to metal-backed acetabular cups are often difficult to detect on stereo radiographs due to the high density of the metal shell. This results in occlusion of the prosthesis markers and may lead to inconclusive migration results. Within the last few yea...

  11. Resting RSA Is Associated with Natural and Self-Regulated Responses to Negative Emotional Stimuli

    Science.gov (United States)

    Demaree, Heath A.; Robinson, Jennifer L.; Everhart, D. Erik; Schmeichel, Brandon J.

    2004-01-01

    Resting respiratory sinus arrhythmia (RSA) was assessed among 111 adult participants. These individuals were then asked to watch a positive or negative affective film in either a natural manner or while exaggerating their facial response. Facial reactions to the film were video-recorded and subsequently rated in terms of facial affect.…

  12. A collection of insurance brands: The story of RSA in Ireland

    Directory of Open Access Journals (Sweden)

    Richard Brophy

    2015-12-01

    Full Text Available Many firms in financial services opt for corporate branding in order to unify their activities and leverage a strong brand across business units. While this may be the case, some financial service organisations retain the approach of using a collection of brands within the organisation. RSA has opted to retain its existing brands while gaining market share in Ireland. This paper studies the approach that RSA has taken in its brand architecture. Through a literature review of branding and rebranding, along with a historical study of the RSA Company going back to its foundation, the author attempts to chart the direction of the company alongside industry changes, such as product distribution and also the introduction of other stakeholders to the marketplace. Unlike its insurance peers, RSA is one of the few insurers that operates a portfolio of brands that operate in different markets within the industry. While the company is well known as a large insurer in Ireland, it retains its existing brands in a successful way through its product distribution

  13. Використання адитивно-різницевих операцій в модифікаціях алгоритму RSA

    OpenAIRE

    Ковальчук, А.; Пелешко, Д.; Навитка, М.

    2011-01-01

    Запропоновано модифікації шифрування - дешифрування зображень у градаціях сірого, які грунтуються на використанні ідей базового алгоритму RSA з додатковим зашумленням зашифрованого зображення і без додаткового зашумлення. A modification of the encryption – decryption of images in grayscale, and are based on ideas using the basic algorithm of RSA, with additional noise encrypted image without any additional noise....

  14. Functional Characterization of the Quorum Sensing Regulator RsaL in the Plant-Beneficial Strain Pseudomonas putida WCS358

    OpenAIRE

    Rampioni, Giordano; Bertani, Iris; Pillai, Cejoice Ramachandran; Venturi, Vittorio; Zennaro, Elisabetta; Leoni, Livia

    2012-01-01

    In many bacteria, quorum sensing (QS) systems rely on a signal receptor and a synthase producing N-acyl-homoserine lactone(s) as the signal molecule(s). In some species, the rsaL gene, located between the signal receptor and synthase genes, encodes a repressor limiting signal synthase expression and hence signal molecule production. Here we investigate the molecular mechanism of action of the RsaL protein in the plant growth-promoting rhizobacterium Pseudomonas putida WCS358 (RsaLWCS). In P. ...

  15. Data-driven batch schuduling

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John [Los Alamos National Laboratory; Denehy, Tim [GOOGLE; Arpaci - Dusseau, Remzi [UNIV OF WISCONSIN; Livny, Miron [UNIV OF WISCONSIN; Arpaci - Dusseau, Andrea C [NON LANL

    2009-01-01

    In this paper, we develop data-driven strategies for batch computing schedulers. Current CPU-centric batch schedulers ignore the data needs within workloads and execute them by linking them transparently and directly to their needed data. When scheduled on remote computational resources, this elegant solution of direct data access can incur an order of magnitude performance penalty for data-intensive workloads. Adding data-awareness to batch schedulers allows a careful coordination of data and CPU allocation thereby reducing the cost of remote execution. We offer here new techniques by which batch schedulers can become data-driven. Such systems can use our analytical predictive models to select one of the four data-driven scheduling policies that we have created. Through simulation, we demonstrate the accuracy of our predictive models and show how they can reduce time to completion for some workloads by as much as 80%.

  16. RSA public key cryptography and security analysis%公钥密码RSA体制及安全性分析

    Institute of Scientific and Technical Information of China (English)

    王红珍

    2012-01-01

    The RSA algorithm is a public key cryptography algorithm. The RSA based on count the theory of unsymmetrical key cryptography. The security of the RSA problem depends on the big integral factoring. The RSA experienced various attack, it can not be offend to break completely up to now.%RSA算法是一种公钥密码算法.RSA是一个基于数论的非对称密码体制,RSA的安全性是依赖于大整数素因子分解的困难性问题.其经历了各种攻击,至今未能被完全攻破.

  17. RSA calibration accuracy of a fluoroscopy-based system using nonorthogonal images for measuring functional kinematics

    Energy Technology Data Exchange (ETDEWEB)

    Kedgley, Angela E.; Jenkyn, Thomas R. [Department of Mechanical and Materials Engineering, Faculty of Engineering, University of Western Ontario, London, Ontario N6A 5B9 (Canada); Wolf Orthopaedic Biomechanics Laboratory, Fowler Kennedy Sport Medicine Clinic, London, Ontario N6A 5B9 (Canada); Department of Mechanical and Materials Engineering, Faculty of Engineering, University of Western Ontario, London, Ontario N6A 5B9 (Canada) and School of Kinesiology, Faculty of Health Sciences, University of Western Ontario, London, Ontario N6A 5B9 (Canada)

    2009-07-15

    When performing radiostereometric analysis (RSA) in a clinical setting it may be desirable to orient the two imaging devices nonorthogonally to obtain the best views of an anatomical structure. In this study, a calibration frame was constructed that allowed the relative angles of fiducial and control planes to be adjusted. Precision and accuracy were quantified across multiple trials and orientations. The 90 deg. frame was always of equivalent or greater accuracy than a calibration frame with the fiducial and control planes aligned parallel to the image intensifiers. This study also showed that RSA may be performed with imaging devices at relative angles other than 90 deg. without compromising accuracy. This allows researchers greater freedom in positioning equipment.

  18. Modified Trail division for Implementation of RSA Algorithm with Large Integers

    Directory of Open Access Journals (Sweden)

    Satyendra Nath Mandal

    2010-01-01

    Full Text Available The RSA cryptosystem, invented by Ron Rivest, Adi Shamir and Len Adleman was first published in the August 1978 issue of ACM[4 ]. The cryptosystem is most commonly used for providing priva cy and ensuring authenticity of digital data. The security level of this algorithm depends on chooing two large prime numbers. But, to handle large prime in personal computer is huge time consuming. Further, each and every compiler has a maximum limit to integer handling capability. In this paper, an approach has been made to modify trial division technique for implementation of RSA algorithm for large numbers beyond the range of a compiler that has been used to implement it. The time complexity of this modified trial division method has been calculated using personal computer, at the end for large integer.

  19. New Attacks on RSA with Modulus N = p2q Using Continued Fractions

    Science.gov (United States)

    Asbullah, M. A.; Ariffin, M. R. K.

    2015-06-01

    In this paper, we propose two new attacks on RSA with modulus N = p2q using continued fractions. Our first attack is based on the RSA key equation ed - ϕ(N)k = 1 where ϕ(N) = p(p - 1)(q - 1). Assuming that and , we show that can be recovered among the convergents of the continued fraction expansion of . Our second attack is based on the equation eX - (N - (ap2 + bq2)) Y = Z where a,b are positive integers satisfying gcd(a,b) = 1, |ap2 - bq2| < N1/2 and ap2 + bq2 = N2/3+α with 0 < α < 1/3. Given the conditions , we show that one can factor N = p2q in polynomial time.

  20. An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions

    Science.gov (United States)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    Secure channels can be realized by an authenticated key exchange (AKE) protocol that generates authenticated session keys between the involving parties. In [32], Shin et al., proposed a new kind of AKE (RSA-AKE) protocol whose goal is to provide high efficiency and security against leakage of stored secrets as much as possible. Let us consider more powerful attacks where an adversary completely controls the communications and the stored secrets (the latter is denoted by “replacement” attacks). In this paper, we first show that the RSA-AKE protocol [32] is no longer secure against such an adversary. The main contributions of this paper are as follows: (1) we propose an RSA-based leakage-resilient AKE (RSA-AKE2) protocol that is secure against active attacks as well as replacement attacks; (2) we prove that the RSA-AKE2 protocol is secure against replacement attacks based on the number theory results; (3) we show that it is provably secure in the random oracle model, by showing the reduction to the RSA one-wayness, under an extended model that covers active attacks and replacement attacks; (4) in terms of efficiency, the RSA-AKE2 protocol is comparable to [32] in the sense that the client needs to compute only one modular multiplication with pre-computation; and (5) we also discuss about extensions of the RSA-AKE2 protocol for several security properties (i.e., synchronization of stored secrets, privacy of client and solution to server compromise-impersonation attacks).

  1. Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL

    OpenAIRE

    Arnaud, Cyril; Fouque, Pierre-Alain

    2013-01-01

    In this paper, we present a timing attack against the RSA-CRT algorithm used in the current version 1.1.4 of PolarSSL, an open-source cryptographic library for embedded systems. This implementation uses a classical countermeasure to avoid two previous attacks of Schindler and another one due to Boneh and Brumley. However, a careful analysis reveals a bias in the implementation of Montgomery multiplication. We theoretically analyse the distribution of output values for Montgomery multiplicatio...

  2. CERTIFICATE AUTHORITY SCHEMES USING ELLIPTIC CURVE CRYPTOGRAPHY, RSA AND THEIR VARIANTS-SIMULATION USING NS2

    Directory of Open Access Journals (Sweden)

    S. Shivkumar

    2014-01-01

    Full Text Available A PKI (public key infrastructure enables users of a basically unsecure public network to securely and privately exchange data through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. The two major digital signature algorithms are Elliptic Curve Digital Signature Algorithm (ECDSA which is the elliptic curve analogue of the Digital Signature Algorithm (DSA and RSA algorithm. The two algorithms are used for generating the certificates exchanged between computer systems. Elliptic curve based systems can give better security compared to RSA with less key size. This study compares the performance of ECC based signature schemes and RSA schemes using NS2 simulation. It is observed that ECC based certificate authority schemes gives better speed and security. Elliptic curve based schemes are the best for time and resource constrained wireless applications.

  3. RSA加密算法中MPI的应用%Application of MPI in RSA encryption algorithm

    Institute of Scientific and Technical Information of China (English)

    陆玉阳

    2015-01-01

    RSA加密算法在进行复杂判断和大数运算时,计算时间往往花费较多,对计算机的运行速度、存储容量等方面具有较高的要求.MPI能够提供较快的数值计算和数据处理能力,提供高性能并行计算.该文通过在RSA加密算法中MPI的应用,通过实践证明MPI并行计算可以改进RSA算法,提高加密速度、减少容量需求等.%RSA encryption algorithm in the complex judgment and operation of large Nbers, calculating the time tend to spend more, the computer run faster, have higher requirements in terms of storage capacity. MPI provides fast Nerical calculation and data processing capability, providing high performance parallel computing. Based on RSA encryption algorithm in application of MPI, MPI parallel computing can improve the RSA algorithm proved by practice, increase speed, reduce capacity requirements, and so on.

  4. Introducing random safety audits (RSA) in a neonatal intensive care unit (NICU).

    LENUS (Irish Health Repository)

    Szymanska, M

    2012-01-31

    Random safety audits (RSA) have been shown to be effective in improving standards of clinical practice. 19 data collection audits were performed relating to hygiene, safe prescribing, oxygen pulse oximetry monitoring and documentation in keeping with the requirements of the new Medical Practitioners Act (MPA) 2007. Hygiene audits (range from 20\\/25 to 21\\/21 80%-100%) and safe prescribing audits (range from 23\\/25 to 25\\/25 86%-100%) achieved n=25 100% compliance with unit guidelines over a 3 month period. Compliance with oxygen pulse oximetry monitoring guideline limits improved from 4\\/27 (15%) to 9\\/16 (56%). Compliance with requirement and use of Physician IMC registration number in documentation was only 10\\/18 (56%). RSA\\'s led to improvements in hygiene and prescribing. Compliance with oxygen monitoring guideline limits highlighted the need for greater education. Awareness of legal requirements relating to documentation improved but this has not translated into a change in practice. RSA\\'s can facilitate real time quality improvement in daily clinical practice.

  5. Efficient and Fair Exchange of Digital Signatures Based on RSA Algorithm

    Directory of Open Access Journals (Sweden)

    V Swapna kumari

    2012-03-01

    Full Text Available A fair contract-signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures to an agreed contract over the Internet in a fair way, so that either each of them obtains the other’s signature, or neither party does. Based on the RSA signature scheme, a new digital contract-signing protocol is proposed in this paper. Like the existing RSA-based solutions for the same problem, our protocol is not only fair, but also optimistic, since the trusted third party is involved only in the situations where one party is cheating or the communication channel is interrupted. Furthermore, the proposed protocol satisfies a new property— abuse-freeness. That is, if the protocol is executed unsuccessfully, none of the two parties can show the validity of intermediate results to others. Technical details are provided to analyze the security and performance of the proposed protocol. In summary, we present the first abuse-free fair contract signing protocol based on the RSA signature, and show that it is both secure and efficient

  6. Aspects of ultra-high-precision diamond machining of RSA 443 optical aluminium

    Science.gov (United States)

    Mkoko, Z.; Abou-El-Hossein, K.

    2015-08-01

    Optical aluminium alloys such as 6061-T6 are traditionally used in ultra-high precision manufacturing for making optical mirrors for aerospace and other applications. However, the optics industry has recently witnessed the development of more advanced optical aluminium grades that are capable of addressing some of the issues encountered when turning with single-point natural monocrystalline diamond cutters. The advent of rapidly solidified aluminium (RSA) grades has generally opened up new possibilities for ultra-high precision manufacturing of optical components. In this study, experiments were conducted with single-point diamond cutters on rapidly solidified aluminium RSA 443 material. The objective of this study is to observe the effects of depth of cut and feed rate at a fixed rotational speed on the tool wear rate and resulting surface roughness of diamond turned specimens. This is done to gain further understanding of the rate of wear on the diamond cutters versus the surface texture generated on the RSA 443 material. The diamond machining experiments yielded machined surfaces which are less reflective but with consistent surface roughness values. Cutting tools were observed for wear through scanning microscopy; relatively low wear pattern was evident on the diamond tool edge. The highest tool wear were obtained at higher depth of cut and increased feed rate.

  7. Does respiratory sinus arrhythmia (RSA) predict anxiety reduction during cognitive behavioral therapy (CBT) for social anxiety disorder (SAD)?

    Science.gov (United States)

    Mathewson, Karen J; Schmidt, Louis A; Miskovic, Vladimir; Santesso, Diane L; Duku, Eric; McCabe, Randi E; Antony, Martin M; Moscovitch, David A

    2013-05-01

    Modifying dysfunctional emotion regulation is an important goal in psychological treatments for social anxiety disorder (SAD). Antecedent-focused strategies learned in cognitive behavioral therapy (CBT), such as cognitive reappraisal, have proven more effective in reducing social anxiety than response-focused strategies, such as expressive suppression. Still, not all patients with SAD respond well to CBT. Medications and physiological factors may also influence the clinical response. The purpose of the present study was to examine the role that these factors play in determining treatment response following CBT for SAD. Using multilevel modeling, we examined associations across four separate laboratory visits between change in self-reported anxiety and indices of reappraisal, suppression, medication status, and resting respiratory sinus arrhythmia (RSA), a proxy measure of self-regulatory capacity, in 23 socially anxious adults during a 12-week program of CBT. Most participants were ultimately classified as responders to CBT (n=15), but in some, anxiety levels remained unchanged (n=8). Medication use explained substantial variance related to individual differences in anxiety among participants. When modeled separately, reappraisal, suppression, and RSA each accounted for significant variance related to anxiety. However, the best-fitting model included reappraisal and RSA. Moreover, RSA reactivity (change in RSA levels over time) was more important for predicting anxiety reduction than were baseline levels of RSA. These findings suggest that reappraisal and parasympathetic responsiveness may be important in reducing anxiety in adults with SAD who respond well to CBT. PMID:23545482

  8. BatchJobs and BatchExperiments: Abstraction Mechanisms for Using R in Batch Environments

    Directory of Open Access Journals (Sweden)

    Bernd Bischl

    2015-03-01

    Full Text Available Empirical analysis of statistical algorithms often demands time-consuming experiments. We present two R packages which greatly simplify working in batch computing environments. The package BatchJobs implements the basic objects and procedures to control any batch cluster from within R. It is structured around cluster versions of the well-known higher order functions Map, Reduce and Filter from functional programming. Computations are performed asynchronously and all job states are persistently stored in a database, which can be queried at any point in time. The second package, BatchExperiments, is tailored for the still very general scenario of analyzing arbitrary algorithms on problem instances. It extends package BatchJobs by letting the user define an array of jobs of the kind apply algorithm A to problem instance P and store results. It is possible to associate statistical designs with parameters of problems and algorithms and therefore to systematically study their influence on the results. The packages main features are: (a Convenient usage: All relevant batch system operations are either handled internally or mapped to simple R functions. (b Portability: Both packages use a clear and well-defined interface to the batch system which makes them applicable in most high-performance computing environments. (c Reproducibility: Every computational part has an associated seed to ensure reproducibility even when the underlying batch system changes. (d Abstraction and good software design: The code layers for algorithms, experiment definitions and execution are cleanly separated and enable the writing of readable and maintainable code.

  9. Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator.

    Science.gov (United States)

    Kumar, Pramod; Joseph, Joby; Singh, Kehar

    2011-05-01

    Interference-based optical encryption schemes have an inherent silhouette problem due to the equipollent nature of the phase-only masks (POMs) generated using an analytical method. One of the earlier methods suggested that removing the problem by use of exchanging process between two masks increases the computational load. This shortcoming is overcome with a noniterative method using the jigsaw transformation (JT) in a single step, with improved security because the inverse JT of these masks, along with correct permutation keys that are necessary to decrypt the original image. The stringent alignment requirement of the POMs in two different arms during the experiment is removed with an alternative method using a single spatial light modulator. Experimental results are provided to demonstrate the decryption process with the proposed method.

  10. 一种高效的彩色图像加密和解密算法%Efficient Encryption and Decryption Algorithm for Color Image

    Institute of Scientific and Technical Information of China (English)

    彭静玉

    2013-01-01

    分析了基于Arnold变换的加密方案在加密效果及加密效率方面的不足。提出了一种新的彩色图像加密及解密算法。加密过程将像素的物理位置置乱并映射到不同的色彩空间;解密过程提出了一种针对彩色图像的逆变换算法,使解密的时间仅依赖加密的密钥而不依赖变换周期。仿真分析比较了该算法在加密效果及加密效率方面的优势。实验数据表明,该加密算法的加密效果理想,且加密效率较高,是一种简单、可行的彩色图像加密方法。%The deficiencies of encryption scheme based on Arnold transformation is analyzed, and a new encryption/decryption algorithm for color image proposed. The physical locations of pixels are scrambled and mapped to different color spaces in the encryption process. An inverse conversion method for color im-age is suggested in decryption process, thus making the decryption time dependent only on the encryption key instead of on the conversion cycle. Simulation and comparison of the advantages of proposed algorithm in encryption effect and encryption efficiency indicates that the proposed algorithm could improve encryp-tion effect while raising the decryption efficiency, and thus a simple and feasible color image encryption method.

  11. BatchJS: Implementing Batches in JavaScript

    NARCIS (Netherlands)

    Kasemier, D.

    2014-01-01

    None of our popular programming languages know how to handle distribution well. Yet our programs interact more and more with each other and our data resorts in databases and web services. Batches are a new addition to languages that can finally bring native support for distribution to our favourite

  12. Accuracy and Precision of Three-Dimensional Low Dose CT Compared to Standard RSA in Acetabular Cups: An Experimental Study

    Directory of Open Access Journals (Sweden)

    Cyrus Brodén

    2016-01-01

    Full Text Available Background and Purpose. The gold standard for detection of implant wear and migration is currently radiostereometry (RSA. The purpose of this study is to compare a three-dimensional computed tomography technique (3D CT to standard RSA as an alternative technique for measuring migration of acetabular cups in total hip arthroplasty. Materials and Methods. With tantalum beads, we marked one cemented and one uncemented cup and mounted these on a similarly marked pelvic model. A comparison was made between 3D CT and standard RSA for measuring migration. Twelve repeated stereoradiographs and CT scans with double examinations in each position and gradual migration of the implants were made. Precision and accuracy of the 3D CT were calculated. Results. The accuracy of the 3D CT ranged between 0.07 and 0.32 mm for translations and 0.21 and 0.82° for rotation. The precision ranged between 0.01 and 0.09 mm for translations and 0.06 and 0.29° for rotations, respectively. For standard RSA, the precision ranged between 0.04 and 0.09 mm for translations and 0.08 and 0.32° for rotations, respectively. There was no significant difference in precision between 3D CT and standard RSA. The effective radiation dose of the 3D CT method, comparable to RSA, was estimated to be 0.33 mSv. Interpretation. Low dose 3D CT is a comparable method to standard RSA in an experimental setting.

  13. Accuracy and Precision of Three-Dimensional Low Dose CT Compared to Standard RSA in Acetabular Cups: An Experimental Study

    Science.gov (United States)

    Olivecrona, Henrik; Maguire, Gerald Q.; Noz, Marilyn E.; Zeleznik, Michael P.

    2016-01-01

    Background and Purpose. The gold standard for detection of implant wear and migration is currently radiostereometry (RSA). The purpose of this study is to compare a three-dimensional computed tomography technique (3D CT) to standard RSA as an alternative technique for measuring migration of acetabular cups in total hip arthroplasty. Materials and Methods. With tantalum beads, we marked one cemented and one uncemented cup and mounted these on a similarly marked pelvic model. A comparison was made between 3D CT and standard RSA for measuring migration. Twelve repeated stereoradiographs and CT scans with double examinations in each position and gradual migration of the implants were made. Precision and accuracy of the 3D CT were calculated. Results. The accuracy of the 3D CT ranged between 0.07 and 0.32 mm for translations and 0.21 and 0.82° for rotation. The precision ranged between 0.01 and 0.09 mm for translations and 0.06 and 0.29° for rotations, respectively. For standard RSA, the precision ranged between 0.04 and 0.09 mm for translations and 0.08 and 0.32° for rotations, respectively. There was no significant difference in precision between 3D CT and standard RSA. The effective radiation dose of the 3D CT method, comparable to RSA, was estimated to be 0.33 mSv. Interpretation. Low dose 3D CT is a comparable method to standard RSA in an experimental setting. PMID:27478832

  14. Accuracy and Precision of Three-Dimensional Low Dose CT Compared to Standard RSA in Acetabular Cups: An Experimental Study.

    Science.gov (United States)

    Brodén, Cyrus; Olivecrona, Henrik; Maguire, Gerald Q; Noz, Marilyn E; Zeleznik, Michael P; Sköldenberg, Olof

    2016-01-01

    Background and Purpose. The gold standard for detection of implant wear and migration is currently radiostereometry (RSA). The purpose of this study is to compare a three-dimensional computed tomography technique (3D CT) to standard RSA as an alternative technique for measuring migration of acetabular cups in total hip arthroplasty. Materials and Methods. With tantalum beads, we marked one cemented and one uncemented cup and mounted these on a similarly marked pelvic model. A comparison was made between 3D CT and standard RSA for measuring migration. Twelve repeated stereoradiographs and CT scans with double examinations in each position and gradual migration of the implants were made. Precision and accuracy of the 3D CT were calculated. Results. The accuracy of the 3D CT ranged between 0.07 and 0.32 mm for translations and 0.21 and 0.82° for rotation. The precision ranged between 0.01 and 0.09 mm for translations and 0.06 and 0.29° for rotations, respectively. For standard RSA, the precision ranged between 0.04 and 0.09 mm for translations and 0.08 and 0.32° for rotations, respectively. There was no significant difference in precision between 3D CT and standard RSA. The effective radiation dose of the 3D CT method, comparable to RSA, was estimated to be 0.33 mSv. Interpretation. Low dose 3D CT is a comparable method to standard RSA in an experimental setting. PMID:27478832

  15. Бінарні операції та елементи алгоритму RSA при шифруванні-дешифруванні кольорових зображень

    OpenAIRE

    Ковальчук, А.; Пелешко, Д.; Борзов, Ю.

    2013-01-01

    Описано поєднання елементів алгоритму RSA і бінарних операцій для сумісного використання при шифруванні–дешифруванні зображень. Шифрування–дешифрування проводиться без додаткового зашумлення. Described combination of elements of the RSA algorithm and binary operations for the joint use for encryption–interpretation of images. Encryption–decryption is performed without additional noise....

  16. Кубічні і лінійні фрактали з елементами алгоритму RSA в шифруванні і дешифруванні зображень

    OpenAIRE

    Ковальчук, А.; Цмоць, І.; Ступень, М.

    2014-01-01

    Запропоновано застосування кубічних фрактальних перетворень до шифрування і дешифрування зображень у градаціях сірого кольору з використанням елементів алгоритму RSA. Proposed application of cubic fractal changes to the encryption and decryption, grayscale color using elements of the RSA algorithm.

  17. Implementation of One Encryption and Decryption Software Based on C Language%基于C语言的加密解密软件的实现

    Institute of Scientific and Technical Information of China (English)

    彭秀萍

    2011-01-01

    介绍了信息加密技术中的置换法及其加密解密思想.采用置换法对文本文件中的字符信息进行加密,给出了一个完整的加密和解密软件制作的程序设计方法和详细步骤,并用C语言进行了具体实现.该软件在信息的传输和存储上具有较高的安全性,能有效防止信息被破解.%Thoughts on replacement algorithm as well as encryption and decryption of information encryption technology were introduced.Replacement algorithm was adopted to encrypt the characters in text files,whose a method of formula design for the comprehensive making process of an encryption and decryption software was given.C language was used to implement it.The findings show that this software has high safety in aspects of information transmit and sotre,which can prevent the information from being decrypted.

  18. Physicochemical Characteristics of Transferon™ Batches

    Directory of Open Access Journals (Sweden)

    Emilio Medina-Rivero

    2016-01-01

    Full Text Available Transferon, a biotherapeutic agent that has been used for the past 2 decades for diseases with an inflammatory component, has been approved by regulatory authorities in Mexico (COFEPRIS for the treatment of patients with herpes infection. The active pharmaceutical ingredient (API of Transferon is based on polydispersion of peptides that have been extracted from lysed human leukocytes by a dialysis process and a subsequent ultrafiltration step to select molecules below 10 kDa. To physicochemically characterize the drug product, we developed chromatographic methods and an SDS-PAGE approach to analyze the composition and the overall variability of Transferon. Reversed-phase chromatographic profiles of peptide populations demonstrated batch-to-batch consistency from 10 representative batches that harbored 4 primary peaks with a relative standard deviation (RSD of less than 7%. Aminogram profiles exhibited 17 proteinogenic amino acids and showed that glycine was the most abundant amino acid, with a relative content of approximately 18%. Further, based on their electrophoretic migration, the peptide populations exhibited a molecular mass of about 10 kDa. Finally, we determined the Transferon fingerprint using a mass spectrometry tool. Because each batch was produced from independent pooled buffy coat samples from healthy donors, supplied by a local blood bank, our results support the consistency of the production of Transferon and reveal its peptide identity with regard to its physicochemical attributes.

  19. Physicochemical Characteristics of Transferon™ Batches

    Science.gov (United States)

    Pérez-Sánchez, Gilberto; Favari, Liliana; Estrada-Parra, Sergio

    2016-01-01

    Transferon, a biotherapeutic agent that has been used for the past 2 decades for diseases with an inflammatory component, has been approved by regulatory authorities in Mexico (COFEPRIS) for the treatment of patients with herpes infection. The active pharmaceutical ingredient (API) of Transferon is based on polydispersion of peptides that have been extracted from lysed human leukocytes by a dialysis process and a subsequent ultrafiltration step to select molecules below 10 kDa. To physicochemically characterize the drug product, we developed chromatographic methods and an SDS-PAGE approach to analyze the composition and the overall variability of Transferon. Reversed-phase chromatographic profiles of peptide populations demonstrated batch-to-batch consistency from 10 representative batches that harbored 4 primary peaks with a relative standard deviation (RSD) of less than 7%. Aminogram profiles exhibited 17 proteinogenic amino acids and showed that glycine was the most abundant amino acid, with a relative content of approximately 18%. Further, based on their electrophoretic migration, the peptide populations exhibited a molecular mass of about 10 kDa. Finally, we determined the Transferon fingerprint using a mass spectrometry tool. Because each batch was produced from independent pooled buffy coat samples from healthy donors, supplied by a local blood bank, our results support the consistency of the production of Transferon and reveal its peptide identity with regard to its physicochemical attributes. PMID:27525277

  20. NDA BATCH 2002-02

    Energy Technology Data Exchange (ETDEWEB)

    Lawrence Livermore National Laboratory

    2009-12-09

    QC sample results (daily background checks, 20-gram and 100-gram SGS drum checks) were within acceptable criteria established by WIPP's Quality Assurance Objectives for TRU Waste Characterization. Replicate runs were performed on 5 drums with IDs LL85101099TRU, LL85801147TRU, LL85801109TRU, LL85300999TRU and LL85500979TRU. All replicate measurement results are identical at the 95% confidence level as established by WIPP criteria. Note that the batch covered 5 weeks of SGS measurements from 23-Jan-2002 through 22-Feb-2002. Data packet for SGS Batch 2002-02 generated using gamma spectroscopy with the Pu Facility SGS unit is technically reasonable. All QC samples are in compliance with established control limits. The batch data packet has been reviewed for correctness, completeness, consistency and compliance with WIPP's Quality Assurance Objectives and determined to be acceptable. An Expert Review was performed on the data packet between 28-Feb-02 and 09-Jul-02 to check for potential U-235, Np-237 and Am-241 interferences and address drum cases where specific scan segments showed Se gamma ray transmissions for the 136-keV gamma to be below 0.1 %. Two drums in the batch showed Pu-238 at a relative mass ratio more than 2% of all the Pu isotopes.

  1. Simulated Batch Production of Penicillin

    Science.gov (United States)

    Whitaker, A.; Walker, J. D.

    1973-01-01

    Describes a program in applied biology in which the simulation of the production of penicillin in a batch fermentor is used as a teaching technique to give students experience before handling a genuine industrial fermentation process. Details are given for the calculation of minimum production cost. (JR)

  2. Batching System for Superior Service

    Science.gov (United States)

    2001-01-01

    Veridian's Portable Batch System (PBS) was the recipient of the 1997 NASA Space Act Award for outstanding software. A batch system is a set of processes for managing queues and jobs. Without a batch system, it is difficult to manage the workload of a computer system. By bundling the enterprise's computing resources, the PBS technology offers users a single coherent interface, resulting in efficient management of the batch services. Users choose which information to package into "containers" for system-wide use. PBS also provides detailed system usage data, a procedure not easily executed without this software. PBS operates on networked, multi-platform UNIX environments. Veridian's new version, PBS Pro,TM has additional features and enhancements, including support for additional operating systems. Veridian distributes the original version of PBS as Open Source software via the PBS website. Customers can register and download the software at no cost. PBS Pro is also available via the web and offers additional features such as increased stability, reliability, and fault tolerance.A company using PBS can expect a significant increase in the effective management of its computing resources. Tangible benefits include increased utilization of costly resources and enhanced understanding of computational requirements and user needs.

  3. 基于Common Lisp的RSA加密实现%RSA Encryption Based on Common Lisp Implementation

    Institute of Scientific and Technical Information of China (English)

    解晨

    2013-01-01

    著名的非对称密钥加密系统——RSA公钥加密系统,是当今流行的加密系统,其简单的实现和高效的保密性使RSA加密算法成为当下最有影响力的公钥加密算法,并且其堪称完美的理论基础使得RSA加密算法可以抵抗目前所知的所有密码攻击.该文探究了RSA加密算法的原理,并使用一门小众语言Common Lisp对RSA加密进行了实现.%Asymmetric key encryption system -- the famous RSA public key encryption system, the encryption system is popu?lar, its simple implementation and high security RSA encryption algorithm to become the most influential contemporary public-key encryption algorithm, and it is theoretical basis of perfect makes the RSA encryption algorithm can resist all known attacks. This paper discusses the principle of RSA encryption algorithm, and realizes the encryption of RSA using a minority language Common Lisp.

  4. FPGA IMPLEMENTATION OF RSA PUBLIC-KEY CRYPTOGRAPHIC COPROCESSOR BASED ON SYSTOLIC LINEAR ARRAY ARCHITECTURE

    Institute of Scientific and Technical Information of China (English)

    Wen Nuan; Dai Zibin; Zhang Yongfu

    2006-01-01

    In order to make the typical Montgomery's algorithm suitable for implementation on FPGA, a modified version is proposed and then a high-performance systolic linear array architecture is designed for RSA cryptosystem on the basis of the optimized algorithm. The proposed systolic array architecture has distinctive features, i.e. not only the computation speed is significantly fast but also the hardware overhead is drastically decreased. As a major practical result, the paper shows that it is possible to implement public-key cryptosystem at secure bit lengths on a single commercially available FPGA.

  5. Fibrinogen adsorption mechanisms at the gold substrate revealed by QCM-D measurements and RSA modeling.

    Science.gov (United States)

    Kubiak, Katarzyna; Adamczyk, Zbigniew; Cieśla, Michał

    2016-03-01

    Adsorption kinetics of fibrinogen at a gold substrate at various pHs was thoroughly studied using the QCM-D method. The experimental were interpreted in terms of theoretical calculations performed according to the random sequential adsorption model (RSA). In this way, the hydration functions and water factors of fibrinogen monolayers were quantitatively evaluated at various pHs. It was revealed that for the lower range of fibrinogen coverage the hydration function were considerably lower than previously obtained for the silica sensor [33]. The lower hydration of fibrinogen monolayers on the gold sensor was attributed to its higher roughness. However, for higher fibrinogen coverage the hydration functions for both sensors became identical exhibiting an universal behavior. By using the hydration functions, the fibrinogen adsorption/desorption runs derived from QCM-D measurements were converted to the Γd vs. the time relationships. This allowed to precisely determine the maximum coverage that varied between 1.6mgm(-2) at pH 3.5 and 4.5mgm(-2) at pH 7.4 (for ionic strength of 0.15M). These results agree with theoretical eRSA modeling and previous experimental data derived by using ellipsometry, OWLS and TIRF. Various fibrinogen adsorption mechanisms were revealed by exploiting the maximum coverage data. These results allow one to develop a method for preparing fibrinogen monolayers of well-controlled coverage and molecule orientation.

  6. NDA Batch 2002-13

    Energy Technology Data Exchange (ETDEWEB)

    Hollister, R

    2009-09-17

    QC sample results (daily background check drum and 100-gram SGS check drum) were within acceptance criteria established by WIPP's Quality Assurance Objectives for TRU Waste Characterization. Replicate runs were performed on drum LL85501243TRU. Replicate measurement results are identical at the 95% confidence level as established by WIPP criteria. HWM NCAR No. 02-1000168 issued on 17-Oct-2002 regarding a partially dislodged Cd sheet filter on the HPGe coaxial detector. This physical geometry occurred on 01-Oct-2002 and was not corrected until 10-Oct-2002, during which period is inclusive of the present batch run of drums. Per discussions among the Independent Technical Reviewer, Expert Reviewer and the Technical QA Supervisor, as well as in consultation with John Fleissner, Technical Point of Contact from Canberra, the analytical results are technically reliable. All QC standard runs during this period were in control. Data packet for SGS Batch 2002-13 generated using passive gamma-ray spectroscopy with the Pu Facility SGS unit is technically reasonable. All QC samples are in compliance with establiShed control limits. The batch data packet has been reviewed for correctness, completeness, consistency and compliance with WIPP's Quality Assurance Objectives and determined to be acceptable.

  7. Batch-oriented software appliances

    CERN Document Server

    Murri, Riccardo

    2012-01-01

    This paper presents AppPot, a system for creating Linux software appliances. AppPot can be run as a regular batch or grid job and executed in user space, and requires no special virtualization support in the infrastructure. The main design goal of AppPot is to bring the benefits of a virtualization-based IaaS cloud to existing batch-oriented computing infrastructures. In particular, AppPot addresses the application deployment and configuration on large heterogeneous computing infrastructures: users are enabled to prepare their own customized virtual appliance for providing a safe execution environment for their applications. These appliances can then be executed on virtually any computing infrastructure being in a private or public cloud as well as any batch-controlled computing clusters the user may have access to. We give an overview of AppPot and its features, the technology that makes it possible, and report on experiences running it in production use within the Swiss National Grid infrastructure SMSCG.

  8. Revisión sobre la capacidad de repetir sprint o RSA en jugadores de fútbol

    OpenAIRE

    Saenz Tomás, Juan

    2014-01-01

    En los últimos años, la capacidad para repetir esprines (RSA), se ha considerado como un factor limitante del rendimiento en el contexto deportivo del fútbol. En este sentido, esta revisión analiza los aspectos importantes que condicionan el rendimiento de la RSA, tales como los aspectos fisiológicos, los diferentes métodos de entrenamiento que se utilizan así como los test más utilizados para su evaluación. Por ello, el objetivo principal de esta revisión es dar a conocer los métodos y recom...

  9. Three Year RSA Evaluation of Vitamin E Diffused Highly Cross-linked Polyethylene Liners and Cup Stability

    DEFF Research Database (Denmark)

    Sillesen, Nanna H; Greene, Meridith E; Nebergall, Audrey K;

    2015-01-01

    Vitamin E diffusion into highly cross-linked polyethylene (E-XLPE) is a method for enhancing oxidative stability of acetabular liners. The purpose of this study was to evaluate in vivo penetration of E-XLPE using radiostereometric analysis (RSA). Eighty-four hips were recruited into a prospective...... 10-year RSA. This is the first evaluation of the multicenter cohort after 3-years. All patients received E-XLPE liners (E1, Biomet) and porous-titanium coated cups (Regenerex, Biomet). There was no difference (P=0.450) in median femoral head penetration into the E-XLPE liners at 3-years comparing...

  10. 间歇结晶过程的分批优化%Batch-to-batch Optimization of Batch Crystallization Processes

    Institute of Scientific and Technical Information of China (English)

    Woranee Paengjuntuek; Paisan Kittisupakorn; Amornchai Arpornwichanop

    2008-01-01

    It is the fact that several process parameters are either unknown or uncertain. Therefore, an optimal control profile calculated with developed process models with respect to such process parameters may not give an optimal performance when implemented to real processes. This study proposes a batch-to-batch optimization strat-egy for the estimation of uncertain kinetic parameters in a batch crystallization process of potassium sulfate produc-tion. The knowledge of a crystal size distribution of the product at the end of batch operation is used in the proposedmethodology. The updated kinetic parameters are applied for determining an optimal operating temperature policy for the next batch run.

  11. 抗侧沟道泄漏信息攻击的安全RSA-CRT算法研究%Improved RSA-CRT algorithm with prevented side channel information attacks

    Institute of Scientific and Technical Information of China (English)

    蒋惠萍; 毛志刚

    2004-01-01

    在信息安全领域中侧沟道泄漏信息(SCI)攻击可以利用加密算法的特点和硬件模块的泄漏信息分析出加密硬件中的关键信息.其中故障分析(Bellcore-Lenstra)和差分功耗分析(differential power analysis,DPA)是该类攻击中的主要方法.由于该类攻击的廉价高效性,在设计采用中国余数定理的安全的并行RSA加密协处理器(RSA-CRT)时必须认真考虑SCI攻击的解决方法.为了获得性价比的最大化,提出把掩码技术和消除中间变量技术引入RSA-CRT算法中来防止SCI攻击,该方案只需增加30%左右的时间消耗,就可以实现安全的RSA-CRT算法,同时简要说明了改进的RSA-CRT算法能够有效的防止side channel information攻击.

  12. Application of input amplitude masks in image encryption with spatially incoherent illumination for increase of decrypted images signal-to-noise ratio

    Science.gov (United States)

    Cheremkhin, Pavel A.; Evtikhiev, Nikolay N.; Krasnov, Vitaly V.; Molodtsov, Dmitriy Y.; Rodin, Vladislav G.; Shifrina, Anna V.

    2016-04-01

    The majority of existing methods of optical encryption use not only light intensity distribution, easily registered with photosensors, but also its phase distribution. This provides best encryption strength for fixed quantities of elements and phase levels in a mask. Downsides are holographic registration scheme used in order to register not only light intensity distribution but also its phase distribution and speckle noise occurring due to coherent illumination. That factors lead to very poor decryption quality when it comes from computer simulations to optical implementations. Method of optical encryption with spatially incoherent illumination does not have drawbacks inherent to coherent systems, however, as only light intensity distribution is considered, mean value of image to be encrypted is always above zero which leads to intensive zero spatial frequency peak in image spectrum. Therefore, in case of spatially incoherent illumination, image spectrum, as well as encryption key spectrum, cannot be white. If encryption is based on convolution operation, no matter coherent light used or not, Fourier spectrum amplitude distribution of encryption key should overlap Fourier spectrum amplitude distribution of image to be encrypted otherwise loss of information is unavoidable. Another factor affecting decrypted image quality is original image spectrum. Usually, most part of image energy is concentrated in area of low frequencies. Consequently, only this area in encrypted image contains information about original image, while other areas contain only noise. We propose to use additional encoding of input scene to increase size of the area containing useful information. This provides increase of signal-to-noise ratio in encrypted image and consequentially increases quality of decrypted images. Results of computer simulations of test images optical encryption with spatially incoherent illumination and additional input amplitude masks are presented.

  13. Algebra Structure of RSA Arithmetic%RSA算法中的代数结构

    Institute of Scientific and Technical Information of China (English)

    司光东; 杨加喜; 谭示崇; 肖国镇

    2011-01-01

    本文首次应用二次剩余理论对RSA中的代数结构进行了研究.计算出了Zn中模n的二次剩余和二次非剩余的个数,对它们之间的关系进行了分析,并用所有二次剩余构成的群对Zn进行了分割,证明了所有陪集构成的商群是一个Klein四元群.对强RSA的结构进行了研究,证明了强RSA中存在阶为φ(n)/2的元素,并且强RSA中Zn可由三个二次非剩余的元素生成.确定了Zn中任意元素的阶,证明了Zn中所有元素阶的最大值是lcm(p-1,q-1),并且给出了如何寻找Zn中最大阶元素方法.从而解决了RSA中的代数结构.%Based on the theory of quadratic residues, the algebra structure of RSA arithmetic is researched in this paper. This work calculates numbers of quadratic residues and non-residues in the group Zn* and investigates their relationship. Z*n is divided up by the group made up with all quadratic residues in Z*n and all cosets form a quotient group of order 4 which is a Klein group.Studyed the structure of strong RSA further,it shows that the element of order φ( n)/2 exists and the group Z*n can be generated by three elements of quadratic non-residues. Let the facterization n = p · q, the order of each element can be calculated, and the biggest order of all element is lcn ( p - 1, q - 1 ) in Z*n. It also shows how to find the element of the biggest order. So the algebra structure of RSA arithmetic is solved.

  14. Combinatorial Batch Codes with Redundancy

    OpenAIRE

    Jung, Jiyoon; Mummert, Carl; Niese, Elizabeth; Schroeder, Michael w.

    2015-01-01

    A combinatorial batch code with redundancy $r$ and parameters $(n,k,m,t)$ can be represented as a system $C$ of $m$ (not necessarily distinct) subsets of an underlying $n$-element set $F$, so that each $k$-subset of $F$ can be covered by every $(m-r)$-subset $K$ of $C$ while taking no more than $t$ elements of $F$ with each set in $K$. The sum of the cardinalities of the sets in $C$ is the weight of the code. We focus on the case $t =1$, and determine the minimal weight for several ranges of ...

  15. Precision of radiostereometric analysis (RSA) of acetabular cup stability and polyethylene wear improved by adding tantalum beads to the liner

    DEFF Research Database (Denmark)

    Nebergall, Audrey K; Rader, Kevin; Palm, Henrik;

    2015-01-01

    Background and purpose - In traditional radiostereometric analysis (RSA), 1 segment defines both the acetabular shell and the polyethylene liner. However, inserting beads into the polyethylene liner permits employment of the shell and liner as 2 separate segments, enabling distinct analysis of th...

  16. Association between estrogen receptor β gene Rsa1 polymorphism and depressive disorder in peri-menopausal and menopausal women

    Institute of Scientific and Technical Information of China (English)

    YU Xue-wen; REN Yong-hui; LI Xue-cheng; GAO Cheng-ge; LI Fen; HAN Zhen; LI Xu

    2005-01-01

    Objective: To investigate estrogen receptor β (ERβ) gene Rsa1 polymorphism and concentration of estrogen, FSH and LH in serum in peri-menopausal and menopausal women with depressive disorder. Methods: Seventy-four peri-menopausal and menopausal women with depressive disorder met ICD-10 and CCMD-3 assessment criteria for depressive disorder were recruited. ERβ gene Rsa1 polymorphism was analyzed with PCR-RFLP. Serum levels of estrogen, FSH and LH were measured by magnetism-ELISA. Results: The respective frequency of ERβ gene Rsa1 polymorphism was no significant difference between women with depressive disorder and the healthy women (χ2=1.106,P>0.05). The serum level of estrogen was lower in women with depressive disorder than in the healthy women (P<0.05). No difference was found for FSH and LH between two groups. Conclusion: ERβ gene Rsa1 polymorphism may be not associated with depressive disorder in the peri-menopausal and menopausal women. The serum level of estrogen is associated with depressive disorder in the peri-menopausal and menopausal women.

  17. Foundational issues surrounding professional training of speech and theatre experts at universities in the RSA

    Directory of Open Access Journals (Sweden)

    Elize Scheepers

    1981-03-01

    Full Text Available When in the course of the thirties in the English and in the sixties in the Afrikaans theatre in the RSA “an urgent need” developed, the university lecturers, to my mind, blindly assumed that there was a demand for well-trained “performing theatre artists” without investigating or researching the matter properly, and they established “drama" departments at their universities “to train actors for the profession". By choosing to follow the objectives of the independent drama schools of the English, “but at a university”, they abused the nature and the function of the university and so ultimately landed in a cul-de-sac.

  18. Interdependence relationships between morphometric indicators in the Bârsa Country (Romania

    Directory of Open Access Journals (Sweden)

    GEORGIAN IONUT PURCÃREATÃ

    2015-07-01

    Full Text Available In a geomorphological analysis on a geographical space, the study of the interdependence between the morphometric indicators can offer us new details concerning the characteristics and causal relationships between the considered parameters. The methodology taken from the literature was adapted to the geographical space of Bârsa. The research area includes a pilot area for which the boundaries are defined by inter fluves bordering the large confluence area of the Olt river in the Brașov Depression. The arrangement of the relief gives the research area obvious asymmetric features, which are completed in this study by the mathematical analysis and graphics. The conclu sion derived from the correlated mathematical analysis between the relief energy and the drainage density is that the relief energy is in a closely dependent relationship with the drainage density, the correlation being positively linear and directly prop ortional, fact prooved by the resulted graphical models.

  19. Fair Exchange of Digital Signatures using RSA-based CEMBS and Offline STTP

    CERN Document Server

    Hussein, Jamal A

    2009-01-01

    One of the essential security services needed to safeguard online transactions is fair exchange. In fair exchange protocols two parties can exchange their signatures in a fair manner, so that either each party gain the other's signature or no one obtain anything useful. This paper examines security solutions for achieving fair exchange. It proposes new security protocols based on the "Certified Encrypted Message Being Signature" (CEMBS) by using RSA signature scheme. This protocol relies on the help of an "off-line Semi-Trusted Third Party" (STTP) to achieve fairness. They provide with confidential protection from the STTP for the exchanged items by limiting the role and power of the STTP. Three different protocols have been proposed. In the first protocol, the two main parties exchange their signatures on a common message. In the second protocol, the signatures are exchanged on two different messages. While in the third one, the exchange is between confidential data and signature.

  20. Improvisation of Security aspect of Steganographic System by applying RSA Algorithm

    Directory of Open Access Journals (Sweden)

    Manoj Kumar Ramaiya

    2016-07-01

    Full Text Available The applications accessing multimedia systems and content over the internet have grown extremely in the earlier few years. Moreover, several end users or intruders can simply use tools to synthesize and modify valuable information. The safety of information over unsafe communication channel has constantly been a primary concern in the consideration of researchers. It became one of the most important problems for information technology and essential to safeguard this valuable information during transmission. It is also important to determine where and how such a multimedia file is confidential. Thus, a need exists for emerging technology that helps to defend the integrity of information and protected the intellectual property privileges of owners. Various approaches are coming up to safeguard the data from unauthorized person. Steganography and Cryptography are two different techniques for security data over communication network. The primary purpose of Cryptography is to create message concept unintelligible or ciphertext might produce suspicious in the mind of opponents. On the other hand, Steganography implant secrete message in to a cover media and hides its existence. As a normal practice, data embedding is employed in communication, image, text or multimedia contents for the purpose of copyright, authentication and digital signature etc. Both techniques provides the sufficient degree of security but are vulnerable to intruder’s attacks when used over unsecure communication channel. Attempt to combines the two techniques i.e. Cryptography and Steganography, did results in security improvement. The existing steganographic algorithms primarily focus on embedding approach with less attention to pre-processing of data which offer flexibility, robustness and high security level. Our proposed model is based on Public key cryptosystem or RSA algorithms in which RSA algorithm is used for message encryption in encoding function and the resultant

  1. Застосування алгоритму RSA у шифруванні і дешифруванні елементів локально-скінченного топологічного покриття зображення як компакту

    OpenAIRE

    Ковальчук, А.; Кузнєцов, Є.; Артимич, Ю.

    2010-01-01

    An application of RSA algorithm encryption and decryption of locally finite topological elements cover image that is clearly marked internal contours. Запропоновано застосування алгоритму RSA шифрування і дешифрування елементів локально скінченного топологічного покриття зображення, яке має чітко виділені внутрішні контури.

  2. 一种基于 me mo ry 的数据加解密算法%An Encryption and Decryption Algorithm of Data Based on Memory

    Institute of Scientific and Technical Information of China (English)

    张金旻; 谢小东

    2015-01-01

    Most memory researches only focus on improving the performance ,which is to enlarge the capacityand and to increase the speed .However ,aided designs to realize more functions have been rarely achieved in present memory studies .So an algorithm to encrypt and decrypt the address of memory is given out in this paper ,and the encryption and decryption of the data is realized ,which is based on the characteristics of memory ,and the feasibility of this algorithm with simulation is validates .%对于memory的研究,大部分都只是停留在对容量的扩充,速度的提高等性能提升方面,很少涉及对mem‐ory进行辅助设计以实现更多的特殊功能。提出了一种通过对memory地址作用加解密算法,利用memory自身的特性来实现对数据的加解密的功能,并通过实验仿真验证了该方法的可行性。

  3. Batch process design: an overview from control

    OpenAIRE

    Zuluaga Bedoya, Christian Camilo

    2015-01-01

    Abstract: batch process design: an overview from control In this work, the topic of batch process design is addressed, through an analysis of the phenomenological-based model and using set-theoretic methods to deduce process constraints and parametric effects in state controllability. A review of literature is presented about characterization of batch process from point of view of design problem. Furthermore simultaneous process and control design is also reviewed, considering the main contri...

  4. Бінарні лінійно-квадратичні перетворення з елементами алгоритму RSA і додатковим зашумленням у захисті зображень

    OpenAIRE

    Ковальчук, А.; Ступень, М.

    2015-01-01

    Запропоновано алгоритм шифрування-дешифрування зображень з використанням елементів алгоритму RSA як найбільш криптографічно стійкого до несанкціонованого дешифрування, стосовно зображень зі строго чіткими контурами. Елементи алгоритму RSA пропонується використовувати як коефіцієнти деякого лінійно-квадратичного афінного перетворення. Запропонований алгоритм має вищу криптографічну стійкість порівняно з алгоритмом RSA. Suggested algorithm encryption-decryption images with using elements RSA al...

  5. 对RSA密码系统旁路攻击的防御%Resistance against side channel attack for RSA cryptosystem

    Institute of Scientific and Technical Information of China (English)

    祝力; 谷大武; 王超

    2008-01-01

    Based on the structure of the side channel attacks (SCAs) to RSA cryptosystem can resist the fault attack andcombine with the randomization method for the message and secret exponent, a new implementation scheme of CRT-based(the Chinese remained theorem) RSA is proposed. The proposed scheme can prevent simple power analysis (SPA), differentialpower analysis (DPA) and time attack, and is compatible with the existing RSA-CRT cryptosystem as well. In addition, animprovement for resisting fault attack is proposed, which can reduce extra computation time.

  6. Realization and Discussion of RSA Public-key Cryptosystem Based on Java%基于Java的RSA公钥密码算法的实现与探讨

    Institute of Scientific and Technical Information of China (English)

    曹军委; 李翼

    2011-01-01

    Because of Java language on the network security characteristics and superiority of RSA encryption algorithm,This article mainly introduced the concept of public-key cryptosystem and the principle of RSA encryption algorithm,And realize the RSA public-key%鉴于Java语言在网络上的安全特性和RSA加密算法的优越性,介绍了公钥密码体制的概念和RSA加密算法的原理,并在Java环境下实现RSA公钥密码算法。

  7. Operation of a Batch Stripping Distillation Column

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A stripping batch distillation column is preferred when the amount of the light component in the feed is small and the products are to be recovered at high purity. The operation modes of a batch stripping are believed to be the same as those of a rectifier. However, the control system of a stripper is different. In this paper, we explore three different control methods with Hysys (Hyprotech Ltd. 1997) for a batch stripper. The main difference is the control scheme for reboiler liquid level: (a) controlled by reflux flow; (b) controlled by reboiler heat duty; (c) controlled by bottom product flow. The main characteristics of operating a batch stripper with different control scheme are presented in this paper. Guidelines are provided for the startup of a batch stripper, the effects of somecontrol tuning parameters on the column performance are discussed.

  8. Parallels in portraits of leadership in mega churches of Gauteng (RSA) and Florida (USA) / Tsietsi John Maloma

    OpenAIRE

    Maloma, Tsietsi John

    2011-01-01

    This thesis, Parallels in portraits of leadership in mega churches of Gauteng (RSA) and Florida (USA), the researcher, studied literature on church leadership with special reference to the leadership of mega churches. He researched issues relating to the nature of church leadership by exploring relevant Bible passages, the lives of certain Bible characters that the Bible presents as good but not perfect leaders, as well as relevant key theological conceptions of leadership. The study accordin...

  9. Safe Characteristics of One Like RSA%一个类RSA系统的两个安全特性

    Institute of Scientific and Technical Information of China (English)

    刘益和

    2004-01-01

    本文通过对比RSA系统的安全问题,给出了由Dickson 多项式簇gk(x,a)构成的类RSA系统的两个安全特性:除少数几个数外,类RSA 算法不满足同态性;类RSA系统仍然存在循环攻击问题.

  10. Validation of a low-dose hybrid RSA and fluoroscopy technique: Determination of accuracy, bias and precision.

    Science.gov (United States)

    Ioppolo, James; Börlin, Niclas; Bragdon, Charles; Li, Mingguo; Price, Roger; Wood, David; Malchau, Henrik; Nivbrant, Bo

    2007-01-01

    Analyzing skeletal kinematics with radiostereometric analysis (RSA) following corrective orthopedic surgery allows the quantitative comparison of different implant designs. The purpose of this study was to validate a technique for dynamically estimating the relative position and orientation of skeletal segments using RSA and single plane X-ray fluoroscopy. Two micrometer-based in vitro phantom models of the skeletal segments in the hip and knee joints were used. The spatial positions of tantalum markers that were implanted into each skeletal segment were reconstructed using RSA. The position and orientation of each segment were determined in fluoroscopy images by minimizing the difference between the markers measured and projected in the image plane. Accuracy was determined in terms of bias and precision by analyzing the deviation between the applied displacement protocol and measured pose estimates. Measured translational accuracy was less than 100 microm parallel to the image plane and less than 700 microm in the direction orthogonal to the image plane. The measured rotational error was less than 1 degrees . Measured translational and rotational bias was not statistically significant at the 95% level of confidence. The technique allows real-time kinematic skeletal measurements to be performed on human subjects implanted with tantalum markers for quantitatively measuring the motion of normal joints and different implant designs.

  11. Batch process. Changes and problems of a batch process; Bacchi prosesu no hensen to kadai

    Energy Technology Data Exchange (ETDEWEB)

    Niwa, T. [Asahi Engineering (Japan)

    1997-09-05

    One of the characteristics of the manufacture of fine chemical products is multikind production. The life cycles of chemical industrial products have become shorter, and the difference between these life cycles and those of the manufacturing facility has become larger. The use of an FMS (Flexible Manufacturing System) has been demanded as the measure for solving the problems, and the advantages of a batch process have begun to be reconsidered. This paper describes the history of the development of a batch process, and then explains the problems of a batch process. The paper mentions the process control techniques, production information control systems, production support systems, training systems and process simulation systems as the main techniques supporting the development of a batch process. The paper mentions the modeling and standardizing of a batch process, systematic batch process designing methods and the modeling of a production control information system as the problems of a batch process. 8 refs., 5 figs., 2 tabs.

  12. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    Science.gov (United States)

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification. PMID:26123833

  13. Die godsdiensneutraliteitsbeginsel van die Amerikaanse demokrasie - implikasie vir onderwys in die RSA

    Directory of Open Access Journals (Sweden)

    J.G. van Staden

    1995-03-01

    Full Text Available The principle of religious neutrality in the American democracy - implications for education in the RSA In a changing, democratic educational dispensation the accommodation of various religious convictions and religious needs of the heterogenous South African population is a matter that has to be dealt with with great circumspection. Valuable lessons that can prevent distress and disruption may be learnt from the way in which the American hyper-democracy has handled the situation. Democracy is the American's predominant pre-occupation. Any attempt of any group (e.g. a religious group to grant a monopoly in state schools to religious values in special learning content and religious ceremonies and practices has always been opposed. This approach has eventually led to total neutrality as regards traditional religious convictions and practices in American state schools, resulting in the establishment of another conviction (secular humanism in state schools. Thus it seems that neutrality as regards religious convictions is not possible. Absolutism of the principle of neutrality as regards traditional religions has resulted in a degeneration of moral values. If all the religious convictions cannot be accommodated in the South African public education system, it may for South Africa, as bastion of Christian civilization, be a danger sign as has been the case in the USA.

  14. CYP2E1 Rsa Ⅰ polymorphism impacts on risk of colorectal cancer association with smoking and alcohol drinking

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    AIM: To investigate associations between the Rsa Ⅰpolymorphism of CYP2E1 and risk of colorectal cancer.METHODS: A case-control study was conducted with 315 colorectal cancer cases (105 colon, 210 rectal)and 439 population-based controls in Jiangsu Province of China. Genomic DNA samples were assayed for restriction fragment length polymorphisms in CYP2E1by PCR amplification followed by digestion with Rsa Ⅰ. Information on smoking and alcohol drinking was collected using a questionnaire. Odds ratios (ORs) were estimated with an unconditional logistic model.RESULTS: The proportional distribution of the CYP2E1 Rsa Ⅰ c1/c1, c1/c2 and c2/c2 genotypes were 61.4%,35.6% and 3.0% in controls, 60.6%, 33.7% and 5.8%in colon cancer cases, and 58.4%, 34.0% and 7.7% in rectal cancer cases, respectively. A significant difference was noted between controls and rectal cancer cases (P = 0.029), the c2/c2 genotype being associated with elevated OR (adjusted age, sex and status of the smoking and alcohol drinking) for rectal cancer (1.64,95% CI, 1.12-2.41, vs c1 allele carriers), but not for colon cancer. In interaction analysis between the CYP2E1Rsa Ⅰ genotype and smoking and drinking habits, we found a significant cooperative action between the c2/c2 genotype and alcohol drinking in the sex-, age-adjusted ORs for both colon (4.74, 95% CI, 1.10-20.40) and rectal (5.75, 95% CI, 1.65-20.05) cancers. Among nonsmokers, the CYP2E1 Rsa Ⅰ c2/c2 genotype was also associated with elevated ORs in the two sites (1.95, 95%CI, 0.99-3.86 and 2.30, 95% CI, 1.32-3.99).CONCLUSION: The results of the present study suggest that the CYP2E1 c2/c2 genotype increases susceptibility to rectal cancer and the gene-environmental interactions between the CYP2E1 polymorphism and smoking or alcohol drinking exist for colorectal neoplasia in general.

  15. LSF usage for batch at CERN

    CERN Multimedia

    Schwickerath, Ulrich

    2007-01-01

    Contributed poster to the CHEP07. Original abstract: LSF 7, the latest version of Platform's batch workload management system, addresses many issues which limited the ability of LSF 6.1 to support large scale batch farms, such as the lxbatch service at CERN. In this paper we will present the status of the evaluation and deployment of LSF 7 at CERN, including issues concerning the integration of LSF 7 with the gLite grid middleware suite and, in particular, the steps taken to endure an efficient reporting of the local batch system status and usage to the Grid Information System

  16. Batch process. Application of CAE technique to a batch process; Bacchi purosesu eno CAE gijutsu no tenkai

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Y.; Nakai, K.; Oba, S. [Aspentic Japan Co. Ltd. (Japan)

    1997-09-05

    This paper introduces recent topics of the application of the CAE technique to a batch process. A batch distillation modeling tool (BATCHFRAC) is aimed at modeling a distillation tower and a batch reactor for a batch process for fine chemical products, and is provided as an expanded additional function for ASPEN FLUS batch distillation. A batch process designing system (BATCH PLUS) is a comprehensive batch process simulator for efficiently carrying out the designing, the development or the analysis of a complicated recipe-based batch process concerning medical treatment, biotechnology and agriculture. A batch process information control system (Batch/21) is provided as a system having an expanded and additional function for a batch process of InfoPlus/21, an information control system which enables the observation, management and controlling of a process. 4 figs.

  17. Multi-objective optimization of glycopeptide antibiotic production in batch and fed batch processes

    DEFF Research Database (Denmark)

    Maiti, Soumen K.; Eliasson Lantz, Anna; Bhushan, Mani;

    2011-01-01

    as pareto optimal solutions. These solutions gives flexibility in evaluating the trade-offs and selecting the most suitable operating policy. Here, ε-constraint approach was used to generate the pareto solutions for two objectives: product concentration and product per unit cost of media, for batch and fed...... batch operations using process model for Amycolatopsis balhimycina, a glycopeptide antibiotic producer. This resulted in a set of several pareto optimal solutions with the two objectives ranging from (0.75gl−1, 3.97g$-1) to (0.44gl−1, 5.19g$-1) for batch and from (1.5gl−1, 5.46g$-1) to (1.1gl−1, 6.34g......$-1) for fed batch operations. One pareto solution each for batch and for fed batch mode was experimentally validated....

  18. Transparent encryption and decryption methods for systems applications and products in data pocessing%面向SAP系统的透明加解密方法

    Institute of Scientific and Technical Information of China (English)

    杜海超; 赵明; 王蕊; 贾晓启

    2015-01-01

    针对广泛应用于国内的企业资源计划( ERP)商用管理软件———数据处理系统应用与产品( SAP)系统存在的本地文件导出安全性问题,建立高度匹配于SAP系统特点及特定进程的文件透明加解密系统,在驱动层针对SAP系统关联的特定进程涉及的新建、读、写文件等操作进行捕获,通过卷上下文与流上下文提取缓存信息,依据所捕获的文件操作类型,完成不同的缓存置换;在应用层实现密钥的获取与分发。同时实现了文件透明加解密系统的客户化定制,通过配置可以实现对SAP系统特定进程,导出文件类型甚至特定文件的指定。实验结果表明,该系统在对用户无干扰无需人工介入的前提下,能自动与SAP系统无缝对接,对导出文件透明加解密,并限定导出文件仅能在本地计算机中使用;最终有效地与SAP系统本身自带的用户名登录、权限管控等安全控制机制整合联动,完善了SAP系统在外部商业数据输出安全性管控上的缺失,提升企业对商业数据安全使用、输出的管控及保障能力。%For the national widely applied famous Enterprise Resource Planning ( ERP ) software system – Systems Applications and Products in data processing ( SAP) , against the existing outstanding local file exporting security problem, a transparent encryption and decryption file system was established according to SAP system characteristic and specific process. Operations of file creation, read and write within specific process in the driver layer were successfully captured by the transparent encryption and decryption file system, cache information of both volume up and low context and flow up and low context were also correctly extracted. Based on the captured operation type, cache replacement automation function was successfully achieved according to predefined rules. Additionally, in the application layer, security key

  19. Batch Attribute-Based Encryption for Secure Clouds

    OpenAIRE

    Chen Yang; Yang Sun; Qianhong Wu

    2015-01-01

    Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE) is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext are associated with an access policy and an attribute set, respectively; in addition to holding a secret key, one can decrypt a ciphertext only if the associated attributes match the predetermined access policy, which allows one to enforce fin...

  20. Applying prior knowledge to model batch keeping-quality of cucumber batches

    NARCIS (Netherlands)

    Schouten, R.E.; Tijskens, L.M.M.; Kooten, van O.; Jongbloed, G.

    2004-01-01

    Keeping-quality of individual cucumbers is limited by the green colour; the keeping-quality of batches of cucumbers is limited by the time it takes before 5␘f the cucumbers in the batch reach a predefined colour limit. From literature concerning the synthesis and degradation of chlorophyll and a pub

  1. Quality and Batch-to-Batch Consistency of Original and Biosimilar Epoetin Products.

    Science.gov (United States)

    Halim, Liem Andhyk; Brinks, Vera; Jiskoot, Wim; Romeijn, Stefan; Haselberg, Rob; Burns, Chris; Wadhwa, Meenu; Schellekens, Huub

    2016-02-01

    Comprehensive physicochemical characterization and biological assays are essential parts in assessing quality attributes of biologicals. Here, we compared the quality of different marketed recombinant human erythropoietin (epoetin) products: originators, Eprex and NeoRecormon as well as 2 biosimilars, Retacrit and Binocrit. In addition, assessment of batch-to-batch variability was included by collecting 2 or more batches of each product. Common assays which included sodium dodecyl sulfate-polyacrylamide gel electrophoresis, high-performance size-exclusion chromatography, asymmetrical flow field-flow fractionation, capillary zone electrophoresis, and potency testing were used. Of the tested products and among batches of single products, variations in epoetin content, isoform profiles, and potency were found. Ultimately, this study demonstrated the high quality of epoetin products with some degree of variation among products and batches, confirming the "similar but not identical" paradigm of biologicals. PMID:26869417

  2. 加密文件系统的原理及其解密方法分析%Analysis of the Principle and Decryption Methods of Encryption File System

    Institute of Scientific and Technical Information of China (English)

    张合; 刘小红

    2011-01-01

    In order to decrypt unusable encrypted files caused by accidental reason,studies the principle of Encryption File System and its trait,and discusses several recovery methods to decrypt unusable encrypted files caused by accidental reason.According to the%为了解决意外导致的加密文件无法恢复的问题,研究EFS加密、解密的原理及其特点,针对意外导致的加密文件无法使用问题,探讨几种恢复方法,针对这些方法的局限性简述解决方案。

  3. Dynamic Fractional Resource Scheduling vs. Batch Scheduling

    CERN Document Server

    Casanova, Henri; Vivien, Frédéric

    2011-01-01

    We propose a novel job scheduling approach for homogeneous cluster computing platforms. Its key feature is the use of virtual machine technology to share fractional node resources in a precise and controlled manner. Other VM-based scheduling approaches have focused primarily on technical issues or on extensions to existing batch scheduling systems, while we take a more aggressive approach and seek to find heuristics that maximize an objective metric correlated with job performance. We derive absolute performance bounds and develop algorithms for the online, non-clairvoyant version of our scheduling problem. We further evaluate these algorithms in simulation against both synthetic and real-world HPC workloads and compare our algorithms to standard batch scheduling approaches. We find that our approach improves over batch scheduling by orders of magnitude in terms of job stretch, while leading to comparable or better resource utilization. Our results demonstrate that virtualization technology coupled with light...

  4. Exploring the Transition From Batch to Online

    DEFF Research Database (Denmark)

    Jørgensen, Anker Helms

    2010-01-01

    The transition from using computers in batch mode with punch cards, paper tape, piles of print, and lengthy response times to online mode by way of the video display terminal took place in most organizations in the 1970s and 1980s. The video display terminal was a significant forerunner of the tr......The transition from using computers in batch mode with punch cards, paper tape, piles of print, and lengthy response times to online mode by way of the video display terminal took place in most organizations in the 1970s and 1980s. The video display terminal was a significant forerunner...... structures, and acquire new skills. This work-in-progress paper extends an earlier study of the transition from batch to online, based on oral history interviews with (ex)-employees in two large Danish Service Bureaus. The paper takes the next step by ana-lyzing a particular genre: the commercial computer...

  5. Following an Optimal Batch Bioreactor Operations Model

    DEFF Research Database (Denmark)

    Ibarra-Junquera, V.; Jørgensen, Sten Bay; Virgen-Ortíz, J.J.;

    2012-01-01

    The problem of following an optimal batch operation model for a bioreactor in the presence of uncertainties is studied. The optimal batch bioreactor operation model (OBBOM) refers to the bioreactor trajectory for nominal cultivation to be optimal. A multiple-variable dynamic optimization of fed...... as the master system which includes the optimal cultivation trajectory for the feed flow rate and the substrate concentration. The “real” bioreactor, the one with unknown dynamics and perturbations, is considered as the slave system. Finally, the controller is designed such that the real bioreactor...

  6. Monte Carlo simulation on kinetics of batch and semi-batch free radical polymerization

    KAUST Repository

    Shao, Jing

    2015-10-27

    Based on Monte Carlo simulation technology, we proposed a hybrid routine which combines reaction mechanism together with coarse-grained molecular simulation to study the kinetics of free radical polymerization. By comparing with previous experimental and simulation studies, we showed the capability of our Monte Carlo scheme on representing polymerization kinetics in batch and semi-batch processes. Various kinetics information, such as instant monomer conversion, molecular weight, and polydispersity etc. are readily calculated from Monte Carlo simulation. The kinetic constants such as polymerization rate k p is determined in the simulation without of “steady-state” hypothesis. We explored the mechanism for the variation of polymerization kinetics those observed in previous studies, as well as polymerization-induced phase separation. Our Monte Carlo simulation scheme is versatile on studying polymerization kinetics in batch and semi-batch processes.

  7. The Design of Identity Authentication Scheme of Network Examination Based on MD5 and RSA Algorithm%基于MD5和 RSA 算法的网络考试身份认证方案设计

    Institute of Scientific and Technical Information of China (English)

    许永达

    2013-01-01

      Establishing a good identity authentication system is one of the key steps to realize the network examination security ,and tradi-tional identity authentication methods like “username + password” have a big security risk .So an identity authentication scheme based on MD5 and RSA Algorithm is proposed ,which uses the MD5 algorithm to improve the“username + password” authentication method ,and then uses the digital signature based on MD5 and RSA algorithm to further verify the user’s identity .This scheme can effectively confirm us-er identity ,and greatly enhance the safety performance of the examination system .%  建立完善的身份认证系统是实现网络考试安全的关键步骤之一,而“用户名+密码”等传统身份认证方式存在较大的安全隐患。文章提出了一种基于MD5和RSA算法的身份认证方案,先利用MD5算法来改进“用户名+密码”认证方法,再借助MD5和RSA算法实现的数字签名来进一步验证用户的身份。该方案可以高效确认用户身份,极大地增强了考试系统的安全性能。

  8. Batch process. Optimum designing and operation of a batch process; Bacchi purosesu

    Energy Technology Data Exchange (ETDEWEB)

    Hasebe, S. [Kyoto Univ. (Japan). Faculty of Engineering

    1997-09-05

    Since the control of a batch process becomes dynamic, it becomes necessary to handle the process differently from a continuous process in terms of the designing, operating and controlling of the process. This paper describes the characteristics and the problems to be solved of a batch process from three points of view, the designing, operation and controlling of the process. A major problem of a batch process is the designing difficulty. In a batch process, the amount of products capable of being manufactured per unit time by each apparatus and that by the whole plant structured by combining apparatuses are different, and therefore the time and apparatus capacity are wasted in some cases. The actual designing of a batch process involves various factors, such as the seasonal fluctuation of demand for products, the possibility of expanding the apparatuses in the future and the easiness of controlling the process, and the shipment of products during consecutive holidays and periodic maintenance, which are not included in the formulation of mathematical programming problems. Regarding the optimum operation of a batch process and the controlling of the same, descriptions of forming of a dynamic optimum operation pattern and verification of the sequence control system are given. 9 refs., 4 figs.

  9. Batch and fed-batch production of butyric acid by Clostridium butyricum ZJUCB

    Institute of Scientific and Technical Information of China (English)

    HE Guo-qing; KONG Qing; CHEN Qi-he; RUAN Hui

    2005-01-01

    The production of butyric acid by Clostridium butyricum ZJUCB at various pH values was investigated. In order to study the effect of pH on cell growth, butyric acid biosynthesis and reducing sugar consumption, different cultivation pH values ranging from 6.0 to 7.5 were evaluated in 5-L bioreactor. In controlled pH batch fermentation, the optimum pH for cell growth and butyric acid production was 6.5 with a cell yield of 3.65 g/L and butyric acid yield of 12.25 g/L. Based on these results, this study then compared batch and fed-batch fermentation of butyric acid production at pH 6.5. Maximum value (16.74 g/L) of butyric acid concentration was obtained in fed-batch fermentation compared to 12.25 g/L in batch fermentation. It was concluded that cultivation under fed-batch fermentation mode could enhance butyric acid production significantly (P<0.01) by C. butyricum ZJUCB.

  10. 移动RSA认证系统的应用部署与维护%Application Deployment and Maintenance of Mobile RSA Authentication System

    Institute of Scientific and Technical Information of China (English)

    颜昭治; 刘竹松

    2014-01-01

    As a strong authentication system, RSA SecurID has been widely used in the field of information security. Its two-factor authentication technology has greatly enhances the security of the system access. Describes the authentication system and its components, combined with the existing network application in deployment and application of RSA briefly, analyzes of the common problems and business continuity security.%RSA SecurID作为一种强大的身份认证系统,已在信息安全领域得到广泛应用,其双因素认证技术极大地增强系统访问的安全性。介绍RSA SecurID认证系统及其组成,结合现网应用情况简述RSA的部署与应用,剖析RSA维护中的常见问题和业务连续性保障。

  11. Research on a Vector-like RSA Cryptosystem Based on Internet%基于Intranet向量形RSA密码体制研究

    Institute of Scientific and Technical Information of China (English)

    蒋天发

    2001-01-01

    A public-key cryptosystem using vector-like RSA ciphers based on Internet is presented to overcome some shortcomings of the traditional RSA system. The security of this cryptosystem is better because it is more difficult to obtain a plaintext from a ciphertext under this cryptosystem than under the traditional RSA system using the factoring modulus N. The principle, the algorithm and the program realization of this vector-like RSA Cryptosystem are detailed.%提出了一种基于Intranet的向量形RSA的公开密钥码体制,其加密、解密算法具有与RSA相同量级的时间复杂性,并克服了RSA体制及现已提出各种RSA修改体制中的一些缺点。在向量形RSA密码体制下从密文中获取明文的某些信息要比在传统的RSA分解模N下更困难,因而向量形RSA的安全性会更好。此外还阐述了其基本原理,以及基本算法思想及其编程实现。

  12. Using Forensics to Untangle Batch Effects in TCGA Data - TCGA

    Science.gov (United States)

    Rehan Akbani, Ph.D., and colleagues at the University of Texas MD Anderson Cancer Center developed a tool called MBatch to detect, diagnose, and correct batch effects in TCGA data. Read more about batch effects in this Case Study.

  13. Le RSA, innovation ou réforme technocratique? Premiers enseignements d'une monographie départementale

    OpenAIRE

    Méda, Dominique; Gomel, Bernard

    2011-01-01

    L'étude constitue une contribution à l'analyse et à l'évaluation du revenu de solidarité active (RSA), institué par la loi du 1er décembre 2008 et mis en œuvre à partir de juin 2009. Les auteurs reviennent dans une première partie sur les intentions des promoteurs de cette réforme, à partir du texte de la commission Familles, vulnérabilités, pauvreté, réunie en 2005 par le président d'Emmaüs, Martin Hirsch. Ils rappellent le diagnostic proposé par celle-ci, l'échec du RMI, sa principale recom...

  14. Four RFLPs of the human insulin receptor gene: PstI, KpnI, RsaI (2 RFLPs)

    Energy Technology Data Exchange (ETDEWEB)

    Cox, N.J.; Spielman, R.S.; Taub, R. (Univ. of Pennsylvania School of Medicine, Philadelphia (USA)); Kahn, C.R.; Muller-Wieland, D.; Kriauciunas, K.M. (Harvard Medical School, Boston, MA (USA))

    1988-08-25

    Fragments were isolated from subclones containing the insulin receptor cDNA described. Probe 1 as obtained from an SP64 subclone containing the 1011bp EcoRI fragment from the 5{prime} region of the U11rich cDNA. Probe 1 was a 677bp XhoI/EcoRI fragment from the {alpha} subunit region of the IR cDNA corresponding to nucleotides 334 to 1011, the putative ligand binding domain. Probe 2 was obtained from an SP64 subclone containing the 4190bp EcoRI fragment from the 3{prime} end of the U11rich cDNA. Probe 2 was a 1599 bp PstI fragment from the {beta} subunit region of the insulin receptor cDNA corresponding to nucleotides 2746 to 4345, encoding the tyrosine kinase domain. Segregation in at least one family was observed for the PstI, KpnI, and RsaI ({beta}) polymorphisms.

  15. Optimal operation of batch membrane processes

    CERN Document Server

    Paulen, Radoslav

    2016-01-01

    This study concentrates on a general optimization of a particular class of membrane separation processes: those involving batch diafiltration. Existing practices are explained and operational improvements based on optimal control theory are suggested. The first part of the book introduces the theory of membrane processes, optimal control and dynamic optimization. Separation problems are defined and mathematical models of batch membrane processes derived. The control theory focuses on problems of dynamic optimization from a chemical-engineering point of view. Analytical and numerical methods that can be exploited to treat problems of optimal control for membrane processes are described. The second part of the text builds on this theoretical basis to establish solutions for membrane models of increasing complexity. Each chapter starts with a derivation of optimal operation and continues with case studies exemplifying various aspects of the control problems under consideration. The authors work their way from th...

  16. Process Modeling for Batch Cooling Crystallization

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The general mathematical model for batch cooling crystallization was established based on the popula tion balance equation considering the change of slurry volume, and simulated with crystallization thermodynamics, kinetics and mass balance employing bed voidage. In the system of vitamin C-water-ethanol, reliability of this model was verified by comparison between simulation results and experimental data. The effects of operation parameters on product quality can be systematically investigated by modeling simulation.

  17. Process Modeling for Batch Cooling Crystallization

    Institute of Scientific and Technical Information of China (English)

    陈慧萍; 王静康

    2001-01-01

    The general mathematical model for batch cooling crystallization was established based on the population balance equation considering the change of slurry volume, and simulated with crystallization thermodynamics,kinetics and mass balance employing bed voidage. In the system of vitamin C-water-ethanol, reliability of this model was verified by comparison between simulation results and experimental data. The effects of operation parameters on product quality can be systematically investigated by modeling simulation.

  18. Pollution prevention applications in batch manufacturing operations

    Science.gov (United States)

    Sykes, Derek W.; O'Shaughnessy, James

    2004-02-01

    Older, "low-tech" batch manufacturing operations are often fertile grounds for gains resulting from pollution prevention techniques. This paper presents a pollution prevention technique utilized for wastewater discharge permit compliance purposes at a batch manufacturer of detergents, deodorants, and floor-care products. This manufacturer generated industrial wastewater as a result of equipment rinses required after each product batch changeover. After investing a significant amount of capital on end of pip-line wastewater treatment technology designed to address existing discharge limits, this manufacturer chose to investigate alternate, low-cost approaches to address anticipated new permit limits. Mass balances using spreadsheets and readily available formulation and production data were conducted on over 300 products to determine how each individual product contributed to the total wastewater pollutant load. These mass balances indicated that 22 products accounted for over 55% of the wastewater pollutant. Laboratory tests were conducted to determine whether these same products could accept their individual changeover rinse water as make-up water in formulations without sacrificing product quality. This changeover reuse technique was then implement at the plant scale for selected products. Significant reductions in wastewater volume (25%) and wastewater pollutant loading (85+%) were realized as a direct result of this approach.

  19. 40 CFR 63.1321 - Batch process vents provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Batch process vents provisions. 63.1321... Standards for Hazardous Air Pollutant Emissions: Group IV Polymers and Resins § 63.1321 Batch process vents provisions. (a) Batch process vents. Except as specified in paragraphs (b) through (d) of this...

  20. Semiautomated, Reproducible Batch Processing of Soy

    Science.gov (United States)

    Thoerne, Mary; Byford, Ivan W.; Chastain, Jack W.; Swango, Beverly E.

    2005-01-01

    A computer-controlled apparatus processes batches of soybeans into one or more of a variety of food products, under conditions that can be chosen by the user and reproduced from batch to batch. Examples of products include soy milk, tofu, okara (an insoluble protein and fiber byproduct of soy milk), and whey. Most processing steps take place without intervention by the user. This apparatus was developed for use in research on processing of soy. It is also a prototype of other soy-processing apparatuses for research, industrial, and home use. Prior soy-processing equipment includes household devices that automatically produce soy milk but do not automatically produce tofu. The designs of prior soy-processing equipment require users to manually transfer intermediate solid soy products and to press them manually and, hence, under conditions that are not consistent from batch to batch. Prior designs do not afford choices of processing conditions: Users cannot use previously developed soy-processing equipment to investigate the effects of variations of techniques used to produce soy milk (e.g., cold grinding, hot grinding, and pre-cook blanching) and of such process parameters as cooking times and temperatures, grinding times, soaking times and temperatures, rinsing conditions, and sizes of particles generated by grinding. In contrast, the present apparatus is amenable to such investigations. The apparatus (see figure) includes a processing tank and a jacketed holding or coagulation tank. The processing tank can be capped by either of two different heads and can contain either of two different insertable mesh baskets. The first head includes a grinding blade and heating elements. The second head includes an automated press piston. One mesh basket, designated the okara basket, has oblong holes with a size equivalent to about 40 mesh [40 openings per inch (.16 openings per centimeter)]. The second mesh basket, designated the tofu basket, has holes of 70 mesh [70 openings

  1. Batch Model for Batched Timestamps Data Analysis with Application to the SSA Disability Program

    Science.gov (United States)

    Yue, Qingqi; Yuan, Ao; Che, Xuan; Huynh, Minh; Zhou, Chunxiao

    2016-01-01

    The Office of Disability Adjudication and Review (ODAR) is responsible for holding hearings, issuing decisions, and reviewing appeals as part of the Social Security Administration’s disability determining process. In order to control and process cases, the ODAR has established a Case Processing and Management System (CPMS) to record management information since December 2003. The CPMS provides a detailed case status history for each case. Due to the large number of appeal requests and limited resources, the number of pending claims at ODAR was over one million cases by March 31, 2015. Our National Institutes of Health (NIH) team collaborated with SSA and developed a Case Status Change Model (CSCM) project to meet the ODAR’s urgent need of reducing backlogs and improve hearings and appeals process. One of the key issues in our CSCM project is to estimate the expected service time and its variation for each case status code. The challenge is that the systems recorded job departure times may not be the true job finished times. As the CPMS timestamps data of case status codes showed apparent batch patterns, we proposed a batch model and applied the constrained least squares method to estimate the mean service times and the variances. We also proposed a batch search algorithm to determine the optimal batch partition, as no batch partition was given in the real data. Simulation studies were conducted to evaluate the performance of the proposed methods. Finally, we applied the method to analyze a real CPMS data from ODAR/SSA.

  2. BATCH-GE: Batch analysis of Next-Generation Sequencing data for genome editing assessment.

    Science.gov (United States)

    Boel, Annekatrien; Steyaert, Woutert; De Rocker, Nina; Menten, Björn; Callewaert, Bert; De Paepe, Anne; Coucke, Paul; Willaert, Andy

    2016-01-01

    Targeted mutagenesis by the CRISPR/Cas9 system is currently revolutionizing genetics. The ease of this technique has enabled genome engineering in-vitro and in a range of model organisms and has pushed experimental dimensions to unprecedented proportions. Due to its tremendous progress in terms of speed, read length, throughput and cost, Next-Generation Sequencing (NGS) has been increasingly used for the analysis of CRISPR/Cas9 genome editing experiments. However, the current tools for genome editing assessment lack flexibility and fall short in the analysis of large amounts of NGS data. Therefore, we designed BATCH-GE, an easy-to-use bioinformatics tool for batch analysis of NGS-generated genome editing data, available from https://github.com/WouterSteyaert/BATCH-GE.git. BATCH-GE detects and reports indel mutations and other precise genome editing events and calculates the corresponding mutagenesis efficiencies for a large number of samples in parallel. Furthermore, this new tool provides flexibility by allowing the user to adapt a number of input variables. The performance of BATCH-GE was evaluated in two genome editing experiments, aiming to generate knock-out and knock-in zebrafish mutants. This tool will not only contribute to the evaluation of CRISPR/Cas9-based experiments, but will be of use in any genome editing experiment and has the ability to analyze data from every organism with a sequenced genome. PMID:27461955

  3. BATCH-GE: Batch analysis of Next-Generation Sequencing data for genome editing assessment

    Science.gov (United States)

    Boel, Annekatrien; Steyaert, Woutert; De Rocker, Nina; Menten, Björn; Callewaert, Bert; De Paepe, Anne; Coucke, Paul; Willaert, Andy

    2016-01-01

    Targeted mutagenesis by the CRISPR/Cas9 system is currently revolutionizing genetics. The ease of this technique has enabled genome engineering in-vitro and in a range of model organisms and has pushed experimental dimensions to unprecedented proportions. Due to its tremendous progress in terms of speed, read length, throughput and cost, Next-Generation Sequencing (NGS) has been increasingly used for the analysis of CRISPR/Cas9 genome editing experiments. However, the current tools for genome editing assessment lack flexibility and fall short in the analysis of large amounts of NGS data. Therefore, we designed BATCH-GE, an easy-to-use bioinformatics tool for batch analysis of NGS-generated genome editing data, available from https://github.com/WouterSteyaert/BATCH-GE.git. BATCH-GE detects and reports indel mutations and other precise genome editing events and calculates the corresponding mutagenesis efficiencies for a large number of samples in parallel. Furthermore, this new tool provides flexibility by allowing the user to adapt a number of input variables. The performance of BATCH-GE was evaluated in two genome editing experiments, aiming to generate knock-out and knock-in zebrafish mutants. This tool will not only contribute to the evaluation of CRISPR/Cas9-based experiments, but will be of use in any genome editing experiment and has the ability to analyze data from every organism with a sequenced genome. PMID:27461955

  4. Production of ethanol in batch and fed-batch fermentation of soluble sugar

    International Nuclear Information System (INIS)

    Keeping in view of the demand and need for alternate energy source, especially liquid fuels and the availability of raw materials in Pakistan, we have carried out biochemical and technological studies for ethanol through fermentation of renewable substrates. Molasses and sugar cane have been used as substrate for yeast fermentation. Selected yeast were used in both batch and semi continuous fermentation of molasses. Clarified dilute molasses were fermented with different strains of Saccharomyces cerevisiae. Ethanol concentration after 64 hours batch fermentation reached 9.4% with 90% yield based on sugar content. During feed batch system similar results were obtained after a fermentation cycle of 48 hours resulting in higher productivity. Similarly carbohydrates in fruit juices and hydro lysates of biomass can be economically fermented to ethanol to be used as feed stock for other chemicals. (author)

  5. Decrypting $SO(10)$-inspired leptogenesis

    CERN Document Server

    Di Bari, Pasquale; Fiorentin, Michele Re

    2014-01-01

    Encouraged by the recent results from neutrino oscillation experiments, we perform an analytical study of $SO(10)$-inspired models and leptogenesis with hierarchical right-handed (RH) neutrino spectrum. Under the approximation of negligible misalignment between the neutrino Yukawa basis and the charged lepton basis, we find an analytical expression for the final asymmetry directly in terms of the low energy neutrino parameters that fully reproduces previous numerical results. This expression also shows that is possible to identify an effective leptogenesis phase for these models. When we also impose the wash-out of a large pre-existing asymmetry $N^{\\rm p,i}_{B-L}$, the strong thermal (ST) condition, we derive analytically all those constraints on the low energy neutrino parameters that characterise the {\\rm ST}-$SO(10)$-inspired leptogenesis solution, confirming previous numerical results. In particular we show why, though neutrino masses have to be necessarily normally ordered, the solution implies an analy...

  6. Decrypting SO(10-inspired leptogenesis

    Directory of Open Access Journals (Sweden)

    Pasquale Di Bari

    2015-04-01

    Full Text Available Encouraged by the recent results from neutrino oscillation experiments, we perform an analytical study of SO(10-inspired models and leptogenesis with hierarchical right-handed (RH neutrino spectrum. Under the approximation of negligible misalignment between the neutrino Yukawa basis and the charged lepton basis, we find an analytical expression for the final asymmetry directly in terms of the low energy neutrino parameters that fully reproduces previous numerical results. This expression also shows that it is possible to identify an effective leptogenesis phase for these models. When we also impose the wash-out of a large pre-existing asymmetry NB−Lp,i, the strong thermal (ST condition, we derive analytically all those constraints on the low energy neutrino parameters that characterise the ST-SO(10-inspired leptogenesis solution, confirming previous numerical results. In particular we show why, though neutrino masses have to be necessarily normally ordered, the solution implies an analytical lower bound on the effective neutrino-less double beta decay neutrino mass, mee≳8 meV, for NB−Lp,i=10−3, testable with next generation experiments. This, in combination with an upper bound on the atmospheric mixing angle, necessarily in the first octant, forces the lightest neutrino mass within a narrow range m1≃(10–30 meV (corresponding to ∑imi≃(75–125 meV. We also show why the solution could correctly predict a non-vanishing reactor neutrino mixing angle and requires the Dirac phase to be in the fourth quadrant, implying sin⁡δ (and JCP negative as hinted by current global analyses. Many of the analytical results presented (expressions for the orthogonal matrix, RH neutrino mixing matrix, masses and phases can have applications beyond leptogenesis.

  7. CONVERSION OF PINEAPPLE JUICE WASTE INTO LACTIC ACID IN BATCH AND FED – BATCH FERMENTATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Abdullah Mochamad Busairi

    2012-01-01

    Full Text Available Pineapple juice waste contains valuable components, which are mainly sucrose, glucose, and fructose. Recently, lactic acid has been considered to be an important raw material for the production of biodegradable lactide polymer. The fermentation experiments were carried out in a 3 litres fermentor (Biostat B Model under anaerobic condition with stirring speed of 50 rpm, temperature at 40oC, and pH of 6.00. Effect of feed concentration on lactic acid production, bacterial growth, substrate utilisation and productivity was studied. The results obtained from fed- batch culture fermentation showed that the maximum lactic acid productivity was 0.44 g/L.h for feed concentration of 90 g/L at 48 hours. Whereas the lactic acid productivity obtained from fed-batch culture was twice and half fold higher than that of batch culture productivity.  Buangan jus nanas mengandung komponen yang berharga terutama sukrosa, glukosa, dan fruktosa. Asam laktat adalah bahan baku yang terbaru dan penting untuk dibuat sebagai polimer laktat yang dapat terdegradasi oleh lingkungan. Percobaan dilakukan pada fermentor 3 liter (Model Biostat B di bawah kondisi anaerob dengan kecepatan pengadukan 50 rpm, temperatur 40oC, dan pH 6,00. Pengaruh konsentrasi umpan terhadap produksi asam laktat, pertumbuhan mikroba, pengggunaan substrat dan produktivitas telah dipelajari. Hasil yang didapatkan pada fermentasi dengan menggunakan sistem fed-batch menunjukkan bahwa produktivitas asam laktat maksimum adalah 0.44 g/L,jam dengan konsentrasi umpan, 90 g/L pada waktu 48 jam. Bahkan produktivitas asam laktat yang didapat pada kultur fed-batch lebih tinggi 2,5 kali dari pada proses menggunakan sistem batch

  8. Sojourn time distributions in a Markovian G-queue with batch arrival and batch removal

    Directory of Open Access Journals (Sweden)

    Yang Woo Shin

    1999-01-01

    Full Text Available We consider a single server Markovian queue with two types of customers; positive and negative, where positive customers arrive in batches and arrivals of negative customers remove positive customers in batches. Only positive customers form a queue and negative customers just reduce the system congestion by removing positive ones upon their arrivals. We derive the LSTs of sojourn time distributions for a single server Markovian queue with positive customers and negative customers by using the first passage time arguments for Markov chains.

  9. Transfer of Campylobacter from a Positive Batch to Broiler Carcasses of a Subsequently Slaughtered Negative Batch: A Quantitative Approach.

    Science.gov (United States)

    Seliwiorstow, Tomasz; Baré, Julie; Van Damme, Inge; Gisbert Algaba, Ignacio; Uyttendaele, Mieke; De Zutter, Lieven

    2016-06-01

    The present study was conducted to quantify Campylobacter cross-contamination from a positive batch of broiler chicken carcasses to a negative batch at selected processing steps and to evaluate the duration of this cross-contamination. During each of nine visits conducted in three broiler slaughterhouses, Campylobacter levels were determined on broiler carcasses originating from Campylobacter-negative batches processed immediately after Campylobacter-positive batches. Data were collected after four steps during the slaughter process (scalding, plucking, evisceration, and washing) at 1, 10, and 20 min after the start of the slaughter of the batches. Campylobacter levels in ceca of birds from Campylobacter-positive batches ranged from 5.62 to 9.82 log CFU/g. When the preceding positive batch was colonized at a low level, no (enumerable) carcass contamination was found in a subsequent negative batch. However, when Campylobacter levels were high in the positive batch, Campylobacter was found on carcasses of the subsequent negative batch but at levels significantly lower than those found on carcasses from the preceding positive batch. The scalding and the evisceration process contributed the least (< 1.5 log CFU/g) and the most (up to 4 log CFU/ g), respectively, to the Campylobacter transmission from a positive batch to a negative batch. Additionally, the number of Campylobacter cells transferred from positive to negative batches decreased over the first 20 min of sampling time. However, the reduction was slower than previously estimated in risk assessment studies, suggesting that pathogen transfer during crosscontamination is a complex process.

  10. PBSNG—Batch System for Farm Architecture

    Institute of Scientific and Technical Information of China (English)

    J.Fromm; K.Genser; 等

    2001-01-01

    FBSNG [1] is a redesigned version of Farm Batch System (FBS[1]),which was developed as a batch process management system for off-line Run II data processing at FNAL.FBSNG is designed for UNIX computer farms and is capable of managing up to 1000 nodes in a single farm.FBSNG allows users to start arrays of parallel processes on one or more farm computers,It uses a simplified abstract resource counting method for load balancing between computers.The resource counting approach allows FBSNG to be a simple and flexible tool for farm resource management.FBSNG scheduler features include guaranteed and controllable” fair-share” scheduling.FBSNG is easily portable across different flavors of UNIX.The system has been successfully used at Fermilab as well as by off-site collaborators for several years on farms of different sizes and different platforms for off-line data processing,Monte-Carlo data generation and other tasks.

  11. 基于C语言的RSA算法高效实现%An Effective Scheme on RSA Algorithm Based on C Language

    Institute of Scientific and Technical Information of China (English)

    郭海民

    2011-01-01

    The RSA algorithm is the standard in the modern public-key cryptosystem, although its situation will be substituted by the Elliptic Curve Cryptosystem(ECC), but it is also having the certain practical significance to study the RSA encryption algorithm. Di%RSA算法是现代公钥密码体制事实上的标准,虽然它有被椭圆曲线密码算法(ECC)取代的局势,但是研究RSA加密算法还有一定的实际意义。深入讨论RSA算法的实现细节,对RSA的快速实现给出一种高效实用算法。

  12. 大规模ad hoc网络下的高效的主动RSA方案%An efficient proactive RSA scheme for large-scale ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    张瑞山; 陈克非

    2007-01-01

    A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key distribution protocol,the share refreshing protocol, the share distribution protocol, and the signature generation protocol. This scheme has two advantages: the building blocks are secure, and the system is efficient.

  13. 基于AES和RSA的XML加密方案及实现%The crypto solutions & realizations of XML based on AES & RSA

    Institute of Scientific and Technical Information of China (English)

    韩星晔; 陈刚; 朱诗兵

    2005-01-01

    本文在分析高级密码算法(AES)的基础上,将AES算法与目前国际上应用最广泛的公开密码算法(RSA)相结合,针对数据库数据提出一个基于AES和RSA的XML加密方案,并给出了其实现过程.

  14. AN APPROXIMATE EXPRESSION RELATED WITH RSA FIXED POINTS%与RSA不动点有关的一个渐近表示

    Institute of Scientific and Technical Information of China (English)

    于秀源

    2004-01-01

    Let T=T(n,e,α) be the number of fixed points of RSA(n,e) that are co-prime with n=pq,and A,B be sets of prime numbers in (1,x) and (1,y) respectively. An estimation on the mean-valueM(A,B,e,α) = 1(#A)(#B) ∑p∈A,q∈B,(p,q)=1 logT(pq,e,α) is given.

  15. Predicting 3D pose in partially overlapped X-ray images of knee prostheses using model-based Roentgen stereophotogrammetric analysis (RSA).

    Science.gov (United States)

    Hsu, Chi-Pin; Lin, Shang-Chih; Shih, Kao-Shang; Huang, Chang-Hung; Lee, Chian-Her

    2014-12-01

    After total knee replacement, the model-based Roentgen stereophotogrammetric analysis (RSA) technique has been used to monitor the status of prosthetic wear, misalignment, and even failure. However, the overlap of the prosthetic outlines inevitably increases errors in the estimation of prosthetic poses due to the limited amount of available outlines. In the literature, quite a few studies have investigated the problems induced by the overlapped outlines, and manual adjustment is still the mainstream. This study proposes two methods to automate the image processing of overlapped outlines prior to the pose registration of prosthetic models. The outline-separated method defines the intersected points and segments the overlapped outlines. The feature-recognized method uses the point and line features of the remaining outlines to initiate registration. Overlap percentage is defined as the ratio of overlapped to non-overlapped outlines. The simulated images with five overlapping percentages are used to evaluate the robustness and accuracy of the proposed methods. Compared with non-overlapped images, overlapped images reduce the number of outlines available for model-based RSA calculation. The maximum and root mean square errors for a prosthetic outline are 0.35 and 0.04 mm, respectively. The mean translation and rotation errors are 0.11 mm and 0.18°, respectively. The errors of the model-based RSA results are increased when the overlap percentage is beyond about 9%. In conclusion, both outline-separated and feature-recognized methods can be seamlessly integrated to automate the calculation of rough registration. This can significantly increase the clinical practicability of the model-based RSA technique.

  16. Batch-to-batch pharmacokinetic variability confounds current bioequivalence regulations: A dry powder inhaler randomized clinical trial.

    Science.gov (United States)

    Burmeister Getz, E; Carroll, K J; Jones, B; Benet, L Z

    2016-09-01

    Current pharmacokinetic (PK) bioequivalence guidelines do not account for batch-to-batch variability in study design or analysis. Here we evaluate the magnitude of batch-to-batch PK variability for Advair Diskus 100/50. Single doses of fluticasone propionate and salmeterol combinations were administered by oral inhalation to healthy subjects in a randomized clinical crossover study comparing three different batches purchased from the market, with one batch replicated across two treatment periods. All pairwise comparisons between different batches failed the PK bioequivalence statistical test, demonstrating substantial PK differences between batches that were large enough to demonstrate bio-inequivalence in some cases. In contrast, between-replicate PK bioequivalence was demonstrated for the replicated batch. Between-batch variance was ∼40-70% of the estimated residual error. This large additional source of variability necessitates re-evaluation of bioequivalence assessment criteria to yield a result that is both generalizable and consistent with the principles of type I and type II error rate control. PMID:27037630

  17. Melting Properties of Loose and Granulated Glass Batch

    Institute of Scientific and Technical Information of China (English)

    WANG Jing; DENG Zhenglu; XIE Jun; CHENG Jinshu; HAN Jianjun; ZHOU Xuedong

    2014-01-01

    The physical properties, the pre-reacting performance and melting properties of the loose glass batch and the granulated glass batch were investigated, respectively. The experimental results showed that compacted glass batch could reduce dust, use ultra-fine powder, and improve heat transfer efficiency. When loose glass batch was compressed into granular, the thermal conductivity was increased from 0.273 W/m•℃to 0.430 W/m•℃, the activation energy Ea of pre-reacting decreased from 178.77 kJ/mol to 143.30 kJ/mol. Using the pre-reacted granular glass batch can significantly reduce the melting time, increase the batch melting rate, and decrease the heat consumption of 1kg molten glass from 3591.24 to 3277.03kJ/kg.

  18. Adaptive quality prediction of batch processes based on PLS model

    Institute of Scientific and Technical Information of China (English)

    LI Chun-fu; ZHANG Jie; WANG Gui-zeng

    2006-01-01

    There are usually no on-line product quality measurements in batch and semi-batch processes,which make the process control task very difficult.In this paper,a model for predicting the end-product quality from the available on-line process variables at the early stage of a batch is developed using partial least squares (PLS)method.Furthermore,some available mid-course quality measurements are used to rectify the final prediction results.To deal with the problem that the process may change with time,recursive PLS (RPLS) algorithm is used to update the model based on the new batch data and the old model parameters after each batch.An application to a simulated batch MMA polymerization process demonstrates the effectiveness of the proposed method.

  19. TANK 50 BATCH 0 SALTSTONE FORMULATION CONFIRMATION

    Energy Technology Data Exchange (ETDEWEB)

    Langton, C.

    2006-06-05

    Savannah River National Laboratory (SRNL) personnel were requested to confirm the Tank 50 Batch 0 grout formulation per Technical Task Request, SSF-TTR-2006-0001 (task 1 of 2) [1]. Earlier Batch 0 formulation testing used a Tank 50 sample collected in September 2005 and is described elsewhere [2]. The current testing was performed using a sample of Tank 50 waste collected in May 2006. This work was performed according to the Technical Task and Quality Assurance Plan (TT/QAP), WSRC-RP-2006-00594 [3]. The salt solution collected from Tank 50 in May 2006 contained approximately 3 weight percent more solids than the sample collected in September 2005. The insoluble solids took longer to settle in the new sample which was interpreted as indicating finer particles in the current sample. The saltstone formulation developed for the September 2005 Tank 50 Batch 0 sample was confirmed for the May 2006 sample with one minor exception. Saltstone prepared with the Tank 50 sample collected in May 2006 required 1.5 times more Daratard 17 set retarding admixture than the saltstone prepared with the September In addition, a sample prepared with lower shear mixing (stirring with a spatula) had a higher plastic viscosity (57 cP) than samples made with higher shear mixing in a blender (23cP). The static gel times of the saltstone slurries made with low shear mixing were also shorter ({approx}32 minutes) than those for comparable samples made in the blender ({approx}47 minutes). The addition of the various waste streams (ETP, HEU-HCAN, and GPE-HCAN) to Tank 50 from September 2005 to May 2006 has increased the amount of set retarder, Daratard 17, required for processing saltstone slurries through the Saltstone facility. If these streams are continued to be added to Tank 50, the quantity of admixtures required to maintain the same processing conditions for the Saltstone facility will probably change and additional testing is recommended to reconfirm the Tank 50 Saltstone formulation.

  20. ENGINEERING CONTRACT ON FY-2 BATCH 2 SATELLITES SIGNED

    Institute of Scientific and Technical Information of China (English)

    SunQing

    2004-01-01

    The signing ceremony of the Engineering Contract on FY-2 Batch 2 (FY-2 02) Satellites was held in Beijing by Commission of Science, Technology and Industry for National Defense (COSTIND) on August 31, 2004. The contract on the development and manufacture of FY-2 batch 2 satellites and the contract on the launch, test and control of FY-2 Batch 2 satellites were signed by China Meteorological Administration (CMA),

  1. ADVANCES ON BILINEAR MODELING OF BIOCHEMICAL BATCH PROCESSES

    OpenAIRE

    GONZÁLEZ MARTÍNEZ, JOSÉ MARÍA

    2015-01-01

    [EN] This thesis is aimed to study the implications of the statistical modeling approaches proposed for the bilinear modeling of batch processes, develop new techniques to overcome some of the problems that have not been yet solved and apply them to data of biochemical processes. The study, discussion and development of the new methods revolve around the four steps of the modeling cycle, from the alignment, preprocessing and calibration of batch data to the monitoring of batches trajectories....

  2. A Survey of Batch Cataloging Practices and Problems

    OpenAIRE

    Young, Philip

    2011-01-01

    Groups of bibliographic records are added to library catalogs with increasing frequency. Batch cataloging requires knowledge of bulk record transfer as well as current cataloging standards. While more efficient than cataloging items individually, batch cataloging requires different skills and creates new challenges. Responses to a wide-ranging online survey document the workload, tools, practices, and problems of batch cataloging. The unique characteristics of electronic resources affect many...

  3. 新月柄杆菌RsaA分泌系统用于大肠杆菌胞外递送重组蛋白的初步研究%Preliminary Study on Exportation of Heterologous Recombinant Proteins in Escherichia coli Utilizing RsaA Secretion System of Caulobacter crescentus

    Institute of Scientific and Technical Information of China (English)

    宁亚蕾; 周立雄; 肖斌; 张卫军; 曾浩; 毛旭虎; 邹全明

    2008-01-01

    目的:构建基于新月柄杆菌RsaA外运机制的以大肠杆菌为宿主的原核胞外分泌表达载体系统.方法:利用分子克隆手段,按RsaA分泌系统操纵子组织方式,将RsaA系统外运功能基因配合以异源调控序列克隆至pQE30骨架质粒.以绿色荧光蛋白(GFP)为报告分子、大肠杆菌M15为宿主菌,诱导表达后通过Western Blotting检测培养上清中GFP的表达.结果:获得了与设计完全一致的pQABPS载体,利用该载体系统,在培养上清中报告分子GFP的表达明显增加,且是通过特异的RsaA外运机制被分泌至胞外的,而非渗漏表达或简单的信号肽引导.结论:在大肠杆菌中重现了RsaA分泌系统的外运功能,为该系统在基因工程领域的应用研究打下了良好基础.

  4. A batch fabricated biomimetic dry adhesive

    Science.gov (United States)

    Northen, Michael T.; Turner, Kimberly L.

    2005-08-01

    The fine hair adhesive system found in nature is capable of reversibly adhering to just about any surface. This dry adhesive, best demonstrated in the pad of the gecko, makes use of a multilevel conformal structure to greatly increase inelastic surface contact, enhancing short range interactions and producing significant amounts of attractive forces. Recent work has attempted to reproduce and test the terminal submicrometre 'hairs' of the system. Here we report the first batch fabricated multi-scale conformal system to mimic nature's dry adhesive. The approach makes use of massively parallel MEMS processing technology to produce 20-150 µm platforms, supported by single slender pillars, and coated with ~2 µm long, ~200 nm diameter, organic looking polymer nanorods, or 'organorods'. To characterize the structures a new mesoscale nanoindenter adhesion test technique has been developed. Experiments indicate significantly improved adhesion with the multiscale system. Additional processing caused a hydrophilic to hydrophobic transformation of the surface and testing indicated further improvement in adhesion.

  5. Batch-to-batch uniformity of bacterial community succession and flavor formation in the fermentation of Zhenjiang aromatic vinegar.

    Science.gov (United States)

    Wang, Zong-Min; Lu, Zhen-Ming; Yu, Yong-Jian; Li, Guo-Quan; Shi, Jin-Song; Xu, Zheng-Hong

    2015-09-01

    Solid-state fermentation of traditional Chinese vinegar is a mixed-culture refreshment process that proceeds for many centuries without spoilage. Here, we investigated bacterial community succession and flavor formation in three batches of Zhenjiang aromatic vinegar using pyrosequencing and metabolomics approaches. Temporal patterns of bacterial succession in the Pei (solid-state vinegar culture) showed no significant difference (P > 0.05) among three batches of fermentation. In all the batches investigated, the average number of community operational taxonomic units (OTUs) decreased dramatically from 119 ± 11 on day 1 to 48 ± 16 on day 3, and then maintained in the range of 61 ± 9 from day 5 to the end of fermentation. We confirmed that, within a batch of fermentation process, the patterns of bacterial diversity between the starter (took from the last batch of vinegar culture on day 7) and the Pei on day 7 were similar (90%). The relative abundance dynamics of two dominant members, Lactobacillus and Acetobacter, showed high correlation (coefficient as 0.90 and 0.98 respectively) among different batches. Furthermore, statistical analysis revealed dynamics of 16 main flavor metabolites were stable among different batches. The findings validate the batch-to-batch uniformity of bacterial community succession and flavor formation accounts for the quality of Zhenjiang aromatic vinegar. Based on our understanding, this is the first study helps to explain the rationality of age-old artistry from a scientific perspective. PMID:25998816

  6. Batch process. Batch process used in a beer brewery; Biru kojo no bacchi purosesu

    Energy Technology Data Exchange (ETDEWEB)

    Kihara, K. [Kirin Engneering Co. Ltd. (Japan)

    1997-09-05

    In a beer brewing process, there is a system in which unit operation of chemical engineering is combined with the techniques of food and fermentation engineering in order to brew beer meeting the quality concept. This paper introduces the characteristics of a batch system used in the brewing of beer and the control method for the brewing of beer. The characteristics of the batch system used in a beer brewing process are the following three. In order to minimize the quality variation ascribed to the raw materials and the process, the materials are blended in various parts of the system. In the saccharification step which determines the quality of beer, two methods, i.e. a batch method and a continuous method are used, and beer brewing companies employ a saccharification system meeting the condition for attaining a desired quality of their own products. Two mashing systems are operated at different cycles shifted by half cycle from each other, not starting both at a time, so as to level the peaks of the utilities, whereby the operation of the utility-related facility is optimized. 1 ref., 2 figs., 1 tab.

  7. Improved batch correction in untargeted MS-based metabolomics

    NARCIS (Netherlands)

    Wehrens, Ron; Hageman, Jos A.; Eeuwijk, van Fred; Kooke, Rik; Flood, Pádraic J.; Wijnker, Erik; Keurentjes, Joost J.B.; Lommen, Arjen; Eekelen, van Henriëtte D.L.M.; Hall, Robert D.; Mumm, Roland; Vos, de Ric C.H.

    2016-01-01

    Introduction: Batch effects in large untargeted metabolomics experiments are almost unavoidable, especially when sensitive detection techniques like mass spectrometry (MS) are employed. In order to obtain peak intensities that are comparable across all batches, corrections need to be performed. S

  8. Adaptive scheduling of batch servers in flow shops

    NARCIS (Netherlands)

    van der Zee, D.J.

    2002-01-01

    Batch servicing is a common way of benefiting from economies of scale in manufacturing operations. Good examples of production systems that allow for batch processing are ovens found in the aircraft industry and in semiconductor manufacturing. In this paper we study the issue of dynamic scheduling o

  9. Communication and control in small batch part manufacturing

    NARCIS (Netherlands)

    Tiemersma, J.J.; Curtis, W.; Kals, H.J.J.

    1993-01-01

    This paper reports on the development of a real-time control network as an integrated part of a shop floor control system for small batch part manufacturing. The shop floor control system is called the production control system (PCS). The PCS aims at an improved control of small batch part manufactu

  10. Spatial and interannual variability in Baltic sprat batch fecundity

    DEFF Research Database (Denmark)

    Haslob, H.; Tomkiewicz, Jonna; Hinrichsen, H.H.;

    2011-01-01

    in the central Baltic Sea, namely the Bornholm Basin, Gdansk Deep and Southern Gotland Basin. Environmental parameters such as hydrography, fish condition and stock density were tested in order to investigate the observed variability in sprat fecundity. Absolute batch fecundity was found to be positively related...... to fish length and weight. Significant differences in absolute and relative batch fecundity of Baltic sprat among areas and years were detected, and could partly be explained by hydrographic features of the investigated areas. A non-linear multiple regression model taking into account fish length...... and ambient temperature explained 70% of variability in absolute batch fecundity. Oxygen content and fish condition were not related to sprat batch fecundity. Additionally, a negative effect of stock size on sprat batch fecundity in the Bornholm Basin was revealed. The obtained data and results are important...

  11. Dynamic Simulation of Batch Photocatalytic Reactor (BPR) for Wastewater Treatment

    Science.gov (United States)

    Dutta, Suman

    2012-08-01

    Reactive dyes discharged from dyehouse causes a serious environmental problem. UV/TiO2 photocatalysis has been employed effectively for these organic dyes removal from dye-house effluent. This process produces less amount of non-toxic final product. In this paper a photocatalytic reactor has been designed for Reactive red 198 (RR198) removal from aqueous solution. The reactor is operating in batch mode. After each batch, TiO2 catalyst has been separated and recycled in the next batch. Mathematical model equation of this batch photocatalytic reactor (BPR) has been developed considering Langmuir-Hinshelwood kinetics. Simulation of BPR has been carried out using fourth order Runge-Kutta (RK) method and fifth order RK method (Butcher method). This simulation results can be used to develop an automatic photocatlytic reactor for industrial wastewater treatment. Catalyst activity decay and its effect on each batch have been incorporated in this model.

  12. Effect of glass-batch makeup on the melting process

    Energy Technology Data Exchange (ETDEWEB)

    Hrma, Pavel R; Schweiger, Michael J; Humrickhouse, Carissa J; Moody, J Adam; Tate, Rachel M; Rainsdon, Timothy T; Tegrotenhuis, Nathan E; Arrigoni, Benjamin M; Marcial, Jose; Rodriguez, Carmen P; Tincher, Benjamin

    2010-03-29

    The response of a glass batch to heating is determined by the batch makeup and in turn determines the rate of melting. Batches formulated for a high-alumina nuclear waste to be vitrified in an all-electric melter were heated at a constant temperature-increase rate to determine changes in melting behavior in response to the selection of batch chemicals and silica grain-size as well as the addition of heat-generating reactants. The type of batch materials and the size of silica grains determine how much, if any, primary foam occurs during melting. Small quartz grains, 5-μm in size, caused extensive foaming because their major portion dissolved at temperatures <800°C, contributing to the formation of viscous glass-forming melt that trapped evolving batch gases. Primary foam did not occur in batches with larger quartz grains, ±75 μm in size, because their major portion dissolved at temperatures >800°C when batch gases no longer evolved. The exothermal reaction of nitrates with sucrose was ignited at a temperature as low as 160°C and caused a temporary jump in temperature of several hundred degrees. Secondary foam, the source of which is oxygen from redox reactions, occurred in all batches of a limited composition variation involving five oxides, B2O3, CaO, Li2O, MgO, and Na2O. The foam volume at the maximum volume-increase rate was a weak function of temperature and melt basicity. Neither the batch makeup nor the change in glass composition had a significant impact on the dissolution of silica grains. The impacts of primary foam generation on glass homogeneity and the rate of melting in large-scale continuous furnaces have yet to be established via mathematical modeling and melter experiments.

  13. Biodenitrification in Sequencing Batch Reactors. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Silverstein, J. [Colorado Univ., Boulder, CO (United States). Dept. of Civil, Environmental, and Architectural Engineering

    1996-01-23

    One plan for stabilization of the Solar Pond waters and sludges at Rocky Flats Plant (RFP), is evaporation and cement solidification of the salts to stabilize heavy metals and radionuclides for land disposal as low-level mixed waste. It has been reported that nitrate (NO{sub 3}{sub {minus}}) salts may interfere with cement stabilization of heavy metals and radionuclides. Therefore, biological nitrate removal (denitrification) may be an important pretreatment for the Solar Pond wastewaters at RFP, improving the stability of the cement final waste form, reducing the requirement for cement (or pozzolan) additives and reducing the volume of cemented low-level mixed waste requiring ultimate disposal. A laboratory investigation of the performance of the Sequencing Batch Reactor (SBR) activated sludge process developed for nitrate removal from a synthetic brine typical of the high-nitrate and high-salinity wastewaters in the Solar Ponds at Rocky Flats Plant was carried out at the Environmental Engineering labs at the University of Colorado, Boulder, between May 1, 1994 and October 1, 1995.

  14. Biodegradability of industrial textile wastewater - batch tests.

    Science.gov (United States)

    Paździor, Katarzyna; Klepacz-Smółka, Anna; Wrębiak, Julita; Liwarska-Bizukojć, Ewa; Ledakowicz, Stanisław

    2016-01-01

    Following new trends we applied oxygen uptake rate (OUR) tests as well as long-term tests (in two batch bioreactors systems) in order to assess the biodegradability of textile wastewater. Effluents coming from a dyeing factory were divided into two streams which differed in inorganic and organic contaminants loads. Usefulness of the stream division was proved. Biodegradation of the low-loaded stream led to over 97% reduction of biochemical oxygen demand (BOD5) together with 80% reduction of chemical oxygen demand (COD) and total organic carbon (TOC). Most of the controlled parameter values were below the levels allowed by legislation for influents to surface water, whereas the high-loaded stream was so contaminated with recalcitrant organic compounds that despite the reduction of BOD5 by over 95%, COD, TOC, total nitrogen and total phosphorus levels exceeded permissible values. OUR tests were aimed at determination of the following kinetic parameters: maximum specific growth rate (μMax), half-saturation constant, hydrolysis constant and decay coefficient for activated sludge biomass for both types of textile wastewater studied. The values of kinetic parameters will be applied in activated sludge models used for prediction and optimisation of biological treatment of textile wastewater. PMID:27642827

  15. Batch-to-batch learning for model-based control of process systems with application to cooling crystallization

    NARCIS (Netherlands)

    Forgione, M.

    2014-01-01

    From an engineering perspective, the term process refers to a conversion of raw materials into intermediate or final products using chemical, physical, or biological operations. Industrial processes can be performed either in continuous or in batch mode. There exist for instance continuous and batch

  16. Kinetic study of batch and fed-batch enzymatic saccharification of pretreated substrate and subsequent fermentation to ethanol

    Directory of Open Access Journals (Sweden)

    Gupta Rishi

    2012-03-01

    Full Text Available Abstract Background Enzymatic hydrolysis, the rate limiting step in the process development for biofuel, is always hampered by its low sugar concentration. High solid enzymatic saccharification could solve this problem but has several other drawbacks such as low rate of reaction. In the present study we have attempted to enhance the concentration of sugars in enzymatic hydrolysate of delignified Prosopis juliflora, using a fed-batch enzymatic hydrolysis approach. Results The enzymatic hydrolysis was carried out at elevated solid loading up to 20% (w/v and a comparison kinetics of batch and fed-batch enzymatic hydrolysis was carried out using kinetic regimes. Under batch mode, the actual sugar concentration values at 20% initial substrate consistency were found deviated from the predicted values and the maximum sugar concentration obtained was 80.78 g/L. Fed-batch strategy was implemented to enhance the final sugar concentration to 127 g/L. The batch and fed-batch enzymatic hydrolysates were fermented with Saccharomyces cerevisiae and ethanol production of 34.78 g/L and 52.83 g/L, respectively, were achieved. Furthermore, model simulations showed that higher insoluble solids in the feed resulted in both smaller reactor volume and shorter residence time. Conclusion Fed-batch enzymatic hydrolysis is an efficient procedure for enhancing the sugar concentration in the hydrolysate. Restricting the process to suitable kinetic regimes could result in higher conversion rates.

  17. 40 CFR Table 7 to Subpart Jjj of... - Group 1 Batch Process Vents and Aggregate Batch Vent Streams-Monitoring, Recordkeeping, and...

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Group 1 Batch Process Vents and Aggregate Batch Vent Streams-Monitoring, Recordkeeping, and Reporting Requirements 7 Table 7 to Subpart JJJ... Table 7 to Subpart JJJ of Part 63—Group 1 Batch Process Vents and Aggregate Batch Vent...

  18. 40 CFR Table 6 to Subpart U of... - Group 1 Batch Front-End Process Vents and Aggregate Batch Vent Streams-Monitoring, Recordkeeping...

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Group 1 Batch Front-End Process Vents and Aggregate Batch Vent Streams-Monitoring, Recordkeeping, and Reporting Requirements 6 Table 6 to... 6 to Subpart U of Part 63—Group 1 Batch Front-End Process Vents and Aggregate Batch Vent...

  19. Batch-specific discrimination using nuclear quadrupole resonance spectroscopy.

    Science.gov (United States)

    Kyriakidou, Georgia; Jakobsson, Andreas; Althoefer, Kaspar; Barras, Jamie

    2015-04-01

    In this paper, we report on the identification of batches of analgesic paracetamol (acetaminophen) tablets using nitrogen-14 nuclear quadrupole resonance spectroscopy ((14)N NQR). The high sensitivity of NQR to the electron charge distribution surrounding the quadrupolar nucleus enables the unique characterization of the crystal structure of the material. Two hypothesis were tested on batches of the same brand: the within the same batch variability and the difference between batches that varied in terms of their batch number and expiry date. The multivariate analysis of variance (MANOVA) did not provide any within-batches variations, indicating the natural deviation of a medicine manufactured under the same conditions. Alternatively, the statistical analysis revealed a significant discrimination between the different batches of paracetamol tablets. Therefore, the NQR signal is an indicator of factors that influence the physical and chemical integrity of the material. Those factors might be the aging of the medicine, the manufacturing, or storage conditions. The results of this study illustrate the potential of NQR as promising technique in applications such as detection and authentication of counterfeit medicines.

  20. FRIT DEVELOPMENT FOR SLUDGE BATCH 6

    Energy Technology Data Exchange (ETDEWEB)

    Fox, K.; Edwards, T.; Zamecnik, J.

    2010-05-13

    The Savannah River National Laboratory (SRNL) evaluated a large number of Sludge Batch 6 (SB6) composition projections to support frit optimization for SB6 vitrification at the Defense Waste Processing Facility (DWPF). The evaluations discussed in this report occurred over a period of about 4 months, and included about 40 composition projections, developed by both Savannah River Remediation (SRR) and SRNL. Paper study assessments were used to evaluate the sludge composition projections with arrays of potential frit compositions using the predictive models in the DWPF Product Composition Control System (PCCS). Both nominal sludge compositions and sludge compositions with anticipated compositional variation were considered. The model predictions were used to identify candidate frit compositions for each SB6 projection and to provide some guidance to SRR on washing and blending strategies for SB6 preparation. This report presents a chronological review of this process and summarizes the findings at each stage. Following initial feedback from this work, the number of washes in Tank 51 was reduced to increase the projected sodium concentration in SB6. Analyses of predicted frit performance before and after a potential decant of Tank 40 showed that the post-decant SB6 composition would be difficult to process with any frit composition and that this scenario should be avoided. Based on the most recent SB6 projections (February 2010 SB6 composition projections developed at SRNL using the measured SB6 qualification sample composition and the revised Tank Farm washing plan), Frit 418 appears to be viable for SB6 processing at a target waste loading of 36%. A Nominal Stage PCCS Measurement Acceptability Region (MAR) assessment gave projected operating windows of 25-41% waste loading, limited by predictions of nepheline crystallization. The projected operating window is reduced to 25-38% waste loading when anticipated compositional variation is considered, again limited by

  1. Batch cooling crystallization and pressure filtration of sulphathiazole

    DEFF Research Database (Denmark)

    Häkkinen, Antti; Pöllänen, Kati; Karjalainen, Milja;

    2005-01-01

    crystal suspensions obtained through an unseeded batch-cooling-crystallization process was studied. Sulphathiazole, which is an antibiotic agent with multiple polymorphic forms, was produced by performing laboratory-scale cooling crystallization experiments from five different mixtures of water and propan...... the samples obtained from different solvents. The crystals produced in the batch-cooling-crystallization experiments were separated from the crystallizing solvents using a batch-type pressure Nutsche filter, and the filtration characteristics of the suspensions were evaluated on the basis of average filter...

  2. IVR RSA Database

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This database contains trip-level reports submitted by vessels participating in Research Set-Aside projects with IVR reporting requirements.

  3. Optimal configuration, design and operation of batch distillation processes

    OpenAIRE

    Low, K. H.

    2003-01-01

    The overall objective of this thesis is to study the optimal configuration. design and operating policy of batch distillation processes in different separation scenarios. In so doing, this work also aims to provide conceptual insights and compare the performance of the traditional regular column against unconventional columns. In the first part of the thesis, the optimal operation of extractive batch distillation is investigated. A rigorous dynamic optimisation approach based o...

  4. Optimal control of a fed-batch fermentation

    Energy Technology Data Exchange (ETDEWEB)

    Dekkers, R.M.

    1984-01-01

    The common cultivation of bakers' yeast is an aerobic fed-batch fermentation under sugar-limited growth. The ultimate objective of on-line computer control is to optimize the process through maximizing the productivity of biomass formation while minimizing the consumption of raw materials for the product. Results obtained on the optimal control of a fed-batch fermentation are given. The aspects to be considered are instrumentation, state estimation, optimization and process control.

  5. Differences of silicon photodiode spectral reflectance among the same batch

    Institute of Scientific and Technical Information of China (English)

    A.L.Mu(n)oz Zurita; J.Campos Acosta; A.Pons Aglio; A.Shcherbakov

    2008-01-01

    Photodiode's reflectance plays an important role regarding the relation between responsivity and the incident flux. In this work we analyze how the spectral reflectance changes among photodiodes from the same manufacturer and batch and how the reflectance of three standard photodiodes has drifted during six years. The results show that the reflectance changes from diode to diode within the same batch and also show th.at the reflectance ofphotodiodes changes on time. This ageing is spectrally dependent.

  6. Dynamic Extensions of Batch Systems with Cloud Resources

    International Nuclear Information System (INIS)

    Compute clusters use Portable Batch Systems (PBS) to distribute workload among individual cluster machines. To extend standard batch systems to Cloud infrastructures, a new service monitors the number of queued jobs and keeps track of the price of available resources. This meta-scheduler dynamically adapts the number of Cloud worker nodes according to the requirement profile. Two different worker node topologies are presented and tested on the Amazon EC2 Cloud service.

  7. Xylitol production by Candida parapsilosis under fed-batch culture

    OpenAIRE

    Furlan Sandra A.; Castro Heizir F. de

    2001-01-01

    Xylitol production by Candida parapsilosis was investigated under fed-batch cultivation, using single (xylose) or mixed (xylose and glucose) sugars as substrates. The presence of glucose in the medium induced the production of ethanol as secondary metabolite and improved specific rates of growth, xylitol formation and substrate consumption. Fractionated supply of the feed medium at constant sugar concentration did not promote any increase on the productivity compared to the single batch culti...

  8. Shortcut Algorithm for Simulation of Batch Extractive Distillation

    Institute of Scientific and Technical Information of China (English)

    WU Huixiong; XU Shimin; HU Hui; XIAO Bin

    2007-01-01

    The batch extractive distillation (BED) process has the advantages of both batch and extractive distillation. It is one of the most promising means for the separation of azeotropic and close-boiling point systems. However, so far this process has not been applied in industry due to its over-complexity. A new shortcut model was proposed to simulate the operation of the batch extractive distillation operations. This algorithm is based on the assumption that the batch extractive distillation column can be considered as a continuous extractive distillation column with changing feed at anytime. Namely, the whole batch process is simulated as a succession of a finite number of steady states of short duration, in which holdup is considered as constant mole. For each period of time the batch extractive distillation process is solved through the algorithm for continuous extractive distillation. Finally, the practical implementation of the shortcut model is discussed and data from the lab-oratory and literature are presented. It is found that this model has better adaptability, more satisfactory accuracy and less calculative load than previous rigorous model. Hence the algorithm for simulating BED is verified.

  9. Batch process monitoring based on multilevel ICA-PCA

    Institute of Scientific and Technical Information of China (English)

    Zhi-qiang GE; Zhi-huan SONG

    2008-01-01

    In this paper,we describe a new batch process monitoring method based on multilevel independent component analysis and principal component analysis (MLICA-PCA).Unlike the conventional multi-way principal component analysis (MPCA) method,MLICA-PCA provides a separated interpretation for multilevel batch process data.Batch process data are partitioned into two levels:the within-batch level and the between-batch level.In each level,the Gaussian and non-Ganssian components of process information can be separately extracted.I2,T2 and SPE statistics are individually built and monitored.The new method facilitates fault diagnosis.Since the two variation levels arc decomposed,the variables responsible for faults in each level can be identified and interpreted more easily.A case study of the Dupont benchmark process showed that the proposed method was more efficient and interpretable in fault detection and diagnosis,compared to the alternative batch process monitoring method.

  10. OPLS in batch monitoring - Opens up new opportunities.

    Science.gov (United States)

    Souihi, Nabil; Lindegren, Anders; Eriksson, Lennart; Trygg, Johan

    2015-02-01

    In batch statistical process control (BSPC), data from a number of "good" batches are used to model the evolution (trajectory) of the process and they also define model control limits, against which new batches may be compared. The benchmark methods used in BSPC include partial least squares (PLS) and principal component analysis (PCA). In this paper, we have used orthogonal projections to latent structures (OPLS) in BSPC and compared the results with PLS and PCA. The experimental study used was a batch hydrogenation reaction of nitrobenzene to aniline characterized by both UV spectroscopy and process data. The key idea is that OPLS is able to separate the variation in data that is correlated to the process evolution (also known as 'batch maturity index') from the variation that is uncorrelated to process evolution. This separation of different types of variations can generate different batch trajectories and hence lead to different established model control limits to detect process deviations. The results demonstrate that OPLS was able to detect all process deviations and provided a good process understanding of the root causes for these deviations. PCA and PLS on the other hand were shown to provide different interpretations for several of these process deviations, or in some cases they were unable to detect actual process deviations. Hence, the use of OPLS in BSPC can lead to better fault detection and root cause analysis as compared to existing benchmark methods and may therefore be used to complement the existing toolbox. PMID:25604817

  11. [Characteristic of Particulate Emissions from Concrete Batching in Beijing].

    Science.gov (United States)

    Xue, Yi-feng; Zhou, Zhen; Zhong, Lian-hong; Yan, Jing; Qu, Song; Huang, Yu-hu; Tian, He- zhong; Pan, Tao

    2016-01-15

    With the economic development and population growth in Beijing, there is a strong need for construction and housing, which leads to the increase of the construction areas. Meanwhile, as a local provided material, the production of concrete has been raised. In the process of concrete production by concrete batching, there are numerous particulates emitted, which have large effect on the atmospheric environment, however, systematic study about the tempo-spatial characteristics of pollutant emission from concrete batching is still rare. In this study, we estimated the emission of particulates from concrete batching from 1991 to 2012 using emission factor method, analyzed the tempo-spatial characteristics of pollutant emission, established the uncertainty range by adopting Monte-Carlo method, and predicted the future emission in 2020 based on the relative environmental and economical policies. The results showed that: (1) the emissions of particulates from concrete batching showed a trend of "first increase and then decrease", reaching the maximum in 2005, and then decreased due to stricter emission standard and enhanced environmental management. (2) according to spatial distribution, the emission of particulates from concrete batch mainly concentrated in the urban area with more human activities, and the area between the fifth ring and the sixth ring contributed the most. (3) through scenarios analysis, for further reducing the emission from concrete batching in 2020, more stricter standard for green production as well as powerful supervision is needed.

  12. 基于RSA的数字图像加密算法%An Encryption Algorithm for Digital Image Based on RSA System

    Institute of Scientific and Technical Information of China (English)

    杨昔阳; 李志伟

    2009-01-01

    It proposes a novel encryption method for digital image based on an Arnold scrambling transform, a chaos encryption algorithm and RSA encryption system. The parameters of the Arnold transform and chaos encryption algorithm are encrypted by RSA system and stored in LSB of an image to ensure the security in transmission. The example in this paper shows that the proposed method is an efficient way to encrypt a digital image.%提出一种基于RSA公钥、Arnold置乱变换和混沌加密算法相结合的公开密钥数字图像加密体制,利用客户的公钥对Arnold置乱变换和混沌序列初值进行RSA加密,确保了只有合法用户才能获取置乱参数信息并将图像复原.RSA对参数的加密信息隐藏于图像LSB中,无需另外传递密文,运算简单,具有良好的加密与隐藏效果.

  13. Effect of batch and fed-batch growth modes on biofilm formation by Listeria monocytogenes at different temperatures

    OpenAIRE

    Rodrigues, Diana Alexandra Ferreira; Almeida, Marta A. S.; Teixeira, P.; Oliveira, Rosário; Azeredo, Joana

    2009-01-01

    The influence of Listeria monocytogenes (L. monocytogenes) biofilm formation feeding conditions (batch and fed-batch) at different temperatures on biofilm biomass and activity was determined. Biofilm biomass and cellular metabolic activity were assessed by Crystal Violet (CV) staining and 2,3-bis(2-methoxy-4-nitro-5-sulfophenyl)-2H-tetrazolium-5-carboxanilide inner salt (XTT) colorimetric method, respectively. Live/Dead staining was also performed in order to get microscopic visualization of ...

  14. Design and Application of Software Sensors in Batch and Fed-batch Cultivations during Recombinant Protein Expression in Escherichia coli

    OpenAIRE

    Warth, Benedikt

    2008-01-01

    Software sensors are a potent tool to improve biotechnological real time process monitoring and control. In the current project, algorithms for six partly novel, software sensors were established and tested in a microbial reactor system. Eight batch and two fed-batch runs were carried out with a recombinant Escherichia coli to investigate the suitability of the different software sensor models in diverse cultivation stages. Special respect was given to effects on the sensors after recombinant...

  15. SLUDGE BATCH 7B GLASS VARIABILITY STUDY

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, F.; Edwards, T.

    2011-10-25

    The Defense Waste Processing Facility (DWPF) is preparing to initiate processing Sludge Batch 7b (SB7b). In support of the upcoming processing, the Savannah River National Laboratory (SRNL) provided a recommendation to utilize Frits 418 with a 6% Na{sub 2}O addition (26 wt% Na{sub 2}O in sludge) and 702 with a 4% Na{sub 2}O addition (24 wt% Na{sub 2}O in sludge) to process SB7b. This recommendation was based on assessments of the compositional projections for SB7b available at the time from the Savannah River Remediation (SRR). To support qualification of SB7b, SRNL executed a variability study to assess the applicability of the current durability models for SB7b. The durability models were assessed over the expected composition range of SB7b, including potential caustic additions, combined with Frits 702 and 418 over a 32-40% waste loading (WL) range. Thirty four glasses were selected based on Frits 418 and 702 coupled with the sludge projections with an additional 4-6% Na{sub 2}O to reflect the potential caustic addition. Six of these glasses, based on average nominal sludge compositions including the appropriate caustic addition, were developed for both Frit 418 and Frit 702 at 32, 36 and 40% WL to provide coverage in the center of the anticipated SB7b glass region. All glasses were fabricated and characterized using chemical composition analysis, X-ray diffraction (XRD) and the Product Consistency Test (PCT). To comply with the DWPF Glass Product Control Program, a total of thirty four glasses were fabricated to assess the applicability of the current DWPF PCCS durability models. Based on the measured PCT response, all of the glasses were acceptable with respect to the Environmental Assessment (EA) benchmark glass regardless of thermal history. The NL[B] values of the SB7b variability study glasses were less than 1.99 g/L as compared to 16.695 g/L for EA. A small number of the D-optimally selected 'outer layer' extreme vertices (EV) glasses were not

  16. SLUDGE BATCH VARIABILITY STUDY WITH FRIT 418

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, F.; Edwards, T.

    2010-11-29

    The Defense Waste Processing Facility (DWPF) initiated processing Sludge Batch 6 (SB6) in the summer of 2010. In support of processing, the Savannah River National Laboratory (SRNL) provided a recommendation to utilize Frit 418 to process SB6. This recommendation was based on assessments of the compositional projections for SB6 available at the time from the Liquid Waste Organization (LWO) and SRNL (using a model-based approach). To support qualification of SB6, SRNL executed a variability study to assess the applicability of the current durability models for SB6. The durability models were assessed over the expected Frit 418-SB6 composition range. Seventeen glasses were selected for the variability study based on the sludge projections used in the frit recommendation. Five of the glasses are based on the centroid of the compositional region, spanning a waste loading (WL) range of 32 to 40%. The remaining twelve glasses are extreme vertices (EVs) of the sludge region of interest for SB6 combined with Frit 418 and are all at 36% WL. These glasses were fabricated and characterized using chemical composition analysis, X-ray diffraction (XRD) and the Product Consistency Test (PCT). After initiating the SB6 variability study, the measured composition of the SB6 Tank 51 qualification glass produced at the SRNL Shielded Cells Facility indicated that thorium was present in the glass at an appreciable concentration (1.03 wt%), which made it a reportable element for SB6. This concentration of ThO{sub 2} resulted in a second phase of experimental studies. Five glasses were formulated that were based on the centroid of the new sludge compositional region combined with Frit 418, spanning a WL range of 32 to 40%. These glasses were fabricated and characterized using chemical composition analysis and the PCT. Based on the measured PCT response, all of the glasses (with and without thorium) were acceptable with respect to the Environmental Assessment (EA) reference glass

  17. A study on clavulanic acid production by Streptomyces clavuligerus in batch, fed-batch and continuous processes

    Directory of Open Access Journals (Sweden)

    A. B. Neto

    2005-12-01

    Full Text Available Clavulanic acid (CA is a potent inhibitor of beta-lactamases, enzymes that are responsible for the hydrolysis of beta-lactam antibiotics. It is a secondary metabolite produced by the filamentous aerobic bacterium Streptomyces clavuligerus in submerged cultivations. In the present work clavulanic acid production in batch, fed-batch and continuous bioreactors was studied with the objective of increasing productivity. The operating conditions: temperature, aeration and agitation, were the same in all cases, 28º C, 0.5 vvm and 800 rpm, respectively. The CA concentration obtained in the fed-batch culture, 404 mg L-1, was ca twice the value obtained in the batch culture, 194 mg L-1, while 293 mg L-1 was obtained in the continuous culture. The highest productivity was obtained in the continuous cultivation, 10.6 mg L-1 h-1, as compared with 8.8 mg L-1 h-1 in the fed-batch process and 3.5 mg L-1 h-1 in the batch process, suggesting that continuous culture of Streptomyces clavuligerus is a promising strategy for clavulanic acid production.

  18. Butanol production by immobilised Clostridium acetobutylicum in repeated batch, fed-batch, and continuous modes of fermentation.

    Science.gov (United States)

    Dolejš, Igor; Krasňan, Vladimír; Stloukal, Radek; Rosenberg, Michal; Rebroš, Martin

    2014-10-01

    Clostridium acetobutylicum immobilised in polyvinylalcohol, lens-shaped hydrogel capsules (LentiKats(®)) was studied for production of butanol and other products of acetone-butanol-ethanol fermentation. After optimising the immobilisation protocol for anaerobic bacteria, continuous, repeated batch, and fed-batch fermentations in repeated batch mode were performed. Using glucose as a substrate, butanol productivity of 0.41 g/L/h and solvent productivity of 0.63 g/L/h were observed at a dilution rate of 0.05 h(-1) during continuous fermentation with a concentrated substrate (60 g/L). Through the process of repeated batch fermentation, the duration of fermentation was reduced from 27.8h (free-cell fermentation) to 3.3h (immobilised cells) with a solvent productivity of 0.77 g/L/h (butanol 0.57 g/L/h). The highest butanol and solvent productivities of 1.21 and 1.91 g/L/h were observed during fed-batch fermentation operated in repeated batch mode with yields of butanol (0.15 g/g) and solvents (0.24 g/g), respectively, produced per gram of glucose.

  19. Timing and Estimates of Plio-Pleistocene Sea-Level Highstands from the Republic of South Africa (RSA)

    Science.gov (United States)

    Hearty, Paul; Raymo, Maureen; Sandstrom, Michael; Rovere, Alessio; O'Leary, Michael

    2016-04-01

    The rapid rise in atmospheric CO2 exceeding 400 ppmv is driving an urgent need to better understand past sea level, ice sheet dynamics, and climate change associated with past warmer geological intervals. The LR04 record reveals sustained intervals during the Pliocene (5.6-2.6 Ma) when δ18O exceeded the present levels, indicating a possible decrease in the volume of polar ice sheets. Other shorter intervals of likely decreased ice volume occur during Pleistocene interglacials including MIS 5e, 11, 31, and 37.Here we focus on the middle Pliocene warm period (MPWP; 3.3 to 2.9 Ma), an interval during which Earth experienced CO2 levels around 400 ppmv (Fedorov et al., 2013). The intra-plate coastal margin of western South Africa, a region of relative tectonic stability and relative insensitivity to uncertainty in mantle viscosity as is effects corrections for glacial isostatic adjustment, is a promising region for deriving estimates of eustatic sea level (ESL; thus ice volumes) at the end of the MPWP (Rovere et al., 2014). During a field expedition covering several thousand kilometres along coastlines of western and southern coasts of RSA, we documented the stratigraphy, geomorphology, and geochronology of Pliocene and Pleistocene shorelines with differential GPS providing decimeter scale accuracy to stratigraphic contacts and sea-level indicators. From about twenty sites, precise elevations (as yet uncorrected for GIA) of multiple sea stands were recorded. Strontium isotopes were used to date the shell material from many of the marine sites, but only three sites yielded reliable age data that passed screening criteria for diagenesis. The oldest shoreline evidence, from Cliffs Point on the west coast near the Olifants River, is observed at 34.9 ±0.2 m asl and yields an age 4.70 ± 0.20 Ma; a younger shoreline from the southern coast Bredasdorp site is observed at >24.0 ± 1.5 m asl and yields ages from 3.00 ± 0.45 to 3.55 ± 0.31 Ma, the interval of the MPWP. . A

  20. 40 CFR 63.492 - Batch front-end process vents-reporting requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Batch front-end process vents-reporting... Batch front-end process vents—reporting requirements. (a) The owner or operator of a batch front-end process vent or aggregate batch vent stream at an affected source shall submit the information...

  1. 40 CFR 63.1322 - Batch process vents-reference control technology.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Batch process vents-reference control... Batch process vents—reference control technology. (a) Batch process vents. The owner or operator of a Group 1 batch process vent, as determined using the procedures in § 63.1323, shall comply with...

  2. 40 CFR 63.1327 - Batch process vents-reporting requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Batch process vents-reporting... Batch process vents—reporting requirements. (a) The owner or operator of a batch process vent or aggregate batch vent stream at an affected source shall submit the information specified in paragraphs...

  3. 40 CFR 63.1326 - Batch process vents-recordkeeping provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Batch process vents-recordkeeping... Batch process vents—recordkeeping provisions. (a) Group determination records for batch process vents... batch process vent subject to the group determination procedures of § 63.1323. Except for paragraph...

  4. 40 CFR 63.487 - Batch front-end process vents-reference control technology.

    Science.gov (United States)

    2010-07-01

    ... assumes that the batch unit operation is operating at the maximum design capacity of the EPPU for 12... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Batch front-end process vents-reference... § 63.487 Batch front-end process vents—reference control technology. (a) Batch front-end process...

  5. Efectos de 2 Tipos de Entrenamiento Interválico de Alta Intensidad en la Habilidad para Realizar Esfuerzos Máximos (RSA Durante una Pretemporada de Fútbol

    Directory of Open Access Journals (Sweden)

    Alejandro Rodríguez Fernández

    2014-01-01

    Full Text Available El trabajo de pretemporada persigue mejorar el rendimiento del futbolista tanto en lo referente a la habilidad para realizar esfuerzos máximos como a su capacidad aeróbica y de recuperación. El objetivo de este estudio fue comparar durante una pretemporada los efectos de 2 programas de entrenamiento interválicos con series de diferente duración en la habilidad de repetir sprints (RSA. Diecinueve jugadores de fútbol con valores medios ± SD de 20,9 ± 1,6 años de edad; 68,8 ± 5,1 Kg de peso; 176,1 ± 5,1 cm de altura; y 9,6 ± 2,4% de grasa corporal fueron asignados al azar al grupo de Speed Endurance Training (SET para realizar 2x10 min con 10, 15 y 20 s al 100% con 30, 45 y 60 s de recuperación (n = 9, o al grupo High Interval Training (HIT para realizar 4x4 min al 95% FCmax (n = 10. Un test RSA de 8x30 m con 25 s de recuperación activa fue realizado antes y después de la intervención (10 sesiones de entrenamiento junto con un Yo-Yo Intermittent Recovery Test level 1 en la evaluación inicial. Tanto SET como HIT ven incrementado su rendimiento de forma significativa (p < 0,05 en RSAmejor (3,12% y 3,59% respectivamente y muy significativamente (p < 0,01 en RSAmedia (3,00% y 3,91% y RSAtotal (3,12% y 4,08%, pero sin cambios significativos en los índices de fatiga (Sdec y Change. Estos resultados demuestran que tanto la intervención SET como HIT se han mostrado útiles para aumentar el rendimiento en algunas de las variables determinantes en el test RSA, durante el periodo de pretemporada.

  6. Run-to-run product quality control of batch processes

    Institute of Scientific and Technical Information of China (English)

    JIA Li; SHI Ji-ping; CHENG Da-shuai; CHIU Min-sen

    2009-01-01

    Batch processes have been increasingly used in the production of low volume and high value added products.Consequently,optimization control in batch processes is crucial in order to derive the maximum benefit.In this paper,a run-to-run product quality control based on iterative learning optimization control is developed.Moreover,a rigorous theorem is proposed and proven in this paper,which states that the tracking error under the optimal iterative learning control (ILC) law can converge to zero.In this paper,a typical nonlinear batch continuous stirred tank reactor (CSTR) is considered,and the results show that the performance of trajectory tracking is gradually improved by the ILC.

  7. Batch Statistical Process Monitoring Approach to a Cocrystallization Process.

    Science.gov (United States)

    Sarraguça, Mafalda C; Ribeiro, Paulo R S; Santos, Adenilson O Dos; Lopes, João A

    2015-12-01

    Cocrystals are defined as crystalline structures composed of two or more compounds that are solid at room temperature held together by noncovalent bonds. Their main advantages are the increase of solubility, bioavailability, permeability, stability, and at the same time retaining active pharmaceutical ingredient bioactivity. The cocrystallization between furosemide and nicotinamide by solvent evaporation was monitored on-line using near-infrared spectroscopy (NIRS) as a process analytical technology tool. The near-infrared spectra were analyzed using principal component analysis. Batch statistical process monitoring was used to create control charts to perceive the process trajectory and define control limits. Normal and non-normal operating condition batches were performed and monitored with NIRS. The use of NIRS associated with batch statistical process models allowed the detection of abnormal variations in critical process parameters, like the amount of solvent or amount of initial components present in the cocrystallization.

  8. Biogas plasticization coupled anaerobic digestion: batch test results.

    Science.gov (United States)

    Schimel, Keith A

    2007-06-01

    Biogas has unique properties for improving the biodegradability of biomass solids during anaerobic digestion (AD). This report presents batch test results of the first investigation into utilizing biogas plasticization to "condition" organic polymers during active digestion of waste activated sludge (WAS). Preliminary design calculations based on polymer diffusion rate limitation are presented. Analysis of the 20 degrees C batch test data determined the first order (k(1)) COD conversion coefficient to be 0.167 day(-1) with a maximum COD utilization rate of 11.25 g L(-1) day(-1). Comparison of these batch test results to typical conventional AD performance parameters showed orders of magnitude improvement. These results show that biogas plasticization during active AD could greatly improve renewable energy yields from biomass waste materials such as MSW RDF, STP sludges, food wastes, animal manure, green wastes, and agricultural crop residuals. PMID:17054122

  9. Application of gain scheduling to the control of batch bioreactors

    Science.gov (United States)

    Cardello, Ralph; San, Ka-Yiu

    1987-01-01

    The implementation of control algorithms to batch bioreactors is often complicated by the inherent variations in process dynamics during the course of fermentation. Such a wide operating range may render the performance of fixed gain PID controllers unsatisfactory. In this work, a detailed study on the control of batch fermentation is performed. Furthermore, a simple batch controller design is proposed which incorporates the concept of gain-scheduling, a subclass of adaptive control, with oxygen uptake rate as an auxiliary variable. The control of oxygen tension in the biorector is used as a vehicle to convey the proposed idea, analysis and results. Simulation experiments indicate significant improvement in controller performance can be achieved by the proposed approach even in the presence of measurement noise.

  10. Batch variation between branchial cell cultures: An analysis of variance

    DEFF Research Database (Denmark)

    Hansen, Heinz Johs. Max; Grosell, M.; Kristensen, L.

    2003-01-01

    We present in detail how a statistical analysis of variance (ANOVA) is used to sort out the effect of an unexpected batch-to-batch variation between cell cultures. Two separate cultures of rainbow trout branchial cells were grown on permeable filtersupports ("inserts"). They were supposed...... and introducing the observed difference between batches as one of the factors in an expanded three-dimensional ANOVA, we were able to overcome an otherwisecrucial lack of sufficiently reproducible duplicate values. We could thereby show that the effect of changing the apical medium was much more marked when...... the radioactive lipid precursors were added on the apical, rather than on the basolateral, side. Theinsert cell cultures were obviously polarized. We argue that it is not reasonable to reject troublesome experimental results, when we do not know a priori that something went wrong. The ANOVA is a very useful...

  11. From Fed-batch to Continuous Enzymatic Biodiesel Production

    DEFF Research Database (Denmark)

    Price, Jason Anthony; Nordblad, Mathias; Woodley, John M.;

    2015-01-01

    In this this paper, we use mechanistic modelling to guide the development of acontinuous enzymatic process that is performed as a fed-batch operation. In this workwe use the enzymatic biodiesel process as a case study. A mechanistic model developedin our previous work was used to determine...... measured components (triglycerides, diglycerides, monoglycerides, free fatty acid and fatty acid methyl esters(biodiesel)) much better than using fed-batch data alone given the smaller residuals. We also observe a reduction in the correlation between the parameters.The model was then used to predict that 5...... reactors are required (with a combined residence time of 30 hours) to reach a final biodiesel concentration within 2 % of the95.6 mass % achieved in a fed-batch operation, for 24 hours....

  12. Batch-related sterile endophthalmitis following intravitreal injection of bevacizumab

    Directory of Open Access Journals (Sweden)

    Morteza Entezari

    2014-01-01

    Full Text Available Background: To report a series of patients with sterile endophthalmitis after intravitreal bevacizumab (IVB injection from 2 different batches of bevacizumab. Materials and Methods: Records of 11 eyes with severe inflammation after IVB injections from two different batches (7 eyes from one and 4 from the other on two separate days were evaluated. Fifteen eyes of 15 patients in one day were treated with one batch and 18 eyes of 17 patients were treated another day using another batch injected for different retinal diseases. Each batch was opened on the day of injection. We used commercially available bevacizumab (100 mg/4 ml kept at 4°C. Severe cases with hypopyon were admitted to the ward and underwent anterior chamber and vitreous tap for direct smear and culture. Results: Pain, redness and decreased vision began after 11-17 days. All had anterior chamber and vitreous reactions and 5 had hypopyon. Antibiotics and corticosteroids were initiated immediately, but the antibiotics were discontinued after negative culture results. Visual acuity returned to pre-injection levels in 10 eyes after 1 month and only in one eye pars plana vitrectomy was performed. Mean VA at the time of presentation with inflammation (1.76 ± 0.78 logMAR decreased significantly (P = 0.008 compared to the initial mean corrected VA (1.18 ± 0.55 logMAR; however, final mean corrected VA (1.02 ± 0.48 logMAR improved in comparison with the baseline but not to a significant level (P = 0.159. Conclusions: We report a cluster of sterile endophthalmitis following intravitreal injection of bevacizumab from the same batch of bevacizumab that has a favorable prognosis.

  13. 基于新月柄杆菌RsaA外运机制的EspA及EspA-IL-24融合蛋白胞外分泌表达研究%Study on Extracellular Expression of EspA and EspA-IL-24 Proteins in Escherichia coli Following RsaA Exportation Mechanism of Caulobacter crescentus

    Institute of Scientific and Technical Information of China (English)

    宁亚蕾; 周立雄; 毛旭虎; 张卫军; 程琰; 余抒; 邹全明

    2008-01-01

    目的:实现大肠杆菌分泌蛋白(Esp)A及EspA与白细胞介素(IL)-24融合蛋白的胞外分泌表达,进一步验证基于新月柄杆菌RsaA外运机制的原核胞外分泌表达载体系统的有效性和通用性,并改造优化该系统.方法:利用分子克隆手段,按RsaA分泌系统操纵子组织方式,将获得的RsaA系统元件编码序列和异源调控序列克隆至pQE30骨架质粒,构建新的胞外分泌表达质粒pQABP2S;以大肠杆菌为宿主菌诱导表达EspA及EspA-IL-24融合蛋白,并通过Western blot检测目标蛋白在培养上清中的表达.结果:获得了新的胞外分泌表达载体pQABP2S;与对照相比,该载体宿主系统培养上清中目标蛋白EspA及EspA-IL-24的表达量明显增加.结论:在大肠杆菌中通过RsaA分泌系统可实现分子大小不同的EspA及EspA-IL-24融合蛋白的特异性分泌表达,进一步证实该分泌表达策略的有效性和通用性;调整调控序列以优化分泌系统的尝试,为此类基因工程技术平台的开发提供了借鉴.

  14. Stochastic growth logistic model with aftereffect for batch fermentation process

    Energy Technology Data Exchange (ETDEWEB)

    Rosli, Norhayati; Ayoubi, Tawfiqullah [Faculty of Industrial Sciences and Technology, Universiti Malaysia Pahang, Lebuhraya Tun Razak, 26300 Gambang, Pahang (Malaysia); Bahar, Arifah; Rahman, Haliza Abdul [Department of Mathematical Sciences, Faculty of Science, Universiti Teknologi Malaysia, 81310 Johor Bahru, Johor (Malaysia); Salleh, Madihah Md [Department of Biotechnology Industry, Faculty of Biosciences and Bioengineering, Universiti Teknologi Malaysia, 81310 Johor Bahru, Johor (Malaysia)

    2014-06-19

    In this paper, the stochastic growth logistic model with aftereffect for the cell growth of C. acetobutylicum P262 and Luedeking-Piret equations for solvent production in batch fermentation system is introduced. The parameters values of the mathematical models are estimated via Levenberg-Marquardt optimization method of non-linear least squares. We apply Milstein scheme for solving the stochastic models numerically. The effciency of mathematical models is measured by comparing the simulated result and the experimental data of the microbial growth and solvent production in batch system. Low values of Root Mean-Square Error (RMSE) of stochastic models with aftereffect indicate good fits.

  15. Stochastic growth logistic model with aftereffect for batch fermentation process

    Science.gov (United States)

    Rosli, Norhayati; Ayoubi, Tawfiqullah; Bahar, Arifah; Rahman, Haliza Abdul; Salleh, Madihah Md

    2014-06-01

    In this paper, the stochastic growth logistic model with aftereffect for the cell growth of C. acetobutylicum P262 and Luedeking-Piret equations for solvent production in batch fermentation system is introduced. The parameters values of the mathematical models are estimated via Levenberg-Marquardt optimization method of non-linear least squares. We apply Milstein scheme for solving the stochastic models numerically. The effciency of mathematical models is measured by comparing the simulated result and the experimental data of the microbial growth and solvent production in batch system. Low values of Root Mean-Square Error (RMSE) of stochastic models with aftereffect indicate good fits.

  16. Analysis and modelling of the energy requirements of batch processes; Analyse und Modellierung des Energiebedarfes in Batch-Prozessen

    Energy Technology Data Exchange (ETDEWEB)

    Bieler, P.S.

    2002-07-01

    This intermediate report for the Swiss Federal Office of Energy (SFOE) presents the results of a project aiming to model the energy consumption of multi-product, multi-purpose batch production plants. The utilities investigated were electricity, brine and steam. Both top-down and bottom-up approaches are described, whereby top-down was used for the buildings where the batch process apparatus was installed. Modelling showed that for batch-plants at the building level, the product mix can be too variable and the diversity of products and processes too great for simple modelling. Further results obtained by comparing six different production plants that could be modelled are discussed. The several models developed are described and their wider applicability is discussed. Also, the results of comparisons made between modelled and actual values are presented. Recommendations for further work are made.

  17. Lipid production in batch and fed-batch cultures of Rhodosporidium toruloides from 5 and 6 carbon carbohydrates

    Directory of Open Access Journals (Sweden)

    Wiebe Marilyn G

    2012-05-01

    Full Text Available Abstract Background Microbial lipids are a potential source of bio- or renewable diesel and the red yeast Rhodosporidium toruloides is interesting not only because it can accumulate over 50% of its dry biomass as lipid, but also because it utilises both five and six carbon carbohydrates, which are present in plant biomass hydrolysates. Methods R. toruloides was grown in batch and fed-batch cultures in 0.5 L bioreactors at pH 4 in chemically defined, nitrogen restricted (C/N 40 to 100 media containing glucose, xylose, arabinose, or all three carbohydrates as carbon source. Lipid was extracted from the biomass using chloroform-methanol, measured gravimetrically and analysed by GC. Results Lipid production was most efficient with glucose (up to 25 g lipid L−1, 48 to 75% lipid in the biomass, at up to 0.21 g lipid L−1 h−1 as the sole carbon source, but high lipid concentrations were also produced from xylose (36 to 45% lipid in biomass. Lipid production was low (15–19% lipid in biomass with arabinose as sole carbon source and was lower than expected (30% lipid in biomass when glucose, xylose and arabinose were provided simultaneously. The presence of arabinose and/or xylose in the medium increased the proportion of palmitic and linoleic acid and reduced the proportion of oleic acid in the fatty acids, compared to glucose-grown cells. High cell densities were obtained in both batch (37 g L−1, with 49% lipid in the biomass and fed-batch (35 to 47 g L−1, with 50 to 75% lipid in the biomass cultures. The highest proportion of lipid in the biomass was observed in cultures given nitrogen during the batch phase but none with the feed. However, carbohydrate consumption was incomplete when the feed did not contain nitrogen and the highest total lipid and best substrate consumption were observed in cultures which received a constant low nitrogen supply. Conclusions Lipid production in R. toruloides was lower from arabinose and mixed

  18. Performance comparison of suspended bed and batch contactor chromatography.

    Science.gov (United States)

    Quiñones-García, I; Rayner, I; Levison, P R; Dickson, N; Purdom, G

    2001-01-26

    In some applications, the purification and recovery of biomolecules is performed via a cascade of batch adsorption and desorption stages using agitated contactors and related filtration devices. Suspended bed chromatography is a recent process-scale innovation that is applicable to these separations. This hybrid technique exploits the benefits of combining batch adsorption in an agitated contactor with elution in an enclosed column system. To some extent, the process is similar to batch contactor chromatography but can be fully contained and significantly quicker. The process has two steps; first the fluid containing the sample is mixed with the adsorbent in a stirred tank. Second, the slurry suspension is transferred directly into a specialized column, such as an IsoPak column. The media with the adsorbed product is formed as a packed bed, whilst the suspension liquid is passed out of the column. The product is then eluted from the packed bed utilizing standard column-chromatography techniques. The performance of the suspended bed and the agitated contactor operations are demonstrated both by full-scale experimental results and process simulations. The purification of ovalbumin from a hen-egg white feedstock by anion-exchange chromatography was used as a case study in order to prove the concept. With the availability of both pump-packed systems and shear-resistant media, suspended bed chromatography is a better alternative for a range of applications than the traditional batch separations using agitated contactors. PMID:11218119

  19. Adaptation to high throughput batch chromatography enhances multivariate screening.

    Science.gov (United States)

    Barker, Gregory A; Calzada, Joseph; Herzer, Sibylle; Rieble, Siegfried

    2015-09-01

    High throughput process development offers unique approaches to explore complex process design spaces with relatively low material consumption. Batch chromatography is one technique that can be used to screen chromatographic conditions in a 96-well plate. Typical batch chromatography workflows examine variations in buffer conditions or comparison of multiple resins in a given process, as opposed to the assessment of protein loading conditions in combination with other factors. A modification to the batch chromatography paradigm is described here where experimental planning, programming, and a staggered loading approach increase the multivariate space that can be explored with a liquid handling system. The iterative batch chromatography (IBC) approach is described, which treats every well in a 96-well plate as an individual experiment, wherein protein loading conditions can be varied alongside other factors such as wash and elution buffer conditions. As all of these factors are explored in the same experiment, the interactions between them are characterized and the number of follow-up confirmatory experiments is reduced. This in turn improves statistical power and throughput. Two examples of the IBC method are shown and the impact of the load conditions are assessed in combination with the other factors explored. PMID:25914370

  20. The second batch of environmental standard qualified list released

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    The Ministry of Environmental Protection released the second batch of enterprises list that basically meet environment standards recently. Total 41 enterprises from 10 provinces and autonomous regions of Inner Mongolia, Jiangsu, Jiangxi, Sichuan, Gansu and so on are included in the list.

  1. A fixed-size batch service queue with vacations

    Directory of Open Access Journals (Sweden)

    Ho Woo Lee

    1996-01-01

    Full Text Available The paper deals with batch service queues with vacations in which customers arrive according to a Poisson process. Decomposition method is used to derive the queue length distributions both for single and multiple vacation cases. The authors look at other decomposition techniques and discuss some related open problems.

  2. A Storage Assignment Model for Batch Preparation in Process Industries

    NARCIS (Netherlands)

    Ashayeri, J.; Selen, W.

    2010-01-01

    A new model formulation is developed for reducing the workload in pre-batching at a manufacturer of flavours and fragrances, by optimally assigning ingredients to different storage types, taking into account past usage of ingredients and several restrictions about volumes and number of storage units

  3. Perancangan Sistem Pengaduk Pada Bioreaktor Batch Untuk Meningkatkan Produksi Biogas

    OpenAIRE

    Candrika Widiartanti Yuwono; Totok Soehartanto

    2013-01-01

    Proses anaerob merupakan proses fermentasi dimana memiliki proses yang berlangsung cukup lama. Dan pada bioreaktor anaerob sistem batch, diduga terdapat indikasi pada penurunan jumlah produksi biogas, yang disebabkan karena tejadi pengendapan atau pemisahan antara limbah cair dengan padatannya. Untuk itu muncul upaya untuk melakukan sistem pengadukan agar terjadi homogenitas dan bisa menyerupai seperti kondisi awal, sehingga diharapkan dapat memperpanjang masa produksi biogas. Adapun pengaduk...

  4. On the track of fish batches in three distribution networks

    DEFF Research Database (Denmark)

    Randrup, Maria; Wu, Haiping; Jørgensen, Bo M.

    2012-01-01

    Three fish products sampled in retail shops were traced back to their origin and fish from the same batch were tracked forward towards the retailer, thereby simulating a recall situation. The resulting distribution networks were very complex, but to the extent that companies were willing to provide...

  5. Computer Simulation of Batch Grinding Process Based on Simulink 5.0

    Institute of Scientific and Technical Information of China (English)

    LI Xia; YANG Ying-jie; DENG Hui-yong; HUANG Guang-yao

    2005-01-01

    How to use Simulink software in grinding system was studied. The method of designing batch grinding subsystem and the steps of building batch grinding blockset were introduced. Based on batch grinding population balance model, batch grinding was simulated with Simulink. The results show that the simulation system designed with Simulink explain reasonably the impersonal rule of batch grinding. On the basis of batch grinding simulation, the computer simulation of mineral processing system with Simulink of grinding and classification, comminution, etc, can be properly explored.

  6. Glucoamylase production in batch, chemostat and fed-batch cultivations by an industrial strain of Aspergillus niger

    DEFF Research Database (Denmark)

    Pedersen, Henrik; Beyer, Michael; Nielsen, Jens

    2000-01-01

    The Aspergillus niger strain BO-1 was grown in batch, continuous (chemostat) and fed-batch cultivations in order to study the production of the extracellular enzyme glucoamylase under different growth conditions. In the pH range 2.5-6.0, the specific glucoamylase productivity and the specific...... growth rate of the fungus were independent of pH when grown in batch cultivations. The specific glucoamylase productivity increased linearly with the specific growth rate in the range 0-0.1 h(-1) and was constant in the range 0.1-0.2 h(-1) Maltose and maltodextrin were non-inducing carbon sources...... compared to glucose, and the maximum specific growth rate was 0.19 +/- 0.02 h(-1) irrespective of whether glucose or maltose was the carbon source. In fed-batch cultivations, glucoamylase titres of up to 6.5 g 1(-1) were obtained even though the strain contained only one copy of the glaA gene....

  7. The research of Web Front-end Encryption AIgorithm and the ImpIementation of Decryption Program%Web前端加密算法的研究及解密程序的实现

    Institute of Scientific and Technical Information of China (English)

    傅桐乐

    2015-01-01

    如今,大部分网站使用Web前端加密技术以提高密码在传输过程中的安全性。文章首先阐述了加密技术的现状和加密技术在网站密码传输中的应用,然后测试某网站加密算法的安全性,用嗅探器捕获网页Post密码时的数据包并对数据包进行分析,研究该网站前端基于Javascript实现的加密算法,用Python编程实现对该网站密码的解密。最后,针对该网站的密码传输安全提出改进方案。%Nowdays, Most websites uses web front-end encryption technoIogy to keep passwords safe whiIe transmit ing. FirstIy, This paper describes the status of encryption technoIogy and the appIication of encryption technoIogy in websites passwords transmission, and then tests a website encryption security. It uses snif er to anaIyzes the packets which captures when webpage posts password. Next, researches the web front-end encryption aIgorithm which base on javascript. After that, decrypts the website ciphers with python programming. FinaI y, gives some soIutions to improve the website passwords security during transmission.

  8. MASS PRODUCTION OF THE BENEFICIAL NEMATODE STEINERNEMA CARPOCAPSAE UTILIZING A FED-BATCH CULTURING PROCESS

    Directory of Open Access Journals (Sweden)

    Leonard D. Holmes

    2013-04-01

    Full Text Available The present study deals with the batch and fed-batch mass production of Steinernema carpocapsae. S. carpocapsae is an entomoparasitic nematode that is used as a biological control agent of soil-borne crop insect pests. The ability and efficiency of fed-batch culture process was successful through the utilization of the nematode’s bacterial symbiont Xenorhabdus nematophila. Results from the fed-batch process were compared to those obtain from the standard batch process. The fed-batch process successively improved the mass production process of S. carpocapsae employing liquid medium technology. Within the first week of the fed-batch process (day six, the nematode density obtained was 202,000 nematodes mL−1; whereas on day six, batch culture mode resulted in a nematode density of 23,000 nematodes mL−1. The fed-batch process was superior to that of batch production with a yield approximately 8.8-fold higher. In fed-batch process, the nematode yield was improved 88.6 % higher within a short amount of time compared to the batch process. Fed-batch seems to make the process more efficient and possibly economically viable.

  9. On the choice of batch mode in order to maximize throughput

    NARCIS (Netherlands)

    Weeda, P.J.

    1990-01-01

    An analysis of serial process configurations consisting of three processes and two machines shows interesting relations between the choice of batch mode (or batch structure), utilization of capacities and maximum throughput.

  10. JAVA Implementation of the Batched iLab Shared Architecture

    Directory of Open Access Journals (Sweden)

    Lenard Payne

    2013-04-01

    Full Text Available The MIT iLab Shared Architecture is limited currently to running on the Microsoft Windows platform. A JAVA implementation of the Batched iLab Shared Architecture has been developed that can be used on other operating systems and still interoperate with the existing Microsoft .NET web services of MIT’s iLab ServiceBroker. The Batched iLab Shared Architecture has been revised and separates the Labserver into a LabServer that handles experiment management and a LabEquipment that handles experiment execution. The JAVA implementation provides a 3-tier code development model that allows code to be reused and to develop only the code that is specific to each experiment.

  11. Nonlinear dynamic modeling of multicomponent batch distillation: a case study

    Directory of Open Access Journals (Sweden)

    L. Jiménez

    2002-07-01

    Full Text Available The aim of this work is to compare several of the commercial dynamic models for batch distillation available worldwide. In this context, BATCHFRAC™, CHEMCAD™ BATCH, and HYSYS.Plant® software performances are compared to experimental data. The software can be used as soft sensors, playing the roll of ad-hoc observers or estimators for control objectives. Rigorous models were used as an alternative to predict the concentration profile and to specify the optimal switching time from products to slop cuts. The performance of a nonlinear model obtained using a novel identification algorithm was also studied. In addition, the strategy for continuous separation was revised with residue curve map analysis using Aspen SPLIT™.

  12. Method to incorporate energy integration considerations in multiproduct batch processes

    Energy Technology Data Exchange (ETDEWEB)

    Corominas, J.; Espuna, A.; Puigjaner, L. (Universidad Politecnica de Cataluna, Barcelona (Spain))

    Systemization of an energy saving grass-root design and retrofitting technology based on process integration is a subject of increasing interest in plants running under the batch mode of operation. In this work, the solution to the product changeover problem is studied in order to achieve a feasible and optimized heat exchange network design for multiproduct batch plants. A new methodology is presented which is based on: (a) the campaign-mode of plant operation; and (b) the study of energy integration for each campaign. The concept of Macronetwork is also introduced. Algorithms to obtain the best feasible matches and energy targets are presented and results of test-case studies are discussed to illustrate this methodology. (author)

  13. A new look at energy integration in multiproduct batch processes

    Energy Technology Data Exchange (ETDEWEB)

    Corominas, J.; Espuna, A.; Puigjaner, L. (Univ. Politecnica de Catalunya (Spain). Chemical Engineering Dept.)

    1993-01-01

    Systematization of an energy saving grass-root design and retrofitting technology based on process integration is a subject of increasing interest in plants running under the batch mode of operation. In this work, the solution to the changeover product problem is studied in order to achieve a feasible and optimized heat exchange network design for multiproduct batch plants. A new methodology is presented which is based on: (a) the campaign-mode of plant operation, (b) the study of energy integration for each campaign. The concept of Macronetwork is also introduced. This includes the heat exchanger network of all campaigns in an overall design, and contemplates the common matches between networks of campaigns of different products. Algorithms to obtain the best feasible matches and energy targets are presented and results of test-case studies are discussed to illustrate this methodology. (author)

  14. Sorting Olive Batches for the Milling Process Using Image Processing

    Directory of Open Access Journals (Sweden)

    Daniel Aguilera Puerto

    2015-07-01

    Full Text Available The quality of virgin olive oil obtained in the milling process is directly bound to the characteristics of the olives. Hence, the correct classification of the different incoming olive batches is crucial to reach the maximum quality of the oil. The aim of this work is to provide an automatic inspection system, based on computer vision, and to classify automatically different batches of olives entering the milling process. The classification is based on the differentiation between ground and tree olives. For this purpose, three different species have been studied (Picudo, Picual and Hojiblanco. The samples have been obtained by picking the olives directly from the tree or from the ground. The feature vector of the samples has been obtained on the basis of the olive image histograms. Moreover, different image preprocessing has been employed, and two classification techniques have been used: these are discriminant analysis and neural networks. The proposed methodology has been validated successfully, obtaining good classification results.

  15. MACROSCOPIC KINETIC MODELS OF GLYCEROL BATCH FERMENTATION WITH OSMOTOLERANT YEAST

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    l introductionGlycerol production by fermentation has beenwidely investigated to meet the great commercialdemand in last decades and osmotolerant yeast wasthe microorganism studied most. To analyze thefermentation process more efficiently, a kinetic modelshould be established but little works about it werereported because of its complicated metabolism ofglycerol [1-3]. Batch fermentation experiment showedthat low glucose concentration in the latterfermentation stage resulted in decrease in both glucoseconsu...

  16. Batch gating for data association in monocular SLAM

    OpenAIRE

    Guerra Paradas, Edmundo; Munguía Alcalá, Rodrigo Francisco; Bolea Monte, Yolanda; Grau Saldes, Antoni

    2013-01-01

    This work describes the development and implementation of a single-camera SLAM system, introducing a novel data validation algorithm. A 6-DOF monocular SLAM method developed is based on the Delayed Inverse-Depth (DI-D) Feature Initialization, with the addition of a new data association batch validation technique, the Highest Order Hypothesis Compatibility Test, HOHCT. The DI-D initializes new features in the system defining single hypothesis for the initial depth of features by stoch...

  17. Group technology. [Increasing batch-lot production efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Rome, C.P.

    1976-01-01

    Group Technology has been conceptually applied to the manufacture of batch-lots of 554 machined electromechanical parts which now require 79 different types of metal-removal tools. The products have been grouped into 7 distinct families which require from 8 to 22 machines in each machine-cell. Throughput time can be significantly reduced and savings can be realized from tooling, direct-labor, and indirect-labor costs.

  18. Feasibility of extractive distillation process variants in batch rectifier column

    OpenAIRE

    Stéger, Csaba; Varga, Viktoria; Horvath, Laszlo; Rev, Endre; Fonyo, Zsolt; Meyer, Michel; Lelkes, Zoltan

    2005-01-01

    A systematic comparison is presented about the separation tasks of azeotropic and close-boiling mixtures applying batch extractive distillation (BED) in rectifier. All the eight possible mixture types with at most a single azeotrope (minimum and maximum boiling azeotropes with heavy, light, and intermediate boiling entrainers; and close boiling mixtures with heavy and light entrainers) are compared. The main results of the feasibility studies on the hitherto unpublished cases are presented. A...

  19. Mathematical modeling of recombinant Escherichia coli aerobic batch fermentations

    OpenAIRE

    Costa, Rafael S; Rocha, I; Ferreira, E. C.

    2008-01-01

    In this work, three competing unstructured mathematical models for the biomass growth by recombinant E. coli strains with different acetate inhibition kinetics terms were evaluated for batch processes at constant temperature and pH. The models considered the dynamics of biomass growth, acetate accumulation, substrate consumption, Green Fluorescence Protein (GFP) production and three metabolic pathways for E. coli. Parameter estimation and model validation was carried out usi...

  20. EFFECT OF DYE CONCENTRATION ON SEQUENCING BATCH REACTOR PERFORMANCE

    OpenAIRE

    A. A. Vaigan ، M. R. Alavi Moghaddam ، H. Hashemi

    2009-01-01

    Reactive dyes have been identified as problematic compounds in textile industries wastewater as they are water soluble and cannot be easily removed by conventional aerobic biological treatment systems. The treatability of a reactive dye (Brill Blue KN-R) by sequencing batch reactor and the influence of the dye concentration on system performance were investigated in this study. Brill Blue KN-R is one of the main dyes that are used in textile industries in Iran. Four cylindrical Plexiglas reac...

  1. Optimization of Recipe Based Batch Control Systems Using Neural Networks

    OpenAIRE

    Šoštarec, A.; Gosak, D.; Hlupić, N.

    2012-01-01

    In the modern pharmaceutical industry many flexible batch plants operate under an integrated business and production system, using ISA S95 and ISA S88 standards for models and terminology, and implementing flexible recipe-based production. In the environment of constantly changing market conditions, adjustment to surroundings is a business necessity. To support necessary production improvement, regulatory authorities have introduced the risk based approach for the control of process dev...

  2. Industrial and Municipal Wastewater Treatment in the Sequencing Batch Reactor

    OpenAIRE

    Vrtovsek, J.; Ros, M.

    2008-01-01

    A mixture of Industrial wastewater from chemical industry (varnish, paint and pigments production) and municipal wastewater was treated in pilot sequencing batch reactor (SBR). Results of the pilot experiments show that the foaming problem has great influence on the behavior of SBR, especially when the ratio between industrial and municipal wastewater is very high. Foaming problem was negligible when the mixture with φ; 20 % of the industrial wastewater and j = 80 % of the municipal wastewate...

  3. SEQUENCING BATCH REACTOR: A PROMISING TECHNOLOGY IN WASTEWATER TREATMENT

    OpenAIRE

    A.H Mahvi

    2008-01-01

    Discharge of domestic and industrial wastewater to surface or groundwater is very dangerous to the environment. Therefore treatment of any kind of wastewater to produce effluent with good quality is necessary. In this regard choosing an effective treatment system is important. Sequencing batch reactor is a modification of activated sludge process which has been successfully used to treat municipal and industrial wastewater. The process could be applied for nutrients removal, high biochemical ...

  4. Integration of virtualized worker nodes in standard batch systems

    Energy Technology Data Exchange (ETDEWEB)

    Buege, Volker; Kunze, Marcel; Oberst, Oliver; Quast, Guenter; Scheurer, Armin [Karlsruhe Institute of Technology, Postfach 6980, 76128 Karlsruhe (Germany); Hessling, Hermann [HTW Berlin, University of Applied Sciences, 10318 Berlin (Germany); Kemp, Yves; Synge, Owen, E-mail: Oliver.Oberst@iwr.fzk.d [DESY, Notkestrasse 85, 22607 Hamburg (Germany)

    2010-04-01

    Current experiments in HEP only use a limited number of operating system flavours. Their software might only be validated on one single OS platform. Resource providers might have other operating systems of choice for the installation of the batch infrastructure. This is especially the case if a cluster is shared with other communities, or communities that have stricter security requirements. One solution would be to statically divide the cluster into separated sub-clusters. In such a scenario, no opportunistic distribution of the load can be achieved, resulting in a poor overall utilization efficiency. Another approach is to make the batch system aware of virtualization, and to provide each community with its favoured operating system in a virtual machine. Here, the scheduler has full flexibility, resulting in a better overall efficiency of the resources. In our contribution, we present a lightweight concept for the integration of virtual worker nodes into standard batch systems. The virtual machines are started on the worker nodes just before jobs are executed there. No meta-scheduling is introduced. We demonstrate two prototype implementations, one based on the Sun Grid Engine (SGE), the other using Maui/Torque as a batch system. Both solutions support local job as well as Grid job submission. The hypervisors currently used are Xen and KVM, a port to another system is easily envisageable. To better handle different virtual machines on the physical host, the management solution VmImageManager is developed. We will present first experience from running the two prototype implementations. In a last part, we will show the potential future use of this lightweight concept when integrated into high-level (i.e. Grid) work-flows.

  5. Health advantages of transition to batch management system in farrow-to-finish pig herds

    OpenAIRE

    Vangroenweghe, F; Suls, L; Van Driessche, E.; Maes, Dominiek; De Graef, E.

    2012-01-01

    Sow batch management systems have become more popular due to advantages in labour planning, piglet batch sizes, all-in all-out practices and health management. The present study investigated the potential health advantages of 10 selected farrow-to-finish pig herds before and after transition from a one week batch management system to a four or five week batch management system. Five different animal categories (gilts, sows, piglets, growers and finishers) were sampled at three time points (T0...

  6. On-line Scheduling Algorithm for Penicillin Fed-batch Fermentation

    Institute of Scientific and Technical Information of China (English)

    XUE Yao-feng; YUAN Jing-qi

    2005-01-01

    An on-line scheduling algorithm to maximize gross profit of penicillin fed-batch fermentation is proposed. According to the on-line classification method, fed-batch fermentation batches are classified into three categories. Using the scheduling strategy, the optimal termination sequence of batches is obtained. Pseudo on-line simulations for testing the proposed algorithm with the data from industrial scale penicillin fermentation are carried out.

  7. Параллельное шифрование данных алгоритмом RSA

    OpenAIRE

    Неретин, А. А.

    2016-01-01

    In this paper a parallel RSA algorithm with preliminary shuffling of source text was presented.Dependence of an encryption speed on the number of encryption nodes has been analysed, The proposed algorithm was implemented on C# language.

  8. Analyzing data flows of WLCG jobs at batch job level

    Science.gov (United States)

    Kuehn, Eileen; Fischer, Max; Giffels, Manuel; Jung, Christopher; Petzold, Andreas

    2015-05-01

    With the introduction of federated data access to the workflows of WLCG, it is becoming increasingly important for data centers to understand specific data flows regarding storage element accesses, firewall configurations, as well as the scheduling of batch jobs themselves. As existing batch system monitoring and related system monitoring tools do not support measurements at batch job level, a new tool has been developed and put into operation at the GridKa Tier 1 center for monitoring continuous data streams and characteristics of WLCG jobs and pilots. Long term measurements and data collection are in progress. These measurements already have been proven to be useful analyzing misbehaviors and various issues. Therefore we aim for an automated, realtime approach for anomaly detection. As a requirement, prototypes for standard workflows have to be examined. Based on measurements of several months, different features of HEP jobs are evaluated regarding their effectiveness for data mining approaches to identify these common workflows. The paper will introduce the actual measurement approach and statistics as well as the general concept and first results classifying different HEP job workflows derived from the measurements at GridKa.

  9. Batch fabrication of micro-optical sensing and imaging devices

    Science.gov (United States)

    Wippermann, F. C.; Reimann, A.; Oelschläger, A.; Dannberg, P.; Blöhbaum, F.; Koburg, C.; Köhler, T.

    2013-03-01

    As demonstrated in microelectronics, the batch fabrication based on the processing of wafers can lead to a significant reduction in prize as well as in size. This concept was adapted to the fabrication of imaging optics extensively used in mobile phone cameras relying on small pixels and low resolutions such as VGA. We report on batch fabricated customer specific opto-electronical modules used in machine sensing and automotive applications relying on large pixel sizes and non-conventional sensor characteristics. We specially focus on the lens mold mastering for the subsequent UV-replication since comparatively large sag heights of 250μm are required. Two technological approaches were applied, first, based on reflow of photoresist and, second, using diamond turning for the generation of a single lens mold and a subsequent step&repeat-process for array mastering on 8" wafers. Aspects of the optical design and simulation, the batch fabrication based on 8" wafers and characterization results are provided by the example of an f/1.1 opto-electronic sensor and an objective for a global shutter imager using 550x550 pixels with 3.6μm pitch.

  10. Fault Diagnosis of Batch Reactor Using Machine Learning Methods

    Directory of Open Access Journals (Sweden)

    Sujatha Subramanian

    2014-01-01

    Full Text Available Fault diagnosis of a batch reactor gives the early detection of fault and minimizes the risk of thermal runaway. It provides superior performance and helps to improve safety and consistency. It has become more vital in this technical era. In this paper, support vector machine (SVM is used to estimate the heat release (Qr of the batch reactor both normal and faulty conditions. The signature of the residual, which is obtained from the difference between nominal and estimated faulty Qr values, characterizes the different natures of faults occurring in the batch reactor. Appropriate statistical and geometric features are extracted from the residual signature and the total numbers of features are reduced using SVM attribute selection filter and principle component analysis (PCA techniques. artificial neural network (ANN classifiers like multilayer perceptron (MLP, radial basis function (RBF, and Bayes net are used to classify the different types of faults from the reduced features. It is observed from the result of the comparative study that the proposed method for fault diagnosis with limited number of features extracted from only one estimated parameter (Qr shows that it is more efficient and fast for diagnosing the typical faults.

  11. Perancangan Sistem Pengaduk Pada Bioreaktor Batch Untuk Meningkatkan Produksi Biogas

    Directory of Open Access Journals (Sweden)

    Candrika Widiartanti Yuwono

    2013-03-01

    Full Text Available Proses anaerob merupakan proses fermentasi dimana memiliki proses yang berlangsung cukup lama. Dan pada bioreaktor anaerob sistem batch, diduga terdapat indikasi pada penurunan jumlah produksi biogas, yang disebabkan karena tejadi pengendapan atau pemisahan antara limbah cair dengan padatannya. Untuk itu muncul upaya untuk melakukan sistem pengadukan agar terjadi homogenitas dan bisa menyerupai seperti kondisi awal, sehingga diharapkan dapat memperpanjang masa produksi biogas. Adapun pengadukan merupakan salah satu faktor yang berpengaruh pada kehidupan mikroba. Dan pada penelitian ini akan dilakukan perancangan sistem pengaduk yang digerakkan oleh sebuah motor dimana menggunakan timer dan pengatur kecepatan. Desain disesuaikan dengan substrat yang digunakan yaitu limbah cair tahu dan eceng gondok, yang mengalami pengendapan sehingga pada pengaduk memiliki blade yang diletakkan di dasar dalam bioreaktor. Sistem pengadukan dilakukan pada saat nilai pH yang diamati tiap harinya mengalami penurunan, yaitu pada hari ke–24 pH bernilai 6,49. Dan pada pengukuran berikutnya ditunjukkan dengan pH bernilai 6,89. Pengadukan dilakukan secara pelan dengan putaran 170 rpm selama 2 x 1 menit. Hasil daripada jumlah produksi biogas yang dihasilkan bisa dibandingkan antara bioreaktor batch tidak berpengaduk dengan bioreaktor batch berpengaduk, dimana berturut-turut memiliki jumlah volume 467 mL (25 hari dan 873 mL (31 hari.

  12. A Content-based Analysis of Shahriar's Azerbaijani Turkish Poem Getmə Tərsa Balası (A Christian Child in Terms of Religious Images and Interpretations

    Directory of Open Access Journals (Sweden)

    Mohammad Amin Mozaheb

    2016-03-01

    Full Text Available The present study aims to analyze Shahriar's Getmə Tərsa Balası (do not leave me the Christian Child poem in terms of religious images using content-based analysis. Initially, the poem published in Azerbaijani Turkish has been analyzed by the researchers to find out the main religious themes covering Islam and Christianity. Then, a number of images created by the poet, including Hell and Heaven, mosque versus church and Mount Sinai, have been extracted and discussed in detail by using the English translation of the verses. Finally, the results have been presented using the extracted themes. The findings showed that Shahriar started his poem from a worldly image in order to reach divine images.Keywords: Shahriar, Getmə Tərsa Balası (A Christian Child, Content-based analysis, Azerbaijani Turkish 

  13. 40 CFR Table 2 to Subpart Vvvvvv... - Emission Limits and Compliance Requirements for Batch Process Vents

    Science.gov (United States)

    2010-07-01

    ... Requirements for Batch Process Vents 2 Table 2 to Subpart VVVVVV of Part 63 Protection of Environment... of Part 63—Emission Limits and Compliance Requirements for Batch Process Vents As required in § 63.11496, you must comply with the requirements for batch process vents as shown in the following...

  14. A General framework for the Synthesis and Operational Design of Batch Processes

    DEFF Research Database (Denmark)

    The objective of this paper is to present a general problem formulation and a general methodlogy for the synthesis of batch operations and the operational design of individual batch processes, such as mixing, reaction and separation. The general methodology described supplies the batch routes...

  15. A general framework for the synthesis and operational design of batch processes

    DEFF Research Database (Denmark)

    Papaeconomou, Eirini; Gani, Rafiqul; Jørgensen, Sten Bay

    2002-01-01

    The objective of this paper is to present a general problem formulation and a general methodology for the synthesis of batch operations and the operational design of individual batch processes, such as mixing, reaction and separation. The general methodology described supplies the batch routes...

  16. Look-ahead strategies for controlling batch operations in industry : basic insights in rule construction

    NARCIS (Netherlands)

    van der Zee, D.J.; Sullivan, W.A.; Ahmad, M.M.; Fichtner, D.; Sauer, W.; Weigert, G.; Zerna, T.

    2002-01-01

    Batching jobs in a manufacturing system is a very common policy in most industries. Main reasons for batching are avoidance of set ups and/or facilitation of material handling. Examples of batch-wise production systems are ovens found in aircraft industry and in semiconductor manufacturing. Starting

  17. OSAT: a tool for sample-to-batch allocations in genomics experiments

    Directory of Open Access Journals (Sweden)

    Yan Li

    2012-12-01

    Full Text Available Abstract Background Batch effect is one type of variability that is not of primary interest but ubiquitous in sizable genomic experiments. To minimize the impact of batch effects, an ideal experiment design should ensure the even distribution of biological groups and confounding factors across batches. However, due to the practical complications, the availability of the final collection of samples in genomics study might be unbalanced and incomplete, which, without appropriate attention in sample-to-batch allocation, could lead to drastic batch effects. Therefore, it is necessary to develop effective and handy tool to assign collected samples across batches in an appropriate way in order to minimize the impact of batch effects. Results We describe OSAT (Optimal Sample Assignment Tool, a bioconductor package designed for automated sample-to-batch allocations in genomics experiments. Conclusions OSAT is developed to facilitate the allocation of collected samples to different batches in genomics study. Through optimizing the even distribution of samples in groups of biological interest into different batches, it can reduce the confounding or correlation between batches and the biological variables of interest. It can also optimize the homogeneous distribution of confounding factors across batches. It can handle challenging instances where incomplete and unbalanced sample collections are involved as well as ideally balanced designs.

  18. RSA加密算法的有效实现及在云计算中的应用%Analysis to Effective Realization of RSA Encryption Algorithm and Its Application in the Cloud Computing

    Institute of Scientific and Technical Information of China (English)

    谢会娟; 韩昌豪; 吴明珠

    2014-01-01

    随着互联网的发展,云计算模式能够提供便捷的、可用的和按需要网络资源,云计算的核心是如何存储和管理用户的数据,除了配置存储设备的之外,还要考虑到存储在云中的数据的安全性。RSA加密算法是基于一个比较简单的数论-两个大素数相乘十分容易实现,但要对它的乘积进行因式分解却十分困难,RSA加密算法是将乘积公开作为加密密钥的非对称加密方法,在云计算中应用RSA算法对存储在云中的数据进行加密,能够保证了数据的安全性。%With the development of the Internet, cloud computing can provide convenient and available network resources, the core of cloud computing is how to store and manage user data, cloud computing does not provide storage devices, but also takes into account the security of the data stored in the cloud. RSA encryption algorithm is based on a relatively simple theory of math-multiplying two large prime numbers is very easy to achieve, but it's the factorization is very difficult, RSA encryption al⁃gorithm considers a product as a public encryption key and is an asymmetric encryption method. To ensure the security of the da⁃ta, RSA encryption algorithm is applied for the data storage in the cloud.

  19. Kinetic study of batch and fed-batch enzymatic saccharification of pretreated substrate and subsequent fermentation to ethanol

    OpenAIRE

    Gupta Rishi; Kumar Sanjay; Gomes James; Kuhad Ramesh

    2012-01-01

    Abstract Background Enzymatic hydrolysis, the rate limiting step in the process development for biofuel, is always hampered by its low sugar concentration. High solid enzymatic saccharification could solve this problem but has several other drawbacks such as low rate of reaction. In the present study we have attempted to enhance the concentration of sugars in enzymatic hydrolysate of delignified Prosopis juliflora, using a fed-batch enzymatic hydrolysis approach. Results The enzymatic hydroly...

  20. E-mail System Based on DES and RSA Encryption Algorithm%基于DES和RSA加密的邮件系统

    Institute of Scientific and Technical Information of China (English)

    蔡斌

    2013-01-01

    随着网络技术的发展,电子邮件的使用越来越多,其安全性也得到越来越多的关注.论文设计的安全电子邮件系统是以对电子邮件内容加以保护的方式,即采用DES加密算法,保证邮件内容在被发送到互联网上之前被加密成为密文,并将公开密钥技术RSA用在电子邮件系统中加密DES密钥,从而有效地实现了电子邮件内容的安全性和保密性以及密钥分配问题.%With the development of network technology,the email accepts more and more usage and the email security receives more and more people's value.This article designs the security electronic mail system by performs the way to protect the email content,namely uses the DES encryption algorithm,guaranteed the mail content is encrypted before transmitted to the Internet,and uses public key technology RSA in the electronic mail system encrypts the DES key,thus effectively realized the email content security as well as the key assignment problem.

  1. 改进的RSA算法在数字签名中的应用%Improved RSA algorithm and application in digital signature

    Institute of Scientific and Technical Information of China (English)

    肖振久; 胡驰; 陈虹

    2014-01-01

    In order to enhance the operation efficiency of RSA algorithm, a new improved algorithm is suggested in this paper which makes some improvements in structure and operation, and it is applied to digital signature. The experiment makes comparison between a combinatorial optimization algorithm which combines SMM with index of 2k hexadecimal algorithm and the new algorithm. It shows that the new algorithm reaches a high level in operation speed.%针对传统RSA密码算法运算效率较低的问题,在标准RSA密码算法的自身结构和具体运算操作两方面做出了相应的改进,提出了一种新的RSA密码优化算法,并将该算法运用到数字签名技术中。然后通过仿真实验,将其与传统RSA算法以及基于乘同余对称特性的SMM算法和指数2k进制化相结合的组合优化算法相比较,实验结果表明新的RSA密码优化算法在提升运算速度方面达到了较高的水平。

  2. Dynamics of Random Sequential Adsorption (RSA) of linear chains consisting of n circular discs - Role of aspect ratio and departure from convexity

    Science.gov (United States)

    Shelke, Pradip B.; Limaye, A. V.

    2015-07-01

    We study Random Sequential Adsorption (RSA) of linear chains consisting of n circular discs on a two-dimensional continuum substrate. The study has been carried out for n = 2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 14, 16, 18, 20, 25, 30, 50, 70, 100 and 300. For all values of n, instantaneous coverage, Θ(t), in late time regime, is found to approach to jammed state coverage, Θ(∞), in a power law fashion, Θ(∞) - Θ(t) ~ t- p. It is observed that, with the increase in n, the exponent p goes on decreasing from the value 0.33 for n = 2 to the value 0.20 for n = 20 and then again starts rising to reach the value of 0.33 for large n. It is also found that for n ≤ 20, the exponent p has near perfect correlation with the coefficient of departure from convexity. On the other hand the jammed state coverage Θ(∞) is found to depend both on the coefficient of departure from convexity as well as on the aspect ratio of the chain.

  3. A design algorithm for batch stirred tank transesterification reactors

    International Nuclear Information System (INIS)

    Highlights: ► Simplified algorithm for batch biodiesel reactor design was developed. ► C Sharp software tool for implementing the algorithm was also developed. ► 50 L/batch reactor was constructed and used to process neem oil biodiesel. ► Results showed that the produced neem biodiesel is a fuel grade product. ► Scale-up of the reactor was carried out using the developed software. - Abstract: A 50 L per batch, stirred tank reactor, suitable for carrying out transesterification of vegetable oils was designed and constructed. The major design assumptions included stainless steel plate thickness of 2 mm, reaction temperature of 60–65 °C and an initial/final fluid temperature of 25/70 °C. The calculated impeller Reynolds number was in the mixed regime zone of 10–104; the power number was varied between 1 and 5, while a typical propeller speed of 22.5 rev/s (or 1350 rev/min) was adopted. The limiting design conditions were maximum reactor diameter of 1.80 m, straight side height-to-diameter ratio in the range of 0.75–1.5 and minimum agitator motor power of 746 W (1 Hp). Based upon the design, a simple algorithm was developed and interpreted into Microsoft C Sharp computer programming language to enable scale up of the reactor. Performance testing of the realized reactor was carried out while using it to produce Neem oil biodiesel via base – catalyzed methanolysis, which yielded high quality fuel product.

  4. Persistence of Escherichia coli in batch and continuous vermicomposting systems.

    Science.gov (United States)

    Hénault-Ethier, Louise; Martin, Vincent J J; Gélinas, Yves

    2016-10-01

    Vermicomposting is a biooxidation process in which epigeicearthworms act in synergy with microbial populations to degrade organic matter. Vermicomposting does not go through a thermophilic stage as required by North American legislations for pathogen eradication. We examined the survival of a Green Fluorescent Protein (GFP) labeled Escherichia coli MG1655 as a model for the survival of pathogenic bacteria in both small-scale batch and medium-scale continuously-operated systems to discern the influence of the earthworm Eisenia fetida, nutrient content and the indigenous vermicompost microbial community on pathogen abundance. In batch systems, the microbial community had the greatest influence on the rapid decline of E. coli populations, and the effect of earthworms was only visible in microbially-impoverishedvermicomposts. No significant earthworm density-dependent relationship was observed on E. coli survival under continuous operation. E. coli numbers decreased below the US EPA compost sanitation guidelines of 10(3)Colony Forming Units (CFU)/g (dry weight) within 18-21days for both the small-scale batch and medium-scale continuous systems, but it took up to 51days without earthworms and with an impoverished microbial community to reach the legal limit. Nutrient replenishment (i.e. organic carbon) provided by continuous feed input did not appear to extend E. coli survival. In fact, longer survival of E. coli was noticed in treatments where less total and labile sugars were available, suggesting that sugars may support potentially antagonist bacteria in the vermicompost. Total N, pH and humidity did not appear to affect E. coli survival. Several opportunistic human pathogens may be found in vermicompost, and their populations are likely kept in check by antagonists.

  5. Persistence of Escherichia coli in batch and continuous vermicomposting systems.

    Science.gov (United States)

    Hénault-Ethier, Louise; Martin, Vincent J J; Gélinas, Yves

    2016-10-01

    Vermicomposting is a biooxidation process in which epigeicearthworms act in synergy with microbial populations to degrade organic matter. Vermicomposting does not go through a thermophilic stage as required by North American legislations for pathogen eradication. We examined the survival of a Green Fluorescent Protein (GFP) labeled Escherichia coli MG1655 as a model for the survival of pathogenic bacteria in both small-scale batch and medium-scale continuously-operated systems to discern the influence of the earthworm Eisenia fetida, nutrient content and the indigenous vermicompost microbial community on pathogen abundance. In batch systems, the microbial community had the greatest influence on the rapid decline of E. coli populations, and the effect of earthworms was only visible in microbially-impoverishedvermicomposts. No significant earthworm density-dependent relationship was observed on E. coli survival under continuous operation. E. coli numbers decreased below the US EPA compost sanitation guidelines of 10(3)Colony Forming Units (CFU)/g (dry weight) within 18-21days for both the small-scale batch and medium-scale continuous systems, but it took up to 51days without earthworms and with an impoverished microbial community to reach the legal limit. Nutrient replenishment (i.e. organic carbon) provided by continuous feed input did not appear to extend E. coli survival. In fact, longer survival of E. coli was noticed in treatments where less total and labile sugars were available, suggesting that sugars may support potentially antagonist bacteria in the vermicompost. Total N, pH and humidity did not appear to affect E. coli survival. Several opportunistic human pathogens may be found in vermicompost, and their populations are likely kept in check by antagonists. PMID:27499290

  6. REAL WASTE TESTING OF SLUDGE BATCH 5 MELTER FEED RHEOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Reboul, S.; Stone, M.

    2010-03-17

    Clogging of the melter feed loop at the Defense Waste Processing Facility (DWPF) has reduced the throughput of Sludge Batch 5 (SB5) processing. After completing a data review, DWPF attributed the clogging to the rheological properties of the Slurry Mix Evaporator (SME) project. The yield stress of the SB5 melter feed material was expected to be high, based on the relatively high pH of the SME product and the rheological results of a previous Chemical Process Cell (CPC) demonstration performed at the Savannah River National Laboratory (SRNL).

  7. Simple multicomponent batch distillation procedure with a variable reflux policy

    Directory of Open Access Journals (Sweden)

    A. N. García

    2014-06-01

    Full Text Available This paper describes a shortcut procedure for batch distillation simulation with a variable reflux policy. The procedure starts from a shortcut method developed by Sundaram and Evans in 1993 and uses an iterative cycle to calculate the reflux ratio at each moment. The functional relationship between the concentrations at the bottom and the dome is evaluated using the Fenske equation and is complemented with the equations proposed by Underwood and Gilliland. The results of this procedure are consistent with those obtained using a fast method widely validated in the relevant literature.

  8. Batch Mode Data Analysis at ORNL for Radiation Portal Monitoring

    International Nuclear Information System (INIS)

    The Global Nuclear Security Technology Division at Oak Ridge National Laboratory (ORNL) has developed two batch-mode data analysis tools to address the volume of data generated by radiation portal monitors (RPMs) deployed by the Second Line of Defense (SLD). The first of these tools, the ORNL Data Portal (ORNLDP), serves as both a repository and an analysis environment for the data generated by RPMs. The second tool, the In-Country Analysis Tool (ICAT), is portable and serves primarily as a small-scale analysis environment.

  9. Comparison of growth, acetate production, and acetate inhibition of Escherichia coli strains in batch and fed-batch fermentations.

    Science.gov (United States)

    Luli, G W; Strohl, W R

    1990-04-01

    The growth characteristics and acetate production of several Escherichia coli strains were compared by using shake flasks, batch fermentations, and glucose-feedback-controlled fed-batch fermentations to assess the potential of each strain to grow at high cell densities. Of the E. coli strains tested, including JM105, B, W3110, W3100, HB101, DH1, CSH50, MC1060, JRG1046, and JRG1061, strains JM105 and B were found to have the greatest relative biomass accumulation, strain MC1060 accumulated the highest concentrations of acetic acid, and strain B had the highest growth rates under the conditions tested. In glucose-feedback-controlled fed-batch fermentations, strains B and JM105 produced only 2 g of acetate.liter-1 while accumulating up to 30 g of biomass.liter-1. Under identical conditions, strains HB101 and MC1060 accumulated less than 10 g of biomass.liter-1 and strain MC1060 produced 8 g of acetate.liter-1. The addition of various concentrations of sodium acetate to the growth medium resulted in a logarithmic decrease, with respect to acetate concentration, in the growth rates of E. coli JM105, JM105(pOS4201), and JRG1061. These data indicated that the growth of the E. coli strains was likely to be inhibited by the acetate they produced when grown on media containing glucose. A model for the inhibition of growth of E. coli by acetate was derived from these experiments to explain the inhibition of acetate on E. coli strains at neutral pH. PMID:2187400

  10. RSA踪迹驱动指令Cache计时攻击研究*%Research on Trace Drive Instruction Cache Timing Attack on RSA

    Institute of Scientific and Technical Information of China (English)

    陈财森; 王韬; 郭世泽; 周平

    2013-01-01

      指令Cache攻击是基于获取算法执行路径的一种旁路攻击方式.首先,通过分析原有RSA指令Cache计时攻击存在可行性不高且能够获取的幂指数位不足等局限性,建立了新的基于监视整个指令 Cache 而不只是监视特定指令 Cache 的踪迹驱动计时攻击模型;然后,提出了一种改进的基于 SWE 算法窗口大小特征的幂指数分析算法;最后,在实际环境下,利用处理器的同步多线程能力确保间谍进程与密码进程能够同步运行.针对 OpenSSL v.0.9.8f中的RSA算法执行指令Cache计时攻击实验,实验结果表明:新的攻击模型在实际攻击中具有更好的可操作性;改进的幂指数分析算法能够进一步缩小密钥搜索空间,提高了踪迹驱动指令Cache计时攻击的有效性.对于一个512位的幂指数,新的分析算法能够比原有分析算法多恢复出大约50个比特位.%The I-cache timing attack which exploits the instruction path of a cipher is one type of side channel attack. First, by analyzing the complications in the previous I-cache timing attacks on RSA algorithm because of how hard it has been to put them into practice, and how the number of the inferred bits is insufficient, this paper builds a new trace driven I-cache timing attack model via spying on the whole I-cache, instead targeting the instruction cache to which the special function mapped. Next, an improved analysis algorithm of the exponent based on the characteristic of the side of window in sliding window exponentiation (SWE) algorithm is proposed. Finally, an I-cache timing attack is implemented on RSA of OpenSSL v.0.9.8f in a practical environment, using a simultaneous multithreading processor to insure that the spy process and the cipher process can run in parallel. Experimental results show that the proposed attack model has strong applicability in real environments;the improved analysis algorithm of the exponent can further

  11. Detection and isolation of Bluetongue virus from commercial vaccine batches.

    Science.gov (United States)

    Bumbarov, Velizar; Golender, Natalia; Erster, Oran; Khinich, Yevgeny

    2016-06-14

    In this report we describe the detection and identification of Bluetongue virus (BTV) contaminations in commercial vaccines. BTV RNA was detected in vaccine batches of Lumpy skin disease (LSD) and Sheep pox (SP) using quantitative PCR (qPCR) for VP1 and NS3 genes. Both batches were positive for VP1 and NS3 in qPCR. The LSD vaccine-derived sample was positive for VP1 and VP2 in conventional PCR. The SP vaccine-derived sample was examined by amplification of VP1, VP4, VP6, VP7, NS2 and NS3 gene segments in conventional PCR. The SP vaccine-derived sample was further propagated in embryonated chicken eggs (ECE) and Vero cells. Preliminary sequence analysis showed that the LSD vaccine-derived sequence was 98-99% similar to BTV9. Analysis of the six genomic segments from the SP vaccine-derived isolate showed the highest similarity to BTV26 (66.3-97.8%). These findings are particularly important due to the effect of BTV on cattle and sheep, for which the vaccines are intended. They also demonstrate the necessity of rigorous vaccine inspection and strict vaccine production control. PMID:27171751

  12. BEclear: Batch Effect Detection and Adjustment in DNA Methylation Data.

    Science.gov (United States)

    Akulenko, Ruslan; Merl, Markus; Helms, Volkhard

    2016-01-01

    Batch effects describe non-natural variations of, for example, large-scale genomic data sets. If not corrected by suitable numerical algorithms, batch effects may seriously affect the analysis of these datasets. The novel array platform independent software tool BEclear enables researchers to identify those portions of the data that deviate statistically significant from the remaining data and to replace these portions by typical values reconstructed from neighboring data entries based on latent factor models. In contrast to other comparable methods that often use some sort of global normalization of the data, BEclear avoids changing the apparently unaffected parts of the data. We tested the performance of this approach on DNA methylation data for various tumor data sets taken from The Cancer Genome Atlas and compared the results to those obtained with the existing algorithms ComBat, Surrogate Variable Analysis, RUVm and Functional normalization. BEclear constantly performed at par with or better than these methods. BEclear is available as an R package at the Bioconductor project http://bioconductor.org/packages/release/bioc/html/BEclear.html. PMID:27559732

  13. Transfer bonding technology for batch fabrication of SMA microactuators

    Science.gov (United States)

    Grund, T.; Guerre, R.; Despont, M.; Kohl, M.

    2008-05-01

    Currently, the broad market introduction of shape memory alloy (SMA) microactuators and sensors is hampered by technological barriers, since batch fabrication methods common to electronics industry are not available. The present study intends to overcome these barriers by introducing a wafer scale transfer process that allows the selective transfer of heat-treated and micromachined shape memory alloy (SMA) film or foil microactuators to randomly selected receiving sites on a target substrate. The technology relies on a temporary adhesive bonding layer between SMA film/foil and an auxiliary substrate, which can be removed by laser ablation. The transfer technology was tested for microactuators of a cold-rolled NiTi foil of 20 μm thickness, which were heat-treated in free-standing condition, then micromachined on an auxiliary substrate of glass, and finally selectively transferred to different target substrates of a polymer. For demonstration, the new technology was used for batch-fabrication of SMA-actuated polymer microvalves.

  14. SEQUENCING BATCH REACTOR: A PROMISING TECHNOLOGY IN WASTEWATER TREATMENT

    Directory of Open Access Journals (Sweden)

    A. H. Mahvi

    2008-04-01

    Full Text Available Discharge of domestic and industrial wastewater to surface or groundwater is very dangerous to the environment. Therefore treatment of any kind of wastewater to produce effluent with good quality is necessary. In this regard choosing an effective treatment system is important. Sequencing batch reactor is a modification of activated sludge process which has been successfully used to treat municipal and industrial wastewater. The process could be applied for nutrients removal, high biochemical oxygen demand containing industrial wastewater, wastewater containing toxic materials such as cyanide, copper, chromium, lead and nickel, food industries effluents, landfill leachates and tannery wastewater. Of the process advantages are single-tank configuration, small foot print, easily expandable, simple operation and low capital costs. Many researches have been conducted on this treatment technology. The authors had been conducted some investigations on a modification of sequencing batch reactor. Their studies resulted in very high percentage removal of biochemical oxygen demand, chemical oxygen demand, total kjeldahl nitrogen, total nitrogen, total phosphorus and total suspended solids respectively. This paper reviews some of the published works in addition to experiences of the authors.

  15. BEclear: Batch Effect Detection and Adjustment in DNA Methylation Data

    Science.gov (United States)

    Akulenko, Ruslan; Merl, Markus; Helms, Volkhard

    2016-01-01

    Batch effects describe non-natural variations of, for example, large-scale genomic data sets. If not corrected by suitable numerical algorithms, batch effects may seriously affect the analysis of these datasets. The novel array platform independent software tool BEclear enables researchers to identify those portions of the data that deviate statistically significant from the remaining data and to replace these portions by typical values reconstructed from neighboring data entries based on latent factor models. In contrast to other comparable methods that often use some sort of global normalization of the data, BEclear avoids changing the apparently unaffected parts of the data. We tested the performance of this approach on DNA methylation data for various tumor data sets taken from The Cancer Genome Atlas and compared the results to those obtained with the existing algorithms ComBat, Surrogate Variable Analysis, RUVm and Functional normalization. BEclear constantly performed at par with or better than these methods. BEclear is available as an R package at the Bioconductor project http://bioconductor.org/packages/release/bioc/html/BEclear.html. PMID:27559732

  16. Treatemnt of Wastewater with Modified Sequencing Batch Biofilm Reactor Technology

    Institute of Scientific and Technical Information of China (English)

    胡龙兴; 刘宇陆

    2002-01-01

    This paper describes the removel of COD and nitrogen from wastewater with modified sequencing batch biofilm reactor,The strategy of simultaneous feeding and draining was explored.The results show that introduction of a new batch of wastewater and withdrawal of the purifeid water can be conducted simultaneously with the maximum volumetric exchange rate of about 70%,Application of this feeding and draining mode leads to the reduction of the cycle time,the increase of the utilization of the reactor volume and the simplification of the reactor structure.The treatment of a synthetic wastewater containing COD and nitrogen was investigated.The operation mode of F(D)-O(i.e.,simultaneous feeding and draining followed by the aerobic condition)was adopted.It was found that COD was degraded very fast in the initial reaction period of time,then reduced slowly and the ammonia nitrogen and nitrate nitrogen concentrations decreased and increased with time respectively,while the nitrite nitrogen level increased first and then reduced.The relationship between the COD or ammonia nitrogen loading and its removal rate was examined,and the removal of COD,ammonia nitrogen and total nitrogen could exceed 95%,90%and 80% respectively,The fact that nitrogen could e removed more completely under constant aeration(aerobic condition)of the SBBR operation mode is very interesting and could be explained in several respects.

  17. Xylitol production by Candida parapsilosis under fed-batch culture

    Directory of Open Access Journals (Sweden)

    Sandra A. Furlan

    2001-06-01

    Full Text Available Xylitol production by Candida parapsilosis was investigated under fed-batch cultivation, using single (xylose or mixed (xylose and glucose sugars as substrates. The presence of glucose in the medium induced the production of ethanol as secondary metabolite and improved specific rates of growth, xylitol formation and substrate consumption. Fractionated supply of the feed medium at constant sugar concentration did not promote any increase on the productivity compared to the single batch cultivation.A produção de xylitol por Candida parapsilosis foi investigada em regime de batelada alimentada, usando substratos açucarados de composição simples (xilose ou composta (xilose e glicose. A presença de glicose no meio induziu a formação de etanol como metabólito secundário. A suplementação fracionada do meio de alimentação numa concentração fixa de açúcar não resultou em aumento da produtividade em relação àquela alcançada em batelada simples.

  18. RSA算法中Z*(φ)(n)的代数结构研究%Study on Algebraic Structure of Z*(φ)(n) in RSA Algorithm

    Institute of Scientific and Technical Information of China (English)

    裴东林; 胡建军; 李旭

    2013-01-01

    [Abstract] Based on the theory of quadratic residues, this paper considers the algebraic structure of Z*φ(n) in the two order strong RSA algorithm. It is proved that the element α of Z*φ(n) gets maximal order if and only if gcd(α±l,n1) = 1, and the numbers of quadratic residues in the group Z*φ(n) is φ(φ(n))/8 .Z*φ(n) is divided up by the group which is composed of all quadratic residues, and all cosets form a Klein eight-group. It proves that the group Z*φ(n) can be generated by seven elements of quadratic non-residues.%应用二次剩余理论,对二阶强RSA算法中Z*(φ)(n)的代数结构进行研究,证明Z*(φ)(n)中元素a取最大阶的充要条件为gcd(a±1,n1)=1,以及任意元素的阶Z*(φ)(n)中模(φ)(n)的二次剩余个数为(φ)(φ)(n))/8,以所有二次剩余构成的群对Z*(φ)(n)进行分割,利用所有陪集构成一个Klein八元群,在此基础上证明Z*(φ)(n)可由7个二次非剩余元素生成.

  19. Displacement of the medial meniscus within the passive motion characteristics of the human knee joint: an RSA study in human cadaver knees.

    Science.gov (United States)

    Tienen, T G; Buma, P; Scholten, J G F; van Kampen, A; Veth, R P H; Verdonschot, N

    2005-05-01

    The objective of this study was to validate an in vitro human cadaver knee-joint model for the evaluation of the meniscal movement during knee-joint flexion. The question was whether our model showed comparable meniscal displacements to those found in earlier meniscal movement studies in vivo. Furthermore, we determined the influence of tibial torque on the meniscal displacement during knee-joint flexion. Three tantalum beads were inserted in the medial meniscus of six human-cadaver joints. The knee joints were placed and loaded in a loading apparatus, and the movements of the beads were determined by means of RSA during knee-joint flexion and extension with and without internal tibial (IT) and external tibial (ET) torque. During flexion without tibial torque, all menisci moved in posterior and lateral direction. The anterior horn showed significantly greater excursions than the posterior horn in both posterior and lateral direction. Internal tibial torque caused an anterior displacement of the pathway on the tibial plateau. External tibial torque caused a posterior displacement of the pathway. External tibial torque restricted the meniscal displacement during the first 30 degrees of knee-joint flexion. The displacements of the meniscus in this experiment were similar to the displacements described in the in vivo MRI studies. Furthermore, the application of tibial torque confirmed the relative immobility of the posterior horn of the meniscus. During external tibial torque, the posterior displacement of the pathway on the tibial plateau during the first 30 degrees of flexion might be restricted by the attached knee-joint capsule or the femoral condyle. This model revealed representative meniscal displacements during simple knee-joint flexion and also during the outer limits of passive knee-joint motion.

  20. Detection of Rsa Ⅰ gene polimorphism of low density lipoprotein receptor related protein and its influence on serum lipid level in hemodialysis patients%血液透析患者低密度脂蛋白受体相关蛋白Rsa Ⅰ位点基因多态性对血脂水平的影响

    Institute of Scientific and Technical Information of China (English)

    王玉新; 张以勤; 叶婧; 陆元善; 徐琴君; 邹和群

    2012-01-01

    Objectives To investigate the characteristics of dislipidemia and influence by low density lipoprotein receptor related protein (LRP) exon 3 Rsa Ⅰ gene polymorphism in hemodialysis patients.Methods serum total cholesterol (TC),triglyceride (TG),low density lipoprotein cholesterol (LDLC),high density lipoprotein cholesterol ( HDLC),apolipoproteins ( Apo A1,B,E) and lipoprotein (a) [Lp (a)] were measured,polymerase chain reaction - restriction fragment length polymophism ( PCR - RFLP) was used to detect LRP gene polymorphism in hemodialysis patients.Results The serum levels of TG and ApoB were higher significantly in the hemodialysis patients compared to contrals,and the levels of TC,LDLC,HDLC were lower compared to controls.Patients with cardiovascular disorder had higher TG level compared to patients without the disorder.The data of LRP polymorphism detected by PCR - RFLP showed that the allele frequency and the distribution of the LRP genotype of tetranucleotide reapeat sequence and exon 3 did not differ significantly between controls and hemodialysis patients.There was no statistic difference in serum lipid level between hemodialysis patients with different genotype of LRP exon 3.Conclusions Hemodialysis patients were liable to develop hypertrglyeridemia and hypocholesteroldemia.TG level might related to the development of cardiovascular disorder in hemodialysis patients.There is different influence of LRP Rsa Ⅰ gene polymorphism on lipid levels between controls and hemodialysis patients.%目的 探讨血液透析患者脂代谢紊乱的临床特征及低密度脂蛋白受体相关蛋白(LRP)外显子3RsaⅠ位点基因多态性对脂代谢的影响.方法 生化方法检测血液透析患者血清总胆固醇(TC)、甘油三酯(TG)、高密度脂蛋白胆固醇(HDLC)、低密度脂蛋白胆固醇(LDLC)、载脂蛋白(Apo)A1、ApoB、ApoE及脂蛋白(Lp)(a)水平,多聚合酶链反应-限制性片断长度多态性方法( PCR - RFLP)检测LRP外显子3Rsa

  1. Bagasse hydrolyzates from Agave tequilana as substrates for succinic acid production by Actinobacillus succinogenes in batch and repeated batch reactor.

    Science.gov (United States)

    Corona-González, Rosa Isela; Varela-Almanza, Karla María; Arriola-Guevara, Enrique; Martínez-Gómez, Álvaro de Jesús; Pelayo-Ortiz, Carlos; Toriz, Guillermo

    2016-04-01

    The aim of this work was to obtain fermentable sugars by enzymatic or acid hydrolyses of Agave tequilana Weber bagasse in order to produce succinic acid with Actinobacillus succinogenes. Hydrolyses were carried out with mineral acids (sulfuric and hydrochloric acids) or a commercial cellulolytic enzyme, and were optimized statistically by a response surface methodology, having as factors the concentration of acid/enzyme and time of hydrolysis. The concentration of sugars obtained at optimal conditions for each hydrolysis were 21.7, 22.4y 19.8g/L for H2SO4, HCl and the enzymatic preparation respectively. Concerning succinic acid production, the enzymatic hydrolyzates resulted in the highest yield (0.446g/g) and productivity (0.57g/Lh) using A. succinogenes in a batch reactor system. Repeated batch fermentation with immobilized A. succinogenes in agar and with the enzymatic hydrolyzates resulted in a maximum concentration of succinic acid of 33.6g/L from 87.2g/L monosaccharides after 5 cycles in 40h, obtaining a productivity of 1.32g/Lh. PMID:26802183

  2. Intact cell mass spectrometry as a progress tracking tool for batch and fed-batch fermentation processes.

    Science.gov (United States)

    Helmel, Michaela; Marchetti-Deschmann, Martina; Raus, Martin; Posch, Andreas E; Herwig, Christoph; Šebela, Marek; Allmaier, Günter

    2015-02-01

    Penicillin production during a fermentation process using industrial strains of Penicillium chrysogenum is a research topic permanently discussed since the accidental discovery of the antibiotic. Intact cell mass spectrometry (ICMS) can be a fast and novel monitoring tool for the fermentation progress during penicillin V production in a nearly real-time fashion. This method is already used for the characterization of microorganisms and the differentiation of fungal strains; therefore, the application of ICMS to samples directly harvested from a fermenter is a promising possibility to get fast information about the progress of fungal growth. After the optimization of the ICMS method to penicillin V fermentation broth samples, the obtained ICMS data were evaluated by hierarchical cluster analysis or an in-house software solution written especially for ICMS data comparison. Growth stages of a batch and fed-batch fermentation of Penicillium chrysogenum are differentiated by one of those statistical approaches. The application of two matrix-assisted laser desorption/ionization time-of-flight (MALDI-TOF) instruments in the linear positive ion mode from different vendors demonstrated the universal applicability of the developed ICMS method. The base for a fast and easy-to-use method for monitoring the fermentation progress of P. chrysogenum is created with this ICMS method developed especially for fermentation broth samples.

  3. Citric acid production from hydrolysate of pretreated straw cellulose by Yarrowia lipolytica SWJ-1b using batch and fed-batch cultivation.

    Science.gov (United States)

    Liu, Xiaoyan; Lv, Jinshun; Zhang, Tong; Deng, Yuanfang

    2015-01-01

    In this study, crude cellulase produced by Trichoderma reesei Rut-30 was used to hydrolyze pretreated straw. After the compositions of the hydrolysate of pretreated straw were optimized, the study showed that natural components of pretreated straw without addition of any other components such as (NH4)2SO4, KH2PO4, or Mg(2+) were suitable for citric acid production by Yarrowia lipolytica SWJ-1b, and the optimal ventilatory capacity was 10.0 L/min/L medium. Batch and fed-batch production of citric acid from the hydrolysate of pretreated straw by Yarrowia lipolytica SWJ-1b has been investigated. In the batch cultivation, 25.4 g/L and 26.7 g/L citric acid were yields from glucose and hydrolysate of straw cellulose, respectively, while the cultivation time was 120 hr. In the three-cycle fed-batch cultivation, citric acid (CA) production was increased to 42.4 g/L and the cultivation time was extended to 240 hr. However, iso-citric acid (ICA) yield in fed-batch cultivation (4.0 g/L) was similar to that during the batch cultivation (3.9 g/L), and only 1.6 g/L of reducing sugar was left in the medium at the end of fed-batch cultivation, suggesting that most of the added carbon was used in the cultivation.

  4. Biological Treatment of Leachate using Sequencing Batch Reactor

    Directory of Open Access Journals (Sweden)

    WDMC Perera

    2014-12-01

    Full Text Available Normal 0 false false false EN-US X-NONE TA Abstract   In Sri Lanka municipal solid waste is generally disposed in poorly managed open dumps which lack liner systems and leachate collection systems. Rain water percolates through the waste layers to produce leachate which drains in to ground water and finally to nearby water bodies, degrading the quality of water. Leachate thus has become a major environmental concern in municipal waste management and treatment of leachate is a major challenge for the existing and proposed landfill sites.   The study was conducted to assess the feasibility of the usage of the Sequencing Batch Reactor in the treatment of the landfill leachate up to the proposed levels in the draft report of “Proposed Sri Lankan standard for landfill leachate to be disposed to the inland waters". Leachate collected from the open dumpsite at Meethotamulla, Western Province, Sri Lanka was used for leachate characterization.   SBR was constructed with a 10-liter working volume operated in an 18 hour cycle mode and each cycle consists of 15hours of aerobic, 2h settle and 0.5 h of fill/decant stages. The Dissolved Oxygen level within the SBR was maintained at 2 mg/l through the aerobic stage. Infeed was diluted with water during the acclimatization period and a leachate to water ratio of 55:45 was maintained. The removal efficiencies for different parameters were; COD (90.5%, BOD (92.6%, TS (92.1%, Conductivity (83.9%, Alkalinity (97.4%, Hardness (82.2%, Mg (80.5%, Fe (94.2%, Zn (63.4%, Cr (31.69%, Pb (99.6%, Sulphate (98.9%, and Phosphorus (71.4% respectively. In addition Ni and Cd were removed completely during a single SBR cycle. Thus the dilution of leachate in the dumpsites using municipal wastewater, groundwater or rainwater was identified as the most cost effective dilution methods. The effluent from the Sequencing batch reactor is proposed to be further treated using a constructed wetland before releasing to surface water.

  5. Two-stage assembly-type flowshop batch scheduling problem subject to a fixed job sequence

    OpenAIRE

    F J Hwang; B M T Lin

    2012-01-01

    This paper discusses a two-stage assembly-type flowshop scheduling problem with batching considerations subject to a fixed job sequence. The two-stage assembly flowshop consists of m stage-1 parallel dedicated machines and a stage-2 assembly machine which processes the jobs in batches. Four regular performance metrics, namely, the total completion time, maximum lateness, total tardiness, and number of tardy jobs, are considered. The goal is to obtain an optimal batching decision for the prede...

  6. A CATASTROPHIC-CUM-RESTORATIVE QUEUING SYSTEM WITH CORRELATED BATCH ARRIVALS AND VARIABLE CAPACITY

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar

    2008-07-01

    Full Text Available In this paper, we study a catastrophic-cum-restorative queuing system with correlated batch arrivals and service in batches of variable sizes. We perform the transient analysis of the queuing model. We obtain the Laplace Transform of the probability generating function of system size. Finally, some particular cases of the model have been derived and discussed. Keywords: Queue length, Catastrophes, Correlated batch arrivals, Broadband services, Variable service capacity, and Restoration.

  7. Sample Results From Routine Salt Batch 7 Samples

    Energy Technology Data Exchange (ETDEWEB)

    Peters, T. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2016-01-14

    Strip Effluent Hold Tank (SEHT) and Decontaminated Salt Solution Hold Tank (DSSHT) samples from several of the “microbatches” of Integrated Salt Disposition Project (ISDP) Salt Batch (“Macrobatch”) 7B have been analyzed for 238Pu, 90Sr, 137Cs, cations (Inductively Coupled Plasma Emission Spectroscopy - ICPES), and anions (Ion Chromatography Anions - IC-A). The analytical results from the current microbatch samples are similar to those from previous macrobatch samples. The Actinide Removal Process (ARP) and the Modular Caustic-Side Solvent Extraction Unit (MCU) continue to show more than adequate Pu and Sr removal, and there is a distinct positive trend in Cs removal (increasing cesium decontamination), due to the use of the Next Generation Solvent (NGS). The bulk chemistry of the DSSHT and SEHT samples do not show any signs of unusual behavior.

  8. Study on the numerical simulation of batch sieving process

    Institute of Scientific and Technical Information of China (English)

    JIAO Hong-guang; MA Jiao; ZHAO Yue-min; CHEN Lun-jian

    2006-01-01

    Screening was widely used in many sectors of industry. However, it is rather incomplete to the cognition of the sieving process for us due to the daedal separation process involving interactions of thousands of particulates. To address this problem, two dimensional numerical simulation of batch sieving process was performed by adopting advanced discrete element method (DEM), which is one of the highly nonlinear digitized dynamic simulative methods and can be used to reveal the quantitative change from particle dimension level. DEM simulation results show that the jam phenomena of sieve-plate apertures of the "blinding particles" in the screen feed can be demonstrated vividly and results also reveal that the velocity of particle moving on the screen plate will vary along with the screen length. This conclusion will be helpful to the design and operation of screen.

  9. Simulated annealing and joint manufacturing batch-sizing

    Directory of Open Access Journals (Sweden)

    Sarker Ruhul

    2003-01-01

    Full Text Available We address an important problem of a manufacturing system. The system procures raw materials from outside suppliers in a lot and processes them to produce finished goods. It proposes an ordering policy for raw materials to meet the requirements of a production facility. In return, this facility has to deliver finished products demanded by external buyers at fixed time intervals. First, a general cost model is developed considering both raw materials and finished products. Then this model is used to develop a simulated annealing approach to determining an optimal ordering policy for procurement of raw materials and also for the manufacturing batch size to minimize the total cost for meeting customer demands in time. The solutions obtained were compared with those of traditional approaches. Numerical examples are presented. .

  10. CONSOLIDATING BATCH AND TRANSACTIONAL WORKLOADS USING DEPENDENCY STRUCTURE PRIORITIZATION

    Directory of Open Access Journals (Sweden)

    S.NIVETHITHA

    2013-04-01

    Full Text Available Organizations offer efficient services to their customers through cloud. These services can either be a batch or transactional workloads. To offer a real-time service, there comes a need to schedule these workloads in an efficient way. An idea to consolidate these workloads enables us to cut down the energy consumption and infrastructure cost. It will be harder to consolidate both these workloads due to the difference in their nature, performance goals and control mechanisms. The proposed work implements the concept of Dependency Structure Prioritization (DSP to assign priority to the job. This work tends to make effective resource utilization through reducing the number of job migration and missed deadline jobs by considering the deadline and the priority of the job as the most important evaluation factor.

  11. [Neural network detection of abnormalities in fed-batch fermentation].

    Science.gov (United States)

    Li, Yun-Feng; Yuan, Jing-Qi

    2005-01-01

    During fermentation, it is often difficult to detect the abnormalities, for example, caused by contamination on-line. Instead, the faults were detected usually by off-line laboratory analysis or other ways, which in most cases, is too late to remedy the situation. In this paper, a simple three-layers BP network was used for the early prediction of the amount of product, based on the difference in prediction errors between normal and abnormal charges and other accessorial information, such as profit function and pH value. In addition, three indications characteristic to abnormal charge are incorporated in practical operation. The prediction for Cephalosporin C Fed-batch Fermentation in a Chinese pharmaceutical factory was studied in details as an example and the result shows the abnormal charge can be discovered early successfully using the method. PMID:15859337

  12. Analytical study plan: Shielded Cells batch 1 campaign; Revision 1

    International Nuclear Information System (INIS)

    Radioactive operations in the Defense Waste Processing Facility (DWPF) will require that the Savannah River Technology Center (SRTC) perform analyses and special studies with actual Savannah River Site (SRS) high-level waste sludge. SRS Tank 42 and Tank 51 will comprise the first batch of sludge to be processed in the DWPF. Approximately 25 liters of sludge from each of these tanks will be characterized and processed in the Shielded Cells of SRTC. During the campaign, processes will include sludge characterization, sludge washing, rheology determination, mixing, hydrogen evolution, feed preparation, and vitrification of the waste. To complete the campaign, the glass will be characterized to determine its durability and crystallinity. This document describes the types of samples that will be produced, the sampling schedule and analyses required, and the methods for sample and analytical control

  13. Hadoop distributed batch processing for Gaia: a success story

    Science.gov (United States)

    Riello, Marco

    2015-12-01

    The DPAC Cambridge Data Processing Centre (DPCI) is responsible for the photometric calibration of the Gaia data including the low resolution spectra. The large data volume produced by Gaia (~26 billion transits/year), the complexity of its data stream and the self-calibrating approach pose unique challenges for scalability, reliability and robustness of both the software pipelines and the operations infrastructure. DPCI has been the first in DPAC to realise the potential of Hadoop and Map/Reduce and to adopt them as the core technologies for its infrastructure. This has proven a winning choice allowing DPCI unmatched processing throughput and reliability within DPAC to the point that other DPCs have started following our footsteps. In this talk we will present the software infrastructure developed to build the distributed and scalable batch data processing system that is currently used in production at DPCI and the excellent results in terms of performance of the system.

  14. Hybrid modeling of xanthan gum bioproduction in batch bioreactor.

    Science.gov (United States)

    Zabot, Giovani L; Mecca, Jaqueline; Mesomo, Michele; Silva, Marceli F; Prá, Valéria Dal; de Oliveira, Débora; Oliveira, J Vladimir; Castilhos, Fernanda; Treichel, Helen; Mazutti, Marcio A

    2011-10-01

    This work is focused on hybrid modeling of xanthan gum bioproduction process by Xanthomonas campestris pv. mangiferaeindicae. Experiments were carried out to evaluate the effects of stirred speed and superficial gas velocity on the kinetics of cell growth, lactose consumption and xanthan gum production in a batch bioreactor using cheese whey as substrate. A hybrid model was employed to simulate the bio-process making use of an artificial neural network (ANN) as a kinetic parameter estimator for the phenomenological model. The hybrid modeling of the process provided a satisfactory fitting quality of the experimental data, since this approach makes possible the incorporation of the effects of operational variables on model parameters. The applicability of the validated model was investigated, using the model as a process simulator to evaluate the effects of initial cell and lactose concentration in the xanthan gum production.

  15. Uranium Adsorption on Granular Activated Carbon – Batch Testing

    Energy Technology Data Exchange (ETDEWEB)

    Parker, Kent E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Golovich, Elizabeth C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Wellman, Dawn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2013-09-01

    The uranium adsorption performance of two activated carbon samples (Tusaar Lot B-64, Tusaar ER2-189A) was tested using unadjusted source water from well 299-W19-36. These batch tests support ongoing performance optimization efforts to use the best material for uranium treatment in the Hanford Site 200 West Area groundwater pump-and-treat system. A linear response of uranium loading as a function of the solution-to-solid ratio was observed for both materials. Kd values ranged from ~380,000 to >1,900,000 ml/g for the B-64 material and ~200,000 to >1,900,000 ml/g for the ER2-189A material. Uranium loading values ranged from 10.4 to 41.6 μg/g for the two Tusaar materials.

  16. Treatment of Laboratory Wastewater by Sequence Batch reactor technology

    International Nuclear Information System (INIS)

    These studies were conducted on the characterization and treatment of sewage mixed with waste -water of research and testing laboratory (PCSIR Laboratories Lahore). In this study all the parameters COD, BOD and TSS etc of influent (untreated waste-water) and effluent (treated waste-water) were characterized using the standard methods of examination for water and waste-water. All the results of the analyzed waste-water parameters were above the National Environmental Quality Standards (NEQS) set at National level. Treatment of waste-water was carried out by conventional sequencing batch reactor technique (SBR) using aeration and settling technique in the same treatment reactor at laboratory scale. The results of COD after treatment were reduced from (90-95 %), BOD (95-97 %) and TSS (96-99 %) and the reclaimed effluent quality was suitable for gardening purposes. (author)

  17. Minimum Amount of Slop Cut in Batch Distillation

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    The pulse-control operation technique which alternates between total reflux operation and total efflux operation in batch distillation was studied along with the minimum amount of slop cut.Total reflux time was confirmed by dynamic simulation, and total efflux time was adopted by statistic method. For the mixture of hexane and cyclohexane and the traditional constant reflux ratio operation strategy, the amount of slop cut is 1.8-2.1 times of the minimum amount of slop cut; whereas for the pulse-control operation strategy, it is 1.2-1.4 times of the minimum amount of slop cut. So compared with the traditional constant reflux ratio operation, the pulse-control operation can decrease the amount of slop cut and operation time, and meanwhile, enhance separation efficiency and yield.

  18. Fed-batch Fermentation of Lactic Acid Bacteria to Improve Biomass Production: A Theoretical Approach

    Science.gov (United States)

    Beng Lee, Boon; Tham, Heng Jin; Chan, Eng Seng

    Recently, fed-batch fermentation has been introduced in an increasing number of fermentation processes. Previous researches showed that fed-batch fermentation can increase the biomass yield of many strains. Improvement of the biomass yield is interested because biomass from lactic acid bacteria (LAB) fermentation is widely used in food and pharmaceutical industry. The aim of this research is to study the ability and feasibility of fed-batch fermentation to improve biomass production of LAB. Appropriate model has been selected from literature. Monod equation described the substrate limitation of LAB and the product inhibition of LAB follows a non-competitive model. Furthermore, the lactic acid production follows Luedeking and Piret model. Then the models are applied to simulate the fermentation of batch and fed-batch cultures by using MATLAB. From the results of simulation, fed-batch fermentation showed that substrate limitation and substrate inhibition can be avoided. Besides that, the variable volume fed-batch fermentation also showed that product inhibition can be eliminated by diluting the product concentration with added fresh feed. However, it was found that fed-batch fermentation is not economically feasible because large amount of substrate is required to reduce the product inhibition effect. Therefore, fed-batch fermentation plays more importance role if the fermentation strain has high Ks value or low Kp value.

  19. Analysis of Mixing Characteristics of Batch Stirred Vessels Using the Networks-of-Zones Model

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Batch stirred vessels, being devoid of through flow, cannot be assessed by the classical response technique. However, visible inert tracers can be readily observed in a batch or semi-batch stirred vessel. Visible images of the mixing and dispersion of the tracer present a picture in both space and time of the mixing process. Axi-symmetric networks of backmixed zones were used in an image reconstruction approach to analytically characterize the mixing. Computer generated images were compared with experimental results. The qualitative agreement between the observed and calculated images suggests that the analysis of batch stirred reactors can be used to guide operational strategies to control internal concentration fields.

  20. Lipase-catalysed transesterification of soya bean oil for biodiesel production during continuous batch operation.

    Science.gov (United States)

    Du, Wei; Xu, Yuanyuan; Liu, Dehua

    2003-10-01

    The effects of temperature, oil/alcohol molar ratio and by-product glycerol were studied during Lipozyme TL IM-catalysed continuous batch operation when short-chain alcohols were used as the acyl acceptor. In non-continuous batch operation, the optimal oil/alcohol ratio and temperature were 1:4 and 40-50 degrees C; however, during the continuous batch operation, the optimal oil/alcohol ratio and temperature were 1:1 and 30 degrees C; 95% of enzymic activity remained after 10 batches when isopropanol was adopted to remove by-product glycerol during repeated use of the lipase.

  1. Increased CPC batch size study for Tank 42 sludge in the Defense Waste Processing Facility

    International Nuclear Information System (INIS)

    A series of experiments have been completed at TNX for the sludge-only REDOX adjusted flowsheet using Tank 42 sludge simulant in response to the Technical Task Request HLW/DWPT/TTR-980013 to increase CPC batch sizes. By increasing the initial SRAT batch size, a melter feed batch at greater waste solids concentration can be prepared and thus increase melter output per batch by about one canister. The increased throughput would allow DWPF to dispose of more waste in a given time period thus shortening the overall campaign

  2. Retardation characteristics of radionuclides in geologic media through batch and packed column experiments

    International Nuclear Information System (INIS)

    Batch and packed column experiments are performed to investigate the retardation characteristics of radionuclide,i.e, Cs-137 in geologic media. In batch experiment, the effects of important parameters on the sorption of radionuclide in geologic media, such as nuclide concentration, pH, and particle size are examined. The Kd value obtained from breakthrough curve was compared with that from the batch sorption experiment to investigate the applicability of the Kd value from batch experiment to prediction of radionuclide migration in dynamic flow through porous media. The proposed model of radionuclide migration in porous media is also verified using the experimental results. (Author)

  3. Sludge Batch 2 (Marcobath 3) Flowsheet Studies with Simulants

    Energy Technology Data Exchange (ETDEWEB)

    Koopman, D.C.

    2001-03-02

    Sludge-only process simulations of the Sludge Receipt and Adjustment Tank (SRAT) and the Slurry Mix Evaporator (SME) cycle were conducted for the two most likely scenarios for Sludge Batch 2 (Macrobatch 3). The two scenarios are a roughly 50:50 blend of Tank 8 and Tank 40 washed sludge and Tank 40 washed sludge by itself. The testing used new simulants of Tank 8 and Tank 40 washed sludge prepared at the University of South Carolina. The washing endpoint was about 0.5 moles sodium per liter supernate. This report summarizes both the simulant preparation and process simulation activities. The rheology work requested in the Task Plan will be documented in a separate report. Two scoping SRAT simulations were conducted for Tank 40 sludge. This was followed by a complete SRAT and SME simulation using Sludge Batch 1B acid stoichiometry (137.5 percent). Four scoping SRAT simulations were conducted for the Tank 8/40 blend. Three complete SRAT and SME simulations using blended sludge were then performed. One was at the recommended acid stoichiometry of 125 percent. The second used identical acid stoichiometry with HM levels of noble metals. The final run was at worst case noble metals and assumed complete transfer of the Formic Acid Feed Tank. Testing was completed without any major incidents. Hydrogen flow rates in excess of the design bases (0.65 lbs./hr for the SRAT and 0.23 lbs./hr for the SME) are marked in bold. Full details on the noble metals concentrations can be found in the body of the report.

  4. Integrating PROOF Analysis in Cloud and Batch Clusters

    International Nuclear Information System (INIS)

    High Energy Physics (HEP) analysis are becoming more complex and demanding due to the large amount of data collected by the current experiments. The Parallel ROOT Facility (PROOF) provides researchers with an interactive tool to speed up the analysis of huge volumes of data by exploiting parallel processing on both multicore machines and computing clusters. The typical PROOF deployment scenario is a permanent set of cores configured to run the PROOF daemons. However, this approach is incapable of adapting to the dynamic nature of interactive usage. Several initiatives seek to improve the use of computing resources by integrating PROOF with a batch system, such as Proof on Demand (PoD) or PROOF Cluster. These solutions are currently in production at Universidad de Oviedo and IFCA and are positively evaluated by users. Although they are able to adapt to the computing needs of users, they must comply with the specific configuration, OS and software installed at the batch nodes. Furthermore, they share the machines with other workloads, which may cause disruptions in the interactive service for users. These limitations make PROOF a typical use-case for cloud computing. In this work we take profit from Cloud Infrastructure at IFCA in order to provide a dynamic PROOF environment where users can control the software configuration of the machines. The Proof Analysis Framework (PAF) facilitates the development of new analysis and offers a transparent access to PROOF resources. Several performance measurements are presented for the different scenarios (PoD, SGE and Cloud), showing a speed improvement closely correlated with the number of cores used.

  5. Optimal control of batch emulsion polymerization of vinyl chloride

    Energy Technology Data Exchange (ETDEWEB)

    Damslora, Andre Johan

    1998-12-31

    The highly exothermic polymerization of vinyl chloride (VC) is carried out in large vessels where the heat removal represents a major limitation of the production rate. Many emulsion polymerization reactors are operated in such a way that a substantial part of the heat transfer capacity is left unused for a significant part of the total batch time. To increase the reaction rate so that it matches the heat removal capacity during the course of the reaction, this thesis proposes the use of a sufficiently flexible initiator system to obtain a reaction rate which is high throughout the reaction and real-time optimization to compute the addition policy for the initiator. This optimization based approach provides a basis for an interplay between design and control and between production and research. A simple model is developed for predicting the polymerization rate. The model is highly nonlinear and open-loop unstable and may serve as an interesting case for comparison of nonlinear control strategies. The model is fitted to data obtained in a laboratory scale reactor. Finally, the thesis discusses optimal control of the emulsion polymerization reactor. Reduction of the batch cycle time is of major economic importance, as long as the quality parameters are within their specifications. The control parameterization had a major influence on the performance. A differentiable spline parameterization was applied and the optimization is illustrated in a number of cases. The best performance is obtained when the reactor temperature is obtained when the optimization is combined with some form of closed-loop control of the reactor temperature. 112 refs., 48 figs., 4 tabs.

  6. Detección de Anomalías en Oráculos Criptográficos tipo RSA por medio de análisis probabilísticas y estadísticos

    OpenAIRE

    Castro Lechtaler, Antonio; Cipriano, Marcelo; Malvacio, Eduardo

    2013-01-01

    Esta línea de investigación persigue la elaboración de herramientas matemáticas susceptibles de ser sistematizadas en un software capaz de detectar anomalías y mal funcionamiento en servicios de infraestructura de clave pública (PKI) que utilicen el esquema RSA. Esta herramienta se puede aplicar en redes Públicas o Privados, Lan´s, o Wan´s e incluso Internet; en sistemas militares como del ámbito civil. Dada la complejidad de los sistemas actuales, se hace cada vez más complicada la det...

  7. A comparative study of sequencing batch reactor and moving-bed sequencing batch reactor for piggery wastewater treatment

    Directory of Open Access Journals (Sweden)

    Kwannate Sombatsompop

    2011-06-01

    Full Text Available This research aims to comparatively study the efficiency of piggery wastewater treatment by the moving-bed sequencing batch reactor (moving-bed SBR system with held medium, and the conventional sequencing batch reactor (SBR system, by varying the organic load from 0.59 to 2.36 kgCOD/m3.d. The COD treatment efficiency of the SBR and moving-bed SBR was higher than 60% at an organic load of 0.59 kgCOD/m3.d and higher than 80% at the organic loads of 1.18-2.36 kgCOD/m3.d. The BOD removal efficiency was greater than 90% at high organic loads of 1.18-2.36 kgCOD/m3.d. The moving-bed SBR gave TKN removal efficiency of 86-93%, whereas the SBR system exhibited the removal efficiency of 75-87% at all organic loads. The amount of effluent suspended solids for SBR systems exceeded the piggery wastewater limit of 200 mg/L at the organic load of 2.36 kgCOD/m3.d while that for the moving-bed SBR system did not. When the organic load was increased, the moving-bed SBR system yielded better treatment efficiency than that of the SBR system. The wastewater treated by the moving-bed SBR system met the criteria of wastewater standard for pig farms at all organic loads, while that treated by the SBR system was not satisfactory at a high organic load of 2.36 kgCOD/m3.d.

  8. Production of laccase by Coriolus versicolor and its application in decolorization of dyestuffs : (Ⅰ) Production of laccase by batch and repeated-batch processes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    The production of laccase by Coriolus versicolor wasstudied. The effect of cultivation conditions on laccase productionby Coriolus versicolor was examined to obtain optimal medium andcultivation conditions. Both batch and repeated-batch processeswere performed for laccase production. In repeated-batchfermentation with self-immobilized mycelia, total of 14 cycles wereperformed with laccase activity in the range between 3.4 and 14.8U/ml.

  9. Meeting Report: Batch-to-Batch Variability in Estrogenic Activity in Commercial Animal Diets—Importance and Approaches for Laboratory Animal Research

    OpenAIRE

    Heindel, Jerrold J.; vom Saal, Frederick S.

    2007-01-01

    We report information from two workshops sponsored by the National Institutes of Health that were held to a) assess whether dietary estrogens could significantly impact end points in experimental animals, and b) involve program participants and feed manufacturers to address the problems associated with measuring and eliminating batch-to-batch variability in rodent diets that may lead to conflicting findings in animal experiments within and between laboratories. Data were presented at the work...

  10. Improving the batch-to-batch reproducibility of microbial cultures during recombinant protein production by regulation of the total carbon dioxide production.

    Science.gov (United States)

    Jenzsch, Marco; Gnoth, Stefan; Kleinschmidt, Martin; Simutis, Rimvydas; Lübbert, Andreas

    2007-03-10

    Batch-to-batch reproducibility of fermentation processes performed during the manufacturing processes of biologics can be increased by operating the cultures at feed rate profiles that are robust against typically arising disturbances. Remaining randomly appearing deviations from the desired path should be suppressed automatically by manipulating the feed rate. With respect to the cells' physiology it is best guiding the cultivations along an optimal profile of the specific biomass growth rate mu(t). However, there are two problems that speak for further investigations: Upon severe disturbances that may happen during the fermentation, the biomass concentration X may significantly deviate from its desired value, then a fixed mu-profile leads to a diminished batch-to-batch reproducibility. Second, the specific growth rate cannot easily be estimated online to a favourably high accuracy, hence it is difficult to determine the deviations in mu from the desired profile. The alternative discussed here solves both problems by keeping the process at the corresponding total cumulative carbon dioxide production-profile: it is robust against distortions in X and the controlled variable can accurately be measured online during cultivations of all relevant sizes. As compared to the fermentation practice currently used in industry, the experimental results, presented at the example of a recombinant protein production with Escherichia coli cells, show that CPR-based corrections lead to a considerably improved batch-to-batch reproducibility.

  11. REPORTABLE RADIONUCLIDES IN DWPF SLUDGE BATCH 7A (MACROBATCH 8)

    Energy Technology Data Exchange (ETDEWEB)

    Reboul, S.; Diprete, D.; Click, D.; Bannochie, C.

    2011-12-20

    The Waste Acceptance Product Specifications (WAPS) 1.2 require that the waste producer 'shall report the curie inventory of radionuclides that have half-lives longer than 10 years and that are, or will be, present in concentrations greater than 0.05 percent of the total inventory for each waste type indexed to the years 2015 and 3115.' As part of the strategy to meet WAPS 1.2, the Defense Waste Processing Facility (DWPF) will report for each waste type all radionuclides that have half-lives longer than 10 years and contribute greater than 0.01 percent of the total curie inventory from the time of production through the 1100 year period from 2015 through 3115. The initial list of radionuclides to be reported is based on the design-basis glass identified in the Waste Form Compliance Plan (WCP) and Waste Form Qualification Report. However, it is required that the list be expanded if other radionuclides with half-lives greater than 10 years are identified that meet the 'greater than 0.01% of the curie inventory' criterion. Specification 1.6 of the WAPS, International Atomic Energy Agency Safeguards Reporting for High Level Waste (HLW), requires that the ratio by weights of the following uranium and plutonium isotopes be reported: U-233, U-234, U-235, U-236, and U-238; and Pu-238, Pu-239, Pu-240, Pu-241, and Pu-242. Therefore, the complete list of reportable radionuclides must also include these sets of U and Pu isotopes - and the U and Pu isotopic mass distributions must be identified. The DWPF receives HLW sludge slurry from Savannah River Site (SRS) Tank 40. For Sludge Batch 7a (SB7a), the waste in Tank 40 contained a blend of the heel from Sludge Batch 6 (SB6) and the Sludge Batch 7 (SB7) material transferred to Tank 40 from Tank 51. This sludge blend is also referred to as Macrobatch 8. Laboratory analyses of a Tank 40 sludge sample were performed to quantify the concentrations of pertinent radionuclides in the SB7a waste. Subsequently

  12. SULFATE SOLUBILITY LIMIT VERIFICATION FOR DWPF SLUDGE BATCH 7A

    Energy Technology Data Exchange (ETDEWEB)

    Billings, A.

    2011-04-19

    During processing at the Defense Waste Processing Facility (DWPF), high sulfate concentrations in the feed are a concern to DWPF as it can lead to the formation of a detrimental, sulfate-rich, molten salt phase on the surface of the glass melt pool. To avoid these issues, a sulfate concentration limit was implemented into the Product Composition Control System (PCCS). Related to SB7a frit development efforts, the Savannah River National Laboratory (SRNL) assessed the viability of using the current 0.6 wt % SO{sub 4}{sup 2-} limit set for SB6 (in glass) and the possibility of increasing the SO{sub 4}{sup 2-} solubility limit in PCCS to account for anticipated sulfur concentrations, targeted waste loadings, and inclusion of secondary streams (e.g., Actinide Removal Process (ARP)) with two recommended frits (Frit 418 and Frit 702) for SB7a processing. For a nominal SB7a blend with a 63 inch SB6 heel remaining in Tank 40 (projection SB7a-63), a 0.60 wt% SO{sub 4}{sup 2-} in glass limit was determined for waste loadings of 34 wt% up to 40 wt% with Frit 418 based on crucible melts with batched chemicals. SRNL also examined the inclusion of ARP for the same blending scenario (SB7a-63-ARP) with Frit 418 and at least a 0.6 wt% SO{sub 4}{sup 2-} level, and waste loadings of 34 wt% to 40 wt% were also acceptable. When a visible yellow and/or white sulfate salt layer was visible on the surface of any cooled glass, it was assumed to have surpassed the solubility limit of SO{sub 4}{sup 2-} for that particular composition. All of the glasses fabricated at these concentrations did not exhibit a sulfate rich salt layer on the surface of the glass melt and retained the majority of the batched SO{sub 4}{sup 2-}. At higher levels of SO{sub 4}{sup 2-} 'spiked' into the projected sludge compositions over the aforementioned interval of waste loadings, with Frit 418, low viscosity sulfur layers were observed on the surface of glass melts which confirm exceeding the solubility

  13. 40 CFR 63.489 - Batch front-end process vents-monitoring equipment.

    Science.gov (United States)

    2010-07-01

    ... pressure drop. (B) If the scrubber is subject to regulations in 40 CFR parts 264 through 266 that have... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Batch front-end process vents... § 63.489 Batch front-end process vents—monitoring equipment. (a) General requirements. Each owner...

  14. 40 CFR 63.1324 - Batch process vents-monitoring equipment.

    Science.gov (United States)

    2010-07-01

    .... (B) If the scrubber is subject to regulations in 40 CFR parts 264 through 266 that have required a... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Batch process vents-monitoring... Batch process vents—monitoring equipment. (a) General requirements. Each owner or operator of a...

  15. Monitoring and Characterization of Crystal Nucleation and Growth during Batch Crystallization

    NARCIS (Netherlands)

    Kadam, S.S.

    2012-01-01

    Batch crystallization is commonly used in pharmaceutical, agrochemical, specialty and fine chemicals industry. The advantages of batch crystallization lie in its ease of operation and the relatively simple equipment that can be used. On the other hand a major disadvantage associated with it is the i

  16. Role of batch depletion of broiler houses on the occurrence of Campylobacter spp. in chicken flocks

    DEFF Research Database (Denmark)

    Hald, Birthe; Rattenborg, Erik; Madsen, Mogens

    2001-01-01

    Aims: The effect of batch depletion of broiler houses for campylobacter occurrence in broiler flocks was estimated in 10 flocks, each comprising a separate female and male batch. Methods and Results: The chicks were sampled first bq; cloacal swabs in the broiler houses before the start of the dep...

  17. Degradation of the herbicide mecoprop in an aerobic aquifer determined by laboratory batch studies

    DEFF Research Database (Denmark)

    Heron, Gorm; Christensen, Thomas Højlund

    1992-01-01

    The potential of a shallow aerobic aquifer to degrade the herbicide Mecoprop (2-(2-methyl-4-chlorophenoxy)propionic acid) was evaluated in the laboratory using groundwater and sediment suspension batches. Mecoprop was added to the batches to obtain concentrations of 65, 140, 400 and 1400 μg...

  18. 40 CFR 417.10 - Applicability; description of the soap manufacturing by batch kettle subcategory.

    Science.gov (United States)

    2010-07-01

    ... manufacturing by batch kettle subcategory. 417.10 Section 417.10 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS SOAP AND DETERGENT MANUFACTURING POINT SOURCE CATEGORY Soap Manufacturing by Batch Kettle Subcategory § 417.10 Applicability; description of the...

  19. Fed-batch fermentation dealing with nitrogen limitation in microbial transglutaminase production by Streptoverticillium mobaraense

    NARCIS (Netherlands)

    Zhu, Y.; Rinzema, A.; Tramper, J.; Bruin, E. de; Bol, J.

    1998-01-01

    In the later stages of a batch fermentation for microbial transglutaminase production by Streptoverticillium mobaraense the availability of a nitrogen source accessible to the microorganism becomes critical. Fed-batch fermentation is investigated with the aim of avoiding this substrate limitation. W

  20. Batch and continuous extraction of bromelain enzyme by reversed micelles

    Directory of Open Access Journals (Sweden)

    Ana Maria Frattini Fileti

    2009-10-01

    Full Text Available The main aim of this study was to optimize the conditions for bromelain extraction by reversed micelles from pineapple juice (Ananas comosus. The purification was carried out in batch extraction and a micro-column with pulsed caps for continuous extraction. The cationic micellar solution was made of BDBAC as a surfactant, isooctane as a solvent and hexanol as a co-solvent. For the batch process, a purification factor of 3 times at the best values of surfactant agent, co-solvent and salt concentrations, pH of the back and forward extractions were, 100 mM, 10% v/v, 1 M, 3.5 and 8, respectively. For the continuous operation, independent variables optimal point was determined: ratio between light phase flow rate and total flow rate equal to 0.67 and 1 second for the time interval between the pulses. This optimal point led to a productivity of 1.29 mL/min and a purification factor of 4.96.Este trabalho teve como objetivo principal otimizar as condições para extração da bromelina do suco do abacaxi (Ananas comosus por micelas reversas. A purificação foi feita usando o processo de extração em batelada e contínuo, este último em uma micro-coluna de campânulas pulsantes. A solução micelar catiônica foi preparada com o surfactante BDBAC, i-octano como solvente e hexanol como co-solvente. Na extração em batelada encontrou-se um fator de purificação de 3 vezes, e seus melhores valores de concentração do agente surfactante, co-solvente e sal, de pH da re-extração e extração, foram respectivamente iguais a: 100 mM, 10% v/v, 1 M, 3,5 e 8. Para a operação contínua, as variáveis independentes ótimas foram: 0,67 para a razão entre as taxas de fluxos da fase leve e a total e 1 s para o intervalo de tempo entre pulsos das campânulas. Este ponto ótimo leva a uma produtividade de 1,29 mL/min e a um fator de purificação igual a 4,96.

  1. Inhibition of Sulfide Mineral Oxidation by Surface Coating Agents: Batch

    Science.gov (United States)

    Choi, J.; Ji, M. K.; Yun, H. S.; Park, Y. T.; Gee, E. D.; Lee, W. R.; Jeon, B.-H.

    2012-04-01

    Mining activities and mineral industries have impacted on rapid oxidation of sulfide minerals such as pyrite (FeS2) which leads to Acid Mine Drainage (AMD) formation. Some of the abandoned mines discharge polluted water without proper environmental remediation treatments, largely because of financial constraints in treating AMD. Magnitude of the problem is considerable, especially in countries with a long history of mining. As metal sulfides become oxidized during mining activities, the aqueous environment becomes acid and rich in many metals, including iron, lead, mercury, arsenic and many others. The toxic heavy metals are responsible for the environmental deterioration of stream, groundwater and soils. Several strategies to remediate AMD contaminated sites have been proposed. Among the source inhibition and prevention technologies, microencapsulation (coating) has been considered as a promising technology. The encapsulation is based on inhibition of O2 diffusion by surface coating agent and is expected to control the oxidation of pyrite for a long time. Potential of several surface coating agents for preventing oxidation of metal sulfide minerals from both Young-Dong coal mine and Il-Gwang gold mine were examined by conducting batch experiments and field tests. Powdered pyrite as a standard sulfide mineral and rock samples from two mine outcrops were mixed with six coating agents (KH2PO4, MgO and KMnO4 as chemical agents, and apatite, cement and manganite as mineral agents) and incubated with oxidizing agents (H2O2 or NaClO). Batch experiments with Young-Dong coal mine samples showed least SO42- production in presence of KMnO4 (16% sulfate production compared to no surface coating agents) or cement (4%) within 8 days. In the case of Il-Gwang mine samples, least SO42- production was observed in presence of KH2PO4 (8%) or cement (2%) within 8 days. Field-scale pilot tests at Il-Gwang site also showed that addition of KH2PO4 decreased sulfate production from 200 to

  2. Case-by-case risk assessment of broiler meat batches: An effective control strategy for Campylobacter

    DEFF Research Database (Denmark)

    Christensen, Bjarke Bak; Nauta, Maarten; Korsgaard, Helle;

    2013-01-01

    In 2006, the Danish government decided to take new measures to control Salmonella and Campylobacter in Danish and imported retail meat. The legal basis for these new measures was article 14 in the EU food law, which states that food shall not be placed on the market if it is unsafe, among others...... and the results of more than 3,000 batches of broiler meat tested since 2007. The risk was assessed for batches with one or more samples positive for Campylobacter (>100 cfu/g). Reductions in the number of positive batches from 2007 to 2010 were observed for both domestic (from 17% to 7%, p=0.01) and imported......, for reasons of contamination. This provision allows each member state to make a specific risk assessment of food batches, and decide whether a batch poses an unacceptable risk to the consumer or not. Here we present the basis for the risk assessment model on Campylobacter used in this new approach...

  3. Sample Results from Routine Salt Batch 7 Samples

    Energy Technology Data Exchange (ETDEWEB)

    Peters, T. [Savannah River Site (SRS), Aiken, SC (United States)

    2015-05-13

    Strip Effluent Hold Tank (SEHT) and Decontaminated Salt Solution Hold Tank (DSSHT) samples from several of the “microbatches” of Integrated Salt Disposition Project (ISDP) Salt Batch (“Macrobatch”) 7B have been analyzed for 238Pu, 90Sr, 137Cs, Inductively Coupled Plasma Emission Spectroscopy (ICPES), and Ion Chromatography Anions (IC-A). The results from the current microbatch samples are similar to those from earlier samples from this and previous macrobatches. The Actinide Removal Process (ARP) and the Modular Caustic-Side Solvent Extraction Unit (MCU) continue to show more than adequate Pu and Sr removal, and there is a distinct positive trend in Cs removal, due to the use of the Next Generation Solvent (NGS). The Savannah River National Laboratory (SRNL) notes that historically, most measured Concentration Factor (CF) values during salt processing have been in the 12-14 range. However, recent processing gives CF values closer to 11. This observation does not indicate that the solvent performance is suffering, as the Decontamination Factor (DF) has still maintained consistently high values. Nevertheless, SRNL will continue to monitor for indications of process upsets. The bulk chemistry of the DSSHT and SEHT samples do not show any signs of unusual behavior.

  4. Catalytic hydroliquefaction of coal: about the methodology in batch experiments

    Energy Technology Data Exchange (ETDEWEB)

    Besson, M.; Bacaud, R.; Charcosset, H.; Cebolla-Burillo, V.; Oberson, M.

    1986-03-01

    The results of catalytic hydroliquefaction under batch conditions depend on a large number of variables. The present results concern a few of these variables, in particular the influence of the catalyst concentration, of the mode of sulfidation or (and) of introduction of the catalyst in the coal/solvent mixture, and of the nature of the model compound solvent. The results indicate that increasing the concentration of catalyst increase the conversion of coal into toluene soluble products and the hydrogen consumption but has a small effect on oil formation. An inhibition of the figst fractions of a NiMo/Al/sub 2/O/sub 3/ catalyst added is shown. Strong effects of the sulfiding mode of an iron oxide catalyst, and of the temperature of introduction of the iron oxide into the autoclave are observed relative to the hydrogenation activity of the iron catalyst, when at the same time there is no influence on coal conversions. The replacement of tetralin by a non-donor solvent, 1-methylnaphthalene, suggests that the direct hydrogen transfer process from molecular hydrogen to coal fragment radicals on the catalyst surface may be important. 9 tabs., 4 firs., 16 refs.

  5. Separation of Benzene and Cyclohexane by Batch Extractive Distillation

    Institute of Scientific and Technical Information of China (English)

    XU Jiao; ZHANG Weijiang; GUI Xia

    2007-01-01

    Azeotropic liquid mixture cannot be separated by conventional distillation. But extractive distillation or combination of the two can be valid for them. An experiment to separate benzene and cyclohexane by batch extractive distillation was carried out with N, N-dimethylformide (DMF), dimethyl sulfoxide (DMSO) and their mixture as extractive solvent. The effect of the operation parameterssuch as solvent flow rate and reflux ratio on the separation was studied under the same operating conditions. The results show that the separation effect was improved with the increase of solvent flow rate and the reflux ratio; all the three extractive solvents can separate benzene and cyclohexane, with DMF being the most efficient one, the mixture the second, and DMSO the least. In the experiment the best operation conditions are with DMF as extractive solvent, the solvent flow rate being 12.33 mL/min, and the reflux ratio being 6. As a result, we can get cyclohexane from the top of tower with the average product content being 86.98%, and its recovering ratio being 83.10%.

  6. Design of Batch Pressing Mechanism for Bedded Standard Samples

    Directory of Open Access Journals (Sweden)

    Li Jianguang

    2016-01-01

    Full Text Available In stability analysis of rock soil engineering, before establishing similar physical simulation model, many match experiments on similar material are required, the current standard sample forming processes are difficult to satisfy the uniformity and compactness in the same sample set often, and have obvious defects in the molding process, molding efficiency and bedding processing. A pressing mechanism consists of adjustable concave-convex composite mould, multi-function trough, drive screw and framework is designed, the mould is pressed nto material to fill directly. Each layered material, dip angle, thickness and position can be controlled, forming number for each lot is adjustable, uniform of the same lot is good, all parts are detachable, operation is also simple. This mechanism is suitable for small batch forming, and has obvious advantages in bedding controlling, forming efficiency, forming quality and operation convenience, which can work well for match experiments before large-scale physical similar simulation experiment, geotechnical experiment, composite rock mass experiment, also can be used to make micro physical model with engineering structure.

  7. Microfabrication-derived DDS: From batch to individual production.

    Science.gov (United States)

    Takada, K

    2008-06-01

    As a result of recent advances in microfabrication technology (MFT), microparticles including microcapsules and microspheres can be prepared individually and the disadvantages of the conventional microparticles produced by batch production, i.e. (i) low loading efficiency, (ii) large size variation, and (iii) initial burst release, have been remedied. In addition, all conventional microparticles have the same structure, a spherical shape, so they have only one function, sustained release. Threelayer microcapsules (TLMCs) have been designed to address these issues. TLMCs consist of a surface layer, a drug carrying layer, and a basement layer. TLMCs have sustained release as well as adhesiveness and targeting functions. TLMCs are prepared using ink-jet printer nozzle technology. The obtained TLMCs are used for the oral delivery of peptide/protein drugs and long-term sustained-release injection preparation. In addition, self-dissolving micropiles (SDMPs) can be individually produced by MFT as a percutaneous preparation. MFT allows biopharmaceutical drugs like insulin, erythropoietin, and growth hormone to be absorbed through the skin. Thus, advances in MFT have accelerated the development of pharmaceutical technology.

  8. EFFECT OF DYE CONCENTRATION ON SEQUENCING BATCH REACTOR PERFORMANCE

    Directory of Open Access Journals (Sweden)

    A. A. Vaigan ، M. R. Alavi Moghaddam ، H. Hashemi

    2009-01-01

    Full Text Available Reactive dyes have been identified as problematic compounds in textile industries wastewater as they are water soluble and cannot be easily removed by conventional aerobic biological treatment systems. The treatability of a reactive dye (Brill Blue KN-R by sequencing batch reactor and the influence of the dye concentration on system performance were investigated in this study. Brill Blue KN-R is one of the main dyes that are used in textile industries in Iran. Four cylindrical Plexiglas reactors were run for 36 days (5 days for acclimatization of sludge and 31 days for normal operation at different initial dye concentrations. The dye concentrations were adjusted to be 20, 25, 30 and 40 mg/L in the reactors R1, R2, R3 and R4, respectively. In all reactors, effective volume, influent wastewater flowrate and sludge retention time were 5.5 L, 3.0 L/d and 10 d, respectively. According to the obtained data, average dye removal efficiencies of R1, R2, R3 and R4 were 57% ± 2, 50.18% ± 3, 44.97% ± 3 and 30.98% ± 3, respectively. The average COD removal efficiencies of all reactors were 97% ± 1, 97.12% ± 1, 96.93% ± 1 and 97.22% ± 1, respectively. The dye removal efficiency was decreased by increasing the dye concentration with the correlation coefficient of 0.997.

  9. Simultaneous denitrifying phosphorus accumulation in a sequencing batch reactor

    Institute of Scientific and Technical Information of China (English)

    YUAN Linjiang; HAN Wei; WANG Lei; YANG Yongzhe; WANG Zhiying

    2007-01-01

    In order to achieve simultaneous nitrogen and phosphorus removal in the biological treatment process,denitrifying phosphorus accumulation(DNPA)and its affecting factors were studied in a sequencing batch reactor(SBR)with synthetic wastewater.The results showed that when acetate was used as the sole carbon resource in the influent.the sludge acclimatized under anaerobic/aerobic operation had good phosphorus removal ability.Denitrifying phosphorus accumulation was observed soon when fed with nitrate instead of aeration following the anaerobic stage,which is a vital premise to DNPA.If DNPA sludge is fed with nitrate prior to the anaerobic stage,the DNPA would weaken or even disappear.At the high concen tration of nitrate fed in the anoxic stage,the longer anoxic time needed,the better the DNPA was.Induced DNPA did not disappear even though an aerobic stage followed the anoxic stage,but the shorter the aerobic stage lasted,the higher the proportions of phosphorus removal via DNPA to total removal.

  10. Pretreatment of coking wastewater using anaerobic sequencing batch reactor (ASBR)

    Institute of Scientific and Technical Information of China (English)

    LI Bing; SUN Ying-lan; LI Yu-ying

    2005-01-01

    A laboratory-scale anaerobic sequencing batch reactor (ASBR) was used to pretreat coking wastewater. Inoculated anaerobic granular biomass was acclimated for 225 d to the coking wastewater, and then the biochemical methane potential (BMP)of the coking wastewater in the acclimated granular biomass was measured. At the same time, some fundamental technological factors, such as the filling time and the reacting time ratio (tf/tr), the mixing intensity and the intermittent mixing mode, that affect anaerobic pretreatment of coking wastewater with ASBR, were evaluated through orthogonal tests. The COD removal efficiency reached 38%~50% in the stable operation period with the organic loading rate of 0.37~0.54 kg COD/(m3.d) at the optimum conditions of tf/tr, the mixing intensity and the intermittent mixing mode. In addition, the biodegradability of coking wastewater distinctly increased after the pretreatment using ASBR. At the end of the experiment, the microorganism forms on the granulated sludge in the ASBR were observed using SEM (scanning electron microscope) and fluoroscope. The results showed that the dominant microorganism on the granular sludge was Methanosaeta instead of Methanosarcina dominated on the inoculated sludge.

  11. Unusal pattern of product inhibition: batch acetic acid fermentation

    Energy Technology Data Exchange (ETDEWEB)

    Bar, R.; Gainer, J.L.; Kirwan, D.J.

    1987-04-20

    The limited tolerance of microorganisms to their metabolic products results in inhibited growth and product formation. The relationship between the specific growth rate, micro, and the concentration of an inhibitory product has been described by a number of mathematical models. In most cases, micro was found to be inversely proportional to the product concentration and invariably the rate of substrate utilization followed the same pattern. In this communication, the authors report a rather unusual case in which the formation rate of a product, acetic acid, increased with a decreasing growth rate of the microorganism, Acetobacter aceti. Apparently, a similar behavior was mentioned in a review report with respect to Clostridium thermocellum in a batch culture but was not published in the freely circulating literature. The fermentation of ethanol to acetic acid, C/sub 2/H/sub 5/OH + O/sub 2/ = CH/sub 3/COOH + H/sub 2/O is clearly one of the oldest known fermentations. Because of its association with the commercial production of vinegar it has been a subject of extensive but rather technically oriented studies. Suprisingly, the uncommon uncoupling between the inhibited microbial growth and the product formation appears to have been unnoticed. 13 references.

  12. Degradation of formaldehyde in anaerobic sequencing batch biofilm reactor (ASBBR)

    Energy Technology Data Exchange (ETDEWEB)

    Pereira, N.S. [Laboratorio de Processos Biologicos (LPB), Departamento de Hidraulica e Saneamento, Escola de Engenharia de Sao Carlos (EESC), Universidade de Sao Paulo - USP, Engenharia Ambiental, Bloco 4-F, Av. Joao Dagnone, 1100 Santa Angelina, 13.563-120 Sao Carlos, SP (Brazil); Zaiat, M. [Laboratorio de Processos Biologicos (LPB), Departamento de Hidraulica e Saneamento, Escola de Engenharia de Sao Carlos (EESC), Universidade de Sao Paulo - USP, Engenharia Ambiental, Bloco 4-F, Av. Joao Dagnone, 1100 Santa Angelina, 13.563-120 Sao Carlos, SP (Brazil)], E-mail: zaiat@sc.usp.br

    2009-04-30

    The present study evaluated the degradation of formaldehyde in a bench-scale anaerobic sequencing batch reactor, which contained biomass immobilized in polyurethane foam matrices. The reactor was operated for 212 days at 35 deg. C with 8 h sequential cycles, under different affluent formaldehyde concentrations ranging from 31.6 to 1104.4 mg/L (formaldehyde loading rates from 0.08 to 2.78 kg/m{sup 3} day). The results indicate excellent reactor stability and over 99% efficiency in formaldehyde removal, with average effluent formaldehyde concentration of 3.6 {+-} 1.7 mg/L. Formaldehyde degradation rates increased from 204.9 to 698.3 mg/L h as the initial concentration of formaldehyde was increased from around 100 to around 1100 mg/L. However, accumulation of organic matter was observed in the effluent (chemical oxygen demand (COD) values above 500 mg/L) due to the presence of non-degraded organic acids, especially acetic and propionic acids. This observation poses an important question regarding the anaerobic route of formaldehyde degradation, which might differ substantially from that reported in the literature. The anaerobic degradation pathway can be associated with the formation of long-chain oligomers from formaldehyde. Such long- or short-chain polymers are probably the precursors of organic acid formation by means of acidogenic anaerobic microorganisms.

  13. Biological hydrogen production measured in batch anaerobic respirometers.

    Science.gov (United States)

    Logan, Bruce E; Oh, Sang-Eun; Kim, In S; Van Ginkel, Steven

    2002-06-01

    The biological production of hydrogen from the fermentation of different substrates was examined in batch tests using heat-shocked mixed cultures with two techniques: an intermittent pressure release method (Owen method) and a continuous gas release method using a bubble measurement device (respirometric method). Under otherwise identical conditions, the respirometric method resulted in the production of 43% more hydrogen gas from glucose than the Owen method. The lower conversion of glucose to hydrogen using the Owen protocol may have been produced by repression of hydrogenase activity from high partial pressures in the gastight bottles, but this could not be proven using a thermodynamic/rate inhibition analysis. In the respirometric method, total pressure in the headspace never exceeded ambient pressure, and hydrogen typically composed as much as 62% of the headspace gas. High conversion efficiencies were consistently obtained with heat-shocked soils taken at different times and those stored for up to a month. Hydrogen gas composition was consistently in the range of 60-64% for glucose-grown cultures during logarithmic growth but declined in stationary cultures. Overall, hydrogen conversion efficiencies for glucose cultures were 23% based on the assumption of a maximum of 4 mol of hydrogen/ mol of glucose. Hydrogen conversion efficiencies were similar for sucrose (23%) and somewhat lower for molasses (15%) but were much lower for lactate (0.50%) and cellulose (0.075%).

  14. Changes of Resistance During Polyelectrolyte-enhanced Stirred Batch Ultrafiltration

    Institute of Scientific and Technical Information of China (English)

    ZHU Xin-Sheng; Kwang-Ho CHOO

    2007-01-01

    The permeation flux or the resistance in the ultrafiltration process is mainly limited by osmotic pressure,and it may originate from various kinds of polymer interactions. However, the real origin of permeation resistance hasn't been clarified yet in the light of polymer solution nature. The removal of nitrate contamination by polyelectrolytes was carried out with stirred batch ultrafiltration. The polyelectrolyte concentrations both in permeate and retentate were analyzed with total organic carbon analyzer and permeate mass was acquired by electronic balance connected with computer. The total resistance was calculated and interpreted based on the osmotic pressures in three concentration regimes. In the dilute region, the resistance was proportional to polymer concentration; in the semidilute region, the resistance depended on polymer concentration in the parabolic relationship; in the highly concentrated solution regime, the osmotic pressure factor (OPF) would dominate the total resistance; and the deviation from OPF control could come from the electrostatic repulsion between the tightly compacted and charged polyelectrolyte particles at extremely concentrated solution regime. It was first found that dilute and semidilute concentration regions can be easily detected by plotting the log-log curves of the polymer concentration versus the ratio of the total resistance to polymer concentration. The new concept OPF was defined and did work well at highly concentrated regime.

  15. Kinetic Batch Soil Adsorption Studies of 2, 4-dinitroanisole (DNAN)

    Science.gov (United States)

    Arthur, J.; Mark, N. W.; Taylor, S.; Brusseau, M. L.; Dontsova, K.

    2014-12-01

    Currently the explosive 2, 4, 6- trinitrotoluene (TNT) is used as a main ingredient in munitions; however the compound has failed to meet sensitivity requirements. The replacement compound being tested is 2, 4-dinitroanisole (DNAN). DNAN is less sensitive to shock, high temperatures, and has good detonation characteristics. However, DNAN is more soluble than TNT, which can influence transport and fate behavior and thus bioavailability and exposure potential. DNAN has been shown to have some human and environmental toxicity. The objective of this study was to investigate the environmental fate of DNAN in soil, with a specific focus on sorption processes. Batch experiments were conducted using 11 soils collected from military installations located across the United States. The soils were characterized for pH, specific surface area, electrical conductivity, cation exchange capacity, and organic carbon content. Adsorption kinetic data determined at room temperature were fitted using the first order kinetic equation. Adsorption isotherms were fitted with linear and Freundlich isotherm equations. The magnitudes of the linear adsorption coefficients ranged from 0.6 to 6 cm3/g. Results indicated that the adsorption of DNAN is strongly dependent on the amount of organic carbon present in the soil.

  16. Efficient flotation of yeast cells grown in batch culture.

    Science.gov (United States)

    Palmieri, M C; Greenhalf, W; Laluce, C

    1996-05-01

    A fast flotation assay was used to select new floating yeast strains. The flotation ability did not seem to be directly correlated to total extracellular protein concentration of the culture. However, the hydrophobicity of the cell was definitely correlated to the flotation capacity. The Saccharomyces strains (FLT strains) were highly hydrophobic and showed an excellent flotation performance in batch cultures without additives (flotation agents) and with no need for a special flotation chamber or flotation column. A stable and well-organized structure was evident in the dried foam as shown by scanning electron microscopy which revealed its unique structure showing mummified cells (dehydrated) attached to each other. The attachment among the cells and the high protein concentration of the foams indicated that proteins might be involved in the foam formation. The floating strains (strains FLT) which were not flocculent and showed no tendency to aggregate, were capable of growing and producing ethanol in a synthetic medium containing high glucose concentration as a carbon source. The phenomenon responsible for flotation seems to be quite different from the flocculation phenomenon. PMID:18626952

  17. Pembuatan Biodiesel Secara Batch Dengan Memanfaatkan Gelombang Mikro (Microwave

    Directory of Open Access Journals (Sweden)

    Rhesa Purnama Putra

    2012-09-01

    Full Text Available Biodiesel merupakan bioenergi atau bahan bakar nabati yang dibuat dari minyak nabati, baik minyak baru atau bekas penggorengan melalui proses transesterifikasi, esterifikasi, atau proses esterifikasi-transesterifikasi. Tujuan penelitian ini adalah untuk membuat biodiesel dari minyak goreng secara batch melalui proses transesterifikasi dengan menggunakan radiasi mikrowave serta mempelajari berapa daya dan waktu optimal yang diperlukan untuk proses pembuatan biodiesel dengan radiasi microwave dengan katalis CaO, H2SO4, dan tanpa katalis. Dalam penelitian ini digunakan tiga variabel, yaitu daya (Watt;100,200,300,400, waktu (menit; 5,10,15,20 dan jenis katalis; CaO, H2SO4, dan tanpa katalis. Pada tahap persiapan menghitung volume minyak dan metanol yang akan dicampur. Kemudian mencampurnya didalam reaktor. Lalu mendinginkan campuran hingga terbentuk dua lapisan atas dan bawah dilanjutkan dengan melakukan pemisahan lapisan atas (biodiesel dari lapisan bawah (gliserol. Adapun pada tahap analisis, biodiesel hasil reaksi transesterfikasi dianalisa untuk mendapatkan data yield metil ester, densitas, viskositas, dan flash point. Dari penelitian diketahui bahwa hasil yang didapatkan masih belum dapat memenuhi standar biodiesel yang ditetapkan. Katalis CaO dapat memberikan hasil yang lebih baik dibandingkan dengan katalis H2SO4 dan tanpa katalis. Kondisi operasi untuk menghasilkan kualitas yield biodiesel terbaik yaitu pada daya 200 Watt selama 20 menit dengan menggunakan katalis CaO. Yield biodiesel terbesar didapatkan yield sebesar 60,11 %.

  18. Biodegradation of phenanthrene in an anaerobic batch reactor: growth kinetics

    Directory of Open Access Journals (Sweden)

    H.S. Nasrollahzadeh

    2010-07-01

    Full Text Available The purpose of the present research was to demonstrate the ability of mixed consortia of microorganisms to degrade high concentrations of phenanthrene (PHE as the sole carbon source. Batch experiments were carried out by the induction of mineral salt medium containing PHE to the seed culture and monitoring PHE biodegradation. The microbial propagation was conducted using PHE concentrations in the range of 20 to 100 mg/l. The microbial growth on PHE was defined based on Monod and modified Logistic rate models. The kinetic studies revealed that maximum specific growth rates (μm for PHE concentrations of 20, 50 and 100 mg/l were 0.12, 0.23 and 0.035 h-1, respectively. The doubling times for microbial population in PHE concentrations of 20, 50 and 100 mg/l were 13, 15 and 17.5 h, respectively. Also, maximum cell dry weight (xm of 54.23 mg/l was achieved, while the inhibition coefficient was 0.023 h-1. It was observed that the experimental data were well represented by the proposed models. It was also found that the biodegradation of PHE was successfully performed by the isolated strains.

  19. Grease waste and sewage sludge co-digestion enhancement by thermal hydrolysis: batch and fed-batch assays.

    Science.gov (United States)

    Cano, R; Nielfa, A; Pérez, A; Bouchy, L; Fdz-Polanco, M

    2014-01-01

    Grease waste (GW) is an adequate substrate for sewage sludge co-digestion since, coming from a waste water treatment plant, it has a high methane potential (489 NmLCH(4)/gVSin); however, no synergistic effect takes place when co-digesting with 52%VS grease. Conversely, thermal hydrolysis (TH) improves the anaerobic digestion of GW (43% higher kinetics) and biological sludge (29% more methane potential). Therefore, the application of TH to a co-digestion process was further studied. First, biochemical methane potential tests showed that the best configuration to implement the TH to the co-digestion process is pretreating the biological sludge alone, providing a 7.5% higher methane production (398 NmLCH(4)/gVSin), 20% faster kinetics and no lag-phase. Its implementation in a fed-batch operation resulted in considerable methane production (363 NmLCH(4)/gVSin) and TH improved the rheology and dewaterability properties of the digestate. This leads to important economical savings when combined with co-digestion, reducing final waste management costs and showing interesting potential for full-scale application. PMID:24804667

  20. Growth kinetics of Saccharomyces cerevisiae in batch and fed-batch cultivation using sugarcane molasses and glucose syrup from cassava starch.

    Science.gov (United States)

    Win, S S; Impoolsup, A; Noomhorm, A

    1996-02-01

    Growth kinetics of Saccharomyces cerevisiae in glucose syrup from cassava starch and sugarcane molasses were studied using batch and fed-batch cultivation. The optimum temperature and pH required for growth were 30 degrees C and pH 5.5, respectively. In batch culture the productivity and overall cell yield were 0.31 g L-1 h-1 and 0.23 g cells g-1 sugar, respectively, on glucose syrup and 0.22 g L-1 h-1 and 0.18 g cells g-1 sugar, respectively, on molasses. In fed-batch cultivation, a productivity of 3.12 g L-1 h-1 and an overall cell yield of 0.52 g cells g-1 sugar were achieved in glucose syrup cultivation and a productivity of 2.33 g L-1 h-1 and an overall cell yield of 0.46 g cells g-1 sugar were achieved in molasses cultivation by controlling the reducing sugar concentration at its optimum level obtained from the fermentation model. By using an on-line ethanol sensor combined with a porous Teflon tubing method in automating the feeding of substrate in the fed-batch culture, a productivity of 2.15 g L-1 h-1 with a yield of 0.47 g cells g-1 sugar was achieved using glucose syrup as substrate when ethanol concentration was kept at a constant level by automatic control.

  1. A Single Dynamic Metabolic Model Can Describe mAb Producing CHO Cell Batch and Fed-Batch Cultures on Different Culture Media.

    Science.gov (United States)

    Robitaille, Julien; Chen, Jingkui; Jolicoeur, Mario

    2015-01-01

    CHO cell culture high productivity relies on optimized culture medium management under fed-batch or perfused chemostat strategies enabling high cell densities. In this work, a dynamic metabolic model for CHO cells was further developed, calibrated and challenged using datasets obtained under four different culture conditions, including two batch and two fed-batch cultures comparing two different culture media. The recombinant CHO-DXB11 cell line producing the EG2-hFc monoclonal antibody was studied. Quantification of extracellular substrates and metabolites concentration, viable cell density, monoclonal antibody concentration and intracellular concentration of metabolite intermediates of glycolysis, pentose-phosphate and TCA cycle, as well as of energetic nucleotides, were obtained for model calibration. Results suggest that a single model structure with a single set of kinetic parameter values is efficient at simulating viable cell behavior in all cases under study, estimating the time course of measured and non-measured intracellular and extracellular metabolites. Model simulations also allowed performing dynamic metabolic flux analysis, showing that the culture media and the fed-batch strategies tested had little impact on flux distribution. This work thus paves the way to an in silico platform allowing to assess the performance of different culture media and fed-batch strategies.

  2. Shortcut Procedure for Inverted Batch Distillation Column (Ⅰ) Multicomponent Ideal System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Inverted batch distillation colunm(stripper) is opposed to a conventional batch distillation column(rectifier). It has a storage vessel at the top and products leave the column at the bottom. The batch stripper is favourable to separate mixtures with a small amount of light components by removing the heavy components as bottom products. In this paper, we are presenting a shortcut procedure based on our earlier work for design and simulation of the inverted batch distillation column, which is equivalent to the Fenske-Underwood-Gilliland procedure for continuous distillation. Given a separation task, we propose to compute the minimum number of stages(Nbmin)and the minimum reboil ratio(Rbmin) required in a batch stripper,which are the stages and reboil ratio required in a hypothetical inverted batch distillation colnmn operating in total reboil ratio or having an infinite number of stages,respectively. Then, it is shown that the performance of inverted batch columns with a finite number of stages and reboil ratios could be correlated in Gilliland coordinates with the minimum stages Nbmin and the minimum reboil ratio Rbmin.

  3. Simulation of kefiran production of Lactobacillus kefiranofaciens JCM6985 in fed-batch reactor

    Directory of Open Access Journals (Sweden)

    Benjamas Cheirsilp

    2006-09-01

    Full Text Available Kinetics of kefiran production by Lactobacillus kefiranofaciens JCM6985 has been investigated. A mathematical model taking into account the mechanism of exopolysaccharides production has been developed. Experiments were carried out in batch mode in order to obtain kinetic model parameters that were further applied to simulate fed-batch processes. A simplification of parameter fitting was also introduced for complicated model. The fed-batch mode allows more flexibility in the control of the substrate concentration as well as product concentration in the culture medium. Based on the batch mathematical model, a fed-batch model was developed and simulations were done. Simulation study in fed-batch reactor resulted that substrate concentration should be controlled at 20 g L-1 to soften the product inhibition and also to stimulate utilization of substrate and its hydrolysate. From simulation results of different feeding techniques, it was found that constant feeding at 0.01 L h-1 was most practically effective feeding profile for exopolysaccharides production in fed-batch mode.

  4. Effect of Recipe of Supplementing Qi and Activating Blood (RSA) on NO3-、ONOO-、MDA、GLU、AMY in Faeces of High Fat Diet Rats%补气活血法对高脂饮食大鼠粪便NO-3 、ONOO- 、MDA、GLU、AMY的影响

    Institute of Scientific and Technical Information of China (English)

    马月梅; 刘晓秋; 张永斌

    2011-01-01

    Objective To investigate the effect of high fat diet on NO3-、 ONOO - ,MDA,glucose,amylase activity. PNA,PSA binding rates af amylase, amylase isoenzyme profile in rat faeces and the effect of recipe of supplementing Qi and activating blood ( RSA )Methods Male rats were randomly divided into four groups: normal group( feeding ordinary diet) ; model group( feeding high fat diet) ;RSA Ⅰ ( feeding RSAI ( S: A =2: 1) by gastrogavage) ; RSA 2 ( feeding RSA2 ( S: A = 1 : 2) by gastrogavage) . N03- , ONOO- , MDA , glucose and amylase activity in rat faeces were determined by colorimetric method. N -glycan patterns of amylase were determined with lectin ( PSA and PNA) affinity precipitation method, and faeces amylase isoenzyme profile was separated by electrophoresis on polyacrylamide gels electrophoresis ( PAGE). Results High fat diet rats showed the symptoms of polyuria, polydipsia, polyphagia and weight loss. These abnormal signs were improved after treatment with RSA. In high fat diet rats, amylase activity, N03 - , P - Amy.S - Amy in faeces were decreased, while PSA, PNA binding rates of amylase, glucose, ONOO - in faeces were increased. After treatment with RSA, all of these indicators were improved. There was difference between RSA1 action and RSA 2 action. Conclusion Supplementing Qi and activating blood method can improve N - glycan deficiency in faeces amylase and up - regulate faeces amylase activity , and increase N03- , also decrease glucose, ONOO- in faeces, thus can regulate the digestion/absorption and glucose metabolism, can reduce oxygen free radicalinduced intestinal damage. This study also showed the different impacts of two different RSA.%目的 研究高脂饮食对大鼠粪便NO3-、ONOO-、MDA、GLU、AMY活性、AMY PSA、PNA结合率、AMY谱的影响,同时研究补气活血中药的作用.方法 雄性SD大鼠随机分为正常组,喂饲普通饲料;模型组,喂饲高脂饲料;补气活血1组(RSA 1),2∶ 1补气

  5. Tc-99 Adsorption on Selected Activated Carbons - Batch Testing Results

    Energy Technology Data Exchange (ETDEWEB)

    Mattigod, Shas V.; Wellman, Dawn M.; Golovich, Elizabeth C.; Cordova, Elsa A.; Smith, Ronald M.

    2010-12-01

    CH2M HILL Plateau Remediation Company (CHPRC) is currently developing a 200-West Area groundwater pump-and-treat system as the remedial action selected under the Comprehensive Environmental Response, Compensation, and Liability Act Record of Decision for Operable Unit (OU) 200-ZP-1. This report documents the results of treatability tests Pacific Northwest National Laboratory researchers conducted to quantify the ability of selected activated carbon products (or carbons) to adsorb technetium-99 (Tc-99) from 200-West Area groundwater. The Tc-99 adsorption performance of seven activated carbons (J177601 Calgon Fitrasorb 400, J177606 Siemens AC1230AWC, J177609 Carbon Resources CR-1240-AW, J177611 General Carbon GC20X50, J177612 Norit GAC830, J177613 Norit GAC830, and J177617 Nucon LW1230) were evaluated using water from well 299-W19-36. Four of the best performing carbons (J177606 Siemens AC1230AWC, J177609 Carbon Resources CR-1240-AW, J177611 General Carbon GC20X50, and J177613 Norit GAC830) were selected for batch isotherm testing. The batch isotherm tests on four of the selected carbons indicated that under lower nitrate concentration conditions (382 mg/L), Kd values ranged from 6,000 to 20,000 mL/g. In comparison. Under higher nitrate (750 mg/L) conditions, there was a measureable decrease in Tc-99 adsorption with Kd values ranging from 3,000 to 7,000 mL/g. The adsorption data fit both the Langmuir and the Freundlich equations. Supplemental tests were conducted using the two carbons that demonstrated the highest adsorption capacity to resolve the issue of the best fit isotherm. These tests indicated that Langmuir isotherms provided the best fit for Tc-99 adsorption under low nitrate concentration conditions. At the design basis concentration of Tc 0.865 µg/L(14,700 pCi/L), the predicted Kd values from using Langmuir isotherm constants were 5,980 mL/g and 6,870 mL/g for for the two carbons. These Kd values did not meet the target Kd value of 9,000 mL/g. Tests

  6. SLUDGE BATCH 6/TANK 51 SIMULANT CHEMICAL PROCESS CELL SIMULATIONS

    Energy Technology Data Exchange (ETDEWEB)

    Koopman, David; Best, David

    2010-04-28

    Qualification simulant testing was completed to determine appropriate processing conditions and assumptions for the Sludge Batch 6 (SB6) Shielded Cells demonstration of the DWPF flowsheet using the qualification sample from Tank 51 for SB6 after SRNL washing. It was found that an acid addition window of 105-139% of the DWPF acid equation (100-133% of the Koopman minimum acid equation) gave acceptable Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) results for nitrite destruction and hydrogen generation. Hydrogen generation occurred continuously after acid addition in three of the four tests. The three runs at 117%, 133%, and 150% stoichiometry (Koopman) were all still producing around 0.1 lb hydrogen/hr at DWPF scale after 42 hours of boiling in the SRAT. The 150% acid run reached 110% of the DWPF SRAT limit of 0.65 lb H{sub 2}/hr, and the 133% acid run reached 75% of the DWPF SME limit of 0.223 lb H{sub 2}/hr. Conversely, nitrous oxide generation was subdued compared to previous sludge batches, staying below 25 lb/hr in all four tests or about a fourth as much as in comparable SB4 testing. Two other processing issues were noted. First, incomplete mercury suspension impacted mercury stripping from the SRAT slurry. This led to higher SRAT product mercury concentrations than targeted (>0.45 wt% in the total solids). Associated with this issue was a general difficulty in quantifying the mass of mercury in the SRAT vessel as a function of time, especially as acid stoichiometry increased. About ten times more mercury was found after drying the 150% acid SME product to powder than was indicated by the SME product sample results. Significantly more mercury was also found in the 133% acid SME product samples than was found during the SRAT cycle sampling. It appears that mercury is segregating from the bulk slurry in the SRAT vessel, as mercury amalgam deposits for example, and is not being resuspended by the agitators. The second processing issue

  7. MELT RATE FURNACE TESTING FOR SLUDGE BATCH 5 FRIT OPTIMIZATION

    Energy Technology Data Exchange (ETDEWEB)

    Miller, D; Fox, K; Pickenheim, B; Stone, M

    2008-10-03

    Savannah River National Laboratory (SRNL) was requested to provide the Defense Waste Processing Facility (DWPF) with a frit composition for Sludge Batch 5 (SB5) to optimize processing. A series of experiments were designed for testing in the Melt Rate Furnace (MRF). This dry fed tool can be used to quickly determine relative melt rates for a large number of candidate frit compositions and lead to a selection for further testing. Simulated Sludge Receipt and Adjustment Tank (SRAT) product was made according to the most recent SB5 sludge projections and a series of tests were conducted with frits that covered a range of boron and alkali ratios. Several frits with relatively large projected operating windows indicated melt rates that would not severely impact production. As seen with previous MRF testing, increasing the boron concentration had positive impacts on melt rate on the SB5 system. However, there appears to be maximum values for both boron and sodium above which the there is a negative effect on melt rate. Based on these data and compositional trends, Frit 418 and a specially designed frit (Frit 550) have been selected for additional melt rate testing. Frit 418 and Frit 550 will be run in the Slurry Fed Melt Rate Furnace (SMRF), which is capable of distinguishing rheological properties not detected by the MRF. Frit 418 will be used initially for SB5 processing in DWPF (given its robustness to compositional uncertainty). The Frit 418-SB5 system will provide a baseline from which potential melt rate advantages of Frit 550 can be gauged. The data from SMRF testing will be used to determine whether Frit 550 should be recommended for implementation in DWPF.

  8. Batch phenol biodegradation study and application of factorial experimental design

    Directory of Open Access Journals (Sweden)

    A. Hellal

    2010-01-01

    Full Text Available A bacterium, Pseudomonas aeruginosa (ATTC27853, was investigated for its ability to grow and to degrade phenol as solecarbon source, in aerobic batch culture. The parameters which affect the substrate biodegradation such as the adaptation ofbacteria to phenol, the temperature, and the nature of the bacteria were investigated. The results show that for a range oftemperature of 30 to 40°C, the best degradation of phenol for a concentration of 100mg/l was observed at 30°C. The regenerationof the bacterium which allows the reactivation of its enzymatic activity, shows that the degradation of 100 mg/ l ofsubstrate at 30° C required approximately 50 hours with revivified bacteria, while it only starts after 72 hours for those norevivified. Adapted to increasing concentrations, allows the bacteria to degrade a substrate concentration of about 400mg/l in less than 350 hours.A second part was consisted in the determination of a substrate degradation model using the factorial experiment design,as a function of temperature (30-40°C and of the size of the inoculums (260.88 - 521.76mg/ l. The results were analyzedstatistically using the Student’s t-test, analysis of variance, and F-test. The value of R2 (0.99872 and adjusted R2 (0.9962close to 1.0, verifies the good correlation between the observed and the predicted values, and provides the excellent relationshipbetween the independent variables (factors and the response (the time of the phenol degradation. F-value found above200, indicates that the considered model is statistically significant.

  9. Transient and Stationary Losses in a Finite-Buffer Queue with Batch Arrivals

    Directory of Open Access Journals (Sweden)

    Andrzej Chydzinski

    2012-01-01

    Full Text Available We present an analysis of the number of losses, caused by the buffer overflows, in a finite-buffer queue with batch arrivals and autocorrelated interarrival times. Using the batch Markovian arrival process, the formulas for the average number of losses in a finite time interval and the stationary loss ratio are shown. In addition, several numerical examples are presented, including illustrations of the dependence of the number of losses on the average batch size, buffer size, system load, autocorrelation structure, and time.

  10. Design and construction of a batch oven for investigation of industrial continuous baking processes

    DEFF Research Database (Denmark)

    Stenby Andresen, Mette; Risum, Jørgen; Adler-Nissen, Jens

    2013-01-01

    A new batch oven has been constructed to mimic industrial convection tunnel ovens for research and development of continuous baking processes. The process parameters (air flow, air temperature, air humidity, height of baking area and the baking band velocity) are therefore highly controllable...... of the baking was documented over a range of temperatures (160C to 190C). Practical Applications The purpose of this paper is to describe a new specially designed pilot scale batch oven. The batch oven is designed and constructed to imitate the baking processes in continuous tunnel ovens with forced convection...

  11. 40 CFR Table 2 to Subpart Ffff of... - Emission Limits and Work Practice Standards for Batch Process Vents

    Science.gov (United States)

    2010-07-01

    ... Standards for Batch Process Vents 2 Table 2 to Subpart FFFF of Part 63 Protection of Environment...—Emission Limits and Work Practice Standards for Batch Process Vents As required in § 63.2460, you must meet... process vents: For each . . . Then you must . . . And you must . . . 1. Process with Group 1 batch...

  12. 基于CRT组合运算故障的RSA故障分析研究%Research on Fault Analysis against RSA Based on Fault in CRT Combination Operation

    Institute of Scientific and Technical Information of China (English)

    陈财森; 王韬; 寇应展; 张金中

    2011-01-01

    The former fault analysis can not attack on RSA-CRT with corresponding countermeasure. In order to find the new vulnerability to fault analysis, this paper took Shamir countermeasure as the analyzed object An attack model based on fault in CRT combination operation was advanced, and gave a differential fault analysis algorithm that can completely recover the RSA key. The fact that the previous countermeasures can not effectively resist the differential fault analysis was demonstrated, and the complexity of our attack was estimated both by a theoretical analysis and software simulations. Experiment results show that the new fault analysis algorithm has well feasibility; it only requires two fault injections for permanent fault, and an improved scheme of key searching for random fault is advanced. Finally, a corresponding advice on countermeasure to differential fault analysis was given by analyzing the problem of previous countermeasures.%原有的基于模幂运算故障的RSA-CRT故障攻击算法,因添加了错误检验操作而失效.为寻找新的故障攻击方法,以Shamir防御算法为攻击分析对象,对CRT组合运算步骤产生故障的情况进行分析,建立了基于CRT组合运算故障的攻击模型,提出了能够完整推算出RSA密钥的故障攻击算法.进行了推导论证和实验仿真,结果表明原有防御措施并不能有效地抵御故障攻击,新的攻击算法具有良好的可行性,在算法复杂度上,对固定故障值仅需2个注入故障,对随机故障给出优化的密钥空间搜索方案.最后分析了原有防御算法的问题,同时给出相应的防御建议.

  13. Aerobic Granulation in Sequencing Batch Reactor (SBR Treating Saline Wastewater

    Directory of Open Access Journals (Sweden)

    Ensieh Taheri

    2012-04-01

    Full Text Available Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 Background and Objectives: Aerobic sludge granulation is an advanced phenomenonin which its mechanisms have not been understood. Granulation can be a promising and novel biological wastewater treatment technology to eliminate organic and inorganic materials in future. High salinity is a parameter which leads to plasmolisatian and reduction of the cell activity. This could be a problem for biological treatment of the saline wastewater. Aerobic granule was formed and investigated during this study. Materials and Methods: This study is an intervention study on the treatment of wastewater with 500-10000 mg/L concentration of NaCl by sequencing batch reactor. Asynthesized wastewater including nutrient required for microorganism's growth was prepared. Input and output pH and EC were measured. Range of pH and DO varied between 7-8, and 2-5 mg/L, respectively. SEM technology was used to identify graduals properties.Results: In terms of color, granules divided into two groups of light brown and black. Granule ranged in 3-7mm with the sediment velocity of 0.9-1.35 m/s and density of 32-60 g/L.Properties of granules were varied. Filamentous bacteria and fungi were dominant in some granules. However non filamentous bacteria were dominant in others. EDX analysis indicated the presence of Ca and PO4.Conclusion: Granules with non filamentous bacterial were compact and settled faster. Presence of different concentrations of salinity leaded to plasmolysis of the bacterial cells and increased concentrations of EPS  in the system as a result  of which granulation accelerated. /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso

  14. Characteristics of anoxic phosphors removal in sequence batch reactor

    Institute of Scientific and Technical Information of China (English)

    WANG Ya-yi; PAN Mian-li; Yan Min; PENG Yong-zhen; WANG Shu-ying

    2007-01-01

    The characteristics of anaerobic phosphorus release and anoxic phosphorus uptake was investigated in sequencing batch reactors using denitrifying phosphorus removing bacteria (DPB) sludge. The lab-scale experiments were accomplished under conditions of various nitrite concentrations (5.5, 9.5, and 15 mg/L) and mixed liquor suspended solids (MLSS) (1844, 3231, and 6730 mg/L). The results obtained confirmed that nitrite, MLSS, and pH were key factors, which had a significant impact on anaerobic phosphorus release and anoxic phosphorus uptake in the biological phosphorous removal process. The nitrites were able to successfully act as electron acceptors for phosphorous uptake at a limited concentration between 5.5 and 9.5 mg/L. The denitrification and dephosphorous were inhibited when the nitrite concentration reached 15 mg/L. This observation indicated that the nitrite would not inhibit phosphorus uptake before it exceeded a threshold concentration. It was assumed that an increase of MLSS concentration from 1844 mg/L to 6730 mg/L led to the increase of denitrification and anoxic P-uptake rate. On the contrary, the average P uptake/N denitrifying reduced from 2.10 to 1.57 mg PO43--P/mg NO3--N. Therefore, it could be concluded that increasing MLSS of the DEPHANOX system might shorten the reaction time of phosphorus release and anoxic phosphorus uptake. However, excessive MLSS might reduce the specific denitrifying rate. Meanwhile, a rapid pH increase occurred at the beginning of the anoxic conditions as a result of denitrification and anoxic phosphate uptake. Anaerobic P release rate increased with an increase in pH. Moreover, when pH exceeded a relatively high value of 8.0, the dissolved P concentration decreased in the liquid phase, because of chemical precipitation. This observation suggested that pH should be strictly controlled below 8.0 to avoid chemical precipitation if the biological denitrifying phosphorus removal capability is to be studied accurately.

  15. SLUDGE BATCH 5 VARIABILITY STUDY WITH FRIT 418

    Energy Technology Data Exchange (ETDEWEB)

    Raszewski, F; Tommy Edwards, T; David Peeler, D

    2008-09-29

    The Defense Waste Processing Facility (DWPF) is preparing to initiate processing Sludge Batch 5 (SB5) in early FY 2009. In support of the upcoming processing, the Savannah River National Laboratory (SRNL) provided a recommendation to utilize Frit 418 as a transitional frit to initiate processing of SB5. This recommendation was based on the results of assessments on the compositional projections for SB5 available at that time from both the Liquid Waste Organization (LWO) and SRNL (using a model-based approach). To support qualification of the Frit 418-SB5 system, SRNL executed a variability study to assess the acceptability of the Frit 418-SB5 glasses with respect to durability and the applicability of the current durability models. Twenty one glasses were selected for the variability study based on the available SB5 projections primarily spanning a waste loading (WL) range of 25-37%. In order to account for the addition of caustic to Tank 40, which occurred in July 2008, 3 wt% Na2O was added to the original Tank 40 heel projections. The addition of the Actinide Removal Process (ARP) stream to the blend composition was also included. Two of the glasses were fabricated at 25% and 28% WL in order to challenge the homogeneity constraint of the Product Composition Control System (PCCS) for SB5 coupled operations. These twenty one glasses were fabricated and characterized using chemical composition analysis, X-ray Diffraction (XRD) and the Product Consistency Test (PCT). The results of this study indicate that Frit 418 is a viable option for sludge-only and coupled operations. The addition of ARP did not have any negative impacts on the acceptability and predictability of the variability study glasses. Based on the measured PCT response, all of the glasses were acceptable as compared to the Environmental Assessment (EA) reference glass regardless of the thermal history and were also predictable using the current PCCS model for durability. The homogeneity constraint can

  16. Batch Cooling Crystallization of Potassium Sulphate from Water Solution

    Directory of Open Access Journals (Sweden)

    Kalšan, M.

    2009-12-01

    Full Text Available Batch cooling crystallization, at the rotation speed of 700 min–1, of an aqueous solution of a potassium sulphate has been investigated on a laboratory scale. The effect of hydrodynamics conditions on the crystallization process were investigated by using different type of impellers. Two types of impellers were investigated; the four-pitched blade impeller which generates axi-al flow and the six-blades Rusthon turbine which generates radial flow. The experiments were performed at four different linear cooling rates in the range from 8-20 °C h–1 for both types of impeller.The influence of the cooling rates on the metastable zone width, the crystallization kinetics and the granulometric properties of the obtained crystals were investigated. The experimental data show that higher cooling rate expands the metastable zone for all the types of impeller (Fig. 2 and influences the crystal size distribution (Fig. 7 and Fig. 8.At low cooling rates, supersaturation was kept at a constant value for a longer period. It resulted in improved conditions for mass transfer and the crystals grew. Bigger crystals were obtained at lower cooling rates (Fig. 7.It is stated that radial flow (Rusthon turbine is particularly inappropriate for the nucleation process, and for crystallization. Nucleation started at a lower temperature and higher supersaturation (Fig. 3. These conditions resulted in a high nucleation’s rate and large number of nucleation centres.Also, the obtained crystals settled on the wall of the reactor, baffles and stirrer. A great part of the obtained crystals was agglomerated. The nucleation order, n and coefficient of nucleation, kn were determined for different cooling rates (Fig. 5a. The nucleation order is higher at radial flow (nucleation started at higher supersaturation. The relation between the rate of concentration drop in a solution and supersaturation has beenapproximated with a power low equation (Fig. 5b. For the used impellers

  17. Effects of CO2 enrichment and nutrients supply intermittency on batch cultures of Isochrysis galbana.

    Science.gov (United States)

    Picardo, Marta C; de Medeiros, José Luiz; Araújo, Ofélia de Queiroz F; Chaloub, Ricardo Moreira

    2013-09-01

    Aiming at enhanced performance to increase economic feasibility of microalgae based processes, Isochrysis galbana was grown in three modes of cultivation: batch, intermittent fed batch and semi-continuous. The batch mode was conducted under two regimes of aeration: conventional aeration and CO2 enriched aeration (5% v/v in air). Increased biomass productivity without significant impact on lipid accumulation was observed for CO2 enriched aeration relatively to cultivation aerated with air only. The intermittent fed batch cultivation policy was proven to be useful for lipid accumulation, increasing the lipid content by 19.8%. However, the semi-continuous mode resulted in higher productivity due to increased biomass concentration; the biomass productivity reached 0.51 g/(Ld). Fluorescence measurements were performed; the calculated low electron transport rate showed the need to increase the irradiance. The results showed that I. galbana can be grown in semi-continuous condition at high levels of biomass productivity.

  18. The second batch of RE export quota in 2009 released/Brief News

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    @@ In accordance with"Regulation on Import and Export of Commodities of the People's Republic of China",the Ministry of Commerce released the second batch of RE export quota of common trade in 2009 on June 29.

  19. A cellular automata model for simulating fed-batch penicillin fermentation process

    Institute of Scientific and Technical Information of China (English)

    Yu Naigong; Ruan Xiaogang

    2006-01-01

    A cellular automata model to simulate penicillin fed-batch fermentation process(CAPFM)was established in this study,based on a morphologically structured dynamic penicillin production model,that is in turn based on the growth mechanism of penicillin producing microorganisms and the characteristics of penicillin fed-batch fermentation.CAPFM uses the three-dimensional cellular automata as a growth space,and a Moore-type neighborhood as the cellular neighborhood.The transition roles of CAPFM are designed based on mechanical and structural kinetic models of penicillin batch-fed fermentation processes.Every cell of CAPFM represents a single or specific number of penicillin producing microorganisms,and has various state.The simulation experimental results show that CAPFM replicates the evolutionary behavior of penicillin batch-fed fermentation processes described by the structured penicillin production kinetic model accordingly.

  20. A Novel Operation Policy for Dilute Component Separation Quasi-batch Distillation

    Institute of Scientific and Technical Information of China (English)

    罗祎青; 袁希钢; 杨祖杰; 刘春江

    2005-01-01

    A new operation policy--quasi-batch distillation for recovering infinitesimal amounts species existing in a mixture is presented. In quasi-batch distillation operation, feed is introduced with a constant flow rate onto the feed stage of the column, and the flow rate of the distillate is the same as that of the feed, whereas the bottom product is withdrawn periodically. The behavior of quasi-batch distillation is simulated and analyzed through an example on heavy water separation. Comparing with continuous or batch distillation, the new operation policy is more reliable and efficient to achieve higher recovery of dilute component. This is especially suitable for separating small amount of precious species from large amount of raw material.

  1. Enhanced methane production via repeated batch bioaugmentation pattern of enriched microbial consortia.

    Science.gov (United States)

    Yang, Zhiman; Guo, Rongbo; Xu, Xiaohui; Wang, Lin; Dai, Meng

    2016-09-01

    Using batch and repeated batch cultivations, this study investigated the effects of bioaugmentation with enriched microbial consortia (named as EMC) on methane production from effluents of hydrogen-producing stage of potato slurry, as well as on the indigenous bacterial community. The results demonstrated that the improved methane production and shift of the indigenous bacterial community structure were dependent on the EMC/sludge ratio and bioaugmentation patterns. The methane yield and production rate in repeated batch bioaugmentation pattern of EMC were, respectively, average 15% and 10% higher than in one-time bioaugmentation pattern of EMC. DNA-sequencing approach showed that the enhanced methane production in the repeated batch bioaugmentation pattern of EMC mainly resulted from the enriched iron-reducing bacteria and the persistence of the introduced Syntrophomonas, which led to a rapid degradation of individual VFAs to methane. The findings contributed to understanding the correlation between the bioaugmentation of microbial consortia, community shift, and methane production.

  2. CONVERTING FROM BATCH TO CONTINUOUS INTENSIFIED PROCESSING IN THE STT? REACTOR

    Science.gov (United States)

    The fluid dynamics, the physical dimensions and characteristics of the reaction zones of continuous process intensification reactors are often quite different from those of the batch reactors they replace. Understanding these differences is critical to the successful transit...

  3. Enhanced methane production via repeated batch bioaugmentation pattern of enriched microbial consortia.

    Science.gov (United States)

    Yang, Zhiman; Guo, Rongbo; Xu, Xiaohui; Wang, Lin; Dai, Meng

    2016-09-01

    Using batch and repeated batch cultivations, this study investigated the effects of bioaugmentation with enriched microbial consortia (named as EMC) on methane production from effluents of hydrogen-producing stage of potato slurry, as well as on the indigenous bacterial community. The results demonstrated that the improved methane production and shift of the indigenous bacterial community structure were dependent on the EMC/sludge ratio and bioaugmentation patterns. The methane yield and production rate in repeated batch bioaugmentation pattern of EMC were, respectively, average 15% and 10% higher than in one-time bioaugmentation pattern of EMC. DNA-sequencing approach showed that the enhanced methane production in the repeated batch bioaugmentation pattern of EMC mainly resulted from the enriched iron-reducing bacteria and the persistence of the introduced Syntrophomonas, which led to a rapid degradation of individual VFAs to methane. The findings contributed to understanding the correlation between the bioaugmentation of microbial consortia, community shift, and methane production. PMID:27262722

  4. UNBOUNDED BATCH SCHEDULING WITH A COMMON DUE WINDOW ON A SINGLE MACHINE

    Institute of Scientific and Technical Information of China (English)

    Hongluan ZHAO; Guojun LI

    2008-01-01

    The common due window scheduling problem with batching on a single machine is dealt with to minimize the total penalty of weighted earliness and tardiness. In this paper it is assumed that a job incurs no penalty as long as it is completed within the common due window. It is the first time for the due window scheduling to be extended to this situation so that jobs can be processed in batches. An unbounded version of batch scheduling is also considered. Hence, jobs, no matter how many there are, can be processed in a batch once the machine is free. For two cases that the location of due window is either a decision variable or a given parameter, polynomial algorithms are proposed based on several optimal properties.

  5. MOFCOM announced supplement to the first batch of 2012 export quotas

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    The Ministry of Commerce of China supplemented the first batch of rare earth export quotas, which were assigned to the companies that had passed the inspection of the Ministry of Environmental Protection.

  6. Preparing cellulose nanocrystal/acrylonitrile-butadiene-styrene nanocomposites using the master-batch method.

    Science.gov (United States)

    Ma, Libo; Zhang, Yang; Meng, Yujie; Anusonti-Inthra, Phuriwat; Wang, Siqun

    2015-07-10

    The master-batch method provides a simple way to apply cellulose nanocrystal (CNC) as reinforcement in a hydrophobic matrix. The two-stage process includes making high-CNC content (70 wt%) master batch pellets, then mixing acrylonitrile-butadiene-styrene (ABS) and maleic anhydride grafted polyethylene with the master batch pellets to prepare the ABS/CNC nanocomposite in extruder. SEM image indicates that self-assembled CNC nanosheets disperse evenly throughout the polymer matrix. The improved mechanical properties shown in tensile and DMA tests reveal that the CNC combines well with the ABS. TGA results show that the thermal degradation temperature of CNC in the master batch increases because of the protection of the ABS coating. This approach not only improves the dispersion ability and the thermal stability of CNC, but it is also applicable to use with other hydrophobic thermoplastics in industrial scale production. PMID:25857992

  7. Data Driven Modeling for Monitoring and Control of Industrial Fed-Batch Cultivations

    DEFF Research Database (Denmark)

    Bonné, Dennis; Alvarez, María Antonieta; Jørgensen, Sten Bay

    2014-01-01

    A systematic methodology for development of a set of discrete-time sequence models for batch control based on historical and online operating data is presented and investigated experimentally. The modeling is based on the two independent characteristic time dimensions of batch processing, being...... convergence of iterative learning control is combined with the closed-loop performance of model predictive control to form an optimal controller aiming to ensure reliable and reproducible operation of the batch process. This learning model predictive controller may also be used for optimizing control through...... optimization of the bioreactor operations model. The modeling and preliminary control performance is demonstrated on an industrial fed-batch protein cultivation production process. The presented methods lend themselves directly for application as Process Analytical Technologies....

  8. Quality of rolled barley flakes as affected by batch of grain and processing technique.

    Science.gov (United States)

    Sundberg, B; Abrahamsson, L; Aman, P

    1994-02-01

    Rolled barely flakes were prepared from three different batches of grain by pearling, steaming and rolling. Autoclaved and malted barleys from the three batches were also processed in the same way. Analysis of the nine products showed that both batch of barley and process had significant effects on chemical composition and viscosity. Puddings were prepared from the products and mechanical consistency, juiciness and grain consistency were graded on both newly prepared and heated puddings by a sensory taste panel. Batch of barley had no effect on mechanical consistency but significant effects on juiciness and grain consistency. Type of processing had significant effect on all three parameters for both newly prepared and heated puddings. PMID:8153065

  9. 40 CFR 1065.170 - Batch sampling for gaseous and PM constituents.

    Science.gov (United States)

    2010-07-01

    ...) AIR POLLUTION CONTROLS ENGINE-TESTING PROCEDURES Equipment Specifications § 1065.170 Batch sampling...-through support bonded to the back and has an overall thickness of 40 ±20 µm. An inert polymer ring may...

  10. OPTIMAL FEED STRATEGY FOR FED-BATCH GLYCEROL FERMENTATION DETERMINED BY MAXIMUM PRINCIPLE

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    1 IntroductionGlycerol fed-batch fermentation is attractive tocommercial application since it can control theglucose concentration by changing the feed rate andget a high glycerol yield, therefore it is essential todevelop an optimal glucose feed strategy. For mostof fed-batch fermentation, optimization of feed ratewas based on Pontryagin's maximum principle [if.Since the term of feed rate appears linearly in theHamiltonian, the optimal feed rate profile usuallyconsists of ba,lg-bang intervals and singular ...

  11. The functionalization of carbon nanotubes using a batch oscillatory flow reactor

    OpenAIRE

    Melendi, Sonia; Bonyadi, S; Castell, P.; Martinez, M.T.; Mackley, M.R.

    2012-01-01

    This paper describes an efficient method for the functionalizing of multi-walled carbon nanotubes (MWCNT) using oscillatory flow mixing (OFM). A 3. l batch oscillatory flow reactor (OFR) was designed and constructed for pilot scale functionalization of MWCNT in order to potentially improve their compatibility within a thermoplastic polyphenylene sulphide (PPS) matrix. The OFM batch reactor consisted of a jacketed cylindrical vessel with a vertical axial oscillator that contained a series of b...

  12. STUDY ON MAXIMUM SPECIFIC SLUDGE ACIVITY OF DIFFERENT ANAEROBIC GRANULAR SLUDGE BY BATCH TESTS

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The maximum specific sludge activity of granular sludge from large-scale UASB, IC and Biobed anaerobic reactors were investigated by batch tests. The limitation factors related to maximum specific sludge activity (diffusion, substrate sort, substrate concentration and granular size) were studied. The general principle and procedure for the precise measurement of maximum specific sludge activity were suggested. The potential capacity of loading rate of the IC and Biobed anaerobic reactors were analyzed and compared by use of the batch tests results.

  13. INVESTIGATION OF INTERMITTENT CHLORINATION SYSTEM IN BIOLOGICAL EXCESS SLUDGE REDUCTION BY SEQUENCING BATCH REACTORS

    OpenAIRE

    A. Takdastan ، N. Mehrdadi ، A. A. Azimi ، A. Torabian ، G. Nabi Bidhendi

    2009-01-01

    The excessive biological sludge production is one of the disadvantages of aerobic wastewater treatment processes such as sequencing batch reactors. To solve the problem of excess sludge production, oxidizing some of the sludge by chlorine, thus reducing the biomass coefficient as well as the sewage sludge disposal may be a suitable idea. In this study, two sequencing batch reactors, each with 20 L volume and controlled by on-line system were used. After providing the steady state conditions i...

  14. Stratified randomization controls better for batch effects in 450K methylation analysis: A cautionary tale

    OpenAIRE

    Buhule, Olive D.; Minster, Ryan L.; Nicola L. Hawley; Mario eMedvedovic; Guangyun eSun; Satupaitea eViali; Ranjan eDeka; Stephen T McGarvey; Weeks, Daniel E.

    2014-01-01

    Background: Batch effects in DNA methylation microarray experiments can lead to spurious results if not properly handled during the plating of samples. Methods: Two pilot studies examining the association of DNA methylation patterns across the genome with obesity in Samoan men were investigated for chip- and row-specific batch effects. For each study, the DNA of 46 obese men and 46 lean men were assayed using Illumina's Infinium HumanMethylation450 BeadChip. In the first study (Sample One),...

  15. Stratified randomization controls better for batch effects in 450K methylation analysis: a cautionary tale

    OpenAIRE

    Buhule, Olive D.; Minster, Ryan L.; Nicola L. Hawley; Medvedovic, Mario; SUN, GUANGYUN; Viali, Satupaitea; Deka, Ranjan; Stephen T McGarvey; Weeks, Daniel E.

    2014-01-01

    Background: Batch effects in DNA methylation microarray experiments can lead to spurious results if not properly handled during the plating of samples. Methods: Two pilot studies examining the association of DNA methylation patterns across the genome with obesity in Samoan men were investigated for chip- and row-specific batch effects. For each study, the DNA of 46 obese men and 46 lean men were assayed using Illumina's Infinium HumanMethylation450 BeadChip. In the first study (Sample One), s...

  16. IMPROVING ENERGY EFFICIENCY OF SILICON CARBIDE CERAMICS PRODUCTION BY BATCH REGULATION

    Directory of Open Access Journals (Sweden)

    Dmitriy Zhukov

    2015-09-01

    Full Text Available The article discusses an energy-efficient method for producing SiC-based composites via doping with oxide eutectic compositions and batch granulometry regulation. The influence of batch granulometry on physico-mechanical properties of ceramics is studied, and fractions ratio is determined allowing us to obtain a dense material with improved strength and fracture toughness. Such ceramics shows excellent mechanical behavior and holds much promise as a structural and armor material.

  17. Stability assessment of a moderately conforming all-polyethylene tibial component in total knee arthroplasty: a prospective RSA study with 2 years of follow-up of the Kinemax Plus design.

    Science.gov (United States)

    Adalberth, G; Nilsson, K G; Byström, S; Kolstad, K; Mallmin, H; Milbrink, J

    1999-01-01

    The magnitude and pattern of the migration of an all-polyethylene tibial component with moderately conforming articular surfaces in total knee arthroplasty was analyzed in 20 patients > or =60 years during a 2-year follow-up using radiostereometry (RSA). Most of the migration occurred during the initial 4 months, whereafter the migration diminished, reaching a mean maximum migration of 0.75 mm at 2 years. Similar patterns were found for rotation of the implant. Maximum subsidence at 2 years was 0.7 mm and was most commonly located at the posteromedial part of the tibial component. These results indicate that an all-polyethylene tibial component with moderately conforming articular geometry and with a thickness of 10-12 mm demonstrated migration patterns compatible with a favorable prognosis in regard to future aseptic loosening.

  18. Initial Sulfate Solubility Study for Sludge Batch 4 (SB4)

    Energy Technology Data Exchange (ETDEWEB)

    Lorier, T

    2005-04-01

    The objective of this task is to provide the Defense Waste Processing Facility (DWPF) of the Savannah River Site (SRS) with an assessment of the viability of using the current 0.6 wt% SO{sub 4}{sup =} limit (in glass) and/or the possibility of increasing the SO{sub 4}{sup =} solubility limit to account for anticipated sulfur concentrations in Sludge Batch 4 (SB4). The 0.6 wt% SO{sub 4}{sup =} limit was implemented for processing of Frit 418-Sludge Batch 3 (SB3) to avoid the formation of sulfate inclusions in the glass and/or the formation of a molten sulfate-rich phase on the melt pool in the DWPF melter. The presence of such a phase on the surface of the melt pool increases corrosion rates of melter components, enhances the potential for steam excursions in a slurry-fed waste glass melter, and creates the potential for undesirable current paths that could deplete energy delivered to the melter due to the electrical conductivity of the molten salt layer. This suite of sulfate-solubility tests began by testing the 1200-canister, 2nd transfer case for SB4 (as defined by Lilliston and Shah, 2004)--based on this being the most conservative (having the highest predicted viscosity when coupled with specific frits, it could potentially have the greatest impact on SO{sub 4}{sup =} solubility) blending scenario of SB4 with the heel of SB3 for SO{sub 4}{sup =} solubility. Frits 320 and 418 were tested with SB4 and the tests indicated that at the current SO{sub 4}{sup =} limit (in glass) and the tested waste loadings (30% and 40%), neither Frit 320 nor Frit 418 could be utilized with SB4 (for the 1200-canister, 2nd transfer case composition originally provided). More specifically, SO{sub 4}{sup =} was observed on the surface with the SB4 composition and Frit 320 at 40% waste loading (WL) and 0.6 wt% SO{sub 4}{sup =}, and with Frit 418 at 30% and 40% WL and 0.5 wt% SO{sub 4}{sup =}. As alternative frits were being developed--Frits 447, 448, and 449, that contained CaO and/or V

  19. SULFATE SOLUBILITY LIMIT VERIFICATION FOR DWPF SLUDGE BATCH 7B

    Energy Technology Data Exchange (ETDEWEB)

    Fox, K.

    2011-10-03

    The objective of this study was to determine a sulfate solubility limit in glass for Sludge Batch 7b (SB7b). The SB7b composition projection provided by Savannah River Remediation (SRR) on May 25, 2011 was used as the basis for formulating glass compositions to determine the sulfate limit. Additions of Na{sub 2}O to the projected sludge composition were made by the Savannah River National Laboratory (SRNL) due to uncertainty in the final concentration of Na{sub 2}O for SB7b, which is dependent on washing effectiveness and the potential need to add NaOH to ensure an acceptable projected operating window. Additions of 4, 6, and 8 wt % Na{sub 2}O were made to the nominal May 25, 2011 composition projection. An updated SB7b composition projection was received from SRR on August 4, 2011. Due to compositional similarities, no additional experimental work using the August 4, 2011 compositions was considered to be necessary for this study. Both Frit 418 and Frit 702 were included in this study. The targeted sulfate (SO{sub 4}{sup 2-}) concentrations of the study glasses were selected within the range of 0.6 to 0.9 wt % in glass. A total of 52 glass compositions were selected based on the compositional variables of Na{sub 2}O addition, Actinide Removal Process (ARP) stream addition, waste loading, frit composition, and sulfate concentration. The glasses were batched, melted, and characterized following SRNL procedures. Visual observations were recorded for each glass after it cooled and used as in indicator of sulfur retention. Representative samples of each of the glasses fabricated were subjected to chemical analysis to determine whether the targeted compositions were met, as well as to determine the quantity of sulfate that was retained after melting. In general, the measured composition data showed that there were only minor issues in meeting the targeted compositions for the study glasses, and the measured sulfate concentrations for each study glass were within 10% of

  20. Analysis and modelling of the energy consumption of chemical batch plants

    Energy Technology Data Exchange (ETDEWEB)

    Bieler, P.S.

    2004-07-01

    This report for the Swiss Federal Office of Energy (SFOE) describes two different approaches for the energy analysis and modelling of chemical batch plants. A top-down model consisting of a linear equation based on the specific energy consumption per ton of production output and the base consumption of the plant is postulated. The model is shown to be applicable to single and multi-product batches for batch plants with constant production mix and multi-purpose batch plants in which only similar chemicals are produced. For multipurpose batch plants with highly varying production processes and changing production mix, the top-down model produced inaccurate results. A bottom-up model is postulated for such plants. The results obtained are discussed that show that the electricity consumption for infrastructure equipment was significant and responsible for about 50% of total electricity consumption. The specific energy consumption for the different buildings was related to the degree of automation and the production processes. Analyses of the results of modelling are presented. More detailed analyses of the energy consumption of this apparatus group show that about 30 to 40% of steam energy is lost and thus a large potential for optimisation exists. Various potentials for making savings, ranging from elimination of reflux conditions to the development of a new heating/cooling-system for a generic batch reactor, are identified.