WorldWideScience

Sample records for batch rsa decryption

  1. A Practical SSL Server Performance Improvement Algorithm Based on Batch RSA Decryption

    Institute of Scientific and Technical Information of China (English)

    LI Shi-qun; WU Yong-dong; ZHOU Jian-ying; CHEN Ke-fei

    2008-01-01

    The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptious when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and opti-mizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance,the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b=4.

  2. A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption

    CERN Document Server

    Pateriya, R K; Shrivastava, S C; Patel, Jaideep

    2009-01-01

    Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement...

  3. The Parallel FDFM Processor Core Approach for CRT-based RSA Decryption

    Directory of Open Access Journals (Sweden)

    Koji Nakano

    2012-01-01

    Full Text Available

    One of the key points of success in high performance computation using an FPGA is the efficient usage of DSP slices and block RAMs in it. This paper presents a FDFM (Few DSP slices and Few block RAMs processor core approach for implementing RSA encryption. In our approach, an efficient hardware algorithm for Chinese Remainder Theorem (CRT based RSA decryption using Montgomery multiplication algorithm is implemented. Our hardware algorithm supporting up-to 2048-bit RSA decryption is designed to be implemented using one DSP slice, one block RAM and few logic blocks in the Xilinx Virtex-6 FPGA. The implementation results show that our RSA core for 1024-bit RSA decryption runs in 13.74ms. Quite surprisingly, the multiplier in the DSP slice used to compute Montgomery multiplication works in more than 95% clock cycles during the processing. Hence, our implementation is close to optimal in the sense that it has only less than 5% overhead in multiplication and no further improvement is possible as long as CRT-based Montgomery multiplication based algorithm is applied. We have also succeeded in implementing 320 RSA decryption cores in one Xilinx Virtex-6 FPGA XC6VLX240T-1 which work in parallel. The implemented parallel 320 RSA cores achieve 23.03 Mbits/s throughput for 1024-bit RSA decryption.

  4. Testing System Encryption-Decryption Method to RSA Security Documents

    International Nuclear Information System (INIS)

    A model of document protection which was tested as one of the instruments, especially text document. The principle of the document protection was how the system was able to protect the document storage and transfer processes. Firstly, the text-formed document was encrypted; therefore, the document cannot be read for the text was transformed into random letters. The letter-randomized text was then unfolded by the description in order that the document owner was able to read it. In the recent research, the method adopted was RSA method, in which it used complicated mathematics calculation and equipped with initial protection key (with either private key or public key), thus, it was more difficult to be attacked by hackers. The system was developed by using the software of Borland Delphi 7. The results indicated that the system was capable to save and transfer the document, both via internet and intranet in the form of encrypted letter and put it back to the initial form of document by way of description. The research also tested for encrypted and decrypted process for various memory size documents. (author)

  5. Research of an Efficient Variant of Batch RSA Algorithm%一种有效的Batch RSA算法的研究

    Institute of Scientific and Technical Information of China (English)

    李云飞; 柳青; 李彤; 郝林

    2011-01-01

    提出了一种改进的Batch RSA算法来提升Batch RSA算法的解密性能.该改进算法结合了负载转移技术和Multi-Power RSA技术,在Batch RSA算法的指数计算阶段提升Batch RSA算法的解密性能.实验结果和理论分析表明,该改进算法使得Batch RSA算法的解密性能得到显著提升,且易于并行实现,可使基于多核平台的Batch RSA算法的整体性能得到进一步提升.%This paper aimed at speeding up Batch RSA decryption. An efficient variant of Batch RSA was proposed to improve the Batch RSA decryption performance. The improved Batch RSA variant speeds up decryption by combining the load transferring technique and multi-power RSA technique in the exponentiation phase. The experimental result and the theoretical values show that the speed of the decryption is substantially improved and the variant can be efficiently implemented in parallel and parallel implementation of the variant on multi-core devices can further improve the overall performance of Batch RSA algorithm.

  6. Research of efficient variant of the Batch RSA based on Multi- Power%基于Multi-Power的批处理RSA算法的研究

    Institute of Scientific and Technical Information of China (English)

    李云飞; 柳青; 李彤; 郝林

    2011-01-01

    提出一种改进的Batch RSA算法来提升Batch RSA算法的解密性能.该改进算法结合了批处理技术和Multi-Power RSA技术,在Batch RSA算法的指数计算阶段来提升Batch RSA算法的解密性能.实验结果和理论分析表明该改进算法使得Batch RSA算法的解密性能得到显著提升.%This paper aims at speeding up Batch RSA decryption.An efficient variant of Batch RSA is proposed to improve the Batch RSA decryption performance.The improved Batch RSA variant speeds up decryption by combining the batch technique and multi - power RSA technique in the exponentiation phase.The experimental result and the theoretical values show that the speed of the decryption has been substantially improved.

  7. Data Encryption and Decryption using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’ Prime Number

    Directory of Open Access Journals (Sweden)

    Alok Kumar Shukla*1,

    2014-06-01

    Full Text Available Now a day, we are having a great dependence on computer and network for communication. The security of computer communication is related to the whole world and everybody. Cryptography is the art and science of achieving security by encoding message to make them non-readable to secure data or information transmits over the network. In this paper introduced modified RSA approach based on multiple public keys and n prime number.RSA algorithm is mostly used in the popular implementation of public key cryptography. In public key cryptography two different keys are generated in RSA one keys is used in encryption data and other corresponding key used for decryption. No other key decrypt the data. Even if it is efficient algorithm it is vulnerable to other person. With the help of all brute force attacks can obtain private keys. In this research paper new approach we used n prime number and multiple public keys. Which is not easily crack able .In here implementation RSA algorithm .Using some mathematical logic integer factorization and discrete logarithm problem

  8. Research of batch RSA based on multi-prime%基于多素数的批处理RSA算法的研究

    Institute of Scientific and Technical Information of China (English)

    柳青; 李云飞; 周保林; 彭华

    2011-01-01

    针对提升batch RSA算法的解密性能,提出了一种改进的batch RSA算法.该改进算法结合了批处理技术和多素数技术,使得batch RSA算法指数计算阶段的大数模幂运算的指数和模数的位数减少.实验结果和理论分析表明,该改进算法使得批处理RSA算法的解密性能得到显著提升.%This paper proposed a new batch RSA variant to improve the batch RSA decryption performance.The improved batch RSA variant speeded up decryption by combining the batch technique and multi-prime technique to reduce modules and private exponents in modular exponentiation in the exponentiation phase.The experimental result and the theoretical values show that the speed of the decryption has been substantially improved.

  9. Blind Decryption and Privacy Protection

    Directory of Open Access Journals (Sweden)

    Mohammed Al-Fayoumi

    2005-01-01

    Full Text Available Blind decryption is an efficient way of protecting customer’s privacy in online marketing over the Internet (i.e. Hiding information about which goods a user purchases from the vendor. In this study, the RSA based blind decryption is simply transposed from an identical protocol as the Chaum’s blind signature scheme and the blind decryption protocol for the Elgamal encryption scheme is suggested. In addition, the difference between the known RSA based blind decryption protocol and our proposed protocol is examined in applications to protect copyright subjects of e-commerce documents over the internet.

  10. k-PARTY SHARED RSA KEY GENERATION

    Institute of Scientific and Technical Information of China (English)

    HeMingxing; FanPingzhi; 等

    2003-01-01

    This Ietter presents a k-party RSA key sharing scheme and the related algorithms are pressented.It is shown that the shared key can be generated in such a collaborative way that the RSA modulus is pubicly known but none of the parties is able to decrypt the enciphered message individually.

  11. Twin RSA

    OpenAIRE

    Lenstra, Arjen K.; Weger, de, B.M.M.; Benjamin, M M

    2005-01-01

    We introduce Twin RSA, pairs of RSA moduli (n, n+ 2), and formulate several questions related to it. Our main questions are: is Twin RSA secure, and what is it good for? © Springer-Verlag Berlin Heidelberg 2005.

  12. On the Efficiency of Fast RSA Variants in Modern Mobile Phones

    Directory of Open Access Journals (Sweden)

    Klaus Hansen

    2009-12-01

    Full Text Available Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public-key cryptosystem RSA. It is, however, well-known that public-key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on modern mobile phones. In this paper, we explore the efficiency on modern mobile phones of variants of the RSA cryptosystem, covering CRT, Multi-Prime RSA, Multi-Power RSA, Rebalanced RSA and R-Prime RSA by comparing the encryption and decryption time using a simple Java implementation and a typical RSA setup.Keywords—Public-key cryptography; RSA; software; mobile phones;

  13. A New Approach for Complex Encrypting and Decrypting Data

    Directory of Open Access Journals (Sweden)

    Obaida Mohammad Awad Al-Hazaimeh

    2013-04-01

    Full Text Available During the last decades, information security has become a major issue. Encrypting and decrypting datahave recently been widely investigated and developed because there is a demand for a stronger encryptionand decryption which is very hard to crack. Cryptography plays major roles to fulfilment these demands.Nowadays, many of researchers have proposed many of encryption and decryption algorithms such as AES,DES, RSA, and others. But most of the proposed algorithms encountered some problems such as lack ofrobustness and significant amount of time added to packet delay to maintain the security on thecommunication channel between the terminals. In this paper, the security goals were enhanced via "A NewApproach for Complex Encrypting and Decrypting Data" which maintains the security on thecommunication channels by making it difficult for attacker to predicate a pattern as well as speed of theencryption / decryption scheme.

  14. Data Security With Colors Using Rsa

    Directory of Open Access Journals (Sweden)

    G. Sankara Rao,

    2014-04-01

    Full Text Available Data Security with Colors using RSA technique that integrates the RGB Color model with the well-known public key cryptographic algorithm RSA (Rivest, Shamir and Adleman. This model provides both confidentiality and authentication to the data sent across the network. RSA algorithm uses public key and private key to encrypt and decrypt the data and thus provides confidentiality. But the public key is known to everyone and so anyone can encrypt the data and send the message. Hence authentication of users is needed. In this technique we use RGB color model to provide authentication. Every user will have a unique color assigned to him. A sender must know the receiver’s color to send a message. The color value is encrypted using a key which is used as a password while decrypting the message. To decrypt the message, the receiver must provide his color values. If the decrypted color values and his color values are equal then the sender and receiver are send to be authentic. The data encryption and decryption follows RSA procedure. Thus both authentication and confidentiality are provided for the data.

  15. On the Efficiency of Fast RSA Variants in Modern Mobile Phones

    CERN Document Server

    Hansen, Klaus; Olsen, Kim

    2010-01-01

    Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public key cryptosystem RSA. It is, however, well known that public key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on modern mobile phones. In this paper, we explore the efficiency on modern mobile phones of variants of the RSA cryptosystem, covering CRT, MultiPrime RSA, MultiPower RSA, Rebalanced RSA and R Prime RSA by comparing the encryption and decryption time using a simple Java implementation and a typical RSA setup.

  16. Penambahan Chinese Reminder Theorem Untuk Mempercepat Proses Enkripsi Dan Dekripsi Pada RSA

    OpenAIRE

    Hasibuan, Andi Hazri

    2015-01-01

    Many methods are used to protect digital data stored or transmitted via electronic media. One way is to use a cryptographic algorithm RSA (Rivest-Shamir-Adleman). Standard RSA uses modular arithmetic to perform the encryption and decryption. In this thesis discussed the addition of Chinese Remainder Theorem to speed up the RSA. 100823021

  17. On the Efficiency of Fast RSA Variants in Modern Mobile Phones

    DEFF Research Database (Denmark)

    Hansen, Klaus; Larsen, Troels; Olsen, Kim

    2009-01-01

    Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public-key cryptosystem RSA. It is, however, well-known that public-key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA...... decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on modern mobile phones....

  18. On the Efficiency of Fast RSA Variants in Modern Mobile Phones

    OpenAIRE

    Klaus Hansen; Troels Larsen; Kim Olsen

    2009-01-01

    Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public-key cryptosystem RSA. It is, however, well-known that public-key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on modern mobile phones. In this paper, we explore the efficiency on modern mobile phones of variants o...

  19. Range Scheduling Aid (RSA)

    Science.gov (United States)

    Logan, J. R.; Pulvermacher, M. K.

    1991-01-01

    Range Scheduling Aid (RSA) is presented in the form of the viewgraphs. The following subject areas are covered: satellite control network; current and new approaches to range scheduling; MITRE tasking; RSA features; RSA display; constraint based analytic capability; RSA architecture; and RSA benefits.

  20. An efficient and secure RSA--like cryptosystem exploiting R\\'edei rational functions over conics

    OpenAIRE

    Bellini, Emanuele; Murru, Nadir

    2015-01-01

    We define an isomorphism between the group of points of a conic and the set of integers modulo a prime equipped with a non-standard product. This product can be efficiently evaluated through the use of R\\'edei rational functions. We then exploit the isomorphism to construct a novel RSA-like scheme. We compare our scheme with classic RSA and with RSA-like schemes based on the cubic or conic equation. The decryption operation of the proposed scheme turns to be two times faster than RSA, and inv...

  1. A New Factorization Method to Factorize RSA Public Key Encryption

    OpenAIRE

    Bhagvant Ram Ambedkar; Sarabjeet Singh Bedi

    2011-01-01

    The security of public key encryption such as RSA scheme relied on the integer factoring problem. The security of RSA algorithm is based on positive integer N, because each transmitting node generates pair of keys such as public and private. Encryption and decryption of any message depends on N. Where, N is the product of two prime numbers and pair of key generation is dependent on these prime numbers. The factorization of N is very intricate. In this paper a New Factorization method is propo...

  2. Implementation of Triple RSA

    Directory of Open Access Journals (Sweden)

    Sapna Sejwani*1

    2014-05-01

    Full Text Available The Rivest Shamir Adleman (RSA cryptosystem, named after its creators, is one of the most popular public key cryptosystems. It is most widely used for its strong security feature and easy implementation. The RSA cryptosystem has been utilized for many e-commerce applications, various forms of authentication, and virtual private networks in any organizations. The importance of high security and faster implementations paved the way for hardware implementations of the RSA algorithm. This work consists of describing a new approach to enhance RSA security. In this paper we will enhance the security feature by introducing an advance model called Triple RSA. Although RSA has not been attacked yet, it is still prone to attacks. So to enhance its security we have implemented triple RSA just like triple DES which is extremely secure. This model provides along with confidentiality, a strong authentication, data integrity, tamper detection and non repudiation.

  3. Strategies and performances of Soft Input Decryption

    OpenAIRE

    Zivic, Natasa

    2009-01-01

    This paper analyzes performance aspects of Soft Input Decryption and L values. Soft Input Decryption is a novel method which uses L values (soft output) of a SISO channel decoder for the correction of input of Soft Input Decryption (SID blocks) which have been modified during the transmission over a noisy channel. The method is based on the combination of cryptography and channel coding improving characteristics of both of them. The algorithm, strategies and scenarios of Soft Input Decryption...

  4. An RSA Encryption Hardware Algorithm using a Single DSP Block and a Single Block RAM on the FPGA

    Directory of Open Access Journals (Sweden)

    Koji Nakano

    2011-07-01

    Full Text Available The main contribution of this paper is to present an efficient hardware algorithm for RSA encryption/decryption based on Montgomery multiplication. Modern FPGAs have a number of embedded DSP blocks (DSP48E1 and embedded memory blocks (BRAM. Our hardware algorithm supporting 2048-bit RSA encryption/decryption is designed to be implemented using one DSP48E1, one BRAM and few logic blocks (slices in the Xilinx Virtex-6 family FPGA. The implementation results showed that our RSA module for 2048-bit RSA encryption/decryption runs in 277.26ms. Quite surprisingly, the multiplier in DSP48E1 used to compute Montgomery multiplication works in more than 97% clock cycles over all clock cycles. Hence, our implementation is close to optimal in the sense that it has only less than 3% overhead in multiplication and no further improvement is possible as long as Montgomery multiplication based algorithm is used. Also, since our circuit uses only one DSP48E1 block and one Block RAM, we can implement a number of RSA modules in an FPGA that can work in parallel to attain high throughput RSA encryption/decryption.

  5. The deduction of the accelerated formula and the efficiency estimating in a number of primes in RSA decryption algorithm with Chinese remainder theorem%有关中国剩余定理在多个素数的RSA解密运算中的加速公式的论证以及加速效率的估算

    Institute of Scientific and Technical Information of China (English)

    刘承彬; 耿也; 舒奎; 高真香子

    2012-01-01

    RSA algorithms play an important role in the public key cryptography. Its computational efficiency have an immediately correlation with the efficiency of modular exponentiation implementation. In this paper the general formula for multiple primes of RSA algorithm were given by reducing the number of modular exponentiation, recover the original simply and fast. A formula for estimating efficiency also was given to calculate the efficiency of acceleration by estimating, which can provide the basis for the most appropriate numbers for RSA.%RSA算法在公钥密码体制中占有重要的地位,它的计算效率与模幂运算的实现效率有着直接关联.本实验在基于使用中国剩余定理简化的RSA解密算法的条件下,给出多个素数情况下的解密通用公式,通过减少大量的模幂运算,迅速简单地恢复出原文.并给出了效率提升估算公式,通过估算求出加速效率,为确定使用多少个素数最为合适提供依据.

  6. Simple Encryption/Decryption Application

    Directory of Open Access Journals (Sweden)

    Majdi Al-qdah

    2007-06-01

    Full Text Available This paper presents an Encryption/Decryption application that is able to work with any type of file; for example: image files, data files, documentation files…etc. The method of encryption is simple enough yet powerful enough to fit the needs of students and staff in a small institution. The application uses simple key generation method of random number generation and combination. The final encryption is a binary one performed through rotation of bits and XOR operation applied on each block of data in any file using a symmetric decimal key. The key generation and Encryption are all done by the system itself after clicking the encryption button with transparency to the user. The same encryption key is also used to decrypt the encrypted binary file.

  7. A New Factorization Method to Factorize RSA Public Key Encryption

    Directory of Open Access Journals (Sweden)

    Bhagvant Ram Ambedkar

    2011-11-01

    Full Text Available The security of public key encryption such as RSA scheme relied on the integer factoring problem. The security of RSA algorithm is based on positive integer N, because each transmitting node generates pair of keys such as public and private. Encryption and decryption of any message depends on N. Where, N is the product of two prime numbers and pair of key generation is dependent on these prime numbers. The factorization of N is very intricate. In this paper a New Factorization method is proposed to obtain the factor of positive integer N. The proposed work focuses on factorization of all trivial and nontrivial integer numbers and requires fewer steps for factorization process of RSA modulus N. The New Factorization method is based on Pollard rho factorization method. Experimental results shown that factorization speed is fast as compare existing methods.

  8. Simple Encryption/Decryption Application

    OpenAIRE

    Majdi Al-qdah; Lin Yi Hui

    2007-01-01

    This paper presents an Encryption/Decryption application that is able to work with any type of file; for example: image files, data files, documentation files…etc. The method of encryption is simple enough yet powerful enough to fit the needs of students and staff in a small institution. The application uses simple key generation method of random number generation and combination. The final encryption is a binary one performed through rotation of bits and XOR operation applied on each b...

  9. Research on the Safe Parameter of RSA Algorithm%RSA算法的安全参数研究

    Institute of Scientific and Technical Information of China (English)

    赵进宏

    2012-01-01

    RSA算法是一个非对称密钥加密算法。文章系统地介绍了RSA公钥密码算法的基本原理及利用RSA算法进行数据加密的过程:对RSA公钥密码算法安全参数的选择进行分析,并探讨了安全参数的选择对RSA公钥密码算法的安全性影响及重要性。%The RSA algorithm is an asymmetric key cryptographic algorithm.The paper introduces the working principle of RSA system in a system way, besides that it perform encryption and decryption in RSA algorithm,and study how to choose the safe parameter of RSA system,and then analyze the importance of a proper parameter in maintaining secudty of the RSA system.

  10. Dual-Layer Video Encryption using RSA Algorithm

    Science.gov (United States)

    Chadha, Aman; Mallik, Sushmit; Chadha, Ankit; Johar, Ravdeep; Mani Roja, M.

    2015-04-01

    This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two layers of encryption to ensure a reasonable level of security. Encryption of the video component involves applying the RSA algorithm followed by the PN-based encryption. Similarly, the audio component is first encrypted using PN and further subjected to encryption using the Discrete Cosine Transform. Combining these techniques, an efficient system, invulnerable to security breaches and attacks with favorable values of parameters such as encryption/decryption speed, encryption/decryption ratio and visual degradation; has been put forth. For applications requiring encryption of sensitive data wherein stringent security requirements are of prime concern, the system is found to yield negligible similarities in visual perception between the original and the encrypted video sequence. For applications wherein visual similarity is not of major concern, we limit the encryption task to a single level of encryption which is accomplished by using RSA, thereby quickening the encryption process. Although some similarity between the original and encrypted video is observed in this case, it is not enough to comprehend the happenings in the video.

  11. Decryption of pure-position permutation algorithms

    Institute of Scientific and Technical Information of China (English)

    赵晓宇; 陈刚; 张亶; 王肖虹; 董光昌

    2004-01-01

    Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown.

  12. Threshold Decryption Scheme with Multiple Policies

    Institute of Scientific and Technical Information of China (English)

    FEI Ru-chun; WANG Li-na

    2005-01-01

    Based on the difficulty in computing discrete logarithm and square root on some special conditions, we propose a basic threshold secret sharing scheme for multiple secrets with multiple policies, which allows a group of users to share multiple secret keys and only one secret shadow to be kept by each user. An efficient threshold decryption scheme with multiple policies is designed on the basis of the basic threshold scheme. This decryption scheme allows multiple secret keys to be shared among a group of users, and each user to keep only one secret shadow. Different public keys can be used to encrypt documents. If and only if the number of cooperated users who keep the secret shadows is greater than or equal to the threshold value of the corresponding secret key,they can cooperate to decrypt the documents. It is proved that the proposed scheme has very strong security, unless the attackers can solve the discrete logarithm problem and the square root problem.

  13. Decryption of pure-position permutation algorithms

    Institute of Scientific and Technical Information of China (English)

    赵晓宇; 陈刚; 张亶; 王肖虹; 董光昌

    2004-01-01

    Pure position permutation image encryption algorithms,commonly used as image encryption investigated in this work are unfortunately frail under known-text attack.In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms.First,a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices.Then,by using probability theory and algebraic principles,the decryption probability of pure-position permutation algorithms is verified theoretically; and then,by defining the operation system of fuzzy ergodic matrices,we improve a specific decryption algorithm.Finally,some simulation results are shown.

  14. New Weak Keys in RSA

    Institute of Scientific and Technical Information of China (English)

    WANG Baocang; LIU Shuanggen; HU Yupu

    2006-01-01

    The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown that the RSA number n=pq can be easily factored if p and q have the special form of p=as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).

  15. Robust RSA for Digital Signature

    OpenAIRE

    Virendra Kumar; Puran Krishen Koul

    2011-01-01

    The RSA cryptosystem is currently used in a wide variety of products, platforms, and industries around the world. It is found in many commercial software products and is planned to be in many more. In hardware, the RSA algorithm can be found in secure telephones, on ethernet network cards, and on smart cards.It offers encryption and digital signatures (authentication). In this paper we will illustrate the application and problem associated with RSA Algorithm.

  16. Robust RSA for Digital Signature

    Directory of Open Access Journals (Sweden)

    Virendra Kumar

    2011-11-01

    Full Text Available The RSA cryptosystem is currently used in a wide variety of products, platforms, and industries around the world. It is found in many commercial software products and is planned to be in many more. In hardware, the RSA algorithm can be found in secure telephones, on ethernet network cards, and on smart cards.It offers encryption and digital signatures (authentication. In this paper we will illustrate the application and problem associated with RSA Algorithm.

  17. 加密算法之RSA算法%Encryption Algorithm of the RSA Algorithm

    Institute of Scientific and Technical Information of China (English)

    盛仲飙

    2012-01-01

    RSA algorithm is one of the most widely used non-symmetric cipher system. On the base of the study of RSA algorithm theory,principle, algorithm description and so on,the paper further studies the details of the problems in the implementation of RSA algorithm that should be paid attention and its application in the encryption/ decryption, digital signatures, key exchange. Finally, the paper proposes a kind of private key power module operation improvement scheme. The scheme improved the speed of RSA algorithm in the decryption.%RSA算法是使用最广泛的一种非对称密码体制.在对RSA算法的理论基础、原理、算法描述等进行研究的基础上,近一步研究了RSA算法在实现时应注意的问题以及它在数字签名、密钥交换等方面的应用.最后提出了一种对私有密钥进行幂模运算的改进方案,提高了RSA算法在解密时的运算速度.

  18. Decrypted secrets methods and maxims of cryptology

    CERN Document Server

    Bauer, Friedrich L

    2006-01-01

    A reference work on cryptology offering technical and biographical details. This book reviews secret codes and their uses - the foundations of cryptography. It also deals with the process of covertly decrypting a secret code - cryptanalysis, and gives particular advice on assessing methods.

  19. Enhanced NTRU cryptosystem eliminating decryption failures

    Institute of Scientific and Technical Information of China (English)

    Yao Jun; Zeng Guihua

    2006-01-01

    An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU.

  20. Additively homomorphic encryption with a double decryption mechanism, revisited

    NARCIS (Netherlands)

    Peter, A.; Kronberg, M.; Trei, W.; Katzenbeisser, S.

    2012-01-01

    We revisit the notion of additively homomorphic encryption with a double decryption mechanism (DD-PKE), which allows for additions in the encrypted domain while having a master decryption procedure that can decrypt all properly formed ciphertexts by using a special master secret. This type of encryp

  1. Akcelerace RSA na GPU

    OpenAIRE

    Balogh, Tomáš

    2013-01-01

    Tato bakalářská práce se zabývá implementací obecného algoritmu RSA prostřednictvím Montgomeryho násobení pro grafické karty. Pro vybranou platformu CUDA jsou vytvořeny čtyři verze implementace s cílem dosáhnutí co nejvyššího zrychlení výpočtu v porovnání s výpočtem na procesoru. Zrychlení výpočtu je kromě jiného dosaženo paralelizací aritmetických operací sčítání a násobení velkých čísel.

  2. H1 in RSA galaxies

    Science.gov (United States)

    Richter, OTTO-G.

    1993-01-01

    The original Revised Shapley-Ames (RSA) galaxy sample of almost 1300 galaxies has been augmented with further bright galaxies from the RSA appendix as well as newer galaxy catalogs. A complete and homogeneous, strictly magnitude-limited all-sky sample of 2345 galaxies brighter than 13.4 in apparent blue magnitude was formed. New 21 cm H1 line observations for more than 600 RSA galaxies have been combined with all previously available H1 data from the literature. This new extentise data act allows detailed tests of widely accepted 'standard' reduction and analysis techniques.

  3. Multi-Prime RSA Over Galois Approach

    OpenAIRE

    Rawal, Swati

    2016-01-01

    Many variants of RSA cryptosystem exist in the literature. One of them is RSA over polynomials based on Galois approach. In standard RSA modulus is product of two large primes whereas in the Galois approach author considered the modulus as a product of two irriduciable polynomials. We use this idea and extend Multi-prime RSA over polynomials.

  4. SEB teams up with RSA

    Index Scriptorium Estoniae

    2011-01-01

    Globaalne kindlustusgrupp RSA ja SEB Pank teatasid 19. aprillil, et alustavad koostööd varakindlustustoodete pakkumisel SEB klientidele Eestis, mis tähendab seda, et RSAst saab ainus varakindlustuse pakkuja pangas

  5. RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Abhishek Patial

    2012-08-01

    Full Text Available Cloud computing presents IT organizations with a funda­mentally different model of operation, one that takes advantage of the maturity of web applications and networks and the rising interoperability of computing systems to provide IT services. Data security is becoming a core problem in cloud computing, there are some kind of solution that are provide some security with model, some technology. In this paper is attempt to secure data from unauthorized access, the Method of data security is RSA algorithm for providing data security by encrypting the given data based on the KEY combinations. And this data then can only be decrypted by authorized person by using his private key. For the same purpose Google application cloud has been implemented on IJCT Foundation, all data has of IJCT Foundation sifted to Google cloud and RSA security algorithm is implemented by us for secure data.

  6. Extending Algorithm of RSA Algorithm%基于RSA算法的扩展算法

    Institute of Scientific and Technical Information of China (English)

    张延招

    2011-01-01

    The security of RSA is designed on the basis of the difficulty of large integer decomposition.In the RSA public key encryption system the public key n is the product of two large prime number,aiming at the large integer n decomposition of the form n=pq(in which p,q as large prime number).The paper describes the encryption and decryption theory of extending RSA algorithm,aiming at the large integer n decomposition to the form n=p1,p2,…,pr(in which p1,p2,…,pr as large prime number).The addition of prime number could enhance the security of RSA algorithm.Compared to RSA algorithm,the extending RSA algorithm could be applied to both digital encryption/decryption and digital signature.Digital signature algorithm based on extending RSA algorithm is also of high security and reliability.%RSA的安全性是依据大整数分解的困难性而设计的。RSA公开密钥加密体制中n为2个大素数的乘积,即针对n=pq(p,q为大素数)的大整数分解,这里介绍了RSA算法的扩展算法的加密和解密原理,即针对n=p1,p2,…,pr(p1,p2,…,pr为大素数)的大整数分解。通过扩展素因子的个数达到RSA算法的安全性。比较RSA算法,扩展的RSA算法不仅可用于数据加密解密,也可用于数字签名。利用扩展的RSA算法实现数字签名也具有较高的安全性和可靠性。

  7. Factorization of a 768-bit RSA modulus

    OpenAIRE

    Kleinjung, T; Aoki, K.; Franke, J.; Lenstra, A.K.; Thomee, E; Bos, Joppe,; Gaudry, P.; Kruppa, Alexander; Montgomery, P. L.; Osvik, D.A.; Riele, te, H.; Timofeev, Andrey; Zimmermann, P; Rabin, T.

    2010-01-01

    The original publication is available at www.springerlink.com International audience This paper reports on the factorization of the 768-bit number RSA-768 by the number field sieve factoring method and discusses some implications for RSA.

  8. EFFICIENT ASIC ARCHITECTURE OF RSA CRYPTOSYSTEM

    OpenAIRE

    Varun Nehru; H.S. Jattana

    2014-01-01

    This paper presents a unified architecture design of the RSA cryptosystem i.e. RSA cryptoaccelerator along with key-pair generation. A structural design methodology for the same is proposed and implemented. The purpose is to design a complete cryptosystem efficiently with reduced hardware redundancy. Individual modular architectures of RSA, Miller-Rabin Test and Extended Binary GCD algorithm are presented and then they are integrated. Standard algorithm for RSA has been used. T...

  9. Generating RSA moduli with a predetermined portion

    OpenAIRE

    Lenstra, Arjen K.

    1998-01-01

    This paper reviews and generalizes a method to generate RSA moduli with a predetermined portion. The potential advantages of the resulting methods are discussed. Both the storage and the computational requirements of the RSA cryptosystem can be considerably reduced. The constructions are as efficient as generation of regular RSA moduli, and the resulting moduli do not seem to offer less security than regular RSA moduli

  10. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  11. EFFICIENT ASIC ARCHITECTURE OF RSA CRYPTOSYSTEM

    Directory of Open Access Journals (Sweden)

    Varun Nehru

    2014-05-01

    Full Text Available This paper presents a unified architecture design of the RSA cryptosystem i.e. RSA cryptoaccelerator along with key-pair generation. A structural design methodology for the same is proposed and implemented. The purpose is to design a complete cryptosystem efficiently with reduced hardware redundancy. Individual modular architectures of RSA, Miller-Rabin Test and Extended Binary GCD algorithm are presented and then they are integrated. Standard algorithm for RSA has been used. The RSA datapath has further been transformed into DPA resistant design. The simulation and implementation results using 180nm technology are shown and prove the validity of the architecture.

  12. Improved RSA cryptosystem based on the study of number theory and public key cryptosystems

    Directory of Open Access Journals (Sweden)

    Israt Jahan

    2015-01-01

    Full Text Available Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In asymmetric key cryptography, also called Public Key cryptography, two different keys (which form a key pair are used. One key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message – not even the original (i.e. the first key used for encryption. In this paper, we have proposed an improved approach of RSA algorithm using two public key pairs and using some mathematical logic rather than sending one public key d irectly.Because if an attacker has an opportunity of getting the public key componet they can find private key value by brute force search. General Terms: Cryptography, network security

  13. Analyzing standards for RSA integers

    CERN Document Server

    Loebenberger, Daniel

    2011-01-01

    The key-generation algorithm for the RSA cryptosystem is specified in several standards, such as PKCS#1, IEEE 1363-2000, FIPS 186-3, ANSI X9.44, or ISO/IEC 18033-2. All of them substantially differ in their requirements. This indicates that for computing a "secure" RSA modulus it does not matter how exactly one generates RSA integers. In this work we show that this is indeed the case to a large extend: First, we give a theoretical framework that will enable us to easily compute the entropy of the output distribution of the considered standards and show that it is comparatively high. To do so, we compute for each standard the number of integers they define (up to an error of very small order) and discuss different methods of generating integers of a specific form. Second, we show that factoring such integers is hard, provided factoring a product of two primes of similar size is hard.

  14. Cryptanalysis of Dual CRT-RSA

    OpenAIRE

    Santanu, Sarkar; Maitra, Subhamoy

    2011-01-01

    International audience Several schemes under the framework of Dual RSA have been proposed by Sun et al (IEEE-IT, August 2007). We here concentrate on the Dual CRT-RSA scheme and present certain range of parameters for which this is insecure. As a corollary of our work, we prove that the Dual Generalized Rebalanced-RSA (Scheme III of Sun et al) can be e ciently broken for a signi cant region where the scheme has been claimed to be secure.

  15. Factorization of a 512-bit RSA modulus

    OpenAIRE

    Cavallar, S.H.; Lioen, W.M.; Riele, te, H.; Dodson, B.; Lenstra, A.K.; Montgomery, P. L.; Murphy, B.

    2000-01-01

    On August 22, 1999, we completed the factorization of the 512--bit 155--digit number RSA--155 with the help of the Number Field Sieve factoring method (NFS). This is a new record for factoring general numbers. Moreover, 512--bit RSA keys are frequently used for the protection of electronic commerce---at least outside the USA---so this factorization represents a breakthrough in research on RSA--based systems. The previous record, factoring the 140--digit number RSA--140, was established on Feb...

  16. Factorization of a 512-bit RSA modulus

    NARCIS (Netherlands)

    Cavallar, S.H.; Lioen, W.M.; Riele, H.J.J. te; Dodson, B.; Lenstra, A.K.; Montgomery, P.L.; Murphy, B.

    2000-01-01

    On August 22, 1999, we completed the factorization of the 512--bit 155--digit number RSA--155 with the help of the Number Field Sieve factoring method (NFS). This is a new record for factoring general numbers. Moreover, 512--bit RSA keys are frequently used for the protection of electronic commerce-

  17. RSA Monitoring Redesign Initiative Informational Booklet #1

    Science.gov (United States)

    US Department of Education, 2005

    2005-01-01

    This informational booklet contains background materials regarding the Rehabilitation Services Administration (RSA) initiative to redesign its monitoring system. The booklet is intended to expand the knowledge and understanding of those individuals selected to participate in the RSA-sponsored monitoring conference that was held August 24 and 25,…

  18. SRI RAMSHALAKA: A VEDIC METHOD OF TEXT ENCRYPTION AND DECRYPTION

    Directory of Open Access Journals (Sweden)

    Rajkishore Prasad

    2013-07-01

    Full Text Available This paper investigates usability of SriRamshalakha, a vedic tool used in Indian Astrology, in the encryption and decryption of plain English text. Sri Ram Shalaka appears in Sri RamChartmanas, one of the very popular sacred epic of Hindu religion, written by great Saint Tulsidasji. SriRamshalakha is used to fetch/infer the approximate answer of questions/decisions by the believers. Basically, the said shalaka embed nine philosophical verses from Sri RamCharitmanas in a matrix form based on which answers to queries are inferred and ingrained. However, none of the verses are visible and directly readable. Thus here we take SriRamshalakha as the ancient Indian method of text encryption and decryption and based on the same algorithms for the encryption and decryption of plain English text areproposed. The developed algorithms are presented with examples and possibility of its use in steganography and text to image transformation are also discussed.

  19. Combinations of resting RSA and RSA reactivity impact maladaptive mood repair and depression symptoms

    OpenAIRE

    Yaroslavsky, Ilya; Bylsma, Lauren M.; Rottenberg, Jonathan; Kovacs, Maria

    2013-01-01

    We examined whether the combined indices of respiratory sinus arrhythmia at rest (resting RSA) and in response to a sad film (RSA reactivity) predict effective and ineffective responses to reduce sadness (adaptive vs. maladaptive mood repair) in women with histories of juvenile-onset depression (n = 74) and no history of major mental disorders (n = 75). Structural equation models were used to estimate latent resting RSA, depression, and adaptive and maladaptive mood repair and to test the stu...

  20. On the factorization of RSA-120

    OpenAIRE

    Denny, T; Dodson, B.; Lenstra, Arjen K.; Manasse, M. S.

    1994-01-01

    We present data concerning the factorization of the 120-digit number RSA-120, which we factored on July 9, 1993, using the quadratic sieve method. The factorization took approximately 825 MIPS years and was completed within three months real time. At the time of writing RSA-120 is the largest integer ever factored by a general purpose factoring algorithm. We also present some conservative extrapolations to estimate the difficulty of factoring even larger numbers, using either the quadratic si...

  1. Simple optical decryption based on a modified joint transform correlator technique

    Institute of Scientific and Technical Information of China (English)

    WANG Huai-bin; WANG Tian-zuo; YUAN Xiao-cong

    2006-01-01

    A new encryption/decryption system for optical information security is proposed in this paper. We used an iterative Fourier transform algorithm to optimize the encrypted hologram as well as the decryption key as phase-only elements. The optical decryption was implemented by superimposing the encrypted hologram and the decryption key in a simple optical setup. Numerical simulation and optical experiment have confirmed the proposed technique as a simple and easy implementation for optical decryption, demonstrating potential applications in optical information security verification.

  2. Perancangan Aplikasi Rsa Dengan Pembangkit Bilangan Prima Lehmann Dan Pembangkit Bilangan Acak Berbasis Rsa

    OpenAIRE

    Rahayu, Dini

    2014-01-01

    Securityandconfidentiality ofthe messageisa veryimportantaspectin the exchangeof information. This paperwillofferaprocess ofencodinga messageusing theRSA-Lehmann-CSPRNGwhichcanincreasethe security ofthe message. Inthis paperthe input data designisin the form ofa textfile. RSA algorithmwill be appliedonasoftware designedandcreatedusingthe VisualBasicprogramming languageBasic 6.0as a meanstoincreasemessaging security. 071402002

  3. Encryption-Decryption RGB Color Image Using Matrix Multiplication

    Directory of Open Access Journals (Sweden)

    Mohamad M.AL-Laham

    2015-10-01

    Full Text Available An enhanced technique of color image encryption based on random matrix key encoding is proposed. To encrypt the color image a separation into Red Green and Blue (R, G, B channels will applied. Each channel is encrypted using a technique called double random matrix key encoding then three new coding image matrices are constructed. To obtain the reconstructed image that is the same as the original image in the receipted side; simple extracted and decryption operations can be maintained. The results shown that the proposed technique is powerful for color image encryption and decryption and a MATLAB and simulations were used to get the results. The proposed technique has high security features because each color component is separately treated using its own double random matrix key which is generated randomly and make the process of hacking the three keys very difficult

  4. On the Performance of Joint Fingerprint Embedding and Decryption Scheme

    CERN Document Server

    Lian, Shiguo; Ren, Zhen; Wang, Haila

    2007-01-01

    Till now, few work has been done to analyze the performances of joint fingerprint embedding and decryption schemes. In this paper, the security of the joint fingerprint embedding and decryption scheme proposed by Kundur et al. is analyzed and improved. The analyses include the security against unauthorized customer, the security against authorized customer, the relationship between security and robustness, the relationship between secu-rity and imperceptibility and the perceptual security. Based these analyses, some means are proposed to strengthen the system, such as multi-key encryp-tion and DC coefficient encryption. The method can be used to analyze other JFD schemes. It is expected to provide valuable information to design JFD schemes.

  5. Encryption-Decryption RGB Color Image Using Matrix Multiplication

    OpenAIRE

    Mohamad M.AL-Laham

    2015-01-01

    An enhanced technique of color image encryption based on random matrix key encoding is proposed. To encrypt the color image a separation into Red Green and Blue (R, G, B) channels will applied. Each channel is encrypted using a technique called double random matrix key encoding then three new coding image matrices are constructed. To obtain the reconstructed image that is the same as the original image in the receipted side; simple extracted and decryption operations can be mainta...

  6. Encryption and Decryption of Messages on Android using NFC Tags

    Directory of Open Access Journals (Sweden)

    Andrei Dragan

    2015-09-01

    Full Text Available Working with NFC technology and mobile devices brings a faster and more secure way of doing things like giving out contact information, automating certain tasks or transmitting data, as easy as touching the two. What this article focuses on is the use of NFC tags on the Android platform to store random generated keys and automate the encryption and decryption of messages.

  7. 基于C语言的RSA算法的实现%The realization of RSA algorithm based on C language

    Institute of Scientific and Technical Information of China (English)

    戚娜

    2015-01-01

    RSA算法是现代公钥密码体制事实上的标准,既能用于数据加密解密也能用于数字签名。本文重点介绍RSA的算法原理,研究在数字签名和密钥交换方面的应用,分析RSA存在的安全问题以及RSA在C语言中具体的实现过程,并针对RSA算法中存在的缺点进行深入的分析研究。%The RSA algorithm is a standard of modern cryptography and is considered a better security key system that can be used for not only for data encryption and decryption but also can be used for digital signature. This paper focuses on algorithm principle, researches on the applications in the digital signature and key exchange, analyses the safety problems in RSA,the specific implementation process in the C language, and analyses the shortcoming that exist for the RSA algorithm in-depth.

  8. Hardware modules of the RSA algorithm

    Directory of Open Access Journals (Sweden)

    Škobić Velibor

    2014-01-01

    Full Text Available This paper describes basic principles of data protection using the RSA algorithm, as well as algorithms for its calculation. The RSA algorithm is implemented on FPGA integrated circuit EP4CE115F29C7, family Cyclone IV, Altera. Four modules of Montgomery algorithm are designed using VHDL. Synthesis and simulation are done using Quartus II software and ModelSim. The modules are analyzed for different key lengths (16 to 1024 in terms of the number of logic elements, the maximum frequency and speed.

  9. On Fixed Points of Order K of RSA

    OpenAIRE

    Zhang, Shaohua

    2009-01-01

    In this paper, we gave a preliminary dynamical analysis on the RSA cryptosystem and obtained a computational formulae of the number of the fixed points of $k$ order of the RSA. Thus, the problem in [8, 9] has been solved.

  10. RSA Monitoring Redesign Initiative Informational Booklet #2

    Science.gov (United States)

    US Department of Education, 2005

    2005-01-01

    The U.S. Department of Education's Rehabilitation Services Administration (RSA) is undertaking a major initiative to substantially redesign its program monitoring and improvement system. The overriding goal is to improve vocational rehabilitation (VR) services and employment outcomes for individuals with disabilities through the development of a…

  11. Analysis of RSA Algorithm using GPU Programming

    Directory of Open Access Journals (Sweden)

    Sonam Mahajan

    2014-07-01

    Full Text Available Modern-day computer security relies heavily on cry ptography as a means to protect the data that we ha ve become increasingly reliant on. The main researc h in computer security domain is how to enhance the speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo value that can process large power of numbers w hich otherwise are not supported by built-in data t ypes. First the traditional algorithm is studied. Secondl y, the parallelized RSA algorithm is designed using CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large pr ime number . As a result the main fundamental problem of RSA algorithm such as speed and use of poo r or small prime numbers that has led to significant s ecurity holes, despite the RSA algorithm's mathemat ical soundness can be alleviated by this algorithm

  12. An Optical Encryption and Decryption Method and System

    DEFF Research Database (Denmark)

    2000-01-01

    The invention relates to securing of information utilising optical imaging technologies and more specifically to phase encryption and decryption of images. An image is encrypted into a mask having a plurality of mask resolution elements (Xm, Ym) by encoding the image using e.g. a phase mask with an...... encoded phase value phi (Xm, Ym) and an encoded amplitude value a (Xm, Ym), and by further encrypting the mask (using e.g. a spatial light modulator) by addition of an encrypting phase value phi c (Xm, Ym) to the encoded phase value phi (Xm, Ym) and by multiplication of an encrypting amplitude value ac...

  13. 基于参数优化批处理的TLS协议%Parameter Optimization-Based Batching TLS Protocol

    Institute of Scientific and Technical Information of China (English)

    齐芳; 贾维嘉; 鲍丰; 吴永东; 王国军

    2007-01-01

    TLS(transport layer security)协议的基本设计目标是为两个通信实体之间提供数据的保密性和完整性.由于在传输层安全握手协议中最耗费计算资源的步骤是服务器RSA解密运算,优化的批处理的RSA方法提出可以用于加速TLS会话的初始化.首先指出了以前的批处理方法由于要求多证书实现而实用性不强.然后提出了单一证书策略的方法,从而克服了这一问题.还提出结合用户对于因特网服务质量的要求优化了批处理参数.为了选择优化的批处理的参数,不仅考虑了服务器的性能,而且还考虑了客户可容忍的等待时间.通过分析并在阐述平均排队时间、批处理服务时间和系统稳定性的基础上提出了一种新颖的优化批处理调度算法,已部署在服务器上.最后通过分析和模拟两种方法验证了所提出方案的实用性和有效性.%The primary goal of the Transport Layer Security (TLS) protocol is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the TLS handshake protocol is the server's RSA decryption, it is introduced that optimal batch RSA can be used to speedup TLS session initialization. This paper first indicates that the previous batch method is impractical since it requires a multiple of certificates, then it proposes the unique certificate scheme to overcome the problem. It is also introduced that the batching parameter is optimized when integrating users' requirements for Internet Quality of Service (QoS). To select the optimal batching parameters, not only the server's performance but also the client's tolerable waiting time is considered. Based on the analysis of the mean queue time, batching service time and the stability of the system, a novel batch optimal scheduling algorithm which is deployed in a batching Web server is proposed. Finally, the proposed algorithm is evaluated to be practical and

  14. Securing Watermarked-Relational Data by Using Encryption and Decryption

    Directory of Open Access Journals (Sweden)

    Nagarjuna Settipalli

    2011-05-01

    Full Text Available Ownership rights on outsourced relational database are very crucial issue in today’s internet environment and in many content distribution applications, because the rapid growth of the internet and related technologies offered an unprecedented ability to access and redistribute digital content. In earlier existing systems the relational data will be watermarked and directly send to the client system, in these systems while sending relational data from server to client attacker easily copy the data and create same copy of relational data. Here there is no security to watermarked relational data. In our proposed system before sending the watermarked relational data to client side we encrypt the relational data and send it to the client side, at client side decryption will be done to get the original watermarked data. Because of using this encryption technique even an attacker copy the data he/she may not read the watermarked relational data.

  15. Dynamic RSA: Examining parasympathetic regulatory dynamics via vector-autoregressive modeling of time-varying RSA and heart period.

    Science.gov (United States)

    Fisher, Aaron J; Reeves, Jonathan W; Chi, Cyrus

    2016-07-01

    Expanding on recently published methods, the current study presents an approach to estimating the dynamic, regulatory effect of the parasympathetic nervous system on heart period on a moment-to-moment basis. We estimated second-to-second variation in respiratory sinus arrhythmia (RSA) in order to estimate the contemporaneous and time-lagged relationships among RSA, interbeat interval (IBI), and respiration rate via vector autoregression. Moreover, we modeled these relationships at lags of 1 s to 10 s, in order to evaluate the optimal latency for estimating dynamic RSA effects. The IBI (t) on RSA (t-n) regression parameter was extracted from individual models as an operationalization of the regulatory effect of RSA on IBI-referred to as dynamic RSA (dRSA). Dynamic RSA positively correlated with standard averages of heart rate and negatively correlated with standard averages of RSA. We propose that dRSA reflects the active downregulation of heart period by the parasympathetic nervous system and thus represents a novel metric that provides incremental validity in the measurement of autonomic cardiac control-specifically, a method by which parasympathetic regulatory effects can be measured in process. PMID:27045609

  16. The multi-dimension RSA and its low exponent security

    Institute of Scientific and Technical Information of China (English)

    曹珍富

    2000-01-01

    Using a well-known result of polynomial over the finite field , we show that the Euler-Fermat theorem holds in N[ x]. We present a multi-dimension RSA cryptosystem and point out that low exponent algorithm of attacking RSA is not suitable for the multi-dimension RSA. Therefore, it is believed that the security of the new cryptosystem is mainly based on the factorization of large integers.

  17. The multi-dimension RSA and its low exponent security

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Using a well-known result of polynomial over the finite field Fp, we show that the Euler-Fermat theorem holds in ZN[x]. We present a multi-dimension RSA cryptosystem and point out that low exponent algorithm of attacking RSA is not suitable for the multi-dimension RSA. Therefore, it is believed that the security of the new cryptosystem is mainly based on the factorization of large integers.

  18. Factorisation of RSA-220 with CADO-NFS

    OpenAIRE

    Bai, Shi; Gaudry, Pierrick; Kruppa, Alexander; Thomé, Emmanuel; Zimmermann, Paul

    2016-01-01

    We give details of the factorization of RSA-220 with CADO-NFS. This is a new record computation with this open-source software. We report on the factorization of RSA-220 (220 decimal digits), which is the 3rd largest integer factorization with the General Number Field Sieve (GNFS), after the factorization of RSA-768 (232 digits) in December 2009 [3], and that of 3 697 + 1 (221 digits) in February 2015 by NFS@home.

  19. Factorization of RSA-140 using the number field sieve

    OpenAIRE

    Cavallar, S.H.; Dodson, B.; Lenstra, A.K.; Leyland, P. C.; Lioen, W.M.; Montgomery, P. L.; Murphy, B.; Riele, te, H.; Zimmermann, P

    1999-01-01

    On February 2, 1999, we completed the factorization of the 140--digit number RSA--140 with the help of the Number Field Sieve factoring method (NFS). This is a new general factoring record. The previous record was established on April 10, 1996 by the factorization of the 130--digit number RSA--130, also with the help of NFS. The amount of computing time spent on RSA--140 was roughly twice that needed for RSA--130, about half of what could be expected from a straightforward extrapolation of th...

  20. A New Batch Verifying Scheme for Identifying Illegal Signatures

    Institute of Scientific and Technical Information of China (English)

    Adrian Atanasiu

    2013-01-01

    The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signatures.In this article,we analyze the complexity of the batch verifying schemes defined by Li,Hwang and Chen in 2010,and propose a new batch verifying multiple digital signature scheme,in two variants:one for RSA-by completing the Harn's schema with an identifying illegal signatures algorithm,and the other adapted for a modified Elliptic Curve Digital Signature Algorithm protocol.

  1. DMAC-AN INTEGRATED ENCRYPTION SCHEME WITH RSA FOR AC TO OBSTRUCT INFERENCE ATTACKS

    Directory of Open Access Journals (Sweden)

    R. Jeeva

    2012-12-01

    Full Text Available The proposal of indistinguishable encryption in Randomized Arithmetic Coding(RAC doesn’t make the system efficient because it was not encrypting the messages it sends. It recomputes the cipher form of every messages it sends that increases not only the computational cost but also increases the response time.Floating point representation in cipher increases the difficulty in decryption side because of loss in precison.RAC doesn’t handle the inference attacks like Man-in-Middle attack,Third party attack etc. In our system, Dynamic Matrix Arithmetic Coding(DMAC using dynamic session matrix to encrypt the messages. The size of the matrix is deduced from the session key that contains ID of end users which proves the server authentication.Nonce values is represented as the public key of the opponents encrypted by the session key will be exchanged between the end users to provide mutual authentication. If the adversary try to compromise either server or end users,the other system won’t respond and the intrusion will be easily detected. we have increased the hacking complexity of AC by integrating with RSA upto 99%.

  2. The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock

    Directory of Open Access Journals (Sweden)

    Shengyong Li

    2009-11-01

    Full Text Available In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array. The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user’s password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.

  3. Universally Composable Proactive Threshold RSA Signature

    Institute of Scientific and Technical Information of China (English)

    HONG Xuan; CHEN Ke-fei; LONG Yu

    2008-01-01

    Recently some efforts were made towards capturing the security requirements within the composable security framework.This modeling has some significant advantages in designing and analyzing complex systems.The threshold signature was discussed and a definition was given based on the universal composability framework,which is proved to be equivalent to the standard security definition.Furthermore,a simple,efficient and proactive threshold RSA signature protocol was presented.It is proved to be correct,consistent and unforgeable relative to the environment that at most t-1 parties are corrupted in each proactive stage.It is also secure under the universal composability framework.It is a UC based security and is proved to be equivalent to the standard security.

  4. Preparing for a (RSA Digital Signature

    Directory of Open Access Journals (Sweden)

    Dragan Vidakovic

    2013-03-01

    Full Text Available Many people know the general story about RSA and large (probably prime numbers, without having an idea of how to perform arithmetic operations with the numbers of thousands of bits. Even if they want to develop their own tool for a digital signature, they give up because they think that special hardware-software offers are required for that. In this paper we want to show that even by using a very simple console application, the tools for signature can be developed. Those tools are not as powerful and functional as the products of renowned companies, but they are sufficient to stimulate the interest in cryptography (and the coding of known algorithms is the best way for that, and that is our overriding and permanent goal[3].

  5. DETERMIN LARGE PRIME NUMBERS TO COMPUTE RSA SYSTEM PARAMETERS

    Directory of Open Access Journals (Sweden)

    Ioan Mang

    2008-05-01

    Full Text Available Cryptography, the secret writing, is probably same old as writing itself and has applications in data security insurance. There are cryptosystems where the encipher algorithm can be public. These are public key algorithms. Research on public key algorithms has been concerned with security aspects. The results of this research have induced sufficient confidence to apply public key cryptography a larger scale. The most used and checked public key-based cryptosystem was find by Rivest, Shamir and Adleman, so called RSA system. This paper shows the RSA algorithm. We have realised a program that is able to determine prime numbers with over 100 digits and compute RSA system parameters.

  6. Providing Security in Data Aggregation using RSA algorithm

    Directory of Open Access Journals (Sweden)

    Sukhpreet Singh

    2012-08-01

    Full Text Available The RSA algorithm proposed by Rivest, Adi Shamir and Leonard Adleman is cryptography technique. The current problem with wireless sensor network is how to protect the  security of the sensor data. RSA algoritm is used as a digital signature authentication in the field of security, basically works on deciding encryption variable. In this also the basic concept is to decide a description variable and then decide the description variable using same encryption variable. It is a secure and fast cryptographic system. The major effort will be applied on the RSA encryption technique in order to make node authenticated as well as to secure data while dealing with aggregation.

  7. RSA Opening Minds: A Curriculum for the 21st Century

    Science.gov (United States)

    Candy, Sara

    2011-01-01

    This article discusses the RSA Opening Minds competence framework, an innovative curriculum to meet the needs of young people as future employees, lifelong learners and as citizens of the twenty-first century.

  8. EFFICIENT ALGORITHM FOR RSA TEXT ENCRYPTION USING CUDA-C

    Directory of Open Access Journals (Sweden)

    Sonam Mahajan

    2014-05-01

    Full Text Available Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. The main research in computer security domain is how to enhance the speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo value that can process large power of numbers which otherwise are not supported by built-in data types. First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical soundness can be alleviated by this algorithm.

  9. Improved decryption quality and security of a joint transform correlator-based encryption system

    International Nuclear Information System (INIS)

    Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption–decryption process. Numerical results are presented and discussed. (paper)

  10. Data Hiding and Retrival Using Advanced Encryption and Decryption Algorithms Mamtha Shetty, Shreedhar. A. Joshi

    OpenAIRE

    Mamtha Shetty; Shreedhar. A. Joshi

    2014-01-01

    In this era of digital world, with the evolution of technology, there is an essential need for optimization of online digital data and information. Nowadays, Security and Authenticity of digital data has become a big challenge. This paper proposes an innovative method to authenticate the digital documents. A new method is introduced here, which allows multiple encryption and decryption of digital data.

  11. Study of Encryption and Decryption of Wave File in Image Formats

    OpenAIRE

    Rahul R Upadhyay

    2013-01-01

    This paper describes a novel method of encrypting wave files in popular image formats like JPEG, TIF and PNG along with retrieving them from these image files. MATLAB software is used to perform matrix manipulation to encrypt and decrypt sound files into and from image files. This method is not only a stenographic means but also a data compression technique.

  12. Study of Encryption and Decryption of Wave File in Image Formats

    Directory of Open Access Journals (Sweden)

    Rahul R Upadhyay

    2013-07-01

    Full Text Available This paper describes a novel method of encrypting wave files in popular image formats like JPEG, TIF and PNG along with retrieving them from these image files. MATLAB software is used to perform matrix manipulation to encrypt and decrypt sound files into and from image files. This method is not only a stenographic means but also a data compression technique.

  13. ECC Based Threshold Decryption Scheme and Its Application in Web Security

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xian-feng; ZHANG Feng; QIN Zhi-guang; LIU Jin-de

    2004-01-01

    The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test approach based on elliptic curve cryptography is designed. The application of these techniques in Web security is studied. Performance analysis shows that our scheme is characterized by excellent security as well as high efficiency.

  14. Secret Message Decryption: Group Consulting Projects Using Matrices and Linear Programming

    Science.gov (United States)

    Gurski, Katharine F.

    2009-01-01

    We describe two short group projects for finite mathematics students that incorporate matrices and linear programming into fictional consulting requests presented as a letter to the students. The students are required to use mathematics to decrypt secret messages in one project involving matrix multiplication and inversion. The second project…

  15. Security analysis of RSA cryptosystem algorithm and it's properties

    Science.gov (United States)

    Liu, Chenglian; Guo, Yongning; Lin, Juan

    2014-10-01

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  16. Batch By Batch Longitudinal Emittance Blowup MD

    CERN Document Server

    Mastoridis, T; Butterworth, A; Jaussi, M; Molendijk, J

    2012-01-01

    The transverse bunch emittance increases significantly at 450 GeV from the time of injection till the ramp due to IBS. By selectively blowing up the longitudinal emittance of the incoming batch at each injection, it should be possible to reduce the transverse emittance growth rates due to IBS. An MD was conducted on April 22nd 2012 to test the feasibility and performance of the batch-by-batch longitudinal emittance blowup. There were three main goals during the MD. First, to test the developed hardware, firmware, and software for the batch-by-batch blowup. Then, to measure the transverse emittance growth rates of blown-up and "witness" batches to quantify any improvement, and finally to test the ALLInjectSequencer class, which deals with the complicated gymnastics of introducing or masking the new batch to various RF loops.

  17. Efficient, Robust and Constant-Round Distributed RSA Key Generation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe

    2010-01-01

    We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one iteration of the underlying primality test on each candidate number.......We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one iteration of the underlying primality test on each candidate number....

  18. Batch Attribute-Based Encryption for Secure Clouds

    Directory of Open Access Journals (Sweden)

    Chen Yang

    2015-10-01

    Full Text Available Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext are associated with an access policy and an attribute set, respectively; in addition to holding a secret key, one can decrypt a ciphertext only if the associated attributes match the predetermined access policy, which allows one to enforce fine-grained access control on outsourced files. One issue in existing ABE schemes is that they are designed for the users of a single organization. When one wants to share the data with the users of different organizations, the owner needs to encrypt the messages to the receivers of one organization and then repeats this process for another organization. This situation is deteriorated with more and more mobile devices using cloud services, as the ABE encryption process is time consuming and may exhaust the power supplies of the mobile devices quickly. In this paper, we propose a batch attribute-based encryption (BABE approach to address this problem in a provably-secure way. With our approach, the data owner can outsource data in batches to the users of different organizations simultaneously. The data owner is allowed to decide the receiving organizations and the attributes required for decryption. Theoretical and experimental analyses show that our approach is more efficient than traditional encryption implementations in computation and communication.

  19. 50 CFR 648.207 - Herring Research Set-Aside (RSA).

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Herring Research Set-Aside (RSA). 648.207... Measures for the Atlantic Herring Fishery § 648.207 Herring Research Set-Aside (RSA). (a) NMFS shall... authorized to utilize RSA, based on the selection criteria described in the RFP. (d) NMFS shall consider...

  20. RSA/Legacy Wind Sensor Comparison. Part 2; Eastern Range

    Science.gov (United States)

    Short, David A.; Wheeler, Mark M.

    2006-01-01

    This report describes a comparison of data from ultrasonic and propeller-and-vane anemometers on 5 wind towers at Kennedy Space Center and Cape Canaveral Air Force Station. The ultrasonic sensors are scheduled to replace the Legacy propeller-and-vane sensors under the Range Standardization and Automation (RSA) program. Because previous studies have noted differences between peak wind speeds reported by mechanical and ultrasonic wind sensors, the latter having no moving parts, the 30th and 45th Weather Squadrons wanted to understand possible differences between the two sensor types. The period-of-record was 13-30 May 2005, A total of 357,626 readings of 1-minute average and peak wind speed/direction from each sensor type were used. Statistics of differences in speed and direction were used to identify 15 out of 19 RSA sensors having the most consistent performance, with respect to the Legacy sensors. RSA average wind speed data from these 15 showed a small positive bias of 0.38 kts. A slightly larger positive bias of 0.94 kts was found in the RSA peak wind speed.

  1. RSA/Legacy Wind Sensor Comparison. Part 1; Western Range

    Science.gov (United States)

    Short, David A.; Wheeler, Mark M.

    2006-01-01

    This report describes a comparison of data from ultrasonic and cup-and-vane anemometers on 5 wind towers at Vandenberg AFB. The ultrasonic sensors are scheduled to replace the Legacy cup-and-vane sensors under the Range Standardization and Automation (RSA) program. Because previous studies have noted differences between peak wind speeds reported by mechanical and ultrasonic wind sensors, the latter having no moving parts, the 30th and 45th Weather Squadrons wanted to understand possible differences between the two sensor types. The period-of-record was 13-30 May 2005. A total of 153,961 readings of I-minute average and peak wind speed/direction from each sensor type were used. Statistics of differences in speed and direction were used to identify 18 out of 34 RSA sensors having the most consistent performance, with respect to the Legacy sensors. Data from these 18 were used to form a composite comparison. A small positive bias in the composite RSA average wind speed increased from +0.5 kts at 15 kts, to +1 kt at 25 kts. A slightly larger positive bias in the RSA peak wind speed increased from +1 kt at 15 kts, to +2 kts at 30 kts.

  2. Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Operations

    Directory of Open Access Journals (Sweden)

    Kurapati Sundar Teja

    2015-08-01

    Full Text Available This paper explains the implementation of data encryption and decryption algorithm using hamming code and arithmetic operations with the help of Verilog HDL. As the days are passing the old algorithms are not remained so strong cryptanalyst are familiar with them. Hamming code is one of forward error correcting code which has got many applications. In this paper hamming code algorithm was discussed and the implementation of it was done with arithmetic operations. For high security some arithmetic operations are added with hamming code process. A 3-bit data will be encrypted as 14-bit and using decryption process again we will receives 3-bit original data. The implemented design was tested on Spartan3A FPGA kit.

  3. Combination of watermarking and joint watermarking-decryption for reliability control and traceability of medical images.

    Science.gov (United States)

    Bouslimi, D; Coatrieux, G; Cozic, M; Roux, Ch

    2014-01-01

    In this paper, we propose a novel crypto-watermarking system for the purpose of verifying the reliability of images and tracing them, i.e. identifying the person at the origin of an illegal distribution. This system couples a common watermarking method, based on Quantization Index Modulation (QIM), and a joint watermarking-decryption (JWD) approach. At the emitter side, it allows the insertion of a watermark as a proof of reliability of the image before sending it encrypted; at the reception, another watermark, a proof of traceability, is embedded during the decryption process. The scheme we propose makes interoperate such a combination of watermarking approaches taking into account risks of interferences between embedded watermarks, allowing the access to both reliability and traceability proofs. Experimental results confirm the efficiency of our system, and demonstrate it can be used to identify the physician at the origin of a disclosure even if the image has been modified. PMID:25570990

  4. Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Operations

    OpenAIRE

    Kurapati Sundar Teja; Shanmukha Mallikarjuna Bandaru

    2015-01-01

    This paper explains the implementation of data encryption and decryption algorithm using hamming code and arithmetic operations with the help of Verilog HDL. As the days are passing the old algorithms are not remained so strong cryptanalyst are familiar with them. Hamming code is one of forward error correcting code which has got many applications. In this paper hamming code algorithm was discussed and the implementation of it was done with arithmetic operations. For high security...

  5. Data Hiding and Retrival Using Advanced Encryption and Decryption Algorithms Mamtha Shetty, Shreedhar. A. Joshi

    Directory of Open Access Journals (Sweden)

    Mamtha Shetty

    2014-04-01

    Full Text Available In this era of digital world, with the evolution of technology, there is an essential need for optimization of online digital data and information. Nowadays, Security and Authenticity of digital data has become a big challenge. This paper proposes an innovative method to authenticate the digital documents. A new method is introduced here, which allows multiple encryption and decryption of digital data.

  6. How Tippecanoe County is Improving a Local Intersection by Using an RSA and Federal Funds

    OpenAIRE

    Kuhl, Opal; Haltom, Greg; Poad, Doug

    2016-01-01

    Road safety audits can be an integral tool to support an application for HSIP funds. In this session we will present how an RSA is used to document the need for a project requesting an HSIP eligibility determination. Attendees will learn how to conduct an RSA, who is needed on the RSA review team, how safety concerns are identified and documented, and how an RSA is used as part of the application for eligibility determination of HSIP funds. A sample RSA will be presented.

  7. Pro Spring Batch

    CERN Document Server

    Minella, Michael T

    2011-01-01

    Since its release, Spring Framework has transformed virtually every aspect of Java development including web applications, security, aspect-oriented programming, persistence, and messaging. Spring Batch, one of its newer additions, now brings the same familiar Spring idioms to batch processing. Spring Batch addresses the needs of any batch process, from the complex calculations performed in the biggest financial institutions to simple data migrations that occur with many software development projects. Pro Spring Batch is intended to answer three questions: *What? What is batch processing? What

  8. A Systematic Methodology for Multi-Images Encryption and Decryption Based on Single Chaotic System and FPGA Embedded Implementation

    OpenAIRE

    Hanzhong Zheng; Simin Yu; Xiangqian Xu

    2014-01-01

    A systematic methodology is developed for multi-images encryption and decryption and field programmable gate array (FPGA) embedded implementation by using single discrete time chaotic system. To overcome the traditional limitations that a chaotic system can only encrypt or decrypt one image, this paper initiates a new approach to design n-dimensional (n-D) discrete time chaotic controlled systems via some variables anticontrol, which can achieve multipath drive-response synchronization. To th...

  9. Adolescent RSA responses during an anger discussion task: Relations to emotion regulation and adjustment.

    Science.gov (United States)

    Cui, Lixian; Morris, Amanda Sheffield; Harrist, Amanda W; Larzelere, Robert E; Criss, Michael M; Houltberg, Benjamin J

    2015-06-01

    The current study examined associations between adolescent respiratory sinus arrhythmia (RSA) during an angry event discussion task and adolescents' emotion regulation and adjustment. Data were collected from 206 adolescents (10-18 years of age, M age = 13.37). Electrocardiogram (ECG) and respiration data were collected from adolescents, and RSA values and respiration rates were computed. Adolescents reported on their own emotion regulation, prosocial behavior, and aggressive behavior. Multilevel latent growth modeling was employed to capture RSA responses across time (i.e., linear and quadratic changes; time course approach), and adolescent emotion regulation and adjustment variables were included in the model to test their links to RSA responses. Results indicated that high RSA baseline was associated with more adolescent prosocial behavior. A pattern of initial RSA decreases (RSA suppression) in response to angry event recall and subsequent RSA increases (RSA rebound) were related to better anger and sadness regulation and more prosocial behavior. However, RSA was not significantly linked to adolescent aggressive behavior. We also compared the time course approach with the conventional linear approach and found that the time course approach provided more meaningful and rich information. The implications of adaptive RSA change patterns are discussed. PMID:25642723

  10. Children's dynamic RSA change during anger and its relations with parenting, temperament, and control of aggression.

    Science.gov (United States)

    Miller, Jonas G; Chocol, Caroline; Nuselovici, Jacob N; Utendale, William T; Simard, Melissa; Hastings, Paul D

    2013-02-01

    This study examined the moderating effects of child temperament on the association between maternal socialization and 4-6-year-old children's dynamic respiratory sinus arrhythmia (RSA) change in response to anger-themed emotional materials (N=180). We used latent growth curve modeling to explore adaptive patterns of dynamic RSA change in response to anger. Greater change in RSA during anger-induction, characterized by more initial RSA suppression and a subsequent return to baseline, was related to children's better regulation of aggression. For anger-themed materials, low levels of authoritarian parenting predicted more RSA suppression and recovery for more anger-prone children, whereas more authoritative parenting predicted more RSA suppression and recovery for less anger-prone children. These findings suggest that children's adaptive patterns of dynamic RSA change can be characterized by latent growth curve modeling, and that these patterns may be differentially shaped by parent socialization experiences as a function of child temperament. PMID:23274169

  11. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin

    2014-01-01

    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  12. Efficient and Robust Two-Party RSA Key Generation

    Institute of Scientific and Technical Information of China (English)

    YANG Muxiang; HONG Fan; ZHENG Minghui; LI Jun

    2006-01-01

    An efficient two party RSA secret key sharing generation scheme based on a homomorphic encryption, which is semantically secure under the prime residuosity assumption, is proposed in this paper. At the stage of computing RSA modulo N, an initial distributed primality test protocol is used to reduce the computation complexity and increase the probability of N being a two-prime product. On the other aspect, the homomorphic encryption based sharing conversion protocols is devised and adopted in multi-party computing modulus N and secret key d. Comparing to any sharing conversion protocols based on oblivious transfer protocol, the homomorphic encryption based sharing conversion protocols are of high performance. Our scheme resists the passive attack and since a method of verifying the sharing was introduced in, the scheme can resists any cheating behaviors too. Security proof, computation complexity and communication complexity analysis are given at last.

  13. Meteosat Images Encryption based on AES and RSA Algorithms

    Directory of Open Access Journals (Sweden)

    Boukhatem Mohammed Belkaid

    2015-06-01

    Full Text Available Satellite image Security is playing a vital role in the field of communication system and Internet. This work is interested in securing transmission of Meteosat images on the Internet, in public or local networks. To enhance the security of Meteosat transmission in network communication, a hybrid encryption algorithm based on Advanced Encryption Standard (AES and Rivest Shamir Adleman (RSA algorithms is proposed. AES algorithm is used for data transmission because of its higher efficiency in block encryption and RSA algorithm is used for the encryption of the key of the AES because of its management advantages in key cipher. Our encryption system generates a unique password every new session of encryption. Cryptanalysis and various experiments have been carried out and the results were reported in this paper, which demonstrate the feasibility and flexibility of the proposed scheme.

  14. Implementasi Sistem Keamanan Data Menggunakan Algoritma RSA Dan Modified LSB

    OpenAIRE

    Anggraini, Siska

    2014-01-01

    Security and confidentiality are two important aspect of data communication. In maintaining security and confidentiality of important messages to be sent, previously message is firstly encrypted and hidden into the media. Media that is used in this study is a digital image format bitmap (.bmp) with 24 bit color depth. This study aims to build a system that can be used to improve data security that is important confidential messages. Cryptography algorithms used to encrypt is the RSA algorithm...

  15. Secure Three Prime RSA from Hardware Fault Attack

    OpenAIRE

    Ravi Rai Chaudhary; Prof. Deepali Kelkar; Vikas Arya

    2011-01-01

    RSA is the most widely deployed public key cryptosystem since it was proposed in 1978.It is used for securing web traffic, e-mail, and some wireless devices. Confidentiality of information has been particularly popularized with the explosive growth of the Internet. However from the user, the Internet was based on open network architecture with computer-based nodes and without network security, and thus was vulnerable to attackers and hackers. This paper is dedicated to the attack study of the...

  16. Software and hardware implementation of the RSA public key cipher

    OpenAIRE

    Brady, Paul

    1988-01-01

    Cryptographic systems and their use in communications are presented. The advantages obtained by the use of a public key cipher and the importance of this in a commercial environment are stressed. Two two main public key ciphers are considered. The RSA public key cipher is introduced and various methods for implementing this cipher on a standard, nondedicated, 8 bit microprocessor are investigated. The performance of the different algorithms are evaluated and compared....

  17. AN APPROXIMATE EXPRESSION RELATED WITH RSA FIXED POINTS

    Institute of Scientific and Technical Information of China (English)

    YuXiuyuan

    2004-01-01

    Let T=T(n,e,a)be the number of fixed points of RSA(n,e)that are co-prime with n=pq,and A,B be sets of prime numbers in (1,x)and(1,y) respectively.An estimation on the mean-value M(A,B,e,a)=1/(#A)(#B)∑p∈A,q∈B,(p.q)=1 logT(pq,e,a)is given.

  18. An Efficient Proactive RSA Scheme for Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Rui-shan; CHEN Ke-fei

    2007-01-01

    A proactive threshold signature scheme is very important to tolerate mobile attack in mobile ad hoc networks. In this paper, we propose an efficient proactive threshold RSA signature scheme for ad hoc networks. The scheme consists of three protocols: the initial secret share distribution protocol, the signature generation protocol and the secret share refreshing protocol. Our scheme has three advantages. First, the signature generation protocol is efficient. Second, the signature generation protocol is resilient. Third, the share refreshing protocol is efficient.

  19. Simplified Threshold RSA with Adaptive and Proactive Security

    DEFF Research Database (Denmark)

    Almansa Guerra, Jesus Fernando; Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2006-01-01

    We present the currently simplest, most efficient, optimally resilient, adaptively secure, and proactive threshold RSA scheme. A main technical contribution is a new rewinding strategy for analysing threshold signature schemes. This new rewinding strategy allows to prove adaptive security of a...... proactive threshold signature scheme which was previously assumed to be only statically secure. As a separate contribution we prove that our protocol is secure in the UC framework....

  20. Encryption and decryption of information in chaotic communication systems governed by delay-differential equations

    International Nuclear Information System (INIS)

    We consider different ways for encryption and decryption of information in communication systems using chaotic signal of a time-delay system as a carrier. A method is proposed for extracting a hidden message in the case when the parameters of the chaotic transmitter are a priori unknown. For different configurations of the transmitter the procedure of information signal extraction from the transmitted signal is demonstrated using numerical data produced by nonlinear mixing of the chaotic signal of the Mackey-Glass system and frequency-modulated harmonic signal

  1. High-precision measurements of cementless acetabular components using model-based RSA: an experimental study

    DEFF Research Database (Denmark)

    Baad-Hansen, Thomas; Kold, Søren; Kaptein, Bart L;

    2007-01-01

    BACKGROUND: In RSA, tantalum markers attached to metal-backed acetabular cups are often difficult to detect on stereo radiographs due to the high density of the metal shell. This results in occlusion of the prosthesis markers and may lead to inconclusive migration results. Within the last few years......, new software systems have been developed to solve this problem. We compared the precision of 3 RSA systems in migration analysis of the acetabular component. MATERIAL AND METHODS: A hemispherical and a non-hemispherical acetabular component were mounted in a phantom. Both acetabular components...... underwent migration analyses with 3 different RSA systems: conventional RSA using tantalum markers, an RSA system using a hemispherical cup algorithm, and a novel model-based RSA system. RESULTS: We found narrow confidence intervals, indicating high precision of the conventional marker system and model...

  2. Application and Implementation of RSA Algorithm%RSA算法的应用与实现

    Institute of Scientific and Technical Information of China (English)

    白晓; 蔡贵荣

    2013-01-01

    RSA 算法是使用最广泛的一种非对称密码体制.在对RSA 算法的原理、算法描述等进行研究的基础上,近一步研究了 RSA算法在数字签名、密钥交换等方面的应用.最后在.NET平台中使用C#语言进行编程,实现RSA数字签名算法。%RSA algorithm is one of the most widely used Public Key Cryptosystem.On the base of the study of RSA algorithm theory and algorithm description ,the paper further studies the application of RSA in the digital signatures ,key exchange and so on.Finally, RSA digital signature algorithm is realised by C# programming In the.NET platform.

  3. RsaI: a new sequence-specific endonuclease activity from Rhodopseudomonas sphaeroides.

    OpenAIRE

    Lynn, S P; Cohen, L K; Kaplan, S; Gardner, J F

    1980-01-01

    A new type II sequence-specific endonuclease, RsaI, has been identified from Rhodopseudomonas sphaeroides strain 28/5. An RsaI purification scheme that yields enzyme which is free of contaminating exonuclease and phosphatase activities after a single column fractionation has been developed. The enzyme recognized the tetranucleotide sequence 5'-GTAC-3' and cleaved between the T and A, thereby generating flush ends. RsaI should be extremely useful in deoxyribonucleic acid sequencing experiments.

  4. Kinerja Tanda Tangan Digital RSA 1024 bit pada Simulasi E-Voting Menggunakan Prosesor Multicore

    OpenAIRE

    Adnan, Adnan

    2014-01-01

    Paper ini menyajikan hasil pengujian kinerja program parallel algoritma tanda tangan digital RSA 1024 bit yang dimaksudkan untuk simulasi e-voting. Idenya adalah algoritma tanda tangan digital RSA diterapkan pada array bilangn big integer berdimensi 1024 1. Array ini mensimulasikan antrian surat suara hasil pemilihan umum. Dengan menyisipkan kode perulangan, komputasi algoritma tanda tangan digital RSA dilakukan sebanyak 600000. Perangkat lunak dikembangkan dengan me...

  5. Recurrent Batch Normalization

    OpenAIRE

    Cooijmans, Tim; Ballas, Nicolas; Laurent, César; Gülçehre, Çağlar; Courville, Aaron

    2016-01-01

    We propose a reparameterization of LSTM that brings the benefits of batch normalization to recurrent neural networks. Whereas previous works only apply batch normalization to the input-to-hidden transformation of RNNs, we demonstrate that it is both possible and beneficial to batch-normalize the hidden-to-hidden transition, thereby reducing internal covariate shift between time steps. We evaluate our proposal on various sequential problems such as sequence classification, language modeling an...

  6. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    OpenAIRE

    Kuang Tsan Lin; Sheng Lih Yeh

    2014-01-01

    The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matri...

  7. Lattice Based Attack on Common Private Exponent RSA

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Ravva

    2012-03-01

    Full Text Available Lattice reduction is a powerful concept for solving diverse problems involving point lattices. Lattice reduction has been successfully utilizing in Number Theory, Linear algebra and Cryptology. Not only the existence of lattice based cryptosystems of hard in nature, but also has vulnerabilities by lattice reduction techniques. In this paper, we show that Wieners small private exponent attack, when viewed as a heuristic lattice based attack, is extended to attack many instances of RSA when they have the same small private exponent.

  8. Information-Theoretic Secure Verifiable Secret Sharing over RSA Modulus

    Institute of Scientific and Technical Information of China (English)

    QIU Gang; WANG Hong; WEI Shimin; XIAO Guozhen

    2006-01-01

    The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoretic verifiable secret sharing over RSA (Rivest,Shamir,Adleman) modulus and give the rigorous security proof. It is shown how to distribute a secret among a group such that any set of k parties get no information about the secret. The presented scheme is generally applied to constructions of secure distributed multiplication and threshold or forward-secure signature protocols.

  9. Secure User Data in Cloud Computing using RSA Algorithm

    Directory of Open Access Journals (Sweden)

    Sunny Behal

    2014-12-01

    Full Text Available Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services of the internet. Cloud computing provides customers the way to share distributed resources and services that belong to different organizations or sites. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This paper explores various security methods such as Access Control, Telecommunications and Network Security, Information security governance and risk management, Application Security, Security Architecture and Design, We proposed a method using RSA algorithm.

  10. Spring batch essentials

    CERN Document Server

    Rao, P Raja Malleswara

    2015-01-01

    If you are a Java developer with basic knowledge of Spring and some experience in the development of enterprise applications, and want to learn about batch application development in detail, then this book is ideal for you. This book will be perfect as your next step towards building simple yet powerful batch applications on a Java-based platform.

  11. Про одну модифікацію алгоритму RSA шифрування – дешифрування півтонових зображень

    OpenAIRE

    Ковальчук, А.; Пелешко, Д.; Навитка, М.; Борзов, Ю.

    2012-01-01

    Описано застосування модифікації алгоритму RSA для шифрування – дешифрування зображень. Шифрування – дешифрування проводиться без і з додатковим зашумленням. We describe the use of modified RSA algorithm for encryption – decryption of images. Encryption – decryption is carried out without and with extra noisy.

  12. 47 CFR 22.969 - Cellular RSA licenses subject to competitive bidding.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Cellular RSA licenses subject to competitive bidding. 22.969 Section 22.969 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.969 Cellular RSA...

  13. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    DEFF Research Database (Denmark)

    Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal;

    2011-01-01

    The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with...... security against malicious behavior. Our second contribution is complete Paillier [Pai99] threshold encryption scheme in the two-party setting with security against malicious behavior. Furthermore, we describe how to extend our protocols to the multiparty setting with dishonest majority. Our RSA key...... generation is comprised of the following: (i) a distributed protocol for generation of an RSA composite, and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite as public key and is comprised of: (i) a distributed...

  14. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    DEFF Research Database (Denmark)

    Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal;

    2012-01-01

    The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with...... security against malicious behavior in the two party setting. Our second contribution is a complete Paillier [37] threshold encryption scheme in the two-party setting with security against malicious behavior. Our RSA key generation is comprised of the following: (i) a distributed protocol for generation of...... an RSA composite, and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite as public key and is comprised of: (i) a distributed generation of the corresponding secret-key shares and, (ii) a distributed...

  15. Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface

    CERN Document Server

    Nyang, DaeHun; Kwon, Taekyoung; Kang, Brent; Stavrou, Angelos

    2011-01-01

    The design of authentication protocols, for online banking services in particular and any service that is of sensitive nature in general, is quite challenging. Indeed, enforcing security guarantees has overhead thus imposing additional computation and design considerations that do not always meet usability and user requirements. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users' trust in the system. In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of the authentication process. To that end, we propose a family of visualized authentication protocols, a visualized transaction verification, and a "decryptable to your eyes only" protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype o...

  16. A Systematic Methodology for Multi-Images Encryption and Decryption Based on Single Chaotic System and FPGA Embedded Implementation

    Directory of Open Access Journals (Sweden)

    Hanzhong Zheng

    2014-01-01

    Full Text Available A systematic methodology is developed for multi-images encryption and decryption and field programmable gate array (FPGA embedded implementation by using single discrete time chaotic system. To overcome the traditional limitations that a chaotic system can only encrypt or decrypt one image, this paper initiates a new approach to design n-dimensional (n-D discrete time chaotic controlled systems via some variables anticontrol, which can achieve multipath drive-response synchronization. To that end, the designed n-dimensional discrete time chaotic controlled systems are used for multi-images encryption and decryption. A generalized design principle and the corresponding implementation steps are also given. Based on the FPGA embedded hardware system working platform with XUP Virtex-II type, a chaotic secure communication system for three digital color images encryption and decryption by using a 7D discrete time chaotic system is designed, and the related system design and hardware implementation results are demonstrated, with the related mathematical problems analyzed.

  17. Children's Externalizing and Internalizing Symptoms over Time: The Role of Individual Differences in Patterns of RSA Responding

    Science.gov (United States)

    Hinnant, James Benjamin; El-Sheikh, Mona

    2009-01-01

    We examined associations between basal respiratory sinus arrhythmia (RSA) in conjunction with RSA regulation with the hypothesis that their interaction would explain unique variability in children's prospective adjustment 2 years later. Participants were 176 children (98 girls; 78 boys) in middle childhood. RSA regulation was assessed through…

  18. Estimation of capacity of RSA module set, stable for cryptoanalysis

    OpenAIRE

    Селюх, П. В.

    2014-01-01

    Розглянуто аспекти практичної стійкості криптосистеми RSA, проаналізовано стандартизовані методи генерації параметрів криптосистеми, стійкість криптосистеми на практиці. Отримано кількісні оцінки множини стійких параметрів для застосування під час генерації параметрів криптосистеми. Висунуто гіпотезу про поліноміальну потужність множини надійних модулів RSA. This paper deals with aspects of practical security of RSA cryptosystem, analyzes standardized methods of generating cryptos...

  19. ECC over RSA for Asymmetric Encryption-A Review

    Directory of Open Access Journals (Sweden)

    Kamlesh Gupta

    2011-05-01

    Full Text Available Cryptography is used to transmit the data securely in open network. This paper gives the survey of Elliptic Curve Cryptosystem (ECC used in many applications. ECC is a when compared to RSA and discrete logarithm systems, is a better option for the future. For this reason ECC is such an excellent choice for doing asymmetric cryptography in portable devices right now. The smaller ECC keys it turn makes the cryptographic operations that must be performed by the communicating devices to be embedded into considerably smaller hardware, so that software applications may complete cryptographic operations with fewer processor cycles, and operations can be performed much faster, while still retaining equivalent security. This means, in turn, reduced power consumption, less space consumed on the printed circuit board, and software applications that run more rapidly make lower memory demands. In brief, for communication using smaller devices and asymmetric cryptosystem we need ECC.

  20. The RSA survey of dwarf galaxies, 1: Optical photometry

    Science.gov (United States)

    Vader, J. Patricia; Chaboyer, Brian

    1994-01-01

    We present detailed surface photometry, based on broad B-band charge coupled device (CCD) images, of about 80 dwarf galaxies. Our sample represents approximately 10% of all dwarf galaxies identified in the vicinity of Revised Shapley-Ames (RSA) galaxies on high resolution blue photographic plates, referred to as the RSA survey of dwarf galaxies. We derive global properties and radial surface brightness profiles, and examine the morphologies. The radial surface brightness profiles of dwarf galaxies, whether early or late type, display the same varieties in shape and complexity as those of classical giant galaxies. Only a few are well described by a pure r(exp 1/4) law. Exponential profiles prevail. Features typical of giant disk galaxies, such as exponential profiles with a central depression, lenses, and even, in one case (IC 2041), a relatively prominent bulge are also found in dwarf galaxies. Our data suggest that the central region evolves from being bulge-like, with an r(exp 1/4) law profile, in bright galaxies to a lens-like structure in dwarf galaxies. We prove detailed surface photometry to be a helpful if not always sufficient tool in investigating the structure of dwarf galaxies. In many cases kinematic information is needed to complete the picture. We find the shapes of the surface brightness profiles to be loosely associated with morphological type. Our sample contains several new galaxies with properties intermediate between those of giant and dwarf ellipticals (but no M32-like objects). This shows that such intermediate galaxies exist so that at least a fraction of early-type dwarf ellipticals is structurally related to early-type giants instead of belonging to a totally unrelated, disjunct family. This supports an origin of early-type dwarf galaxies as originally more massive systems that acquired their current morphology as a result of substantial, presumable supernova-driven, mass loss. On the other hand, several early-type dwarfs in our sample are

  1. Cryptanalysis and Improvement of Digital Multisignature Scheme Based on RSA

    Institute of Scientific and Technical Information of China (English)

    SU Li; CUI Guo-hua; CHEN Jing; YUAN Jun

    2007-01-01

    Zhang et al. proposed a sequential multisignature scheme based on RSA. The scheme has advantages of low computation and communication costs, and so on. However, we find a problem in their scheme that the verifier can not distinguish whether the multisignature is signed by all the signers of the group or only by the last signer. Thus, any single signature created by the last signer can be used as a multisignature created by the whole group members. This paper proposes an improved scheme that can overcome the defect. In the new scheme, the identity messages of all the signers are added in the multisignature and used in verification phase, so that the verifier can know the signature is generated by which signers. Performance analysis shows that the proposed scheme costs less computation than the original scheme in both signature and verification phases. Furthermore, each partial signature is based on the signer's identity certificate, which makes the scheme more secure.

  2. Batch-to-batch model improvement for cooling crystallization

    OpenAIRE

    Forgione, Marco; Birpoutsoukis, Georgios; Bombois, Xavier; Mesbah, Ali; Daudey, Peter; Van Den Hof, Paul

    2015-01-01

    © 2015 Elsevier Ltd. Two batch-to-batch model update strategies for model-based control of batch cooling crystallization are presented. In Iterative Learning Control, a nominal process model is adjusted by a non-parametric, additive correction term which depends on the difference between the measured output and the model prediction in the previous batch. In Iterative Identification Control, the uncertain model parameters are iteratively estimated using the measured batch data. Due to the diff...

  3. Nurses as advocates between western and traditional wealth practices in RSA

    Directory of Open Access Journals (Sweden)

    Valerie Ehlers

    2000-02-01

    Full Text Available The RSA, like most African countries, have two health care systems. The most visible one is the Westernised hospital and/or clinic based treatment of diseases. This system was introduced by the colonisers and perpetuated by the current formal education programmes of most health care professionals in the RSA. Traditional African medicine has existed since time immemorial and continues to treat vast numbers of people. Both these health care systems will be briefly discussed. Then the role of nurses in the RSA's health care system(s will be examined. *Please note: This is a reduced version of the abstract. Please refer to PDF for full text.

  4. Lung cancer chemotherapy agents increase procoagulant activity via protein disulfide isomerase-dependent tissue factor decryption.

    Science.gov (United States)

    Lysov, Zakhar; Swystun, Laura L; Kuruvilla, Sara; Arnold, Andrew; Liaw, Patricia C

    2015-01-01

    Lung cancer patients undergoing chemotherapy have an elevated risk for thrombosis. However, the mechanisms by which chemotherapy agents increase the risk for thrombosis remains unclear. The aim of this study was to determine the mechanism(s) by which lung cancer chemotherapy agents cisplatin, carboplatin, gemcitabine, and paclitaxel elicit increased tissue factor activity on endothelial cells, A549 cells, and monocytes. Tissue factor activity, tissue factor antigen, and phosphatidylserine exposure were measured on chemotherapy-treated human umbilical vein endothelial cells (HUVEC), A549 cells, and monocytes. Cell surface protein disulfide isomerase (PDI) and cell surface free thiol levels were measured on HUVEC and A549 non-small cell lung carcinoma cells. Treatment of HUVECs, A549 cells, and monocytes with lung cancer chemotherapy significantly increased cell surface tissue factor activity. However, elevated tissue factor antigen levels were observed only on cisplatin-treated and gemcitabine-treated monocytes. Cell surface levels of phosphatidylserine were increased on HUVEC and monocytes treated with cisplatin/gemcitabine combination therapy. Chemotherapy also resulted in increased cell surface levels of PDI and reduced cell surface free thiol levels. Glutathione treatment and PDI inhibition, but not phosphatidylserine inhibition, attenuated tissue factor activity. Furthermore, increased tissue factor activity was reversed by reducing cysteines with dithiothreitol. These studies are the first to demonstrate that lung cancer chemotherapy agents increase procoagulant activity on endothelial cells and A549 cells by tissue factor decryption through a disulfide bond formation in a PDI-dependent mechanism. PMID:24911456

  5. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping

    Directory of Open Access Journals (Sweden)

    Musheer Ahmad

    2010-01-01

    Full Text Available The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryption of images is different from that of texts; therefore it is difficult to handle them by traditional encryption methods. In this communication, a new image encryption algorithm based on three different chaotic maps is proposed. In the proposed algorithm, the plain-image is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out using 2D Cat map. Further, the control parameters of shuffling are randomly generated by employing 2D coupled Logistic map. After that the shuffled image is encrypted using chaotic sequence generated by one-dimensional Logistic map. The experimental results show that the proposed algorithm can successfully encrypt/decrypt the images with same secret keys, and the algorithm has good encryption effect, large key space and high sensitivity to a small change in secret keys. Moreover, the simulation analysis also demonstrates that the encrypted images have good information entropy, very low correlation coefficients and the distribution of gray values of an encrypted image has random-like behavior.

  6. Intellectual property rights vs. public access rights: ethical aspects of the DeCSS decryptation program

    Directory of Open Access Journals (Sweden)

    Robert Vaagan

    2005-01-01

    Full Text Available Introduction. In 1999-2000, a Norwegian youth cracked a DVD-access code and published a decryptation program on the Internet. He was sued by the US DVD Copy Control Association (DVD-CCA and the Norwegian Motion Picture Association (MAP, allies of the US Motion Picture Association of America (MPAA, arrested by Norwegian police and charged with data crime. Two Norwegian court rulings in 2003 unanimously ruled that the program did not amount to a breach of Norwegian law, and he was fully acquitted. In the US, there have been related cases, some with other outcomes. Method. Based on a theoretical framework developed by Zwass, the paper discusses these court rulings and the wider issues of intellectual property rights versus public access rights. Analysis. The DVD-Jon case illustrates that intellectual property rights can conflict with public access rights, as the struggle between proprietary software and public domain software, as well as the SPARC and Open Archives Initiative reflect. Results. An assessment of the DVD-Jon case based on the Zwass framework does not give a clear information ethics answer. The analysis depends on whether one ascribes to consequentialist (e.g., utilitarian or de-ontological reflection, and also on which side of the digital gap is to be accorded most weight. Conclusion. While copyright interests are being legally strengthened, there may be ethically- grounded access rights that outweigh property rights.

  7. An Image Encryption and Decryption Algorithm Based on Chaos Sequence%基于混沌序列的图像加密解密算法

    Institute of Scientific and Technical Information of China (English)

    陈永红; 黄席樾

    2003-01-01

    In this paper, an image encryption and decryption algorithm based on chaos sequence is proposed. This algorithm provides low computational complexity, high security and no distortion. Finally, experimental results are satisfactory.

  8. Early Adversity, RSA, and Inhibitory Control: Evidence of Children’s Neurobiological Sensitivity to Social Context

    OpenAIRE

    Skowron, Elizabeth A.; Cipriano-Essel, Elizabeth; Gatzke-Kopp, Lisa M.; Teti, Douglas M.; Ammerman, Robert T.

    2013-01-01

    This study examined parasympathetic physiology as a moderator of the effects of early adversity (i.e., child abuse and neglect) on children’s inhibitory control. Children’s respiratory sinus arrhythmia (RSA) was assessed during a resting baseline, two joint challenge tasks with mother, and an individual frustration task. RSA assessed during each of the joint parent–child challenge tasks moderated the effects of child maltreatment (CM) status on children’s independently-assessed inhibitory con...

  9. Adolescent RSA Responses during an Anger Discussion Task: Relations to Emotion Regulation and Adjustment

    OpenAIRE

    Cui, Lixian; Morris, Amanda Sheffield; Harrist, Amanda W.; Larzelere, Robert E; Criss, Michael M.; Houltberg, Benjamin J.

    2015-01-01

    The current study examined associations between adolescent respiratory sinus arrhythmia (RSA) during an angry event discussion task and adolescents’ emotion regulation and adjustment. Data were collected from 206 adolescents (10–18 years old, M age = 13.37). Electrocardiogram (ECG) and respiration data were collected from adolescents, and RSA values and respiration rates were computed. Adolescents reported on their own emotion regulation, prosocial behavior, and aggressive behavior. Multi-lev...

  10. Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks

    OpenAIRE

    Perin, Guilherme; Imbert, Laurent; Torres, Lionel; Maurine, Philippe

    2013-01-01

    International audience This paper analyzes the robustness of RSA countermeasures against electromagnetic analysis and collision attacks. The proposed RSA cryptosystem uses residue number systems (RNS) for fast executions of the modular calculi with large numbers. The parallel architecture is protected at arithmetic and algorithmic levels by using the Montgomery Ladder and the Leak Resistant Arithmetic countermeasures. Because the architecture can leak information through control and memory...

  11. Modified Trial Division Algorithm Using KNJ-Factorization Method To Factorize RSA Public Key Encryption

    OpenAIRE

    Lal, Nidhi; Singh, Anurag Prakash; Kumar, Shishupal

    2015-01-01

    The security of RSA algorithm depends upon the positive integer N, which is the multiple of two precise large prime numbers. Factorization of such great numbers is a problematic process. There are many algorithms has been implemented in the past years. The offered KNJ -Factorization algorithm contributes a deterministic way to factorize RSA. The algorithm limits the search by only considering the prime values. Subsequently prime numbers are odd numbers accordingly it also requires smaller num...

  12. An Encryption-Decryption Method Using XOR Gate Based on the XPM between O-Band and C-Band Light Waves

    Institute of Scientific and Technical Information of China (English)

    WANG Ya-Ping; WU Chong-Qing; WANG Zhi; WANG Yong-Jun; YANG Shuang-Shou

    2009-01-01

    An all-optical encryption-decryption method using an exclusive-or gate hazed on the cross-phase modulation between O-band and C-band light waves is proposed. The feasibility of the encryption-decryption technique is verified by handling binary signals at 2.5Gbps, with less than 3dB penalty of extinction ratio and 1 dB polarization dependent loss.

  13. Improved Trial Division Technique for Primality Checking in RSA Algorithm

    Directory of Open Access Journals (Sweden)

    Kumarjit Banerjee

    2012-07-01

    Full Text Available The RSA cryptosystem, invented by Ron Rivest, Adi Shamir and Len Adleman was first publicized in the August 1977 issue of Scientific American. The security level of this algorithm very much depends on two large prime numbers. To check the primality of large number in personal computer is huge time consuming using the best known trial division algorithm. The time complexity for primality testing has been reduced using the representation of divisors in the form of 6n±1. According to the fundamental theorem of Arithmetic, every number has unique factorization. So to check primality, it is sufficient to check if the number is divisible by any prime below the square root of the number. The set of divisors obtained by 6n±1 form representation contains many composites. These composite numbers have been reduced by 30k approach. In this paper, the number of composites has been further reduced using 210k approach. A performance analysis in time complexity has been given between 210k approach and other prior applied methods. It has been observed that the time complexity for primality testing has been reduced using 210k approach.

  14. A randomized RSA study concentrating especially on continuous migration.

    Science.gov (United States)

    Molt, Mats; Ryd, Leif; Toksvig-Larsen, Sören

    2016-06-01

    Background and purpose - There is a general call for phased introduction of new implants, and one step in the introduction is an early evaluation of micromotion. We compared the micromotion in the Triathlon and its predecessor, the Duracon total knee prosthesis, concentrating especially on continuous migration over 5 years of follow-up. Patients and methods - 60 patients were randomized to receive either a cemented Triathlon total knee prosthesis or a cemented Duracon total knee prosthesis. 3-D tibial component migration was measured by radiostereometric analysis (RSA) at 3 months and at 1, 2, and 5 years. Results - There was no statistically significant difference in maximum total point motion (MTPM) between the 2 groups (p = 0.1). The mean MTPM at 5 years for the Duracon was 1.10 (SD 1.21) mm and for the Triathlon it was 0.66 (SD 0.38) mm. The numbers of continuously migrating prostheses were similar in the groups at the fifth year of follow-up; 6 of 21 prostheses in the Duracon group and 3 of 21 in the Triathlon group had migrated more than 0.3 mm between the second year and the fifth year of follow-up (p = 0.2). Interpretation - The Triathlon has a micromotion pattern similar to that of the Duracon total knee system at both short-term and medium-term follow-up, and may therefore, over time, show the same good long-term mechanical stability. PMID:27088580

  15. Surface roughness when diamond turning RSA 905 optical aluminium

    Science.gov (United States)

    Otieno, T.; Abou-El-Hossein, K.; Hsu, W. Y.; Cheng, Y. C.; Mkoko, Z.

    2015-08-01

    Ultra-high precision machining is used intensively in the photonics industry for the production of various optical components. Aluminium alloys have proven to be advantageous and are most commonly used over other materials to make various optical components. Recently, the increasing demand from optical systems for optical aluminium with consistent material properties has led to the development of newly modified grades of aluminium alloys produced by rapid solidification in the foundry process. These new aluminium grades are characterised by their finer microstructures and refined mechanical and physical properties. However the machining database of these new optical aluminium grades is limited and more research is still required to investigate their machinability performance when they are diamond turned in ultrahigh precision manufacturing environment. This work investigates the machinability of rapidly solidified aluminium RSA 905 by varying a number of diamond-turning cutting parameters and measuring the surface roughness over a cutting distance of 4 km. The machining parameters varied in this study were the cutting speed, feed rate and depth of cut. The results showed a common trend of decrease in surface roughness with increasing cutting distance. The lowest surface roughness Ra result obtained after 4 km in this study was 3.2 nm. This roughness values was achieved using a cutting speed of 1750 rpm, feed rate of 5 mm/min and depth of cut equal to 25 μm.

  16. "Concordia res parvae crescunt" or how different approaches can be combined to decrypt root water uptake

    Science.gov (United States)

    Meunier, Félicien; Couvreur, Valentin; Draye, Xavier; Javaux, Mathieu; Lobet, Guillaume

    2015-04-01

    In this study, we developed a new operation pipe showing that the combined use of computer models and in vivo experiments allows one a better analysis of the water fluxes in the soil-plant system and can help researchers to decrypt the root water uptake dynamics. From an experimental point of view, we monitored in 2D the evolution of soil water content around roots of transpiring maize plants using a light transmission imaging (LTI) technique on a rhizotron. Subsequently, we digitized the entire root system in order to create an input file for the model RSWMS (HYDRUS-like model for soil-plant water transfers). In the other hand, we performed a global sensitivity analysis of the modeled experiment to highlight the plant parameters that can be measured thanks to such a procedure. Then fitting the simulated changes of distributed Sink term in Richards equation to experimental data enabled us to depict the local radial and axial conductivities. The use of the RSWMS model in association with experimental data gave us an insight on the water potential distribution in the plant and fluxes by and through individual segments during the entire duration of the experiment. Finally, this analysis can be optimized by changing the timing and/or types of measurements included in the protocol in order to maximize the information content of the experiment. A validation of the results can also take place: the optimized conductivities of the root segments are indeed sensitive to a global conductance measurement and to other root water uptake experiments. In the future, this experimental set-up will enable us to compare genotypes hydraulic architectures in order to answer questions such as: which genotype is the best adapted to avoid a drought stress occurring at a certain time in a given environment?

  17. Polling with batch service

    OpenAIRE

    Boxma, O.; Van der Wal; Yechiali, U.

    2008-01-01

    This article considers a batch service polling system. We first study the case in which the server visits the queues cyclically, considering three different service regimes: gated, exhaustive, and globally gated. We subsequently analyze the case (the so-called "Israeli Queue") in which the server first visits the queue with the "oldest" customer. In both cases, queue lengths and waiting times are the main performance measures under consideration.

  18. Modelling of Batch Process Operations

    DEFF Research Database (Denmark)

    Abdul Samad, Noor Asma Fazli; Cameron, Ian; Gani, Rafiqul

    Here a batch cooling crystalliser is modelled and simulated as is a batch distillation system. In the batch crystalliser four operational modes of the crystalliser are considered, namely: initial cooling, nucleation, crystal growth and product removal. A model generation procedure is shown that s...

  19. The Pseudomonas Quorum-Sensing Regulator RsaL Belongs to the Tetrahelical Superclass of H-T-H Proteins▿

    OpenAIRE

    Rampioni, Giordano; Polticelli, Fabio; Bertani, Iris; Righetti, Karima; Venturi, Vittorio; Zennaro, Elisabetta; Leoni, Livia

    2006-01-01

    In the opportunistic human pathogen Pseudomonas aeruginosa, quorum sensing (QS) is crucial for virulence. The RsaL protein directly represses the transcription of lasI, the synthase gene of the main QS signal molecule. On the basis of sequence homology, RsaL cannot be predicted to belong to any class of characterized DNA-binding proteins. In this study, an in silico model of the RsaL structure was inferred showing that RsaL belongs to the tetrahelical superclass of helix-turn-helix proteins. ...

  20. The Quorum-Sensing Negative Regulator RsaL of Pseudomonas aeruginosa Binds to the lasI Promoter

    OpenAIRE

    Rampioni, Giordano; Bertani, Iris; Zennaro, Elisabetta; Polticelli, Fabio; Venturi, Vittorio; Leoni, Livia

    2006-01-01

    A mutation in the rsaL gene of Pseudomonas aeruginosa produces dramatically higher amounts of N-acyl homoserine lactone with respect to the wild type, highlighting the key role of this negative regulator in controlling quorum sensing (QS) in this opportunistic pathogen. The DNA binding site of the RsaL protein on the rsaL-lasI bidirectional promoter partially overlaps the binding site of the LasR protein, consistent with the hypothesis that RsaL and LasR could be in binding competition on thi...

  1. Microstructure encryption and decryption techniques in optical variable and invariable devices in printed documents for security and forensic applications

    Science.gov (United States)

    Ambadiyil, Sajan; K. G, Jayan; Prabhu, Radhakrishna; Mahadevan Pillai, V. P.

    2015-05-01

    Today, document counterfeiting is a global menace because of the advanced technologies available at ever decreasing prices. Instead of eschew the paper documents; applying efficient cost effective security methodologies are the feasible solutions. This paper reports a novel cost effective and simple optical technique using micro text encrypted optical variable device (OVD) threads, ultra-violet (UV) based optical invariable device (OID) patterns and artistic fonts for secure preparation of the documents and its forensic application. Applying any one of the above technique or together can effectively enhance the level of security of the most valuable document. The genuineness of the documents can be verified using simple decryption techniques.

  2. On the improvement of Wiener attack on RSA with small private exponent.

    Science.gov (United States)

    Wu, Mu-En; Chen, Chien-Ming; Lin, Yue-Hsun; Sun, Hung-Min

    2014-01-01

    RSA system is based on the hardness of the integer factorization problem (IFP). Given an RSA modulus N = pq, it is difficult to determine the prime factors p and q efficiently. One of the most famous short exponent attacks on RSA is the Wiener attack. In 1997, Verheul and van Tilborg use an exhaustive search to extend the boundary of the Wiener attack. Their result shows that the cost of exhaustive search is 2r + 8 bits when extending the Weiner's boundary r bits. In this paper, we first reduce the cost of exhaustive search from 2r + 8 bits to 2r + 2 bits. Then, we propose a method named EPF. With EPF, the cost of exhaustive search is further reduced to 2r - 6 bits when we extend Weiner's boundary r bits. It means that our result is 2(14) times faster than Verheul and van Tilborg's result. Besides, the security boundary is extended 7 bits. PMID:24982974

  3. RSA 2010信息安全论坛在京举行

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    本刊讯10月21~22日,在RSA进入中国市场10周年之际。由美国RSA Conference(RSA大会)主办、中国电子学会承办的RSA 大会2010信息安全国际论坛在北京举行,标志着RSA Conference这一全球最权威的信息安全年度峰会首次进入中国。国家工业与信息化部有关领导出席论坛并讲话,对论坛的积极意义表示高度肯定。

  4. Security analysis of RSA cryptosystem algorithm and it’s properties

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  5. Security analysis of RSA cryptosystem algorithm and it’s properties

    International Nuclear Information System (INIS)

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA

  6. A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA

    OpenAIRE

    Rauzy, Pablo; Guilley, Sylvain

    2014-01-01

    In this article, we describe a methodology that aims at either breaking or proving the security of CRT-RSA implementations against fault injection attacks. In the specific case-study of the BellCoRe attack, our work bridges a gap between formal proofs and implementation-level attacks. We apply our results to three implementations of CRT-RSA, namely the unprotected one, that of Shamir, and that of Aum\\"uller et al. Our findings are that many attacks are possible on both the unprotected and the...

  7. More on Combinatorial Batch Codes

    OpenAIRE

    Ruj, Sushmita; Roy, Bimal

    2008-01-01

    Paterson, Stinson and Wei \\cite{PSW} introduced Combinatorial batch codes, which are combinatorial description of Batch code. Batch codes were first presented by Ishai, Kushilevita, Ostrovsky and Sahai \\cite{IKOS} in STOC'04. In this paper we answer some of the questions put forward by Paterson, Stinson and Wei and give some results for the general case $t>1$ which were not studied by the authors.

  8. Modelling of Batch Process Operations

    DEFF Research Database (Denmark)

    Abdul Samad, Noor Asma Fazli; Cameron, Ian; Gani, Rafiqul

    Here a batch cooling crystalliser is modelled and simulated as is a batch distillation system. In the batch crystalliser four operational modes of the crystalliser are considered, namely: initial cooling, nucleation, crystal growth and product removal. A model generation procedure is shown that...... Freedom (DoF) analysis, choice of variables to satisfy DoF and solution strategy. The batch distillation model for setting up and testing an operating sequence is developed and simulated. This looks at such operating policies as constant reflux ratio or set concentration of specific compound in the...

  9. Column and Batch Experiments

    Directory of Open Access Journals (Sweden)

    Jorge L. Gardea-Torresdey

    2005-01-01

    Full Text Available Batch and column experiments were performed to determine the Cu(II binding capacity of silica-immobilized humin biomass. For column studies, 500 bed volumes of a 0.1 mM Cu(II solution were passed through humin packed columns at the flow rates of 1, 1.5, 2, and 3 mL/min. The biopolymer showed an average Cu binding capacity of 12 ± 1.5 mg/g and a Cu recovery of about 96.5 % ± 1.5. The breakthrough points for Cu(II alone were approximately 420, 390, 385, and 300 bed volumes for the flow rates of 1, 1.5, 2 and 3 mL/min, respectively. The interference studies demonstrated that at low concentrations, the hard cations Ca(II and Mg(II did not seem to represent a major interference on Cu(II binding to the humin biopolymer. The selectivity showed by this biopolymer was Cu(II>Ca(II>Mg(II. On the other hand, batch experiments showed that Ca(II + Mg(II at 100mM each reduced the Cu(II binding to 73 %. However, 1000 mM concentrations of Ca(II and Mg(II, separately and in mixture, reduced the Cu(II binding to 47 %, 44 % and 31 %, respectively. The results of this study showed that immobilized humin in a silica matrix could represent an inexpensive bio-source for Cu removal from contaminated water, even in the presence of low concentrations of the hard cations Ca(II and Mg(II.

  10. Heterogeneous batch structures in throughput scheduling

    OpenAIRE

    Weeda, P.J.

    1993-01-01

    Recently a few papers appeared on throughput scheduling, dealing with the relationship between batch structure and process structure in discrete batch production, while maximizing time-constrained throughput. Results have been concentrated on the class of homogeneous batch structures, i.e. batch structures with equal batch sizes for each process per cycle. In this paper heterogeneous batch structures are considered. By numerical examples, it is shown that heterogeneous batch structures can ou...

  11. Emotion suppression moderates the quadratic association between RSA and executive function

    Science.gov (United States)

    Spangler, Derek P.; Bell, Martha Ann; Deater-Deckard, Kirby

    2016-01-01

    There is uncertainty about whether respiratory sinus arrhythmia (RSA), a cardiac marker of adaptive emotion regulation, is involved in relatively low or high executive function performance. In the present study, we investigated: (1) whether RSA during rest and tasks predict both relatively low and high executive function within a larger quadratic association among the two variables, and (2) the extent to which this quadratic trend was moderated by individual differences in emotion regulation. To achieve these aims, a sample of ethnically and socioeconomically diverse women self-reported reappraisal and emotion suppression. They next experienced a two-minute resting period during which ECG was continually assessed. In the next phase, the women completed an array of executive function and non-executive cognitive tasks while ECG was measured throughout. As anticipated, resting RSA showed a quadratic association with executive function that was strongest for high suppression. These results suggest that relatively high resting RSA may predict poor executive function ability when emotion regulation consumes executive control resources needed for ongoing cognitive performance. PMID:26018941

  12. Resting RSA Is Associated with Natural and Self-Regulated Responses to Negative Emotional Stimuli

    Science.gov (United States)

    Demaree, Heath A.; Robinson, Jennifer L.; Everhart, D. Erik; Schmeichel, Brandon J.

    2004-01-01

    Resting respiratory sinus arrhythmia (RSA) was assessed among 111 adult participants. These individuals were then asked to watch a positive or negative affective film in either a natural manner or while exaggerating their facial response. Facial reactions to the film were video-recorded and subsequently rated in terms of facial affect.…

  13. Використання адитивно-різницевих операцій в модифікаціях алгоритму RSA

    OpenAIRE

    Ковальчук, А.; Пелешко, Д.; Навитка, М.

    2011-01-01

    Запропоновано модифікації шифрування - дешифрування зображень у градаціях сірого, які грунтуються на використанні ідей базового алгоритму RSA з додатковим зашумленням зашифрованого зображення і без додаткового зашумлення. A modification of the encryption – decryption of images in grayscale, and are based on ideas using the basic algorithm of RSA, with additional noise encrypted image without any additional noise....

  14. Microalgal TAG production strategies: why batch beats repeated-batch

    OpenAIRE

    Benvenuti, G.; Lamers, P.P.; Breuer, G.; Bosma, R.; Cerar, Ana; Wijffels, R.H.; Barbosa, M. J.

    2016-01-01

    Background For a commercially feasible microalgal triglyceride (TAG) production, high TAG productivities are required. The operational strategy affects TAG productivity but a systematic comparison between different strategies is lacking. For this, physiological responses of Nannochloropsis sp. to nitrogen (N) starvation and N-rich medium replenishment were studied in lab-scale batch and repeated-batch (part of the culture is periodically harvested and N-rich medium is re-supplied) cultivation...

  15. Functional Characterization of the Quorum Sensing Regulator RsaL in the Plant-Beneficial Strain Pseudomonas putida WCS358

    OpenAIRE

    Rampioni, Giordano; Bertani, Iris; Pillai, Cejoice Ramachandran; Venturi, Vittorio; Zennaro, Elisabetta; Leoni, Livia

    2012-01-01

    In many bacteria, quorum sensing (QS) systems rely on a signal receptor and a synthase producing N-acyl-homoserine lactone(s) as the signal molecule(s). In some species, the rsaL gene, located between the signal receptor and synthase genes, encodes a repressor limiting signal synthase expression and hence signal molecule production. Here we investigate the molecular mechanism of action of the RsaL protein in the plant growth-promoting rhizobacterium Pseudomonas putida WCS358 (RsaLWCS). In P. ...

  16. Data-driven batch schuduling

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John [Los Alamos National Laboratory; Denehy, Tim [GOOGLE; Arpaci - Dusseau, Remzi [UNIV OF WISCONSIN; Livny, Miron [UNIV OF WISCONSIN; Arpaci - Dusseau, Andrea C [NON LANL

    2009-01-01

    In this paper, we develop data-driven strategies for batch computing schedulers. Current CPU-centric batch schedulers ignore the data needs within workloads and execute them by linking them transparently and directly to their needed data. When scheduled on remote computational resources, this elegant solution of direct data access can incur an order of magnitude performance penalty for data-intensive workloads. Adding data-awareness to batch schedulers allows a careful coordination of data and CPU allocation thereby reducing the cost of remote execution. We offer here new techniques by which batch schedulers can become data-driven. Such systems can use our analytical predictive models to select one of the four data-driven scheduling policies that we have created. Through simulation, we demonstrate the accuracy of our predictive models and show how they can reduce time to completion for some workloads by as much as 80%.

  17. Batch compositions for cordierite ceramics

    Science.gov (United States)

    Hickman, David L.

    1994-07-26

    Ceramic products consisting principally of cordierite and a method for making them are provided, the method employing batches comprising a mineral component and a chemical component, the mineral component comprising clay and talc and the chemical component consisting essentially of a combination of the powdered oxides, hydroxides, or hydrous oxides of magnesium, aluminum and silicon. Ceramics made by extrusion and firing of the batches can exhibit low porosity, high strength and low thermal expansion coefficients.

  18. RSA public key cryptography and security analysis%公钥密码RSA体制及安全性分析

    Institute of Scientific and Technical Information of China (English)

    王红珍

    2012-01-01

    The RSA algorithm is a public key cryptography algorithm. The RSA based on count the theory of unsymmetrical key cryptography. The security of the RSA problem depends on the big integral factoring. The RSA experienced various attack, it can not be offend to break completely up to now.%RSA算法是一种公钥密码算法.RSA是一个基于数论的非对称密码体制,RSA的安全性是依赖于大整数素因子分解的困难性问题.其经历了各种攻击,至今未能被完全攻破.

  19. New Attacks on RSA with Modulus N = p2q Using Continued Fractions

    Science.gov (United States)

    Asbullah, M. A.; Ariffin, M. R. K.

    2015-06-01

    In this paper, we propose two new attacks on RSA with modulus N = p2q using continued fractions. Our first attack is based on the RSA key equation ed - ϕ(N)k = 1 where ϕ(N) = p(p - 1)(q - 1). Assuming that and , we show that can be recovered among the convergents of the continued fraction expansion of . Our second attack is based on the equation eX - (N - (ap2 + bq2)) Y = Z where a,b are positive integers satisfying gcd(a,b) = 1, |ap2 - bq2| < N1/2 and ap2 + bq2 = N2/3+α with 0 < α < 1/3. Given the conditions , we show that one can factor N = p2q in polynomial time.

  20. Modified Trail division for Implementation of RSA Algorithm with Large Integers

    Directory of Open Access Journals (Sweden)

    Satyendra Nath Mandal

    2010-01-01

    Full Text Available The RSA cryptosystem, invented by Ron Rivest, Adi Shamir and Len Adleman was first published in the August 1978 issue of ACM[4 ]. The cryptosystem is most commonly used for providing priva cy and ensuring authenticity of digital data. The security level of this algorithm depends on chooing two large prime numbers. But, to handle large prime in personal computer is huge time consuming. Further, each and every compiler has a maximum limit to integer handling capability. In this paper, an approach has been made to modify trial division technique for implementation of RSA algorithm for large numbers beyond the range of a compiler that has been used to implement it. The time complexity of this modified trial division method has been calculated using personal computer, at the end for large integer.

  1. RSA calibration accuracy of a fluoroscopy-based system using nonorthogonal images for measuring functional kinematics

    International Nuclear Information System (INIS)

    When performing radiostereometric analysis (RSA) in a clinical setting it may be desirable to orient the two imaging devices nonorthogonally to obtain the best views of an anatomical structure. In this study, a calibration frame was constructed that allowed the relative angles of fiducial and control planes to be adjusted. Precision and accuracy were quantified across multiple trials and orientations. The 90 deg. frame was always of equivalent or greater accuracy than a calibration frame with the fiducial and control planes aligned parallel to the image intensifiers. This study also showed that RSA may be performed with imaging devices at relative angles other than 90 deg. without compromising accuracy. This allows researchers greater freedom in positioning equipment.

  2. RSA calibration accuracy of a fluoroscopy-based system using nonorthogonal images for measuring functional kinematics

    Energy Technology Data Exchange (ETDEWEB)

    Kedgley, Angela E.; Jenkyn, Thomas R. [Department of Mechanical and Materials Engineering, Faculty of Engineering, University of Western Ontario, London, Ontario N6A 5B9 (Canada); Wolf Orthopaedic Biomechanics Laboratory, Fowler Kennedy Sport Medicine Clinic, London, Ontario N6A 5B9 (Canada); Department of Mechanical and Materials Engineering, Faculty of Engineering, University of Western Ontario, London, Ontario N6A 5B9 (Canada) and School of Kinesiology, Faculty of Health Sciences, University of Western Ontario, London, Ontario N6A 5B9 (Canada)

    2009-07-15

    When performing radiostereometric analysis (RSA) in a clinical setting it may be desirable to orient the two imaging devices nonorthogonally to obtain the best views of an anatomical structure. In this study, a calibration frame was constructed that allowed the relative angles of fiducial and control planes to be adjusted. Precision and accuracy were quantified across multiple trials and orientations. The 90 deg. frame was always of equivalent or greater accuracy than a calibration frame with the fiducial and control planes aligned parallel to the image intensifiers. This study also showed that RSA may be performed with imaging devices at relative angles other than 90 deg. without compromising accuracy. This allows researchers greater freedom in positioning equipment.

  3. BatchJobs and BatchExperiments: Abstraction Mechanisms for Using R in Batch Environments

    Directory of Open Access Journals (Sweden)

    Bernd Bischl

    2015-03-01

    Full Text Available Empirical analysis of statistical algorithms often demands time-consuming experiments. We present two R packages which greatly simplify working in batch computing environments. The package BatchJobs implements the basic objects and procedures to control any batch cluster from within R. It is structured around cluster versions of the well-known higher order functions Map, Reduce and Filter from functional programming. Computations are performed asynchronously and all job states are persistently stored in a database, which can be queried at any point in time. The second package, BatchExperiments, is tailored for the still very general scenario of analyzing arbitrary algorithms on problem instances. It extends package BatchJobs by letting the user define an array of jobs of the kind apply algorithm A to problem instance P and store results. It is possible to associate statistical designs with parameters of problems and algorithms and therefore to systematically study their influence on the results. The packages main features are: (a Convenient usage: All relevant batch system operations are either handled internally or mapped to simple R functions. (b Portability: Both packages use a clear and well-defined interface to the batch system which makes them applicable in most high-performance computing environments. (c Reproducibility: Every computational part has an associated seed to ensure reproducibility even when the underlying batch system changes. (d Abstraction and good software design: The code layers for algorithms, experiment definitions and execution are cleanly separated and enable the writing of readable and maintainable code.

  4. Improved RSA cryptosystem based on the study of number theory and public key cryptosystems

    OpenAIRE

    Israt Jahan; Mohammad Asif; Liton Jude Rozario

    2015-01-01

    Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In asymmetric key cryptography, also called Public Key cryptography, two different keys (which form a key pair) are used. One key is used for encryption and only t...

  5. Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL

    OpenAIRE

    Arnaud, Cyril; Fouque, Pierre-Alain

    2013-01-01

    In this paper, we present a timing attack against the RSA-CRT algorithm used in the current version 1.1.4 of PolarSSL, an open-source cryptographic library for embedded systems. This implementation uses a classical countermeasure to avoid two previous attacks of Schindler and another one due to Boneh and Brumley. However, a careful analysis reveals a bias in the implementation of Montgomery multiplication. We theoretically analyse the distribution of output values for Montgomery multiplicatio...

  6. Precision measurements of the RSA method using a phantom model of hip prosthesis.

    Science.gov (United States)

    Mäkinen, Tatu J; Koort, Jyri K; Mattila, Kimmo T; Aro, Hannu T

    2004-04-01

    Radiostereometric analysis (RSA) has become one of the recommended techniques for pre-market evaluation of new joint implant designs. In this study we evaluated the effect of repositioning of X-ray tubes and phantom model on the precision of the RSA method. In precision measurements, we utilized mean error of rigid body fitting (ME) values as an internal control for examinations. ME value characterizes relative motion among the markers within each rigid body and is conventionally used to detect loosening of a bone marker. Three experiments, each consisting of 10 double examinations, were performed. In the first experiment, the X-ray tubes and the phantom model were not repositioned between one double examination. In experiments two and three, the X-ray tubes were repositioned between one double examination. In addition, the position of the phantom model was changed in experiment three. Results showed that significant differences could be found in 2 of 12 comparisons when evaluating the translation and rotation of the prosthetic components. Repositioning procedures increased ME values mimicking deformation of rigid body segments. Thus, ME value seemed to be a more sensitive parameter than migration values in this study design. These results confirmed the importance of standardized radiographic technique and accurate patient positioning for RSA measurements. Standardization and calibration procedures should be performed with phantom models in order to avoid unnecessary radiation dose of the patients. The present model gives the means to establish and to follow the intra-laboratory precision of the RSA method. The model is easily applicable in any research unit and allows the comparison of the precision values in different laboratories of multi-center trials. PMID:14996560

  7. RSA Cryptography Algorithm: An Impressive Tool in Decreasing Intrusion Detection System Vulnerabilities in Network Security

    OpenAIRE

    S.H.Mortazavi; Avadhani, Prof. P. S.

    2013-01-01

    This paper is discussed the security of computer networks is a concern for businesses and individuals who are aware of its advantages due to its flexibility. With the increase security of IDS for companies and homes, where information property are shared continually, security is of the nature.. Cryptography is seen as a major instrumentation in the line of defense of network security. This paper discusses the various RSA cryptography algorithm used in network security especially IDS and how e...

  8. Introducing random safety audits (RSA) in a neonatal intensive care unit (NICU).

    LENUS (Irish Health Repository)

    Szymanska, M

    2012-01-31

    Random safety audits (RSA) have been shown to be effective in improving standards of clinical practice. 19 data collection audits were performed relating to hygiene, safe prescribing, oxygen pulse oximetry monitoring and documentation in keeping with the requirements of the new Medical Practitioners Act (MPA) 2007. Hygiene audits (range from 20\\/25 to 21\\/21 80%-100%) and safe prescribing audits (range from 23\\/25 to 25\\/25 86%-100%) achieved n=25 100% compliance with unit guidelines over a 3 month period. Compliance with oxygen pulse oximetry monitoring guideline limits improved from 4\\/27 (15%) to 9\\/16 (56%). Compliance with requirement and use of Physician IMC registration number in documentation was only 10\\/18 (56%). RSA\\'s led to improvements in hygiene and prescribing. Compliance with oxygen monitoring guideline limits highlighted the need for greater education. Awareness of legal requirements relating to documentation improved but this has not translated into a change in practice. RSA\\'s can facilitate real time quality improvement in daily clinical practice.

  9. Efficient and Fair Exchange of Digital Signatures Based on RSA Algorithm

    Directory of Open Access Journals (Sweden)

    V Swapna kumari

    2012-03-01

    Full Text Available A fair contract-signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures to an agreed contract over the Internet in a fair way, so that either each of them obtains the other’s signature, or neither party does. Based on the RSA signature scheme, a new digital contract-signing protocol is proposed in this paper. Like the existing RSA-based solutions for the same problem, our protocol is not only fair, but also optimistic, since the trusted third party is involved only in the situations where one party is cheating or the communication channel is interrupted. Furthermore, the proposed protocol satisfies a new property— abuse-freeness. That is, if the protocol is executed unsuccessfully, none of the two parties can show the validity of intermediate results to others. Technical details are provided to analyze the security and performance of the proposed protocol. In summary, we present the first abuse-free fair contract signing protocol based on the RSA signature, and show that it is both secure and efficient

  10. Aspects of ultra-high-precision diamond machining of RSA 443 optical aluminium

    Science.gov (United States)

    Mkoko, Z.; Abou-El-Hossein, K.

    2015-08-01

    Optical aluminium alloys such as 6061-T6 are traditionally used in ultra-high precision manufacturing for making optical mirrors for aerospace and other applications. However, the optics industry has recently witnessed the development of more advanced optical aluminium grades that are capable of addressing some of the issues encountered when turning with single-point natural monocrystalline diamond cutters. The advent of rapidly solidified aluminium (RSA) grades has generally opened up new possibilities for ultra-high precision manufacturing of optical components. In this study, experiments were conducted with single-point diamond cutters on rapidly solidified aluminium RSA 443 material. The objective of this study is to observe the effects of depth of cut and feed rate at a fixed rotational speed on the tool wear rate and resulting surface roughness of diamond turned specimens. This is done to gain further understanding of the rate of wear on the diamond cutters versus the surface texture generated on the RSA 443 material. The diamond machining experiments yielded machined surfaces which are less reflective but with consistent surface roughness values. Cutting tools were observed for wear through scanning microscopy; relatively low wear pattern was evident on the diamond tool edge. The highest tool wear were obtained at higher depth of cut and increased feed rate.

  11. RSA加密算法中MPI的应用%Application of MPI in RSA encryption algorithm

    Institute of Scientific and Technical Information of China (English)

    陆玉阳

    2015-01-01

    RSA加密算法在进行复杂判断和大数运算时,计算时间往往花费较多,对计算机的运行速度、存储容量等方面具有较高的要求.MPI能够提供较快的数值计算和数据处理能力,提供高性能并行计算.该文通过在RSA加密算法中MPI的应用,通过实践证明MPI并行计算可以改进RSA算法,提高加密速度、减少容量需求等.%RSA encryption algorithm in the complex judgment and operation of large Nbers, calculating the time tend to spend more, the computer run faster, have higher requirements in terms of storage capacity. MPI provides fast Nerical calculation and data processing capability, providing high performance parallel computing. Based on RSA encryption algorithm in application of MPI, MPI parallel computing can improve the RSA algorithm proved by practice, increase speed, reduce capacity requirements, and so on.

  12. CERTIFICATE AUTHORITY SCHEMES USING ELLIPTIC CURVE CRYPTOGRAPHY, RSA AND THEIR VARIANTS-SIMULATION USING NS2

    Directory of Open Access Journals (Sweden)

    S. Shivkumar

    2014-01-01

    Full Text Available A PKI (public key infrastructure enables users of a basically unsecure public network to securely and privately exchange data through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. The two major digital signature algorithms are Elliptic Curve Digital Signature Algorithm (ECDSA which is the elliptic curve analogue of the Digital Signature Algorithm (DSA and RSA algorithm. The two algorithms are used for generating the certificates exchanged between computer systems. Elliptic curve based systems can give better security compared to RSA with less key size. This study compares the performance of ECC based signature schemes and RSA schemes using NS2 simulation. It is observed that ECC based certificate authority schemes gives better speed and security. Elliptic curve based schemes are the best for time and resource constrained wireless applications.

  13. Does respiratory sinus arrhythmia (RSA) predict anxiety reduction during cognitive behavioral therapy (CBT) for social anxiety disorder (SAD)?

    Science.gov (United States)

    Mathewson, Karen J; Schmidt, Louis A; Miskovic, Vladimir; Santesso, Diane L; Duku, Eric; McCabe, Randi E; Antony, Martin M; Moscovitch, David A

    2013-05-01

    Modifying dysfunctional emotion regulation is an important goal in psychological treatments for social anxiety disorder (SAD). Antecedent-focused strategies learned in cognitive behavioral therapy (CBT), such as cognitive reappraisal, have proven more effective in reducing social anxiety than response-focused strategies, such as expressive suppression. Still, not all patients with SAD respond well to CBT. Medications and physiological factors may also influence the clinical response. The purpose of the present study was to examine the role that these factors play in determining treatment response following CBT for SAD. Using multilevel modeling, we examined associations across four separate laboratory visits between change in self-reported anxiety and indices of reappraisal, suppression, medication status, and resting respiratory sinus arrhythmia (RSA), a proxy measure of self-regulatory capacity, in 23 socially anxious adults during a 12-week program of CBT. Most participants were ultimately classified as responders to CBT (n=15), but in some, anxiety levels remained unchanged (n=8). Medication use explained substantial variance related to individual differences in anxiety among participants. When modeled separately, reappraisal, suppression, and RSA each accounted for significant variance related to anxiety. However, the best-fitting model included reappraisal and RSA. Moreover, RSA reactivity (change in RSA levels over time) was more important for predicting anxiety reduction than were baseline levels of RSA. These findings suggest that reappraisal and parasympathetic responsiveness may be important in reducing anxiety in adults with SAD who respond well to CBT. PMID:23545482

  14. 一种高效的彩色图像加密和解密算法%Efficient Encryption and Decryption Algorithm for Color Image

    Institute of Scientific and Technical Information of China (English)

    彭静玉

    2013-01-01

    分析了基于Arnold变换的加密方案在加密效果及加密效率方面的不足。提出了一种新的彩色图像加密及解密算法。加密过程将像素的物理位置置乱并映射到不同的色彩空间;解密过程提出了一种针对彩色图像的逆变换算法,使解密的时间仅依赖加密的密钥而不依赖变换周期。仿真分析比较了该算法在加密效果及加密效率方面的优势。实验数据表明,该加密算法的加密效果理想,且加密效率较高,是一种简单、可行的彩色图像加密方法。%The deficiencies of encryption scheme based on Arnold transformation is analyzed, and a new encryption/decryption algorithm for color image proposed. The physical locations of pixels are scrambled and mapped to different color spaces in the encryption process. An inverse conversion method for color im-age is suggested in decryption process, thus making the decryption time dependent only on the encryption key instead of on the conversion cycle. Simulation and comparison of the advantages of proposed algorithm in encryption effect and encryption efficiency indicates that the proposed algorithm could improve encryp-tion effect while raising the decryption efficiency, and thus a simple and feasible color image encryption method.

  15. Accuracy and Precision of Three-Dimensional Low Dose CT Compared to Standard RSA in Acetabular Cups: An Experimental Study

    Science.gov (United States)

    Olivecrona, Henrik; Maguire, Gerald Q.; Noz, Marilyn E.; Zeleznik, Michael P.

    2016-01-01

    Background and Purpose. The gold standard for detection of implant wear and migration is currently radiostereometry (RSA). The purpose of this study is to compare a three-dimensional computed tomography technique (3D CT) to standard RSA as an alternative technique for measuring migration of acetabular cups in total hip arthroplasty. Materials and Methods. With tantalum beads, we marked one cemented and one uncemented cup and mounted these on a similarly marked pelvic model. A comparison was made between 3D CT and standard RSA for measuring migration. Twelve repeated stereoradiographs and CT scans with double examinations in each position and gradual migration of the implants were made. Precision and accuracy of the 3D CT were calculated. Results. The accuracy of the 3D CT ranged between 0.07 and 0.32 mm for translations and 0.21 and 0.82° for rotation. The precision ranged between 0.01 and 0.09 mm for translations and 0.06 and 0.29° for rotations, respectively. For standard RSA, the precision ranged between 0.04 and 0.09 mm for translations and 0.08 and 0.32° for rotations, respectively. There was no significant difference in precision between 3D CT and standard RSA. The effective radiation dose of the 3D CT method, comparable to RSA, was estimated to be 0.33 mSv. Interpretation. Low dose 3D CT is a comparable method to standard RSA in an experimental setting. PMID:27478832

  16. Physicochemical Characteristics of Transferon™ Batches

    Directory of Open Access Journals (Sweden)

    Emilio Medina-Rivero

    2016-01-01

    Full Text Available Transferon, a biotherapeutic agent that has been used for the past 2 decades for diseases with an inflammatory component, has been approved by regulatory authorities in Mexico (COFEPRIS for the treatment of patients with herpes infection. The active pharmaceutical ingredient (API of Transferon is based on polydispersion of peptides that have been extracted from lysed human leukocytes by a dialysis process and a subsequent ultrafiltration step to select molecules below 10 kDa. To physicochemically characterize the drug product, we developed chromatographic methods and an SDS-PAGE approach to analyze the composition and the overall variability of Transferon. Reversed-phase chromatographic profiles of peptide populations demonstrated batch-to-batch consistency from 10 representative batches that harbored 4 primary peaks with a relative standard deviation (RSD of less than 7%. Aminogram profiles exhibited 17 proteinogenic amino acids and showed that glycine was the most abundant amino acid, with a relative content of approximately 18%. Further, based on their electrophoretic migration, the peptide populations exhibited a molecular mass of about 10 kDa. Finally, we determined the Transferon fingerprint using a mass spectrometry tool. Because each batch was produced from independent pooled buffy coat samples from healthy donors, supplied by a local blood bank, our results support the consistency of the production of Transferon and reveal its peptide identity with regard to its physicochemical attributes.

  17. NDA BATCH 2002-02

    Energy Technology Data Exchange (ETDEWEB)

    Lawrence Livermore National Laboratory

    2009-12-09

    QC sample results (daily background checks, 20-gram and 100-gram SGS drum checks) were within acceptable criteria established by WIPP's Quality Assurance Objectives for TRU Waste Characterization. Replicate runs were performed on 5 drums with IDs LL85101099TRU, LL85801147TRU, LL85801109TRU, LL85300999TRU and LL85500979TRU. All replicate measurement results are identical at the 95% confidence level as established by WIPP criteria. Note that the batch covered 5 weeks of SGS measurements from 23-Jan-2002 through 22-Feb-2002. Data packet for SGS Batch 2002-02 generated using gamma spectroscopy with the Pu Facility SGS unit is technically reasonable. All QC samples are in compliance with established control limits. The batch data packet has been reviewed for correctness, completeness, consistency and compliance with WIPP's Quality Assurance Objectives and determined to be acceptable. An Expert Review was performed on the data packet between 28-Feb-02 and 09-Jul-02 to check for potential U-235, Np-237 and Am-241 interferences and address drum cases where specific scan segments showed Se gamma ray transmissions for the 136-keV gamma to be below 0.1 %. Two drums in the batch showed Pu-238 at a relative mass ratio more than 2% of all the Pu isotopes.

  18. Simulated Batch Production of Penicillin

    Science.gov (United States)

    Whitaker, A.; Walker, J. D.

    1973-01-01

    Describes a program in applied biology in which the simulation of the production of penicillin in a batch fermentor is used as a teaching technique to give students experience before handling a genuine industrial fermentation process. Details are given for the calculation of minimum production cost. (JR)

  19. Physicochemical Characteristics of Transferon™ Batches

    Science.gov (United States)

    Pérez-Sánchez, Gilberto; Favari, Liliana; Estrada-Parra, Sergio

    2016-01-01

    Transferon, a biotherapeutic agent that has been used for the past 2 decades for diseases with an inflammatory component, has been approved by regulatory authorities in Mexico (COFEPRIS) for the treatment of patients with herpes infection. The active pharmaceutical ingredient (API) of Transferon is based on polydispersion of peptides that have been extracted from lysed human leukocytes by a dialysis process and a subsequent ultrafiltration step to select molecules below 10 kDa. To physicochemically characterize the drug product, we developed chromatographic methods and an SDS-PAGE approach to analyze the composition and the overall variability of Transferon. Reversed-phase chromatographic profiles of peptide populations demonstrated batch-to-batch consistency from 10 representative batches that harbored 4 primary peaks with a relative standard deviation (RSD) of less than 7%. Aminogram profiles exhibited 17 proteinogenic amino acids and showed that glycine was the most abundant amino acid, with a relative content of approximately 18%. Further, based on their electrophoretic migration, the peptide populations exhibited a molecular mass of about 10 kDa. Finally, we determined the Transferon fingerprint using a mass spectrometry tool. Because each batch was produced from independent pooled buffy coat samples from healthy donors, supplied by a local blood bank, our results support the consistency of the production of Transferon and reveal its peptide identity with regard to its physicochemical attributes. PMID:27525277

  20. Бінарні операції та елементи алгоритму RSA при шифруванні-дешифруванні кольорових зображень

    OpenAIRE

    Ковальчук, А.; Пелешко, Д.; Борзов, Ю.

    2013-01-01

    Описано поєднання елементів алгоритму RSA і бінарних операцій для сумісного використання при шифруванні–дешифруванні зображень. Шифрування–дешифрування проводиться без додаткового зашумлення. Described combination of elements of the RSA algorithm and binary operations for the joint use for encryption–interpretation of images. Encryption–decryption is performed without additional noise....

  1. Кубічні і лінійні фрактали з елементами алгоритму RSA в шифруванні і дешифруванні зображень

    OpenAIRE

    Ковальчук, А.; Цмоць, І.; Ступень, М.

    2014-01-01

    Запропоновано застосування кубічних фрактальних перетворень до шифрування і дешифрування зображень у градаціях сірого кольору з використанням елементів алгоритму RSA. Proposed application of cubic fractal changes to the encryption and decryption, grayscale color using elements of the RSA algorithm.

  2. NGBAuth - Next Generation Batch Authentication for long running batch jobs.

    CERN Document Server

    Juto, Zakarias

    2015-01-01

    This document describes the prototyping of a new solution for the CERN batch authentication of long running jobs. While the job submission requires valid user credentials, these have to be renewed due to long queuing and execution times. Described within is a new system which will guarantee a similar level of security as the old LSFAuth while simplifying the implementation and the overall architecture. The new system is being built on solid, streamlined and tested components (notably OpenSSL) and a priority has been to make it more generic in order to facilitate the evolution of the current system such as for the expected migration from LSF to Condor as backend batch system.

  3. 基于Common Lisp的RSA加密实现%RSA Encryption Based on Common Lisp Implementation

    Institute of Scientific and Technical Information of China (English)

    解晨

    2013-01-01

    著名的非对称密钥加密系统——RSA公钥加密系统,是当今流行的加密系统,其简单的实现和高效的保密性使RSA加密算法成为当下最有影响力的公钥加密算法,并且其堪称完美的理论基础使得RSA加密算法可以抵抗目前所知的所有密码攻击.该文探究了RSA加密算法的原理,并使用一门小众语言Common Lisp对RSA加密进行了实现.%Asymmetric key encryption system -- the famous RSA public key encryption system, the encryption system is popu?lar, its simple implementation and high security RSA encryption algorithm to become the most influential contemporary public-key encryption algorithm, and it is theoretical basis of perfect makes the RSA encryption algorithm can resist all known attacks. This paper discusses the principle of RSA encryption algorithm, and realizes the encryption of RSA using a minority language Common Lisp.

  4. FPGA IMPLEMENTATION OF RSA PUBLIC-KEY CRYPTOGRAPHIC COPROCESSOR BASED ON SYSTOLIC LINEAR ARRAY ARCHITECTURE

    Institute of Scientific and Technical Information of China (English)

    Wen Nuan; Dai Zibin; Zhang Yongfu

    2006-01-01

    In order to make the typical Montgomery's algorithm suitable for implementation on FPGA, a modified version is proposed and then a high-performance systolic linear array architecture is designed for RSA cryptosystem on the basis of the optimized algorithm. The proposed systolic array architecture has distinctive features, i.e. not only the computation speed is significantly fast but also the hardware overhead is drastically decreased. As a major practical result, the paper shows that it is possible to implement public-key cryptosystem at secure bit lengths on a single commercially available FPGA.

  5. NDA Batch 2002-13

    Energy Technology Data Exchange (ETDEWEB)

    Hollister, R

    2009-09-17

    QC sample results (daily background check drum and 100-gram SGS check drum) were within acceptance criteria established by WIPP's Quality Assurance Objectives for TRU Waste Characterization. Replicate runs were performed on drum LL85501243TRU. Replicate measurement results are identical at the 95% confidence level as established by WIPP criteria. HWM NCAR No. 02-1000168 issued on 17-Oct-2002 regarding a partially dislodged Cd sheet filter on the HPGe coaxial detector. This physical geometry occurred on 01-Oct-2002 and was not corrected until 10-Oct-2002, during which period is inclusive of the present batch run of drums. Per discussions among the Independent Technical Reviewer, Expert Reviewer and the Technical QA Supervisor, as well as in consultation with John Fleissner, Technical Point of Contact from Canberra, the analytical results are technically reliable. All QC standard runs during this period were in control. Data packet for SGS Batch 2002-13 generated using passive gamma-ray spectroscopy with the Pu Facility SGS unit is technically reasonable. All QC samples are in compliance with establiShed control limits. The batch data packet has been reviewed for correctness, completeness, consistency and compliance with WIPP's Quality Assurance Objectives and determined to be acceptable.

  6. Optimal online-list batch scheduling

    OpenAIRE

    Paulus, JJ Jacob Jan; Ye, Deshi; Zhang, G.

    2008-01-01

    We consider the online-list batch scheduling problem. Jobs arrive one by one and have to be assigned upon arrival to a scheduled batch such that the makespan is minimized. Each batch can accommodate up to B jobs. We give a complete classification of the tractability of this online problem.

  7. 间歇结晶过程的分批优化%Batch-to-batch Optimization of Batch Crystallization Processes

    Institute of Scientific and Technical Information of China (English)

    Woranee Paengjuntuek; Paisan Kittisupakorn; Amornchai Arpornwichanop

    2008-01-01

    It is the fact that several process parameters are either unknown or uncertain. Therefore, an optimal control profile calculated with developed process models with respect to such process parameters may not give an optimal performance when implemented to real processes. This study proposes a batch-to-batch optimization strat-egy for the estimation of uncertain kinetic parameters in a batch crystallization process of potassium sulfate produc-tion. The knowledge of a crystal size distribution of the product at the end of batch operation is used in the proposedmethodology. The updated kinetic parameters are applied for determining an optimal operating temperature policy for the next batch run.

  8. Revisión sobre la capacidad de repetir sprint o RSA en jugadores de fútbol

    OpenAIRE

    Saenz Tomás, Juan

    2014-01-01

    En los últimos años, la capacidad para repetir esprines (RSA), se ha considerado como un factor limitante del rendimiento en el contexto deportivo del fútbol. En este sentido, esta revisión analiza los aspectos importantes que condicionan el rendimiento de la RSA, tales como los aspectos fisiológicos, los diferentes métodos de entrenamiento que se utilizan así como los test más utilizados para su evaluación. Por ello, el objetivo principal de esta revisión es dar a conocer los métodos y recom...

  9. Precision of radiostereometric analysis (RSA) of acetabular cup stability and polyethylene wear improved by adding tantalum beads to the liner

    DEFF Research Database (Denmark)

    Nebergall, Audrey K; Rader, Kevin; Palm, Henrik;

    2015-01-01

    Background and purpose - In traditional radiostereometric analysis (RSA), 1 segment defines both the acetabular shell and the polyethylene liner. However, inserting beads into the polyethylene liner permits employment of the shell and liner as 2 separate segments, enabling distinct analysis of the...... precision of 3 measurement methods in determining femoral head penetration and shell migration. Patients and methods - The UmRSA program was used to analyze the double examinations of 51 hips to determine if there was a difference in using the shell-only segment, the liner-only segment, or the shell + liner...

  10. Three Year RSA Evaluation of Vitamin E Diffused Highly Cross-linked Polyethylene Liners and Cup Stability

    DEFF Research Database (Denmark)

    Sillesen, Nanna H; Greene, Meridith E; Nebergall, Audrey K;

    2015-01-01

    Vitamin E diffusion into highly cross-linked polyethylene (E-XLPE) is a method for enhancing oxidative stability of acetabular liners. The purpose of this study was to evaluate in vivo penetration of E-XLPE using radiostereometric analysis (RSA). Eighty-four hips were recruited into a prospective...... 10-year RSA. This is the first evaluation of the multicenter cohort after 3-years. All patients received E-XLPE liners (E1, Biomet) and porous-titanium coated cups (Regenerex, Biomet). There was no difference (P=0.450) in median femoral head penetration into the E-XLPE liners at 3-years comparing...

  11. Rancangan Model Algoritma Pohlig–Hellman Multiple-Key Berdasarkan Algoritma R.S.A. Multiple-Key

    OpenAIRE

    Simarmata, Allwin M.

    2012-01-01

    This study uses Pohlig-Hellman algorithm and the RSA algorithm, which is part of an asymmetric algorithm using the generation of prime numbers as keys. RSA algorithm is better than the Pohlig-Hellman algorithm for use of two prime numbers as keys while the Pohlig-Hellman algorithm uses only one key.The design of Pohlig-Hellman algorithm model of multiple-key can be a solution for the development of Pohlig-Hellman algorithm for adding a key that can enhance the security of informationon the al...

  12. Influence of batch or fed-batch growth on Staphylococcus epidermidis biofilm formation

    OpenAIRE

    Cerca, Nuno; Pier, Gerald B.; Vilanova, Manuel; Oliveira, Rosário; Azeredo, Joana

    2004-01-01

    Aims: To make a quantitative evaluation of the differences in biofilm formation by Staphylococcus epidermidis using batch and fed-batch growth systems and to correlate this with production of the major biofilm polysaccharide, poly-N-acetyl glucosamine (PNAG). Methods and Results: Dry weight measurements of biofilms formed in batch and fed-batch conditions were compared with haemagglutination titres, which measure the amount of PNAG produced. Strains grown in batch systems devel...

  13. 抗侧沟道泄漏信息攻击的安全RSA-CRT算法研究%Improved RSA-CRT algorithm with prevented side channel information attacks

    Institute of Scientific and Technical Information of China (English)

    蒋惠萍; 毛志刚

    2004-01-01

    在信息安全领域中侧沟道泄漏信息(SCI)攻击可以利用加密算法的特点和硬件模块的泄漏信息分析出加密硬件中的关键信息.其中故障分析(Bellcore-Lenstra)和差分功耗分析(differential power analysis,DPA)是该类攻击中的主要方法.由于该类攻击的廉价高效性,在设计采用中国余数定理的安全的并行RSA加密协处理器(RSA-CRT)时必须认真考虑SCI攻击的解决方法.为了获得性价比的最大化,提出把掩码技术和消除中间变量技术引入RSA-CRT算法中来防止SCI攻击,该方案只需增加30%左右的时间消耗,就可以实现安全的RSA-CRT算法,同时简要说明了改进的RSA-CRT算法能够有效的防止side channel information攻击.

  14. Combinatorial Batch Codes with Redundancy

    OpenAIRE

    Jung, Jiyoon; Mummert, Carl; Niese, Elizabeth; Schroeder, Michael w.

    2015-01-01

    A combinatorial batch code with redundancy $r$ and parameters $(n,k,m,t)$ can be represented as a system $C$ of $m$ (not necessarily distinct) subsets of an underlying $n$-element set $F$, so that each $k$-subset of $F$ can be covered by every $(m-r)$-subset $K$ of $C$ while taking no more than $t$ elements of $F$ with each set in $K$. The sum of the cardinalities of the sets in $C$ is the weight of the code. We focus on the case $t =1$, and determine the minimal weight for several ranges of ...

  15. Association between estrogen receptor β gene Rsa1 polymorphism and depressive disorder in peri-menopausal and menopausal women

    Institute of Scientific and Technical Information of China (English)

    YU Xue-wen; REN Yong-hui; LI Xue-cheng; GAO Cheng-ge; LI Fen; HAN Zhen; LI Xu

    2005-01-01

    Objective: To investigate estrogen receptor β (ERβ) gene Rsa1 polymorphism and concentration of estrogen, FSH and LH in serum in peri-menopausal and menopausal women with depressive disorder. Methods: Seventy-four peri-menopausal and menopausal women with depressive disorder met ICD-10 and CCMD-3 assessment criteria for depressive disorder were recruited. ERβ gene Rsa1 polymorphism was analyzed with PCR-RFLP. Serum levels of estrogen, FSH and LH were measured by magnetism-ELISA. Results: The respective frequency of ERβ gene Rsa1 polymorphism was no significant difference between women with depressive disorder and the healthy women (χ2=1.106,P>0.05). The serum level of estrogen was lower in women with depressive disorder than in the healthy women (P<0.05). No difference was found for FSH and LH between two groups. Conclusion: ERβ gene Rsa1 polymorphism may be not associated with depressive disorder in the peri-menopausal and menopausal women. The serum level of estrogen is associated with depressive disorder in the peri-menopausal and menopausal women.

  16. Regulatory mechanism of the three-component system HptRSA in glucose-6-phosphate uptake in Staphylococcus aureus.

    Science.gov (United States)

    Yang, Yifan; Sun, Haipeng; Liu, Xiaoyu; Wang, Mingxing; Xue, Ting; Sun, Baolin

    2016-06-01

    Glucose-6-phosphate (G6P) is a common alternative carbon source for various bacteria, and its uptake usually relies on the hexose phosphate antiporter UhpT. In the human pathogenic bacterium Staphylococcus aureus, the ability to utilize different nutrients, particularly alternative carbon source uptake in glucose-limiting conditions, is essential for its fitness in the host environment during the infectious process. It has been reported that G6P uptake in S. aureus is regulated by the three-component system HptRSA. When G6P is provided as the only carbon source, HptRSA could sense extracellular G6P and activate uhpT expression to facilitate G6P utilization. However, the regulatory mechanism of HptRSA is still unclear. In this study, we further investigated the HptRSA system in S. aureus. First, we confirmed that HptRSA is necessary for the normal growth of this pathogen in chemically defined medium with G6P supplementation, and we discovered that HptRSA could exclusively sense extracellular G6P compared to the other organophosphates we tested. Next, using isothermal titration calorimetry, we found that HptA could bind to G6P, suggesting that it may be the G6P sensor. After that experiment, using an electrophoresis mobility shift assay, we verified that the response regulator HptR could directly bind to the uhpT promoter and identified a putative binding site from -67 to -96-bp. Subsequently, we created different point mutations in the putative binding site and revealed that the entire 30-bp sequence is essential for HptR regulation. In summary, we unveiled the regulatory mechanism of the HptRSA system in S. aureus, HptA most likely functions as the G6P sensor, and HptR could implement its regulatory function by directly binding to a conserved, approximately 30-bp sequence in the uhpT promoter. PMID:26711125

  17. Fair Exchange of Digital Signatures using RSA-based CEMBS and Offline STTP

    CERN Document Server

    Hussein, Jamal A

    2009-01-01

    One of the essential security services needed to safeguard online transactions is fair exchange. In fair exchange protocols two parties can exchange their signatures in a fair manner, so that either each party gain the other's signature or no one obtain anything useful. This paper examines security solutions for achieving fair exchange. It proposes new security protocols based on the "Certified Encrypted Message Being Signature" (CEMBS) by using RSA signature scheme. This protocol relies on the help of an "off-line Semi-Trusted Third Party" (STTP) to achieve fairness. They provide with confidential protection from the STTP for the exchanged items by limiting the role and power of the STTP. Three different protocols have been proposed. In the first protocol, the two main parties exchange their signatures on a common message. In the second protocol, the signatures are exchanged on two different messages. While in the third one, the exchange is between confidential data and signature.

  18. Interdependence relationships between morphometric indicators in the Bârsa Country (Romania

    Directory of Open Access Journals (Sweden)

    GEORGIAN IONUT PURCÃREATÃ

    2015-07-01

    Full Text Available In a geomorphological analysis on a geographical space, the study of the interdependence between the morphometric indicators can offer us new details concerning the characteristics and causal relationships between the considered parameters. The methodology taken from the literature was adapted to the geographical space of Bârsa. The research area includes a pilot area for which the boundaries are defined by inter fluves bordering the large confluence area of the Olt river in the Brașov Depression. The arrangement of the relief gives the research area obvious asymmetric features, which are completed in this study by the mathematical analysis and graphics. The conclu sion derived from the correlated mathematical analysis between the relief energy and the drainage density is that the relief energy is in a closely dependent relationship with the drainage density, the correlation being positively linear and directly prop ortional, fact prooved by the resulted graphical models.

  19. 一种基于 me mo ry 的数据加解密算法%An Encryption and Decryption Algorithm of Data Based on Memory

    Institute of Scientific and Technical Information of China (English)

    张金旻; 谢小东

    2015-01-01

    Most memory researches only focus on improving the performance ,which is to enlarge the capacityand and to increase the speed .However ,aided designs to realize more functions have been rarely achieved in present memory studies .So an algorithm to encrypt and decrypt the address of memory is given out in this paper ,and the encryption and decryption of the data is realized ,which is based on the characteristics of memory ,and the feasibility of this algorithm with simulation is validates .%对于memory的研究,大部分都只是停留在对容量的扩充,速度的提高等性能提升方面,很少涉及对mem‐ory进行辅助设计以实现更多的特殊功能。提出了一种通过对memory地址作用加解密算法,利用memory自身的特性来实现对数据的加解密的功能,并通过实验仿真验证了该方法的可行性。

  20. Batch processing: definition and event log identification

    OpenAIRE

    Martin, Niels,; SWENNEN, Marijke; Depaire, Benoit; Jans, Mieke; CARIS, An; Vanhoof, Koen

    2015-01-01

    A resource typically executes a particular activity on a series of cases. When a resource performs an activity on several cases simultaneously, (quasi-) sequentially or concurrently, this is referred to as batch processing. Given its influence on process performance, batch processing needs to be taken into account when modeling business processes for performance evaluation purposes. This paper suggests event logs as an information source to gain insight in batching behavior. It marks a first ...

  1. Batch process design: an overview from control

    OpenAIRE

    Zuluaga Bedoya, Christian Camilo

    2015-01-01

    Abstract: batch process design: an overview from control In this work, the topic of batch process design is addressed, through an analysis of the phenomenological-based model and using set-theoretic methods to deduce process constraints and parametric effects in state controllability. A review of literature is presented about characterization of batch process from point of view of design problem. Furthermore simultaneous process and control design is also reviewed, considering the main contri...

  2. Застосування алгоритму RSA у шифруванні і дешифруванні елементів локально-скінченного топологічного покриття зображення як компакту

    OpenAIRE

    Ковальчук, А.; Кузнєцов, Є.; Артимич, Ю.

    2010-01-01

    An application of RSA algorithm encryption and decryption of locally finite topological elements cover image that is clearly marked internal contours. Запропоновано застосування алгоритму RSA шифрування і дешифрування елементів локально скінченного топологічного покриття зображення, яке має чітко виділені внутрішні контури.

  3. Plutonium immobilization feed batching system concept report

    International Nuclear Information System (INIS)

    The Plutonium Immobilization Facility will encapsulate plutonium in ceramic pucks and seal the pucks inside welded cans. Remote equipment will place these cans in magazines and the magazines in a Defense Waste Processing Facility (DWPF) canister. The DWPF will fill the canister with high level waste glass for permanent storage. Feed batching is one of the first process steps involved with first stage plutonium immobilization. It will blend plutonium oxide powder before it is combined with other materials to make pucks. This report discusses the Plutonium Immobilization feed batching process preliminary concept, batch splitting concepts, and includes a process block diagram, concept descriptions, a preliminary equipment list, and feed batching development areas

  4. Realization and Discussion of RSA Public-key Cryptosystem Based on Java%基于Java的RSA公钥密码算法的实现与探讨

    Institute of Scientific and Technical Information of China (English)

    曹军委; 李翼

    2011-01-01

    Because of Java language on the network security characteristics and superiority of RSA encryption algorithm,This article mainly introduced the concept of public-key cryptosystem and the principle of RSA encryption algorithm,And realize the RSA public-key%鉴于Java语言在网络上的安全特性和RSA加密算法的优越性,介绍了公钥密码体制的概念和RSA加密算法的原理,并在Java环境下实现RSA公钥密码算法。

  5. 对RSA密码系统旁路攻击的防御%Resistance against side channel attack for RSA cryptosystem

    Institute of Scientific and Technical Information of China (English)

    祝力; 谷大武; 王超

    2008-01-01

    Based on the structure of the side channel attacks (SCAs) to RSA cryptosystem can resist the fault attack andcombine with the randomization method for the message and secret exponent, a new implementation scheme of CRT-based(the Chinese remained theorem) RSA is proposed. The proposed scheme can prevent simple power analysis (SPA), differentialpower analysis (DPA) and time attack, and is compatible with the existing RSA-CRT cryptosystem as well. In addition, animprovement for resisting fault attack is proposed, which can reduce extra computation time.

  6. Бінарні лінійно-квадратичні перетворення з елементами алгоритму RSA і додатковим зашумленням у захисті зображень

    OpenAIRE

    Ковальчук, А.; Ступень, М.

    2015-01-01

    Запропоновано алгоритм шифрування-дешифрування зображень з використанням елементів алгоритму RSA як найбільш криптографічно стійкого до несанкціонованого дешифрування, стосовно зображень зі строго чіткими контурами. Елементи алгоритму RSA пропонується використовувати як коефіцієнти деякого лінійно-квадратичного афінного перетворення. Запропонований алгоритм має вищу криптографічну стійкість порівняно з алгоритмом RSA. Suggested algorithm encryption-decryption images with using elements RSA al...

  7. Supervision of Fed-Batch Fermentations

    DEFF Research Database (Denmark)

    Gregersen, Lars; Jørgensen, Sten Bay

    1999-01-01

    Process faults may be detected on-line using existing measurements based upon modelling that is entirely data driven. A multivariate statistical model is developed and used for fault diagnosis of an industrial fed-batch fermentation process. Data from several (25) batches are used to develop a mo...

  8. Operation of a Batch Stripping Distillation Column

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A stripping batch distillation column is preferred when the amount of the light component in the feed is small and the products are to be recovered at high purity. The operation modes of a batch stripping are believed to be the same as those of a rectifier. However, the control system of a stripper is different. In this paper, we explore three different control methods with Hysys (Hyprotech Ltd. 1997) for a batch stripper. The main difference is the control scheme for reboiler liquid level: (a) controlled by reflux flow; (b) controlled by reboiler heat duty; (c) controlled by bottom product flow. The main characteristics of operating a batch stripper with different control scheme are presented in this paper. Guidelines are provided for the startup of a batch stripper, the effects of somecontrol tuning parameters on the column performance are discussed.

  9. BATCH systémy

    OpenAIRE

    Beránek, Jakub

    2013-01-01

    Bakalářská práce je zaměřena na dávkové systémy. V teoretické části je stručně popsána filozofie dávkových systémů a norma ANSI/ISA 88, která je významným dokumentem v dávkovém řízení. V další části je popsáno několik programů pro řízení dávkových procesů z české i celosvětové produkce. Poslední část obsahuje přípravu, návrh a realizaci laboratorní úlohy pro řízení modelového dávkového procesu s použitím modulu COMES Batch.

  10. Batch Scheduling a Fresh Approach

    Science.gov (United States)

    Cardo, Nicholas P.; Woodrow, Thomas (Technical Monitor)

    1994-01-01

    The Network Queueing System (NQS) was designed to schedule jobs based on limits within queues. As systems obtain more memory, the number of queues increased to take advantage of the added memory resource. The problem now becomes too many queues. Having a large number of queues provides users with the capability to gain an unfair advantage over other users by tailoring their job to fit in an empty queue. Additionally, the large number of queues becomes confusing to the user community. The High Speed Processors group at the Numerical Aerodynamics Simulation (NAS) Facility at NASA Ames Research Center developed a new approach to batch job scheduling. This new method reduces the number of queues required by eliminating the need for queues based on resource limits. The scheduler examines each request for necessary resources before initiating the job. Also additional user limits at the complex level were added to provide a fairness to all users. Additional tools which include user job reordering are under development to work with the new scheduler. This paper discusses the objectives, design and implementation results of this new scheduler

  11. 27 CFR 19.748 - Dump/batch records.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Dump/batch records. 19.748.../batch records. (a) Format of dump/batch records. Proprietor's dump/batch records shall contain, as... ingredients used; (10) Formula number; (11) Quantity of ingredients used in the batch that have...

  12. Batch and Fed-Batch Fermentation System on Ethanol Production from Whey using Kluyveromyces marxianus

    Directory of Open Access Journals (Sweden)

    H Hadiyanto

    2013-10-01

    Full Text Available Nowadays reserve of fossil fuel has gradually depleted. This condition forces many researchers to  find energy alternatives which is renewable and sustainable in the future. Ethanol derived from cheese industrial waste (whey using fermentation process can be a new perspective in order to secure both energy and environment. The aim of this study was  to compare the operation modes (batch and fed-batch of fermentation system on ethanol production from whey using Kluyveromyces marxianus. The result showed that the fermentation process for ethanol production by fed-batch system was higher at some point of parameters compared with batch system. Growth rate and ethanol yield (YP/S of fed-batch fermentation were 0.122/h and 0.21 gP/gS respectively; growth rate and ethanol yield (YP/S of batch fermentation were 0.107/h, and 0.12 g ethanol/g substrate, respectively. Based on the data of biomass and ethanol concentrations, the fermentation process for ethanol production by fed-batch system were higher at some point of parameters compared to batch system. Periodic substrate addition performed on fed-batch system leads the yeast growth in low substrate concentrations and consequently  increasing their activity and ethanol productivity. Keywords: batch; ethanol; fed-batch; fermentation;Kluyveromyces marxianus, whey

  13. Parallels in portraits of leadership in mega churches of Gauteng (RSA) and Florida (USA) / Tsietsi John Maloma

    OpenAIRE

    Maloma, Tsietsi John

    2011-01-01

    This thesis, Parallels in portraits of leadership in mega churches of Gauteng (RSA) and Florida (USA), the researcher, studied literature on church leadership with special reference to the leadership of mega churches. He researched issues relating to the nature of church leadership by exploring relevant Bible passages, the lives of certain Bible characters that the Bible presents as good but not perfect leaders, as well as relevant key theological conceptions of leadership. The study accordin...

  14. Safe Characteristics of One Like RSA%一个类RSA系统的两个安全特性

    Institute of Scientific and Technical Information of China (English)

    刘益和

    2004-01-01

    本文通过对比RSA系统的安全问题,给出了由Dickson 多项式簇gk(x,a)构成的类RSA系统的两个安全特性:除少数几个数外,类RSA 算法不满足同态性;类RSA系统仍然存在循环攻击问题.

  15. Die godsdiensneutraliteitsbeginsel van die Amerikaanse demokrasie - implikasie vir onderwys in die RSA

    Directory of Open Access Journals (Sweden)

    J.G. van Staden

    1995-03-01

    Full Text Available The principle of religious neutrality in the American democracy - implications for education in the RSA In a changing, democratic educational dispensation the accommodation of various religious convictions and religious needs of the heterogenous South African population is a matter that has to be dealt with with great circumspection. Valuable lessons that can prevent distress and disruption may be learnt from the way in which the American hyper-democracy has handled the situation. Democracy is the American's predominant pre-occupation. Any attempt of any group (e.g. a religious group to grant a monopoly in state schools to religious values in special learning content and religious ceremonies and practices has always been opposed. This approach has eventually led to total neutrality as regards traditional religious convictions and practices in American state schools, resulting in the establishment of another conviction (secular humanism in state schools. Thus it seems that neutrality as regards religious convictions is not possible. Absolutism of the principle of neutrality as regards traditional religions has resulted in a degeneration of moral values. If all the religious convictions cannot be accommodated in the South African public education system, it may for South Africa, as bastion of Christian civilization, be a danger sign as has been the case in the USA.

  16. [A MULTIDISCIPLINARY BIOPSYCHOSOCIAL INTEGRATED APPROACH IN ORGANIZATION OF REHABILITATIVE ACTIVITY IN NURSING HOMES (RSA)].

    Science.gov (United States)

    Panella, Lorenzo; Piccioni, Davide; Borcescu, Lidia; Isella, Celeste; Callegari, Camilla

    2015-01-01

    Objectives, social role and organization of Italian nursing homes (RSA) are characterized by a pronounced regional differentiation that causes situations which are difficult to compare about expected outcomes. The definition of a functional outcome is particularly difficult in institutionalized patients and this is due to the failure of a conclusive moment of the rehabilitative treatment. Furthermore we often take care of patients who have already been admitted to intensive and/or extensive rehabilitation units time after time, without further functional profit margin. The inconstant presence of professional figures of rehabilitation in nursing homes' staff makes difficult the drafting of an adequate rehabilitative project, especially for the multiple needs of frail old people. Starting with these assumptions, authors hypothesize and adopt a model of sanitary organization to consent a correct allocation of available resources, according to the patient's needs. They stratified all nursing home patients, using the Multidimensional Prognostic Index (MPI) and "Scheda di osservazione intermedia assistenza" (SOSIA), and measured the residual function. They concluded that a multidimensional evaluation of patients allows to identify wellness (of the sick person and of caregivers) as the main objective; nursing home organization could be think as a "complex supportive prosthesis for old people", made by the interaction among structure, operators and activities. PMID:26934811

  17. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    Science.gov (United States)

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification. PMID:26123833

  18. LSF usage for batch at CERN

    CERN Multimedia

    Schwickerath, Ulrich

    2007-01-01

    Contributed poster to the CHEP07. Original abstract: LSF 7, the latest version of Platform's batch workload management system, addresses many issues which limited the ability of LSF 6.1 to support large scale batch farms, such as the lxbatch service at CERN. In this paper we will present the status of the evaluation and deployment of LSF 7 at CERN, including issues concerning the integration of LSF 7 with the gLite grid middleware suite and, in particular, the steps taken to endure an efficient reporting of the local batch system status and usage to the Grid Information System

  19. Fractional Repetition and Erasure Batch Codes

    OpenAIRE

    Silberstein, Natalia

    2014-01-01

    Batch codes are a family of codes that represent a distributed storage system (DSS) of $n$ nodes so that any batch of $t$ data symbols can be retrieved by reading at most one symbol from each node. Fractional repetition codes are a family of codes for DSS that enable efficient uncoded repairs of failed nodes. In this work these two families of codes are combined to obtain fractional repetition batch (FRB) codes which provide both uncoded repairs and parallel reads of subsets of stored symbols...

  20. Batch Proving and Proof Scripting in PVS

    Science.gov (United States)

    Munoz, Cesar A.

    2007-01-01

    The batch execution modes of PVS are powerful, but highly technical, features of the system that are mostly accessible to expert users. This paper presents a PVS tool, called ProofLite, that extends the theorem prover interface with a batch proving utility and a proof scripting notation. ProofLite enables a semi-literate proving style where specification and proof scripts reside in the same file. The goal of ProofLite is to provide batch proving and proof scripting capabilities to regular, non-expert, users of PVS.

  1. Model Penjadwalan Batch Multi Item dengan Dependent Processing Time

    OpenAIRE

    Sukoyo Sukoyo; TMA. Ari Samadhi; Bermawi P. Iskandar; Abdul Hakim Halim

    2010-01-01

    This paper investigates a development of single machine batch scheduling for multi items with dependent processing time. The batch scheduling problem is to determine simultaneously number of batch (N), which item and its size allocated for each batch, and processing sequences of resulting batches. We use total actual flow time as the objective of schedule performance. The multi item batch scheduling problem could be formulated into a biner-integer nonlinear programming model because the numbe...

  2. Multi-objective optimization of glycopeptide antibiotic production in batch and fed batch processes

    DEFF Research Database (Denmark)

    Maiti, Soumen K.; Eliasson Lantz, Anna; Bhushan, Mani; Wangikar, Pramod P.

    2011-01-01

    as pareto optimal solutions. These solutions gives flexibility in evaluating the trade-offs and selecting the most suitable operating policy. Here, ε-constraint approach was used to generate the pareto solutions for two objectives: product concentration and product per unit cost of media, for batch...... and fed batch operations using process model for Amycolatopsis balhimycina, a glycopeptide antibiotic producer. This resulted in a set of several pareto optimal solutions with the two objectives ranging from (0.75gl−1, 3.97g$-1) to (0.44gl−1, 5.19g$-1) for batch and from (1.5gl−1, 5.46g$-1) to (1.1gl......−1, 6.34g$-1) for fed batch operations. One pareto solution each for batch and for fed batch mode was experimentally validated....

  3. Complete characterisation of the customer delay in a queueing system with batch arrivals and batch service

    OpenAIRE

    Claeys, Dieter; Laevens, Koenraad; Walraevens, Joris; Bruneel, Herwig

    2010-01-01

    Whereas the buffer content of batch-service queueing systems has been studied extensively, the customer delay has only occasionally been studied. The few papers concerning the customer delay share the common feature that only the moments are calculated explicitly. In addition, none of these surveys consider models including the combination of batch arrivals and a server operating under the full-batch service policy (the server waits to initiate service until he can serve at full capacity). In...

  4. 21 CFR 211.188 - Batch production and control records.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Batch production and control records. 211.188... Reports § 211.188 Batch production and control records. Batch production and control records shall be prepared for each batch of drug product produced and shall include complete information relating to...

  5. 7 CFR 58.728 - Cooking the batch.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Cooking the batch. 58.728 Section 58.728 Agriculture... Procedures § 58.728 Cooking the batch. Each batch of cheese within the cooker, including the optional... cheese particles or ingredients after the cooker batch of cheese has reached the final...

  6. 40 CFR 63.1408 - Aggregate batch vent stream provisions.

    Science.gov (United States)

    2010-07-01

    ... from all aggregate batch vent streams in the compliance demonstration required for reactor batch... comply with the mass emission limit for reactor batch process vents. ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Aggregate batch vent stream...

  7. A Batch Feeder for Inhomogeneous Bulk Materials

    Science.gov (United States)

    Vislov, I. S.; Kladiev, S. N.; Slobodyan, S. M.; Bogdan, A. M.

    2016-04-01

    The work includes the mechanical analysis of mechanical feeders and batchers that find application in various technological processes and industrial fields. Feeders are usually classified according to their design features into two groups: conveyor-type feeders and non-conveyor feeders. Batchers are used to batch solid bulk materials. Less frequently, they are used for liquids. In terms of a batching method, they are divided into volumetric and weighting batchers. Weighting batchers do not provide for sufficient batching accuracy. Automatic weighting batchers include a mass controlling sensor and systems for automatic material feed and automatic mass discharge control. In terms of operating principle, batchers are divided into gravitational batchers and batchers with forced feed of material using conveyors and pumps. Improved consumption of raw materials, decreased loss of materials, ease of use in automatic control systems of industrial facilities allows increasing the quality of technological processes and improve labor conditions. The batch feeder suggested by the authors is a volumetric batcher that has no comparable counterparts among conveyor-type feeders and allows solving the problem of targeted feeding of bulk material batches increasing reliability and hermeticity of the device.

  8. Applying prior knowledge to model batch keeping-quality of cucumber batches

    NARCIS (Netherlands)

    Schouten, R.E.; Tijskens, L.M.M.; Kooten, van O.; Jongbloed, G.

    2004-01-01

    Keeping-quality of individual cucumbers is limited by the green colour; the keeping-quality of batches of cucumbers is limited by the time it takes before 5␘f the cucumbers in the batch reach a predefined colour limit. From literature concerning the synthesis and degradation of chlorophyll and a pub

  9. Batch Attribute-Based Encryption for Secure Clouds

    OpenAIRE

    Chen Yang; Yang Sun; Qianhong Wu

    2015-01-01

    Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE) is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext are associated with an access policy and an attribute set, respectively; in addition to holding a secret key, one can decrypt a ciphertext only if the associated attributes match the predetermined access policy, which allows one to enforce fin...

  10. Quality and Batch-to-Batch Consistency of Original and Biosimilar Epoetin Products.

    Science.gov (United States)

    Halim, Liem Andhyk; Brinks, Vera; Jiskoot, Wim; Romeijn, Stefan; Haselberg, Rob; Burns, Chris; Wadhwa, Meenu; Schellekens, Huub

    2016-02-01

    Comprehensive physicochemical characterization and biological assays are essential parts in assessing quality attributes of biologicals. Here, we compared the quality of different marketed recombinant human erythropoietin (epoetin) products: originators, Eprex and NeoRecormon as well as 2 biosimilars, Retacrit and Binocrit. In addition, assessment of batch-to-batch variability was included by collecting 2 or more batches of each product. Common assays which included sodium dodecyl sulfate-polyacrylamide gel electrophoresis, high-performance size-exclusion chromatography, asymmetrical flow field-flow fractionation, capillary zone electrophoresis, and potency testing were used. Of the tested products and among batches of single products, variations in epoetin content, isoform profiles, and potency were found. Ultimately, this study demonstrated the high quality of epoetin products with some degree of variation among products and batches, confirming the "similar but not identical" paradigm of biologicals. PMID:26869417

  11. The practical effect of batch on genomic prediction

    OpenAIRE

    2012-01-01

    Measurements from microarrays and other high-throughput technologies are susceptible to non-biological artifacts like batch effects. It is known that batch effects can alter or obscure the set of significant results and biological conclusions in high-throughput studies. Here we examine the impact of batch effects on predictors built from genomic technologies. To investigate batch effects, we collected publicly available gene expression measurements with known outcomes, and estimated batches u...

  12. Following an Optimal Batch Bioreactor Operations Model

    DEFF Research Database (Denmark)

    Ibarra-Junquera, V.; Jørgensen, Sten Bay; Virgen-Ortíz, J.J.;

    2012-01-01

    The problem of following an optimal batch operation model for a bioreactor in the presence of uncertainties is studied. The optimal batch bioreactor operation model (OBBOM) refers to the bioreactor trajectory for nominal cultivation to be optimal. A multiple-variable dynamic optimization of fed-batch...... reactor for biomass production is studied using a differential geometry approach. The maximization problem is solved by handling both the optimal filling policy and substrate concentration in the inlet stream. In order to follow the OBBOM, a master–slave synchronization is used. The OBBOM is considered as...... the master system which includes the optimal cultivation trajectory for the feed flow rate and the substrate concentration. The “real” bioreactor, the one with unknown dynamics and perturbations, is considered as the slave system. Finally, the controller is designed such that the real bioreactor is...

  13. Systematic Methodology for Reproducible Optimizing Batch Operation

    DEFF Research Database (Denmark)

    Bonné, Dennis; Jørgensen, Sten Bay

    This contribution presents a systematic methodology for rapid acquirement of discrete-time state space model representations of batch processes based on their historical operation data. These state space models are parsimoniously parameterized as a set of local, interdependent models. The present...... contribution furthermore presents how the asymptotic convergence of Iterative Learning Control is combined with the closed-loop performance of Model Predictive Control to form a robust and asymptotically stable optimal controller for ensuring reliable and reproducible operation of batch processes. This...... controller may also be used for Optimizing control. The modeling and control performance is demonstrated on a fed-batch protein cultivation example. The presented methodologies lend themselves directly for application as Process Analytical Technologies (PAT)....

  14. Dynamic Fractional Resource Scheduling vs. Batch Scheduling

    CERN Document Server

    Casanova, Henri; Vivien, Frédéric

    2011-01-01

    We propose a novel job scheduling approach for homogeneous cluster computing platforms. Its key feature is the use of virtual machine technology to share fractional node resources in a precise and controlled manner. Other VM-based scheduling approaches have focused primarily on technical issues or on extensions to existing batch scheduling systems, while we take a more aggressive approach and seek to find heuristics that maximize an objective metric correlated with job performance. We derive absolute performance bounds and develop algorithms for the online, non-clairvoyant version of our scheduling problem. We further evaluate these algorithms in simulation against both synthetic and real-world HPC workloads and compare our algorithms to standard batch scheduling approaches. We find that our approach improves over batch scheduling by orders of magnitude in terms of job stretch, while leading to comparable or better resource utilization. Our results demonstrate that virtualization technology coupled with light...

  15. A Security Solution for the Transmission of Confidential Data and Efficient File Authentication Based on DES, AES, DSS and RSA

    Directory of Open Access Journals (Sweden)

    Rajat Chaudhary,

    2012-08-01

    Full Text Available Data security is an integral part of web basedbusiness applications like insurance, banking etc. Theseapplications require a secure infrastructure to meet the securityrequirements of confidentiality, endpoint authentication, messageintegrity and no repudiation. Document encryption/decryptionand signatures/validation are the data security standards thatdefine XML vocabularies and processing rules to meet thesesecurity requirements.In this paper, we present a how a file securely passes fromsender (server to the receiver (client through a central gatewaywith web services applications which mean a secure architecturefor the exchange of confidential documents. Designing a securedelectronic system architecture i.e. connected to the centralgateway through which the whole work is established and takesplace accordingly to pass only the files over the internet and havesecurity features like digital signatures. Various algorithms,implementations and coding have been developed forencryption/decryption, signatures/validations and web services.

  16. Optimal Control of Fed-Batch Fermenters

    OpenAIRE

    Valentinotti, S.; Cannizzaro, C; Rhiel, M.; Holmberg, U.; von Stockar, U; Bonvin, D.

    2000-01-01

    Optimal control of fed-batch fermenters S. Valentinotti† C. Cannizzaro‡ M.Rhiel‡ U. Holmberg† U. von Stockar‡ D. Bonvin† †Institut d’Automatique, EPFL, 1015 Lausanne, Switzerland ‡Institut de Genie Chimique, EPFL, 1015 Lausanne, Switzerland Fermentors are often run in a fed-batch manner to avoid the formation of overflow metabolites. At a high growth rate, the most efficient metabolic pathway(s) of certain microorganisms become saturated resulting in overflow metabolite production. These byprodu...

  17. Exploring the Transition From Batch to Online

    DEFF Research Database (Denmark)

    Jørgensen, Anker Helms

    2010-01-01

    truly interactive use of computers known today. The transition invoked changes in a number of areas: technological, such as hybrid forms between batch and online; organisational such as decentralization; and personal as users and developers alike had to adopt new technology, shape new organizational...

  18. Monte Carlo simulation on kinetics of batch and semi-batch free radical polymerization

    KAUST Repository

    Shao, Jing

    2015-10-27

    Based on Monte Carlo simulation technology, we proposed a hybrid routine which combines reaction mechanism together with coarse-grained molecular simulation to study the kinetics of free radical polymerization. By comparing with previous experimental and simulation studies, we showed the capability of our Monte Carlo scheme on representing polymerization kinetics in batch and semi-batch processes. Various kinetics information, such as instant monomer conversion, molecular weight, and polydispersity etc. are readily calculated from Monte Carlo simulation. The kinetic constants such as polymerization rate k p is determined in the simulation without of “steady-state” hypothesis. We explored the mechanism for the variation of polymerization kinetics those observed in previous studies, as well as polymerization-induced phase separation. Our Monte Carlo simulation scheme is versatile on studying polymerization kinetics in batch and semi-batch processes.

  19. Batch and Fed-Batch Fermentation System on Ethanol Production from Whey using Kluyveromyces marxianus

    OpenAIRE

    H Hadiyanto; D. Ariyanti; A.P. Aini; D.S. Pinundi

    2013-01-01

    Nowadays reserve of fossil fuel has gradually depleted. This condition forces many researchers to  find energy alternatives which is renewable and sustainable in the future. Ethanol derived from cheese industrial waste (whey) using fermentation process can be a new perspective in order to secure both energy and environment. The aim of this study was  to compare the operation modes (batch and fed-batch) of fermentation system on ethanol production from whey using Kluyveromyces marxianus. The r...

  20. Sojourn time distributions in a Markovian G-queue with batch arrival and batch removal

    OpenAIRE

    Yang Woo Shin

    1999-01-01

    We consider a single server Markovian queue with two types of customers; positive and negative, where positive customers arrive in batches and arrivals of negative customers remove positive customers in batches. Only positive customers form a queue and negative customers just reduce the system congestion by removing positive ones upon their arrivals. We derive the LSTs of sojourn time distributions for a single server Markovian queue with positive customers and negative customers by using the...

  1. Batch and fed-batch production of butyric acid by Clostridium butyricum ZJUCB

    Institute of Scientific and Technical Information of China (English)

    HE Guo-qing; KONG Qing; CHEN Qi-he; RUAN Hui

    2005-01-01

    The production of butyric acid by Clostridium butyricum ZJUCB at various pH values was investigated. In order to study the effect of pH on cell growth, butyric acid biosynthesis and reducing sugar consumption, different cultivation pH values ranging from 6.0 to 7.5 were evaluated in 5-L bioreactor. In controlled pH batch fermentation, the optimum pH for cell growth and butyric acid production was 6.5 with a cell yield of 3.65 g/L and butyric acid yield of 12.25 g/L. Based on these results, this study then compared batch and fed-batch fermentation of butyric acid production at pH 6.5. Maximum value (16.74 g/L) of butyric acid concentration was obtained in fed-batch fermentation compared to 12.25 g/L in batch fermentation. It was concluded that cultivation under fed-batch fermentation mode could enhance butyric acid production significantly (P<0.01) by C. butyricum ZJUCB.

  2. The Design of Identity Authentication Scheme of Network Examination Based on MD5 and RSA Algorithm%基于MD5和 RSA 算法的网络考试身份认证方案设计

    Institute of Scientific and Technical Information of China (English)

    许永达

    2013-01-01

      Establishing a good identity authentication system is one of the key steps to realize the network examination security ,and tradi-tional identity authentication methods like “username + password” have a big security risk .So an identity authentication scheme based on MD5 and RSA Algorithm is proposed ,which uses the MD5 algorithm to improve the“username + password” authentication method ,and then uses the digital signature based on MD5 and RSA algorithm to further verify the user’s identity .This scheme can effectively confirm us-er identity ,and greatly enhance the safety performance of the examination system .%  建立完善的身份认证系统是实现网络考试安全的关键步骤之一,而“用户名+密码”等传统身份认证方式存在较大的安全隐患。文章提出了一种基于MD5和RSA算法的身份认证方案,先利用MD5算法来改进“用户名+密码”认证方法,再借助MD5和RSA算法实现的数字签名来进一步验证用户的身份。该方案可以高效确认用户身份,极大地增强了考试系统的安全性能。

  3. Using Forensics to Untangle Batch Effects in TCGA Data - TCGA

    Science.gov (United States)

    Rehan Akbani, Ph.D., and colleagues at the University of Texas MD Anderson Cancer Center developed a tool called MBatch to detect, diagnose, and correct batch effects in TCGA data. Read more about batch effects in this Case Study.

  4. Research on a Vector-like RSA Cryptosystem Based on Internet%基于Intranet向量形RSA密码体制研究

    Institute of Scientific and Technical Information of China (English)

    蒋天发

    2001-01-01

    A public-key cryptosystem using vector-like RSA ciphers based on Internet is presented to overcome some shortcomings of the traditional RSA system. The security of this cryptosystem is better because it is more difficult to obtain a plaintext from a ciphertext under this cryptosystem than under the traditional RSA system using the factoring modulus N. The principle, the algorithm and the program realization of this vector-like RSA Cryptosystem are detailed.%提出了一种基于Intranet的向量形RSA的公开密钥码体制,其加密、解密算法具有与RSA相同量级的时间复杂性,并克服了RSA体制及现已提出各种RSA修改体制中的一些缺点。在向量形RSA密码体制下从密文中获取明文的某些信息要比在传统的RSA分解模N下更困难,因而向量形RSA的安全性会更好。此外还阐述了其基本原理,以及基本算法思想及其编程实现。

  5. 移动RSA认证系统的应用部署与维护%Application Deployment and Maintenance of Mobile RSA Authentication System

    Institute of Scientific and Technical Information of China (English)

    颜昭治; 刘竹松

    2014-01-01

    As a strong authentication system, RSA SecurID has been widely used in the field of information security. Its two-factor authentication technology has greatly enhances the security of the system access. Describes the authentication system and its components, combined with the existing network application in deployment and application of RSA briefly, analyzes of the common problems and business continuity security.%RSA SecurID作为一种强大的身份认证系统,已在信息安全领域得到广泛应用,其双因素认证技术极大地增强系统访问的安全性。介绍RSA SecurID认证系统及其组成,结合现网应用情况简述RSA的部署与应用,剖析RSA维护中的常见问题和业务连续性保障。

  6. Optimal operation of batch membrane processes

    CERN Document Server

    Paulen, Radoslav

    2016-01-01

    This study concentrates on a general optimization of a particular class of membrane separation processes: those involving batch diafiltration. Existing practices are explained and operational improvements based on optimal control theory are suggested. The first part of the book introduces the theory of membrane processes, optimal control and dynamic optimization. Separation problems are defined and mathematical models of batch membrane processes derived. The control theory focuses on problems of dynamic optimization from a chemical-engineering point of view. Analytical and numerical methods that can be exploited to treat problems of optimal control for membrane processes are described. The second part of the text builds on this theoretical basis to establish solutions for membrane models of increasing complexity. Each chapter starts with a derivation of optimal operation and continues with case studies exemplifying various aspects of the control problems under consideration. The authors work their way from th...

  7. FBSNG - batch system for farm architecture

    International Nuclear Information System (INIS)

    FBSNG is a redesigned version of Farm Batch System (FBS), which was developed as a batch process management system for off-line Run II data processing at FNAL. FBSNG is designed for UNIX computer farms and is capable of managing up to 1000 nodes in a single farm. FBSNG allows users to start arrays of parallel processes on one or more farm computers. It uses a simplified abstract resource counting method for load balancing between computers. The resource counting approach allows FBSNG to be a simple and flexible tool for farm resource management. FBSNG scheduler features include guaranteed and controllable 'fair-share' scheduling. FBSNG is easily portable across different flavors of UNIX. The system has been successfully used at Fermilab as well as by off-site collaborators for several years on farms of different sizes and different platforms for off-line data processing, Monte-Carlo data generation and other tasks

  8. Properties of batch means from stationary ARMA time series

    OpenAIRE

    Kang, Keebom; Schmeiser, Bruce

    1986-01-01

    The batch means process arising from an arbitrary autoregressive moving-average (ARMA) process time series is derived. As side results, the variance and correlation structures of the batch means process as functions of the batch size and parameters of the original process are obtained. Except for the first-order ARMA process, for which a closed-form expression is obtained, the parameters of the batch-means process are determined numerically. Keywords: Monte Carlo method; Simulation. (Author)

  9. Exception Handling in Recipe-Based Batch Control

    OpenAIRE

    Olsson, Rasmus

    2002-01-01

    The focus of this thesis is exception handling in recipe-based batch control. Exception handling is a critical element for achieving long-term success in batch production. It is reported to constitute 40-60 percent of the batch control design and implementation effort. Correct handling of exceptions is a key element in process safety, consistent product quality, and production cost minimization. The previous work on Grafchart for sequential programming, batch process recipe handling and resou...

  10. Capacitated max -Batching with Interval Graph Compatibilities

    Science.gov (United States)

    Nonner, Tim

    We consider the problem of partitioning interval graphs into cliques of bounded size. Each interval has a weight, and the weight of a clique is the maximum weight of any interval in the clique. This natural graph problem can be interpreted as a batch scheduling problem. Solving a long-standing open problem, we show NP-hardness, even if the bound on the clique sizes is constant. Moreover, we give a PTAS based on a novel dynamic programming technique for this case.

  11. Process Modeling for Batch Cooling Crystallization

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The general mathematical model for batch cooling crystallization was established based on the popula tion balance equation considering the change of slurry volume, and simulated with crystallization thermodynamics, kinetics and mass balance employing bed voidage. In the system of vitamin C-water-ethanol, reliability of this model was verified by comparison between simulation results and experimental data. The effects of operation parameters on product quality can be systematically investigated by modeling simulation.

  12. Process Modeling for Batch Cooling Crystallization

    Institute of Scientific and Technical Information of China (English)

    陈慧萍; 王静康

    2001-01-01

    The general mathematical model for batch cooling crystallization was established based on the population balance equation considering the change of slurry volume, and simulated with crystallization thermodynamics,kinetics and mass balance employing bed voidage. In the system of vitamin C-water-ethanol, reliability of this model was verified by comparison between simulation results and experimental data. The effects of operation parameters on product quality can be systematically investigated by modeling simulation.

  13. Isopropyl alcohol recovery by heteroazeotropic batch distillation

    OpenAIRE

    Van Baelen, Guy; Vreysen, Steven; Gerbaud, Vincent; Rodriguez-Donis, Ivonne; Geens, Jeroen; Janssens, Bart

    2010-01-01

    Solvent recovery is becoming a major issue in the pharmaceutical and specialty chemical industries. Solvent recovery by conventional batch distillation is limited by the frequent presence of azeotropes in the used solvent mixtures. Most distillation processes for the separation of azeotropic or difficult zeotropic mixtures involve the addition of an entrainer (homogeneous and heterogeneous azeotropic distillation or extractive distillation). In this study the recovery of IPA (isopropyl alc...

  14. A novel heat integrated batch distillation scheme

    International Nuclear Information System (INIS)

    Highlights: → We develop an internally heat integrated structure for a batch distillation. → The concentric reboiler receives heat from the rectifier operated at high pressure. → A compressor and a throttling valve are installed for pressure adjustment. → Heat integration provides a significant savings in energy as well as cost. -- Abstract: Published studies have been focused mainly on the energy integration of continuous distillation columns. In this contribution, a novel heat integrated batch distillation column (HIBDC) is proposed. Aiming to improve the thermodynamic efficiency and reduce the total annual cost (TAC), a thermally coupled column configuration is explored with introducing heat integration between the rectifying tower and concentric reboiler. A compressor is employed to provide the necessary temperature driving force for the heat transferred from the rectifier to the reboiler. Investigating the feasibility of energy integration in the simulated batch process, a number of sensitivity tests have been conducted to select the value of operating compression ratio. An economic comparison between the proposed HIBDC and the conventional stand alone column is also performed. It is observed that the HIBDC system appears overwhelmingly superior to its conventional counterpart providing about an energy savings of 56.1% and cost (TAC) savings of 40.53%.

  15. Le RSA, innovation ou réforme technocratique? Premiers enseignements d'une monographie départementale

    OpenAIRE

    Méda, Dominique; Gomel, Bernard

    2011-01-01

    L'étude constitue une contribution à l'analyse et à l'évaluation du revenu de solidarité active (RSA), institué par la loi du 1er décembre 2008 et mis en œuvre à partir de juin 2009. Les auteurs reviennent dans une première partie sur les intentions des promoteurs de cette réforme, à partir du texte de la commission Familles, vulnérabilités, pauvreté, réunie en 2005 par le président d'Emmaüs, Martin Hirsch. Ils rappellent le diagnostic proposé par celle-ci, l'échec du RMI, sa principale recom...

  16. Four RFLPs of the human insulin receptor gene: PstI, KpnI, RsaI (2 RFLPs)

    Energy Technology Data Exchange (ETDEWEB)

    Cox, N.J.; Spielman, R.S.; Taub, R. (Univ. of Pennsylvania School of Medicine, Philadelphia (USA)); Kahn, C.R.; Muller-Wieland, D.; Kriauciunas, K.M. (Harvard Medical School, Boston, MA (USA))

    1988-08-25

    Fragments were isolated from subclones containing the insulin receptor cDNA described. Probe 1 as obtained from an SP64 subclone containing the 1011bp EcoRI fragment from the 5{prime} region of the U11rich cDNA. Probe 1 was a 677bp XhoI/EcoRI fragment from the {alpha} subunit region of the IR cDNA corresponding to nucleotides 334 to 1011, the putative ligand binding domain. Probe 2 was obtained from an SP64 subclone containing the 4190bp EcoRI fragment from the 3{prime} end of the U11rich cDNA. Probe 2 was a 1599 bp PstI fragment from the {beta} subunit region of the insulin receptor cDNA corresponding to nucleotides 2746 to 4345, encoding the tyrosine kinase domain. Segregation in at least one family was observed for the PstI, KpnI, and RsaI ({beta}) polymorphisms.

  17. 21 CFR 80.37 - Treatment of batch pending certification.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Treatment of batch pending certification. 80.37... COLOR ADDITIVE CERTIFICATION Certification Procedures § 80.37 Treatment of batch pending certification. Immediately after the sample that is to accompany a request for certification of a batch of color additive...

  18. 21 CFR 80.38 - Treatment of batch after certification.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Treatment of batch after certification. 80.38... COLOR ADDITIVE CERTIFICATION Certification Procedures § 80.38 Treatment of batch after certification. (a) Immediately upon notification that a batch of color additive has been certified, the person...

  19. 40 CFR 63.462 - Batch cold cleaning machine standards.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Batch cold cleaning machine standards... National Emission Standards for Halogenated Solvent Cleaning § 63.462 Batch cold cleaning machine standards. (a) Each owner or operator of an immersion batch cold solvent cleaning machine shall comply with...

  20. 40 CFR 63.1321 - Batch process vents provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Batch process vents provisions. 63.1321... Standards for Hazardous Air Pollutant Emissions: Group IV Polymers and Resins § 63.1321 Batch process vents provisions. (a) Batch process vents. Except as specified in paragraphs (b) through (d) of this...

  1. 40 CFR 63.1406 - Reactor batch process vent provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Reactor batch process vent provisions... § 63.1406 Reactor batch process vent provisions. (a) Emission standards. Owners or operators of reactor... reactor batch process vent located at a new affected source shall control organic HAP emissions...

  2. A Semi-Batch Reactor Experiment for the Undergraduate Laboratory

    Science.gov (United States)

    Derevjanik, Mario; Badri, Solmaz; Barat, Robert

    2011-01-01

    This experiment and analysis offer an economic yet challenging semi-batch reactor experience. Household bleach is pumped at a controlled rate into a batch reactor containing pharmaceutical hydrogen peroxide solution. Batch temperature, product molecular oxygen, and the overall change in solution conductivity are metered. The reactor simulation…

  3. Response variation in a batch of TLDS

    International Nuclear Information System (INIS)

    Full text: At Royal Perth Hospital, LiF thermoluminescent dosimeter rods (TLDs) are handled in batches of 50. Rods in each batch are always annealed together to ensure the same thermal history and an individual batch is used with the same type and energy of radiation. A subset of a batch is used for calibration purposes by exposing them to a range of known doses and their output is used to calculate the dose received by other rods used for a dose measurement. Variation in TLD response is addressed by calculating 95% certainty levels from the calibration rods and applying this to the dose measurement rods. This approach relies on the sensitivity of rods within each batch being similar. This work investigates the validity of this assumption and considers possible benefits of applying individual rod sensitivities. The variation in response of TLD rods was assessed using 25 TLD-100 rods (Harshaw/Bicron) which were uniformly exposed to 1 Gy using 6 MeV photons in a linear accelerator on 5 separate occasions. Rods were read with a Harshaw 5500 reader. During the read process the Harshaw reader periodically checks for noise and PMT gain drift and the data were corrected for these parameters. Replicate exposure data were analysed using 1-way Analysis of Variance (ANOVA) to determine whether the between rod variations were significantly different to the variations within a single rod. A batch of 50 rods was also exposed on three occasions using the above technique. Individual TLD rod sensitivity values were determined using the rod responses from 2 exposures and these values were applied to correct charges on a rod-by-rod basis for the third exposure. ANOVA results on the 5 exposures of 25 rods showed the variance between rods was significantly greater than the within rod variance (p < 0.001). The precision of an individual rod was estimated to have a standard deviation of 2.8%. This suggests that the 95% confidence limits for repeated measurements using the same dose and

  4. BATCH-GE: Batch analysis of Next-Generation Sequencing data for genome editing assessment

    Science.gov (United States)

    Boel, Annekatrien; Steyaert, Woutert; De Rocker, Nina; Menten, Björn; Callewaert, Bert; De Paepe, Anne; Coucke, Paul; Willaert, Andy

    2016-01-01

    Targeted mutagenesis by the CRISPR/Cas9 system is currently revolutionizing genetics. The ease of this technique has enabled genome engineering in-vitro and in a range of model organisms and has pushed experimental dimensions to unprecedented proportions. Due to its tremendous progress in terms of speed, read length, throughput and cost, Next-Generation Sequencing (NGS) has been increasingly used for the analysis of CRISPR/Cas9 genome editing experiments. However, the current tools for genome editing assessment lack flexibility and fall short in the analysis of large amounts of NGS data. Therefore, we designed BATCH-GE, an easy-to-use bioinformatics tool for batch analysis of NGS-generated genome editing data, available from https://github.com/WouterSteyaert/BATCH-GE.git. BATCH-GE detects and reports indel mutations and other precise genome editing events and calculates the corresponding mutagenesis efficiencies for a large number of samples in parallel. Furthermore, this new tool provides flexibility by allowing the user to adapt a number of input variables. The performance of BATCH-GE was evaluated in two genome editing experiments, aiming to generate knock-out and knock-in zebrafish mutants. This tool will not only contribute to the evaluation of CRISPR/Cas9-based experiments, but will be of use in any genome editing experiment and has the ability to analyze data from every organism with a sequenced genome. PMID:27461955

  5. BATCH-GE: Batch analysis of Next-Generation Sequencing data for genome editing assessment.

    Science.gov (United States)

    Boel, Annekatrien; Steyaert, Woutert; De Rocker, Nina; Menten, Björn; Callewaert, Bert; De Paepe, Anne; Coucke, Paul; Willaert, Andy

    2016-01-01

    Targeted mutagenesis by the CRISPR/Cas9 system is currently revolutionizing genetics. The ease of this technique has enabled genome engineering in-vitro and in a range of model organisms and has pushed experimental dimensions to unprecedented proportions. Due to its tremendous progress in terms of speed, read length, throughput and cost, Next-Generation Sequencing (NGS) has been increasingly used for the analysis of CRISPR/Cas9 genome editing experiments. However, the current tools for genome editing assessment lack flexibility and fall short in the analysis of large amounts of NGS data. Therefore, we designed BATCH-GE, an easy-to-use bioinformatics tool for batch analysis of NGS-generated genome editing data, available from https://github.com/WouterSteyaert/BATCH-GE.git. BATCH-GE detects and reports indel mutations and other precise genome editing events and calculates the corresponding mutagenesis efficiencies for a large number of samples in parallel. Furthermore, this new tool provides flexibility by allowing the user to adapt a number of input variables. The performance of BATCH-GE was evaluated in two genome editing experiments, aiming to generate knock-out and knock-in zebrafish mutants. This tool will not only contribute to the evaluation of CRISPR/Cas9-based experiments, but will be of use in any genome editing experiment and has the ability to analyze data from every organism with a sequenced genome. PMID:27461955

  6. On the track of fish batches in three distribution networks

    DEFF Research Database (Denmark)

    Randrup, Maria; Wu, Haiping; Jørgensen, Bo M.

    2012-01-01

    Three fish products sampled in retail shops were traced back to their origin and fish from the same batch were tracked forward towards the retailer, thereby simulating a recall situation. The resulting distribution networks were very complex, but to the extent that companies were willing to provide...... the necessary information, it was possible to locate the end destinations of the fish batches. The batch sizes and the number of companies involved clearly rose when batch joining occurred. Thus, a fault in a small batch can potentially have widespread implications. The study also underlines the...

  7. Production of ethanol in batch and fed-batch fermentation of soluble sugar

    International Nuclear Information System (INIS)

    Keeping in view of the demand and need for alternate energy source, especially liquid fuels and the availability of raw materials in Pakistan, we have carried out biochemical and technological studies for ethanol through fermentation of renewable substrates. Molasses and sugar cane have been used as substrate for yeast fermentation. Selected yeast were used in both batch and semi continuous fermentation of molasses. Clarified dilute molasses were fermented with different strains of Saccharomyces cerevisiae. Ethanol concentration after 64 hours batch fermentation reached 9.4% with 90% yield based on sugar content. During feed batch system similar results were obtained after a fermentation cycle of 48 hours resulting in higher productivity. Similarly carbohydrates in fruit juices and hydro lysates of biomass can be economically fermented to ethanol to be used as feed stock for other chemicals. (author)

  8. Decrypting $SO(10)$-inspired leptogenesis

    CERN Document Server

    Di Bari, Pasquale; Fiorentin, Michele Re

    2014-01-01

    Encouraged by the recent results from neutrino oscillation experiments, we perform an analytical study of $SO(10)$-inspired models and leptogenesis with hierarchical right-handed (RH) neutrino spectrum. Under the approximation of negligible misalignment between the neutrino Yukawa basis and the charged lepton basis, we find an analytical expression for the final asymmetry directly in terms of the low energy neutrino parameters that fully reproduces previous numerical results. This expression also shows that is possible to identify an effective leptogenesis phase for these models. When we also impose the wash-out of a large pre-existing asymmetry $N^{\\rm p,i}_{B-L}$, the strong thermal (ST) condition, we derive analytically all those constraints on the low energy neutrino parameters that characterise the {\\rm ST}-$SO(10)$-inspired leptogenesis solution, confirming previous numerical results. In particular we show why, though neutrino masses have to be necessarily normally ordered, the solution implies an analy...

  9. Decrypting SO(10-inspired leptogenesis

    Directory of Open Access Journals (Sweden)

    Pasquale Di Bari

    2015-04-01

    Full Text Available Encouraged by the recent results from neutrino oscillation experiments, we perform an analytical study of SO(10-inspired models and leptogenesis with hierarchical right-handed (RH neutrino spectrum. Under the approximation of negligible misalignment between the neutrino Yukawa basis and the charged lepton basis, we find an analytical expression for the final asymmetry directly in terms of the low energy neutrino parameters that fully reproduces previous numerical results. This expression also shows that it is possible to identify an effective leptogenesis phase for these models. When we also impose the wash-out of a large pre-existing asymmetry NB−Lp,i, the strong thermal (ST condition, we derive analytically all those constraints on the low energy neutrino parameters that characterise the ST-SO(10-inspired leptogenesis solution, confirming previous numerical results. In particular we show why, though neutrino masses have to be necessarily normally ordered, the solution implies an analytical lower bound on the effective neutrino-less double beta decay neutrino mass, mee≳8 meV, for NB−Lp,i=10−3, testable with next generation experiments. This, in combination with an upper bound on the atmospheric mixing angle, necessarily in the first octant, forces the lightest neutrino mass within a narrow range m1≃(10–30 meV (corresponding to ∑imi≃(75–125 meV. We also show why the solution could correctly predict a non-vanishing reactor neutrino mixing angle and requires the Dirac phase to be in the fourth quadrant, implying sin⁡δ (and JCP negative as hinted by current global analyses. Many of the analytical results presented (expressions for the orthogonal matrix, RH neutrino mixing matrix, masses and phases can have applications beyond leptogenesis.

  10. Kinetic Analyses of Desulfurization of Dibenzothiophene by Rhodococcus erythropolis in Batch and Fed-Batch Cultures

    OpenAIRE

    P. Wang; Krawiec, S.

    1996-01-01

    The DbtS(sup+) phenotype (which confers the ability to oxidize selectively the sulfur atom of dibenzothiophene [DBT] or dibenzothiophene sulfone [DBTO(inf2)]) of Rhodococcus erythropolis N1-36 was quantitatively characterized in batch and fed-batch cultures. In flask cultures, production of the desulfurization product, monohydroxybiphenyl (OH-BP), was maximal at pH 6.0, while specific productivity (OH-BP cell(sup-1)) was maximal at pH 5.5. Quantitative measurements in fermentors (in both batc...

  11. Characterization of three LYSO crystal batches

    International Nuclear Information System (INIS)

    We report on three LYSO crystal batches characterized at the Caltech crystal laboratory for future HEP experiments: 25 20 cm long crystals for the SuperB experiment; 12 13 cm long crystals for the Mu2e experiment and 623 14×14×1.5 mm3 plates with five holes for a LYSO/W Shashlik matrix for a beam test at Fermilab. Optical and scintillation properties measured are longitudinal transmittance, light output and FWHM energy resolution. Correlations between these properties are also investigated

  12. Characterization of Three LYSO Crystal Batches

    International Nuclear Information System (INIS)

    We report on three LYSO crystal batches characterized at the Caltech crystal laboratory for future HEP experiments: Twenty-five 20 cm long crystals for the SuperB experiment; twelve 13 cm long crystals for the Mu2e experiment and 623 14×14×1.5 mm plates with five holes for a LYSO/W Shashlik matrix for a beam test at Fermilab. Optical and scintillation properties measured are longitudinal Transmittance, light output and FWHM energy resolution. Correlations between these properties are also investigated

  13. Batch-annealed dual-phase steel

    International Nuclear Information System (INIS)

    Dual-phase steel, consisting essentially of a ferrite matrix containing islands of martensite, is produced by batch annealing of hot or cold rolled steel having carbon below 0.2% and manganese below 2% and at least critical contents of copper (0.4%) and nickel (0.6%), with heat to the alpha plus gamma region, followed by slow cooling. This procedure is effective and controllable, and yields a dual-phase steel product that has high tensile strength with excellent elongation properties and that develops good yield strength upon moderate deformation

  14. 21 CFR 111.260 - What must the batch record include?

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false What must the batch record include? 111.260... for the Batch Production Record § 111.260 What must the batch record include? The batch production record must include the following: (a) The batch, lot, or control number: (1) Of the finished batch...

  15. Batch-to-batch pharmacokinetic variability confounds current bioequivalence regulations: A dry powder inhaler randomized clinical trial.

    Science.gov (United States)

    Burmeister Getz, E; Carroll, K J; Jones, B; Benet, L Z

    2016-09-01

    Current pharmacokinetic (PK) bioequivalence guidelines do not account for batch-to-batch variability in study design or analysis. Here we evaluate the magnitude of batch-to-batch PK variability for Advair Diskus 100/50. Single doses of fluticasone propionate and salmeterol combinations were administered by oral inhalation to healthy subjects in a randomized clinical crossover study comparing three different batches purchased from the market, with one batch replicated across two treatment periods. All pairwise comparisons between different batches failed the PK bioequivalence statistical test, demonstrating substantial PK differences between batches that were large enough to demonstrate bio-inequivalence in some cases. In contrast, between-replicate PK bioequivalence was demonstrated for the replicated batch. Between-batch variance was ∼40-70% of the estimated residual error. This large additional source of variability necessitates re-evaluation of bioequivalence assessment criteria to yield a result that is both generalizable and consistent with the principles of type I and type II error rate control. PMID:27037630

  16. 基于C语言的RSA算法高效实现%An Effective Scheme on RSA Algorithm Based on C Language

    Institute of Scientific and Technical Information of China (English)

    郭海民

    2011-01-01

    The RSA algorithm is the standard in the modern public-key cryptosystem, although its situation will be substituted by the Elliptic Curve Cryptosystem(ECC), but it is also having the certain practical significance to study the RSA encryption algorithm. Di%RSA算法是现代公钥密码体制事实上的标准,虽然它有被椭圆曲线密码算法(ECC)取代的局势,但是研究RSA加密算法还有一定的实际意义。深入讨论RSA算法的实现细节,对RSA的快速实现给出一种高效实用算法。

  17. Adaptive quality prediction of batch processes based on PLS model

    Institute of Scientific and Technical Information of China (English)

    LI Chun-fu; ZHANG Jie; WANG Gui-zeng

    2006-01-01

    There are usually no on-line product quality measurements in batch and semi-batch processes,which make the process control task very difficult.In this paper,a model for predicting the end-product quality from the available on-line process variables at the early stage of a batch is developed using partial least squares (PLS)method.Furthermore,some available mid-course quality measurements are used to rectify the final prediction results.To deal with the problem that the process may change with time,recursive PLS (RPLS) algorithm is used to update the model based on the new batch data and the old model parameters after each batch.An application to a simulated batch MMA polymerization process demonstrates the effectiveness of the proposed method.

  18. Evaluation of vitrification factors from DWPF's macro-batch 1

    International Nuclear Information System (INIS)

    The Defense Waste Processing Facility (DWPF) is evaluating new sampling and analytical methods that may be used to support future Slurry Mix Evaporator (SME) batch acceptability decisions. This report uses data acquired during DWPF's processing of macro-batch 1 to determine a set of vitrification factors covering several SME and Melter Feed Tank (MFT) batches. Such values are needed for converting the cation measurements derived from the new methods to a ''glass'' basis. The available data from macro-batch 1 were used to examine the stability of these vitrification factors, to estimate their uncertainty over the course of a macro-batch, and to provide a recommendation on the use of a single factor for an entire macro-batch. The report is in response to Technical Task Request HLW/DWPF/TTR-980015

  19. 大规模ad hoc网络下的高效的主动RSA方案%An efficient proactive RSA scheme for large-scale ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    张瑞山; 陈克非

    2007-01-01

    A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key distribution protocol,the share refreshing protocol, the share distribution protocol, and the signature generation protocol. This scheme has two advantages: the building blocks are secure, and the system is efficient.

  20. TANK 50 BATCH 0 SALTSTONE FORMULATION CONFIRMATION

    Energy Technology Data Exchange (ETDEWEB)

    Langton, C.

    2006-06-05

    Savannah River National Laboratory (SRNL) personnel were requested to confirm the Tank 50 Batch 0 grout formulation per Technical Task Request, SSF-TTR-2006-0001 (task 1 of 2) [1]. Earlier Batch 0 formulation testing used a Tank 50 sample collected in September 2005 and is described elsewhere [2]. The current testing was performed using a sample of Tank 50 waste collected in May 2006. This work was performed according to the Technical Task and Quality Assurance Plan (TT/QAP), WSRC-RP-2006-00594 [3]. The salt solution collected from Tank 50 in May 2006 contained approximately 3 weight percent more solids than the sample collected in September 2005. The insoluble solids took longer to settle in the new sample which was interpreted as indicating finer particles in the current sample. The saltstone formulation developed for the September 2005 Tank 50 Batch 0 sample was confirmed for the May 2006 sample with one minor exception. Saltstone prepared with the Tank 50 sample collected in May 2006 required 1.5 times more Daratard 17 set retarding admixture than the saltstone prepared with the September In addition, a sample prepared with lower shear mixing (stirring with a spatula) had a higher plastic viscosity (57 cP) than samples made with higher shear mixing in a blender (23cP). The static gel times of the saltstone slurries made with low shear mixing were also shorter ({approx}32 minutes) than those for comparable samples made in the blender ({approx}47 minutes). The addition of the various waste streams (ETP, HEU-HCAN, and GPE-HCAN) to Tank 50 from September 2005 to May 2006 has increased the amount of set retarder, Daratard 17, required for processing saltstone slurries through the Saltstone facility. If these streams are continued to be added to Tank 50, the quantity of admixtures required to maintain the same processing conditions for the Saltstone facility will probably change and additional testing is recommended to reconfirm the Tank 50 Saltstone formulation.

  1. TANK 50 BATCH 0 SALTSTONE FORMULATION CONFIRMATION

    International Nuclear Information System (INIS)

    Savannah River National Laboratory (SRNL) personnel were requested to confirm the Tank 50 Batch 0 grout formulation per Technical Task Request, SSF-TTR-2006-0001 (task 1 of 2) [1]. Earlier Batch 0 formulation testing used a Tank 50 sample collected in September 2005 and is described elsewhere [2]. The current testing was performed using a sample of Tank 50 waste collected in May 2006. This work was performed according to the Technical Task and Quality Assurance Plan (TT/QAP), WSRC-RP-2006-00594 [3]. The salt solution collected from Tank 50 in May 2006 contained approximately 3 weight percent more solids than the sample collected in September 2005. The insoluble solids took longer to settle in the new sample which was interpreted as indicating finer particles in the current sample. The saltstone formulation developed for the September 2005 Tank 50 Batch 0 sample was confirmed for the May 2006 sample with one minor exception. Saltstone prepared with the Tank 50 sample collected in May 2006 required 1.5 times more Daratard 17 set retarding admixture than the saltstone prepared with the September In addition, a sample prepared with lower shear mixing (stirring with a spatula) had a higher plastic viscosity (57 cP) than samples made with higher shear mixing in a blender (23cP). The static gel times of the saltstone slurries made with low shear mixing were also shorter (∼32 minutes) than those for comparable samples made in the blender (∼47 minutes). The addition of the various waste streams (ETP, HEU-HCAN, and GPE-HCAN) to Tank 50 from September 2005 to May 2006 has increased the amount of set retarder, Daratard 17, required for processing saltstone slurries through the Saltstone facility. If these streams are continued to be added to Tank 50, the quantity of admixtures required to maintain the same processing conditions for the Saltstone facility will probably change and additional testing is recommended to reconfirm the Tank 50 Saltstone formulation

  2. 基于AES和RSA的XML加密方案及实现%The crypto solutions & realizations of XML based on AES & RSA

    Institute of Scientific and Technical Information of China (English)

    韩星晔; 陈刚; 朱诗兵

    2005-01-01

    本文在分析高级密码算法(AES)的基础上,将AES算法与目前国际上应用最广泛的公开密码算法(RSA)相结合,针对数据库数据提出一个基于AES和RSA的XML加密方案,并给出了其实现过程.

  3. AN APPROXIMATE EXPRESSION RELATED WITH RSA FIXED POINTS%与RSA不动点有关的一个渐近表示

    Institute of Scientific and Technical Information of China (English)

    于秀源

    2004-01-01

    Let T=T(n,e,α) be the number of fixed points of RSA(n,e) that are co-prime with n=pq,and A,B be sets of prime numbers in (1,x) and (1,y) respectively. An estimation on the mean-valueM(A,B,e,α) = 1(#A)(#B) ∑p∈A,q∈B,(p,q)=1 logT(pq,e,α) is given.

  4. ENGINEERING CONTRACT ON FY-2 BATCH 2 SATELLITES SIGNED

    Institute of Scientific and Technical Information of China (English)

    SunQing

    2004-01-01

    The signing ceremony of the Engineering Contract on FY-2 Batch 2 (FY-2 02) Satellites was held in Beijing by Commission of Science, Technology and Industry for National Defense (COSTIND) on August 31, 2004. The contract on the development and manufacture of FY-2 batch 2 satellites and the contract on the launch, test and control of FY-2 Batch 2 satellites were signed by China Meteorological Administration (CMA),

  5. Batch routing queuing networks with jump-over blocking

    OpenAIRE

    Boucherie, Richard J.

    1993-01-01

    This paper shows that the equilibrium distribution of a queueing network with batch routing is of product-form if a batch which cannot enter the destination stations, for example as a consequence of capacity constraints, jumps over these stations and selects a new set of destination stations according to the routing probabilities, that is if also customers in the batch who arrive at a non-saturated station jump over that station.

  6. ADVANCES ON BILINEAR MODELING OF BIOCHEMICAL BATCH PROCESSES

    OpenAIRE

    GONZÁLEZ MARTÍNEZ, JOSÉ MARÍA

    2015-01-01

    [EN] This thesis is aimed to study the implications of the statistical modeling approaches proposed for the bilinear modeling of batch processes, develop new techniques to overcome some of the problems that have not been yet solved and apply them to data of biochemical processes. The study, discussion and development of the new methods revolve around the four steps of the modeling cycle, from the alignment, preprocessing and calibration of batch data to the monitoring of batches trajectories....

  7. A Survey of Batch Cataloging Practices and Problems

    OpenAIRE

    Young, Philip

    2011-01-01

    Groups of bibliographic records are added to library catalogs with increasing frequency. Batch cataloging requires knowledge of bulk record transfer as well as current cataloging standards. While more efficient than cataloging items individually, batch cataloging requires different skills and creates new challenges. Responses to a wide-ranging online survey document the workload, tools, practices, and problems of batch cataloging. The unique characteristics of electronic resources affect many...

  8. Spatial and interannual variability in Baltic sprat batch fecundity

    DEFF Research Database (Denmark)

    Haslob, H.; Tomkiewicz, Jonna; Hinrichsen, H.H.;

    2011-01-01

    central Baltic Sea, namely the Bornholm Basin, Gdansk Deep and Southern Gotland Basin. Environmental parameters such as hydrography, fish condition and stock density were tested in order to investigate the observed variability in sprat fecundity. Absolute batch fecundity was found to be positively related...... ambient temperature explained 70% of variability in absolute batch fecundity. Oxygen content and fish condition were not related to sprat batch fecundity. Additionally, a negative effect of stock size on sprat batch fecundity in the Bornholm Basin was revealed. The obtained data and results are important...

  9. Batch sequential designs for computer experiments

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Leslie M [Los Alamos National Laboratory; Williams, Brian J [Los Alamos National Laboratory; Loeppky, Jason L [UBC-OKANAGAN

    2009-01-01

    Computer models simulating a physical process are used in many areas of science. Due to the complex nature of these codes it is often necessary to approximate the code, which is typically done using a Gaussian process. In many situations the number of code runs available to build the Guassian process approximation is limited. When the initial design is small or the underlying response surface is complicated this can lead to poor approximations of the code output. In order to improve the fit of the model, sequential design strategies must be employed. In this paper we introduce two simple distance based metrics that can be used to augment an initial design in a batch sequential manner. In addition we propose a sequential updating strategy to an orthogonal array based Latin hypercube sample. We show via various real and simulated examples that the distance metrics and the extension of the orthogonal array based Latin hypercubes work well in practice.

  10. Maximum thermodynamic efficiency problem in batch distillation

    Directory of Open Access Journals (Sweden)

    J. C. Zavala-Loría

    2011-06-01

    Full Text Available A dynamic batch distillation study of the non-ideal mixture Ethanol-Water is presented. The objective of the study was to calculate an average thermodynamic efficiency of the process under an optimal constant reflux policy and the objective function includes a given production time in order to obtain the desired product quality (measured as the average mole fraction of the accumulated product. An expression for computing the thermodynamic efficiency is presented. The simulation of the column uses a mathematical model considering the complete dynamics of the operation and the problem of optimal control resulting in a non-linear programming problem. A dynamic optimization technique based on a SQP method was used to solve the problem. The average thermodynamic efficiency for the separation process under the conditions presented was 37.95%.

  11. Sewage sludge irradiators: Batch and continuous flow

    International Nuclear Information System (INIS)

    The potential threat to the environment imposed by high pathogenic organism content in municipal wastewater, especially the sludge and the world-wide growing aspirations for a cleaner, salubrious environment have made it mandatory for the sewage and sludge to undergo treatment, prior to their ultimate disposal to mother nature. Incapabilities associated with the conventional wastewater treatments to mitigate the problem of microorganisms have made it necessary to look for other alternatives, radiation treatment being the most reliable, rapid and environmentally sustainable of them. To promote the use of radiation for the sludge hygienization, Department of Atomic Energy has endeavoured to set up an indigenous, Sludge Hygienization Research Irradiator (SHRI) in the city of Baroda. Designed for 18.5 PBq of 60Co to disinfect the digested sludge, the irradiator has additional provision for treatment of effluent and raw sewage. From engineering standpoint, all the subsystems have been functioning satisfactorily since its commissioning in 1990. Prolonged studies, spanning over a period of six years, primarily focused on inactivation of microorganism revealed that 3 kGy dose of gamma radiation is adequate to make the sludge pathogen and odour-free. A dose of 1.6 kGy in raw sewage and 0.5 kGy in effluent reduced coliform counts down to the regulatory discharge limits. These observations reflect a possible cost-effective solution to the burgeoning problem of surface water pollution across the globe. In the past, sub 37 PBq 60Co batch irradiators have been designed and commissioned successfully for the treatment of sludge. Characterized with low dose delivery rates they are well-suited for treating low volumes of sludge in batches. Some concepts of continuous flow 60Co irradiators having larger activities, yet simple and economic in design, are presented in the paper

  12. On the stochastic domination for batch-arrival, batch-service and assemble-transfer queueing networks

    OpenAIRE

    Economou, Antonis

    2003-01-01

    Stochastic monotonicity properties for various classes of queueing networks have been established in the literature mainly with the use of coupling constructions. Miyazawa and Taylor (1997) introduced a class of batch-arrival, batch-service and assemble-transfer queueing networks which can be thought of as generalized Jackson networks with batch movements. We study conditions for stochastic domination within this class of networks. The proofs are based on a certain charac...

  13. Batch-to-batch uniformity of bacterial community succession and flavor formation in the fermentation of Zhenjiang aromatic vinegar.

    Science.gov (United States)

    Wang, Zong-Min; Lu, Zhen-Ming; Yu, Yong-Jian; Li, Guo-Quan; Shi, Jin-Song; Xu, Zheng-Hong

    2015-09-01

    Solid-state fermentation of traditional Chinese vinegar is a mixed-culture refreshment process that proceeds for many centuries without spoilage. Here, we investigated bacterial community succession and flavor formation in three batches of Zhenjiang aromatic vinegar using pyrosequencing and metabolomics approaches. Temporal patterns of bacterial succession in the Pei (solid-state vinegar culture) showed no significant difference (P > 0.05) among three batches of fermentation. In all the batches investigated, the average number of community operational taxonomic units (OTUs) decreased dramatically from 119 ± 11 on day 1 to 48 ± 16 on day 3, and then maintained in the range of 61 ± 9 from day 5 to the end of fermentation. We confirmed that, within a batch of fermentation process, the patterns of bacterial diversity between the starter (took from the last batch of vinegar culture on day 7) and the Pei on day 7 were similar (90%). The relative abundance dynamics of two dominant members, Lactobacillus and Acetobacter, showed high correlation (coefficient as 0.90 and 0.98 respectively) among different batches. Furthermore, statistical analysis revealed dynamics of 16 main flavor metabolites were stable among different batches. The findings validate the batch-to-batch uniformity of bacterial community succession and flavor formation accounts for the quality of Zhenjiang aromatic vinegar. Based on our understanding, this is the first study helps to explain the rationality of age-old artistry from a scientific perspective. PMID:25998816

  14. Continuous Cellulosic Bioethanol Fermentation by Cyclic Fed-Batch Cocultivation

    OpenAIRE

    Jiang, He-Long; He, Qiang; He, Zhili; Hemme, Christopher L.; Wu, Liyou; Zhou, Jizhong

    2013-01-01

    Cocultivation of cellulolytic and saccharolytic microbial populations is a promising strategy to improve bioethanol production from the fermentation of recalcitrant cellulosic materials. Earlier studies have demonstrated the effectiveness of cocultivation in enhancing ethanolic fermentation of cellulose in batch fermentation. To further enhance process efficiency, a semicontinuous cyclic fed-batch fermentor configuration was evaluated for its potential in enhancing the efficiency of cellulose...

  15. Communication and control in small batch part manufacturing

    NARCIS (Netherlands)

    Tiemersma, J.J.; Curtis, W.; Kals, H.J.J.

    1993-01-01

    This paper reports on the development of a real-time control network as an integrated part of a shop floor control system for small batch part manufacturing. The shop floor control system is called the production control system (PCS). The PCS aims at an improved control of small batch part manufactu

  16. Batch variation between branchial cell cultures: An analysis of variance

    DEFF Research Database (Denmark)

    Hansen, Heinz Johs. Max; Grosell, M.; Kristensen, L.

    2003-01-01

    We present in detail how a statistical analysis of variance (ANOVA) is used to sort out the effect of an unexpected batch-to-batch variation between cell cultures. Two separate cultures of rainbow trout branchial cells were grown on permeable filtersupports ("inserts"). They were supposed to be...

  17. Searching CA Condensates, On-Line and Batch.

    Science.gov (United States)

    Kaminecki, Ronald M.; And Others

    Batch mode processing is compared, using cost-effectiveness, with on-line processing for computer-aided searching of chemical abstracts. Consideration for time, need, coverage, and adaptability are found to be the criteria by which a searcher selects a method, and sometimes both methods are used. There is a tradeoff between batch mode's slower…

  18. 40 CFR Table 1 to Subpart H of... - Batch Processes

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Batch Processes 1 Table 1 to Subpart H of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Subpart H of Part 63—Batch Processes Monitoring Frequency for Equipment Other than Connectors...

  19. System Requirements for On-Line and Batch Retrieval.

    Science.gov (United States)

    American Society for Information Science, Washington, DC. Special Interest Group on Computerized Retrieval Services.

    Three papers on system requirements for on-line and batch retrieval presented at the American Society for Information Science (ASIS) annual meeting are included here. At G.D. Searle, data for records related to pharmacology screening are used in a batch system, and an on-line system is used to search information on mutagenic, carcinogenic, and…

  20. Improved batch correction in untargeted MS-based metabolomics

    NARCIS (Netherlands)

    Wehrens, Ron; Hageman, Jos A.; Eeuwijk, van Fred; Kooke, Rik; Flood, Pádraic J.; Wijnker, Erik; Keurentjes, Joost J.B.; Lommen, Arjen; Eekelen, van Henriëtte D.L.M.; Hall, Robert D.; Mumm, Roland; Vos, de Ric C.H.

    2016-01-01

    Introduction: Batch effects in large untargeted metabolomics experiments are almost unavoidable, especially when sensitive detection techniques like mass spectrometry (MS) are employed. In order to obtain peak intensities that are comparable across all batches, corrections need to be performed. S

  1. Dynamic Simulation of Batch Photocatalytic Reactor (BPR) for Wastewater Treatment

    Science.gov (United States)

    Dutta, Suman

    2012-08-01

    Reactive dyes discharged from dyehouse causes a serious environmental problem. UV/TiO2 photocatalysis has been employed effectively for these organic dyes removal from dye-house effluent. This process produces less amount of non-toxic final product. In this paper a photocatalytic reactor has been designed for Reactive red 198 (RR198) removal from aqueous solution. The reactor is operating in batch mode. After each batch, TiO2 catalyst has been separated and recycled in the next batch. Mathematical model equation of this batch photocatalytic reactor (BPR) has been developed considering Langmuir-Hinshelwood kinetics. Simulation of BPR has been carried out using fourth order Runge-Kutta (RK) method and fifth order RK method (Butcher method). This simulation results can be used to develop an automatic photocatlytic reactor for industrial wastewater treatment. Catalyst activity decay and its effect on each batch have been incorporated in this model.

  2. Biodenitrification in Sequencing Batch Reactors. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Silverstein, J. [Colorado Univ., Boulder, CO (United States). Dept. of Civil, Environmental, and Architectural Engineering

    1996-01-23

    One plan for stabilization of the Solar Pond waters and sludges at Rocky Flats Plant (RFP), is evaporation and cement solidification of the salts to stabilize heavy metals and radionuclides for land disposal as low-level mixed waste. It has been reported that nitrate (NO{sub 3}{sub {minus}}) salts may interfere with cement stabilization of heavy metals and radionuclides. Therefore, biological nitrate removal (denitrification) may be an important pretreatment for the Solar Pond wastewaters at RFP, improving the stability of the cement final waste form, reducing the requirement for cement (or pozzolan) additives and reducing the volume of cemented low-level mixed waste requiring ultimate disposal. A laboratory investigation of the performance of the Sequencing Batch Reactor (SBR) activated sludge process developed for nitrate removal from a synthetic brine typical of the high-nitrate and high-salinity wastewaters in the Solar Ponds at Rocky Flats Plant was carried out at the Environmental Engineering labs at the University of Colorado, Boulder, between May 1, 1994 and October 1, 1995.

  3. Biodenitrification in Sequencing Batch Reactors. Final report

    International Nuclear Information System (INIS)

    One plan for stabilization of the Solar Pond waters and sludges at Rocky Flats Plant (RFP), is evaporation and cement solidification of the salts to stabilize heavy metals and radionuclides for land disposal as low-level mixed waste. It has been reported that nitrate (NO3-) salts may interfere with cement stabilization of heavy metals and radionuclides. Therefore, biological nitrate removal (denitrification) may be an important pretreatment for the Solar Pond wastewaters at RFP, improving the stability of the cement final waste form, reducing the requirement for cement (or pozzolan) additives and reducing the volume of cemented low-level mixed waste requiring ultimate disposal. A laboratory investigation of the performance of the Sequencing Batch Reactor (SBR) activated sludge process developed for nitrate removal from a synthetic brine typical of the high-nitrate and high-salinity wastewaters in the Solar Ponds at Rocky Flats Plant was carried out at the Environmental Engineering labs at the University of Colorado, Boulder, between May 1, 1994 and October 1, 1995

  4. Bottleneck Management in Discrete Batch Production

    Directory of Open Access Journals (Sweden)

    Ferenčíková Denisa

    2012-06-01

    Full Text Available Today, production planning and scheduling becomes very important part of production management because companies have to react to dynamic market conditions and rising customers´ requirements for shorter delivery times, lower prices and better quality and services. They can use a lot of sophisticated methods and approaches to make their planning processes more efficient and thus meet growing customers´ requirements. However, using these new approaches is not so easy in all types of production systems. This paper deals with production planning and scheduling in discrete batch production that is just an example of very complicated production system. This type of production process is susceptible to demand fluctuation and facility exceptions and this implies bottleneck shifting. Therefore it is quite difficult to implement methods such as Theory of Constraints (TOC for production planning improvement in the standard way. One part of this paper is a case study wherecurrent production planning and scheduling in real factory is improved just through the use TOC principles.

  5. Batch-to-batch learning for model-based control of process systems with application to cooling crystallization

    NARCIS (Netherlands)

    Forgione, M.

    2014-01-01

    From an engineering perspective, the term process refers to a conversion of raw materials into intermediate or final products using chemical, physical, or biological operations. Industrial processes can be performed either in continuous or in batch mode. There exist for instance continuous and batch

  6. Kinetic study of batch and fed-batch enzymatic saccharification of pretreated substrate and subsequent fermentation to ethanol

    Directory of Open Access Journals (Sweden)

    Gupta Rishi

    2012-03-01

    Full Text Available Abstract Background Enzymatic hydrolysis, the rate limiting step in the process development for biofuel, is always hampered by its low sugar concentration. High solid enzymatic saccharification could solve this problem but has several other drawbacks such as low rate of reaction. In the present study we have attempted to enhance the concentration of sugars in enzymatic hydrolysate of delignified Prosopis juliflora, using a fed-batch enzymatic hydrolysis approach. Results The enzymatic hydrolysis was carried out at elevated solid loading up to 20% (w/v and a comparison kinetics of batch and fed-batch enzymatic hydrolysis was carried out using kinetic regimes. Under batch mode, the actual sugar concentration values at 20% initial substrate consistency were found deviated from the predicted values and the maximum sugar concentration obtained was 80.78 g/L. Fed-batch strategy was implemented to enhance the final sugar concentration to 127 g/L. The batch and fed-batch enzymatic hydrolysates were fermented with Saccharomyces cerevisiae and ethanol production of 34.78 g/L and 52.83 g/L, respectively, were achieved. Furthermore, model simulations showed that higher insoluble solids in the feed resulted in both smaller reactor volume and shorter residence time. Conclusion Fed-batch enzymatic hydrolysis is an efficient procedure for enhancing the sugar concentration in the hydrolysate. Restricting the process to suitable kinetic regimes could result in higher conversion rates.

  7. 21 CFR 320.35 - Requirements for in vitro testing of each batch.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Requirements for in vitro testing of each batch... of each batch. If a bioequivalence requirement specifies a currently available in vitro test or an in... conduct the test on a sample of each batch of the drug product to assure batch-to-batch uniformity....

  8. 40 CFR 204.57-7 - Acceptance and rejection of batch sequence.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Acceptance and rejection of batch... § 204.57-7 Acceptance and rejection of batch sequence. (a) The manufacturer will continue to inspect consecutive batches until the batch sequence is accepted or rejected. The batch sequence will be accepted...

  9. 40 CFR 63.1322 - Batch process vents-reference control technology.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Batch process vents-reference control... Batch process vents—reference control technology. (a) Batch process vents. The owner or operator of a... venting to any combustion control device, and thus make the batch process vent, aggregate batch...

  10. Morphologically structured model for antitumoral retamycin production during batch and fed-batch cultivations of Streptomyces olindensis.

    Science.gov (United States)

    Giudici, Reinaldo; Pamboukian, Celso R D; Facciotti, Maria Cândida R

    2004-05-20

    A morphologically structured model is proposed to describe trends in biomass growth, substrate consumption, and antitumoral retamycin production during batch and fed-batch cultivations of Streptomyces olindensis. Filamentous biomass is structured into three morphological compartments (apical, subapical, and hyphal), and the production of retamycin, a secondary metabolite, is assumed to take place in the subapical cell compartment. Model accounts for the effect of glucose as well as complex nitrogen source on both the biomass growth and retamycin production. Laboratory data from bench-scale batch and fed-batch fermentations were used to estimate some model parameters by nonlinear regression. The predictive capability of the model was then tested for additional fed-batch and continuous experiments not used in the previous fitting procedure. The model predictions show fair agreement to the experimental data. The proposed model can be useful for further studies on process optimization and control. PMID:15112294

  11. 40 CFR Table 6 to Subpart U of... - Group 1 Batch Front-End Process Vents and Aggregate Batch Vent Streams-Monitoring, Recordkeeping...

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Group 1 Batch Front-End Process Vents and Aggregate Batch Vent Streams-Monitoring, Recordkeeping, and Reporting Requirements 6 Table 6 to... 6 to Subpart U of Part 63—Group 1 Batch Front-End Process Vents and Aggregate Batch Vent...

  12. 40 CFR Table 7 to Subpart Jjj of... - Group 1 Batch Process Vents and Aggregate Batch Vent Streams-Monitoring, Recordkeeping, and...

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Group 1 Batch Process Vents and Aggregate Batch Vent Streams-Monitoring, Recordkeeping, and Reporting Requirements 7 Table 7 to Subpart JJJ... Table 7 to Subpart JJJ of Part 63—Group 1 Batch Process Vents and Aggregate Batch Vent...

  13. RsaI but not DraI polymorphism in CYP2E1 gene increases the risk of gastrointestinal cancer in Malaysians: a case–control study

    Science.gov (United States)

    Chong, Eric Tzyy Jiann; Lee, Chong Cin; Chua, Kek Heng; Chuah, Jitt Aun; Lee, Ping-Chin

    2014-01-01

    Objectives Our study aimed to investigate the association of CYP2E1 C-1019T RsaI and T7678A DraI polymorphisms and factors such as age, gender and ethnicity to the risk of gastrointestinal cancer (GIC) in Malaysians. Design Case–control study. Setting Malaysia. Participants 520 consented healthy blood donors with no previous GIC record and 175 patients with GIC. Measurements C-1019T RsaI and T7678A DraI genotyping of CYP2E1 gene; direct sequencing. Results This study reveals that the variant c2 allele and carrier with at least one c2 allele of C-1019T single nucleotide polymorphism (SNP) significantly increased the risk of GIC but no significant association was found between T7678A SNP and combined analysis of C-1019T and T7678A SNPs to risk of GIC. The Malaysian Chinese had greater risk of GIC compared with the Malays, Indians and KadazanDusun. An increased risk of GIC was observed in individuals aged >40 years and women had a 2.22-fold and 1.58-fold increased risk of stomach and colorectal cancers, respectively, when compared with men. Limitations The future research should be conducted with a larger sample population and including the gene–gene and gene–environmental interactions. Conclusions Our study suggests that the rare c2 allele and carrier with at least one c2 allele of CYP2E1 RsaI polymorphism significantly elevated the risk of GIC and may be used as a genetic biomarker for early screening of GIC in Malaysians. The risk age-group has been shifted to a younger age at 40s and women showed a significant greater risk of stomach and colorectal cancers than men. PMID:24394801

  14. Large improvements in application throughput of long-running multi-component applications using batch grids

    OpenAIRE

    Sundari, Sivagama M.; Vadhiyar, Sathish S.; Nanjundiah, Ravi S.

    2012-01-01

    Computational grids with multiple batch systems (batch grids) can be powerful infrastructures for executing long-running multi-component parallel applications. In this paper, we evaluate the potential improvements in throughput of long-running multi-component applications when the different components of the applications are executed on multiple batch systems of batch grids. We compare the multiple batch executions with executions of the components on a single batch system without increasing ...

  15. Minimizing makespan in a two-machine no-wait flow shop with batch processing machines

    OpenAIRE

    Muthuswamy, Shanthi; V??lez Gallego, Mario C??sar; Rojas Santiago, Miguel; Maya Toro, Jairo

    2012-01-01

    Given a set of jobs and two batch processing machines (BPMs) arranged in a flow shop environment,the objective is to batch the jobs and sequence the batches such that the makespan is minimized. The job sizes, ready times, and processing times on the two BPMs are knowN -- The batch processing machines can process a batch of jobs as long as the total size of all the jobs assigned to a batch does not exceed its capacity -- Once the jobs are batched, the processing time of the batch on the first ...

  16. Xylitol production by Candida parapsilosis under fed-batch culture

    OpenAIRE

    Furlan Sandra A.; Castro Heizir F. de

    2001-01-01

    Xylitol production by Candida parapsilosis was investigated under fed-batch cultivation, using single (xylose) or mixed (xylose and glucose) sugars as substrates. The presence of glucose in the medium induced the production of ethanol as secondary metabolite and improved specific rates of growth, xylitol formation and substrate consumption. Fractionated supply of the feed medium at constant sugar concentration did not promote any increase on the productivity compared to the single batch culti...

  17. Statistical strategies for microRNAseq batch effect reduction

    OpenAIRE

    Guo, Yan; Zhao, Shilin; Su, Pei-Fang; Li, Chung-I; Ye, Fei; Flynn, Charles R.; Shyr, Yu

    2014-01-01

    RNAseq technology is replacing microarray technology as the tool of choice for gene expression profiling. While providing much richer data than microarray, analysis of RNAseq data has been much more challenging. Among the many difficulties of RNAseq analysis, correctly adjusting for batch effect is a pivotal one for large-scale RNAseq based studies. The batch effect of RNAseq data is most obvious in microRNA (miRNA) sequencing studies. Using real miRNA sequencing (miRNAseq) dat...

  18. Optimal configuration, design and operation of batch distillation processes

    OpenAIRE

    Low, K. H.

    2003-01-01

    The overall objective of this thesis is to study the optimal configuration. design and operating policy of batch distillation processes in different separation scenarios. In so doing, this work also aims to provide conceptual insights and compare the performance of the traditional regular column against unconventional columns. In the first part of the thesis, the optimal operation of extractive batch distillation is investigated. A rigorous dynamic optimisation approach based o...

  19. APPLICATION OF MODEL PREDICTIVE CONTROL TO BATCH POLYMERIZATION REACTOR

    OpenAIRE

    N.M. Ghasem; Hussain, M. A.; S. A. Sata

    2006-01-01

    The absence of a stable operational state in polymerization reactors that operates in batches is factor that determine the need of a special control system. In this study, advanced control methodology is implemented for controlling the operation of a batch polymerization reactor for polystyrene production utilizingmodel predictive control. By utilizing a model of the polymerization process, the necessary operational conditions were determined for producing the polymer within the desired chara...

  20. Dynamic Extensions of Batch Systems with Cloud Resources

    International Nuclear Information System (INIS)

    Compute clusters use Portable Batch Systems (PBS) to distribute workload among individual cluster machines. To extend standard batch systems to Cloud infrastructures, a new service monitors the number of queued jobs and keeps track of the price of available resources. This meta-scheduler dynamically adapts the number of Cloud worker nodes according to the requirement profile. Two different worker node topologies are presented and tested on the Amazon EC2 Cloud service.

  1. Fault Diagnosis of Batch Reactor Using Machine Learning Methods

    OpenAIRE

    2014-01-01

    Fault diagnosis of a batch reactor gives the early detection of fault and minimizes the risk of thermal runaway. It provides superior performance and helps to improve safety and consistency. It has become more vital in this technical era. In this paper, support vector machine (SVM) is used to estimate the heat release (Qr) of the batch reactor both normal and faulty conditions. The signature of the residual, which is obtained from the difference between nominal and estimated faulty Qr values,...

  2. [Characteristic of Particulate Emissions from Concrete Batching in Beijing].

    Science.gov (United States)

    Xue, Yi-feng; Zhou, Zhen; Zhong, Lian-hong; Yan, Jing; Qu, Song; Huang, Yu-hu; Tian, He- zhong; Pan, Tao

    2016-01-15

    With the economic development and population growth in Beijing, there is a strong need for construction and housing, which leads to the increase of the construction areas. Meanwhile, as a local provided material, the production of concrete has been raised. In the process of concrete production by concrete batching, there are numerous particulates emitted, which have large effect on the atmospheric environment, however, systematic study about the tempo-spatial characteristics of pollutant emission from concrete batching is still rare. In this study, we estimated the emission of particulates from concrete batching from 1991 to 2012 using emission factor method, analyzed the tempo-spatial characteristics of pollutant emission, established the uncertainty range by adopting Monte-Carlo method, and predicted the future emission in 2020 based on the relative environmental and economical policies. The results showed that: (1) the emissions of particulates from concrete batching showed a trend of "first increase and then decrease", reaching the maximum in 2005, and then decreased due to stricter emission standard and enhanced environmental management. (2) according to spatial distribution, the emission of particulates from concrete batch mainly concentrated in the urban area with more human activities, and the area between the fifth ring and the sixth ring contributed the most. (3) through scenarios analysis, for further reducing the emission from concrete batching in 2020, more stricter standard for green production as well as powerful supervision is needed. PMID:27078945

  3. Batch process monitoring based on multilevel ICA-PCA

    Institute of Scientific and Technical Information of China (English)

    Zhi-qiang GE; Zhi-huan SONG

    2008-01-01

    In this paper,we describe a new batch process monitoring method based on multilevel independent component analysis and principal component analysis (MLICA-PCA).Unlike the conventional multi-way principal component analysis (MPCA) method,MLICA-PCA provides a separated interpretation for multilevel batch process data.Batch process data are partitioned into two levels:the within-batch level and the between-batch level.In each level,the Gaussian and non-Ganssian components of process information can be separately extracted.I2,T2 and SPE statistics are individually built and monitored.The new method facilitates fault diagnosis.Since the two variation levels arc decomposed,the variables responsible for faults in each level can be identified and interpreted more easily.A case study of the Dupont benchmark process showed that the proposed method was more efficient and interpretable in fault detection and diagnosis,compared to the alternative batch process monitoring method.

  4. OPLS in batch monitoring - Opens up new opportunities.

    Science.gov (United States)

    Souihi, Nabil; Lindegren, Anders; Eriksson, Lennart; Trygg, Johan

    2015-02-01

    In batch statistical process control (BSPC), data from a number of "good" batches are used to model the evolution (trajectory) of the process and they also define model control limits, against which new batches may be compared. The benchmark methods used in BSPC include partial least squares (PLS) and principal component analysis (PCA). In this paper, we have used orthogonal projections to latent structures (OPLS) in BSPC and compared the results with PLS and PCA. The experimental study used was a batch hydrogenation reaction of nitrobenzene to aniline characterized by both UV spectroscopy and process data. The key idea is that OPLS is able to separate the variation in data that is correlated to the process evolution (also known as 'batch maturity index') from the variation that is uncorrelated to process evolution. This separation of different types of variations can generate different batch trajectories and hence lead to different established model control limits to detect process deviations. The results demonstrate that OPLS was able to detect all process deviations and provided a good process understanding of the root causes for these deviations. PCA and PLS on the other hand were shown to provide different interpretations for several of these process deviations, or in some cases they were unable to detect actual process deviations. Hence, the use of OPLS in BSPC can lead to better fault detection and root cause analysis as compared to existing benchmark methods and may therefore be used to complement the existing toolbox. PMID:25604817

  5. Shortcut Algorithm for Simulation of Batch Extractive Distillation

    Institute of Scientific and Technical Information of China (English)

    WU Huixiong; XU Shimin; HU Hui; XIAO Bin

    2007-01-01

    The batch extractive distillation (BED) process has the advantages of both batch and extractive distillation. It is one of the most promising means for the separation of azeotropic and close-boiling point systems. However, so far this process has not been applied in industry due to its over-complexity. A new shortcut model was proposed to simulate the operation of the batch extractive distillation operations. This algorithm is based on the assumption that the batch extractive distillation column can be considered as a continuous extractive distillation column with changing feed at anytime. Namely, the whole batch process is simulated as a succession of a finite number of steady states of short duration, in which holdup is considered as constant mole. For each period of time the batch extractive distillation process is solved through the algorithm for continuous extractive distillation. Finally, the practical implementation of the shortcut model is discussed and data from the lab-oratory and literature are presented. It is found that this model has better adaptability, more satisfactory accuracy and less calculative load than previous rigorous model. Hence the algorithm for simulating BED is verified.

  6. IVR RSA Database

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This database contains trip-level reports submitted by vessels participating in Research Set-Aside projects with IVR reporting requirements.

  7. 基于RSA的数字图像加密算法%An Encryption Algorithm for Digital Image Based on RSA System

    Institute of Scientific and Technical Information of China (English)

    杨昔阳; 李志伟

    2009-01-01

    It proposes a novel encryption method for digital image based on an Arnold scrambling transform, a chaos encryption algorithm and RSA encryption system. The parameters of the Arnold transform and chaos encryption algorithm are encrypted by RSA system and stored in LSB of an image to ensure the security in transmission. The example in this paper shows that the proposed method is an efficient way to encrypt a digital image.%提出一种基于RSA公钥、Arnold置乱变换和混沌加密算法相结合的公开密钥数字图像加密体制,利用客户的公钥对Arnold置乱变换和混沌序列初值进行RSA加密,确保了只有合法用户才能获取置乱参数信息并将图像复原.RSA对参数的加密信息隐藏于图像LSB中,无需另外传递密文,运算简单,具有良好的加密与隐藏效果.

  8. Effect of batch and fed-batch growth modes on biofilm formation by Listeria monocytogenes at different temperatures

    OpenAIRE

    Rodrigues, Diana Alexandra Ferreira; Almeida, Marta A. S.; Teixeira, P.; Oliveira, Rosário; Azeredo, Joana

    2009-01-01

    The influence of Listeria monocytogenes (L. monocytogenes) biofilm formation feeding conditions (batch and fed-batch) at different temperatures on biofilm biomass and activity was determined. Biofilm biomass and cellular metabolic activity were assessed by Crystal Violet (CV) staining and 2,3-bis(2-methoxy-4-nitro-5-sulfophenyl)-2H-tetrazolium-5-carboxanilide inner salt (XTT) colorimetric method, respectively. Live/Dead staining was also performed in order to get microscopic visualization of ...

  9. Design and Application of Software Sensors in Batch and Fed-batch Cultivations during Recombinant Protein Expression in Escherichia coli

    OpenAIRE

    Warth, Benedikt

    2008-01-01

    Software sensors are a potent tool to improve biotechnological real time process monitoring and control. In the current project, algorithms for six partly novel, software sensors were established and tested in a microbial reactor system. Eight batch and two fed-batch runs were carried out with a recombinant Escherichia coli to investigate the suitability of the different software sensor models in diverse cultivation stages. Special respect was given to effects on the sensors after recombinant...

  10. SLUDGE BATCH VARIABILITY STUDY WITH FRIT 418

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, F.; Edwards, T.

    2010-11-29

    The Defense Waste Processing Facility (DWPF) initiated processing Sludge Batch 6 (SB6) in the summer of 2010. In support of processing, the Savannah River National Laboratory (SRNL) provided a recommendation to utilize Frit 418 to process SB6. This recommendation was based on assessments of the compositional projections for SB6 available at the time from the Liquid Waste Organization (LWO) and SRNL (using a model-based approach). To support qualification of SB6, SRNL executed a variability study to assess the applicability of the current durability models for SB6. The durability models were assessed over the expected Frit 418-SB6 composition range. Seventeen glasses were selected for the variability study based on the sludge projections used in the frit recommendation. Five of the glasses are based on the centroid of the compositional region, spanning a waste loading (WL) range of 32 to 40%. The remaining twelve glasses are extreme vertices (EVs) of the sludge region of interest for SB6 combined with Frit 418 and are all at 36% WL. These glasses were fabricated and characterized using chemical composition analysis, X-ray diffraction (XRD) and the Product Consistency Test (PCT). After initiating the SB6 variability study, the measured composition of the SB6 Tank 51 qualification glass produced at the SRNL Shielded Cells Facility indicated that thorium was present in the glass at an appreciable concentration (1.03 wt%), which made it a reportable element for SB6. This concentration of ThO{sub 2} resulted in a second phase of experimental studies. Five glasses were formulated that were based on the centroid of the new sludge compositional region combined with Frit 418, spanning a WL range of 32 to 40%. These glasses were fabricated and characterized using chemical composition analysis and the PCT. Based on the measured PCT response, all of the glasses (with and without thorium) were acceptable with respect to the Environmental Assessment (EA) reference glass

  11. SLUDGE BATCH 7B GLASS VARIABILITY STUDY

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, F.; Edwards, T.

    2011-10-25

    The Defense Waste Processing Facility (DWPF) is preparing to initiate processing Sludge Batch 7b (SB7b). In support of the upcoming processing, the Savannah River National Laboratory (SRNL) provided a recommendation to utilize Frits 418 with a 6% Na{sub 2}O addition (26 wt% Na{sub 2}O in sludge) and 702 with a 4% Na{sub 2}O addition (24 wt% Na{sub 2}O in sludge) to process SB7b. This recommendation was based on assessments of the compositional projections for SB7b available at the time from the Savannah River Remediation (SRR). To support qualification of SB7b, SRNL executed a variability study to assess the applicability of the current durability models for SB7b. The durability models were assessed over the expected composition range of SB7b, including potential caustic additions, combined with Frits 702 and 418 over a 32-40% waste loading (WL) range. Thirty four glasses were selected based on Frits 418 and 702 coupled with the sludge projections with an additional 4-6% Na{sub 2}O to reflect the potential caustic addition. Six of these glasses, based on average nominal sludge compositions including the appropriate caustic addition, were developed for both Frit 418 and Frit 702 at 32, 36 and 40% WL to provide coverage in the center of the anticipated SB7b glass region. All glasses were fabricated and characterized using chemical composition analysis, X-ray diffraction (XRD) and the Product Consistency Test (PCT). To comply with the DWPF Glass Product Control Program, a total of thirty four glasses were fabricated to assess the applicability of the current DWPF PCCS durability models. Based on the measured PCT response, all of the glasses were acceptable with respect to the Environmental Assessment (EA) benchmark glass regardless of thermal history. The NL[B] values of the SB7b variability study glasses were less than 1.99 g/L as compared to 16.695 g/L for EA. A small number of the D-optimally selected 'outer layer' extreme vertices (EV) glasses were not

  12. Sludge Batch Variability Study With Frit 418

    International Nuclear Information System (INIS)

    The Defense Waste Processing Facility (DWPF) initiated processing Sludge Batch 6 (SB6) in the summer of 2010. In support of processing, the Savannah River National Laboratory (SRNL) provided a recommendation to utilize Frit 418 to process SB6. This recommendation was based on assessments of the compositional projections for SB6 available at the time from the Liquid Waste Organization (LWO) and SRNL (using a model-based approach). To support qualification of SB6, SRNL executed a variability study to assess the applicability of the current durability models for SB6. The durability models were assessed over the expected Frit 418-SB6 composition range. Seventeen glasses were selected for the variability study based on the sludge projections used in the frit recommendation. Five of the glasses are based on the centroid of the compositional region, spanning a waste loading (WL) range of 32 to 40%. The remaining twelve glasses are extreme vertices (EVs) of the sludge region of interest for SB6 combined with Frit 418 and are all at 36% WL. These glasses were fabricated and characterized using chemical composition analysis, X-ray diffraction (XRD) and the Product Consistency Test (PCT). After initiating the SB6 variability study, the measured composition of the SB6 Tank 51 qualification glass produced at the SRNL Shielded Cells Facility indicated that thorium was present in the glass at an appreciable concentration (1.03 wt%), which made it a reportable element for SB6. This concentration of ThO2 resulted in a second phase of experimental studies. Five glasses were formulated that were based on the centroid of the new sludge compositional region combined with Frit 418, spanning a WL range of 32 to 40%. These glasses were fabricated and characterized using chemical composition analysis and the PCT. Based on the measured PCT response, all of the glasses (with and without thorium) were acceptable with respect to the Environmental Assessment (EA) reference glass regardless of

  13. Batch and Pulsed Fed-Batch Cultures of Aspergillus flavipes FP-500 Growing on Lemon Peel at Stirred Tank Reactor.

    Science.gov (United States)

    Wolf-Márquez, V E; García-García, E; García-Rivero, M; Aguilar-Osorio, G; Martínez Trujillo, M A

    2015-11-01

    Aspergillus flavipes FP-500 grew up on submerged cultures using lemon peel as the only carbon source, developing several batch and pulsed fed-batch trials on a stirred tank reactor. The effect of carbon source concentration, reducing sugar presence and initial pH on exopectinase and endopectinase production, was analyzed on batch cultures. From this, we observed that the highest substrate concentration favored biomass (X max) but had not influence on the corresponding specific production (q p) of both pectinases; the most acid condition provoked higher endopectinase-specific productions but had not a significant effect on those corresponding to exopectinases; and reducing sugar concentrations higher than 1.5 g/L retarded pectinase production. On the other hand, by employing the pulsed fed-batch operation mode, we observed a prolonged growth phase, and an increase of about twofold on endopectinase production without a significant raise on biomass concentration. So, pulsed fed-batch seems to be a good alternative for obtaining higher endopectinase titers by using high lemon peel quantities without having mixing and repression problems to the system. The usefulness of unstructured kinetic models for explaining, under a theoretic level, the behavior of the fungus along the batch culture with regard to pectinase production was evident. PMID:26304128

  14. A study on clavulanic acid production by Streptomyces clavuligerus in batch, fed-batch and continuous processes

    Directory of Open Access Journals (Sweden)

    A. B. Neto

    2005-12-01

    Full Text Available Clavulanic acid (CA is a potent inhibitor of beta-lactamases, enzymes that are responsible for the hydrolysis of beta-lactam antibiotics. It is a secondary metabolite produced by the filamentous aerobic bacterium Streptomyces clavuligerus in submerged cultivations. In the present work clavulanic acid production in batch, fed-batch and continuous bioreactors was studied with the objective of increasing productivity. The operating conditions: temperature, aeration and agitation, were the same in all cases, 28º C, 0.5 vvm and 800 rpm, respectively. The CA concentration obtained in the fed-batch culture, 404 mg L-1, was ca twice the value obtained in the batch culture, 194 mg L-1, while 293 mg L-1 was obtained in the continuous culture. The highest productivity was obtained in the continuous cultivation, 10.6 mg L-1 h-1, as compared with 8.8 mg L-1 h-1 in the fed-batch process and 3.5 mg L-1 h-1 in the batch process, suggesting that continuous culture of Streptomyces clavuligerus is a promising strategy for clavulanic acid production.

  15. Neutron batch size optimisation methodology for Monte Carlo criticality calculations

    International Nuclear Information System (INIS)

    Highlights: • A method is suggested for improving efficiency of MC criticality calculations. • The method optimises the number of neutrons simulated per cycle. • The optimal number of neutrons per cycle depends on allocated computing time. - Abstract: We present a methodology that improves the efficiency of conventional power iteration based Monte Carlo criticality calculations by optimising the number of neutron histories simulated per criticality cycle (the so-called neutron batch size). The chosen neutron batch size affects both the rate of convergence (in computing time) and magnitude of bias in the fission source. Setting a small neutron batch size ensures a rapid simulation of criticality cycles, allowing the fission source to converge fast to its stationary state; however, at the same time, the small neutron batch size introduces a large systematic bias in the fission source. It follows that for a given allocated computing time, there is an optimal neutron batch size that balances these two effects. We approach this problem by studying the error in the cumulative fission source, i.e. the fission source combined over all simulated cycles, as all results are commonly combined over the simulated cycles. We have deduced a simplified formula for the error in the cumulative fission source, taking into account the neutron batch size, the dominance ratio of the system, the error in the initial fission source and the allocated computing time (in the form of the total number of simulated neutron histories). Knowing how the neutron batch size affects the error in the cumulative fission source allows us to find its optimal value. We demonstrate the benefits of the method on a number of numerical test calculations

  16. Batch Scheduling on Two-Machine Flowshop with Machine-Dependent Setup Times

    OpenAIRE

    Daniel Oron; Gur Mosheiov; Lika Ben-Dati

    2009-01-01

    We study a batch scheduling problem on a 2-machine flowshop. We assume unit processing time jobs, batch availability, and machine-dependent setup times. The objective is to find a job allocation to batches of integer size and a batch schedule that minimize makespan. We introduce a very efficient closed form solution for the problem.

  17. 40 CFR 63.486 - Batch front-end process vent provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Batch front-end process vent provisions... Batch front-end process vent provisions. (a) Batch front-end process vents. Except as specified in paragraph (b) of this section, owners and operators of new and existing affected sources with batch...

  18. 40 CFR 63.1327 - Batch process vents-reporting requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Batch process vents-reporting... Batch process vents—reporting requirements. (a) The owner or operator of a batch process vent or aggregate batch vent stream at an affected source shall submit the information specified in paragraphs...

  19. 40 CFR 63.1326 - Batch process vents-recordkeeping provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Batch process vents-recordkeeping... Batch process vents—recordkeeping provisions. (a) Group determination records for batch process vents... batch process vent subject to the group determination procedures of § 63.1323. Except for paragraph...

  20. 40 CFR Table 3 to Subpart Ooo of... - Batch Process Vent Monitoring Requirements

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Batch Process Vent Monitoring... Resins Pt. 63, Subpt. OOO, Table 3 Table 3 to Subpart OOO of Part 63—Batch Process Vent Monitoring... the batch process vents or aggregate batch vent streams are not introduced with or used as the...

  1. 21 CFR 111.255 - What is the requirement to establish a batch production record?

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false What is the requirement to establish a batch... System: Requirements for the Batch Production Record § 111.255 What is the requirement to establish a batch production record? (a) You must prepare a batch production record every time you manufacture...

  2. 40 CFR 63.492 - Batch front-end process vents-reporting requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Batch front-end process vents-reporting... Batch front-end process vents—reporting requirements. (a) The owner or operator of a batch front-end process vent or aggregate batch vent stream at an affected source shall submit the information...

  3. Timing and Estimates of Plio-Pleistocene Sea-Level Highstands from the Republic of South Africa (RSA)

    Science.gov (United States)

    Hearty, Paul; Raymo, Maureen; Sandstrom, Michael; Rovere, Alessio; O'Leary, Michael

    2016-04-01

    The rapid rise in atmospheric CO2 exceeding 400 ppmv is driving an urgent need to better understand past sea level, ice sheet dynamics, and climate change associated with past warmer geological intervals. The LR04 record reveals sustained intervals during the Pliocene (5.6-2.6 Ma) when δ18O exceeded the present levels, indicating a possible decrease in the volume of polar ice sheets. Other shorter intervals of likely decreased ice volume occur during Pleistocene interglacials including MIS 5e, 11, 31, and 37.Here we focus on the middle Pliocene warm period (MPWP; 3.3 to 2.9 Ma), an interval during which Earth experienced CO2 levels around 400 ppmv (Fedorov et al., 2013). The intra-plate coastal margin of western South Africa, a region of relative tectonic stability and relative insensitivity to uncertainty in mantle viscosity as is effects corrections for glacial isostatic adjustment, is a promising region for deriving estimates of eustatic sea level (ESL; thus ice volumes) at the end of the MPWP (Rovere et al., 2014). During a field expedition covering several thousand kilometres along coastlines of western and southern coasts of RSA, we documented the stratigraphy, geomorphology, and geochronology of Pliocene and Pleistocene shorelines with differential GPS providing decimeter scale accuracy to stratigraphic contacts and sea-level indicators. From about twenty sites, precise elevations (as yet uncorrected for GIA) of multiple sea stands were recorded. Strontium isotopes were used to date the shell material from many of the marine sites, but only three sites yielded reliable age data that passed screening criteria for diagenesis. The oldest shoreline evidence, from Cliffs Point on the west coast near the Olifants River, is observed at 34.9 ±0.2 m asl and yields an age 4.70 ± 0.20 Ma; a younger shoreline from the southern coast Bredasdorp site is observed at >24.0 ± 1.5 m asl and yields ages from 3.00 ± 0.45 to 3.55 ± 0.31 Ma, the interval of the MPWP. . A

  4. Efectos de 2 Tipos de Entrenamiento Interválico de Alta Intensidad en la Habilidad para Realizar Esfuerzos Máximos (RSA Durante una Pretemporada de Fútbol

    Directory of Open Access Journals (Sweden)

    Alejandro Rodríguez Fernández

    2014-01-01

    Full Text Available El trabajo de pretemporada persigue mejorar el rendimiento del futbolista tanto en lo referente a la habilidad para realizar esfuerzos máximos como a su capacidad aeróbica y de recuperación. El objetivo de este estudio fue comparar durante una pretemporada los efectos de 2 programas de entrenamiento interválicos con series de diferente duración en la habilidad de repetir sprints (RSA. Diecinueve jugadores de fútbol con valores medios ± SD de 20,9 ± 1,6 años de edad; 68,8 ± 5,1 Kg de peso; 176,1 ± 5,1 cm de altura; y 9,6 ± 2,4% de grasa corporal fueron asignados al azar al grupo de Speed Endurance Training (SET para realizar 2x10 min con 10, 15 y 20 s al 100% con 30, 45 y 60 s de recuperación (n = 9, o al grupo High Interval Training (HIT para realizar 4x4 min al 95% FCmax (n = 10. Un test RSA de 8x30 m con 25 s de recuperación activa fue realizado antes y después de la intervención (10 sesiones de entrenamiento junto con un Yo-Yo Intermittent Recovery Test level 1 en la evaluación inicial. Tanto SET como HIT ven incrementado su rendimiento de forma significativa (p < 0,05 en RSAmejor (3,12% y 3,59% respectivamente y muy significativamente (p < 0,01 en RSAmedia (3,00% y 3,91% y RSAtotal (3,12% y 4,08%, pero sin cambios significativos en los índices de fatiga (Sdec y Change. Estos resultados demuestran que tanto la intervención SET como HIT se han mostrado útiles para aumentar el rendimiento en algunas de las variables determinantes en el test RSA, durante el periodo de pretemporada.

  5. From Fed-batch to Continuous Enzymatic Biodiesel Production

    DEFF Research Database (Denmark)

    Price, Jason Anthony; Nordblad, Mathias; Woodley, John M.;

    2015-01-01

    In this this paper, we use mechanistic modelling to guide the development of acontinuous enzymatic process that is performed as a fed-batch operation. In this workwe use the enzymatic biodiesel process as a case study. A mechanistic model developedin our previous work was used to determine...... measured components (triglycerides, diglycerides, monoglycerides, free fatty acid and fatty acid methyl esters(biodiesel)) much better than using fed-batch data alone given the smaller residuals. We also observe a reduction in the correlation between the parameters.The model was then used to predict that 5...... reactors are required (with a combined residence time of 30 hours) to reach a final biodiesel concentration within 2 % of the95.6 mass % achieved in a fed-batch operation, for 24 hours....

  6. Biogas plasticization coupled anaerobic digestion: batch test results.

    Science.gov (United States)

    Schimel, Keith A

    2007-06-01

    Biogas has unique properties for improving the biodegradability of biomass solids during anaerobic digestion (AD). This report presents batch test results of the first investigation into utilizing biogas plasticization to "condition" organic polymers during active digestion of waste activated sludge (WAS). Preliminary design calculations based on polymer diffusion rate limitation are presented. Analysis of the 20 degrees C batch test data determined the first order (k(1)) COD conversion coefficient to be 0.167 day(-1) with a maximum COD utilization rate of 11.25 g L(-1) day(-1). Comparison of these batch test results to typical conventional AD performance parameters showed orders of magnitude improvement. These results show that biogas plasticization during active AD could greatly improve renewable energy yields from biomass waste materials such as MSW RDF, STP sludges, food wastes, animal manure, green wastes, and agricultural crop residuals. PMID:17054122

  7. Batch-related sterile endophthalmitis following intravitreal injection of bevacizumab

    Directory of Open Access Journals (Sweden)

    Morteza Entezari

    2014-01-01

    Full Text Available Background: To report a series of patients with sterile endophthalmitis after intravitreal bevacizumab (IVB injection from 2 different batches of bevacizumab. Materials and Methods: Records of 11 eyes with severe inflammation after IVB injections from two different batches (7 eyes from one and 4 from the other on two separate days were evaluated. Fifteen eyes of 15 patients in one day were treated with one batch and 18 eyes of 17 patients were treated another day using another batch injected for different retinal diseases. Each batch was opened on the day of injection. We used commercially available bevacizumab (100 mg/4 ml kept at 4°C. Severe cases with hypopyon were admitted to the ward and underwent anterior chamber and vitreous tap for direct smear and culture. Results: Pain, redness and decreased vision began after 11-17 days. All had anterior chamber and vitreous reactions and 5 had hypopyon. Antibiotics and corticosteroids were initiated immediately, but the antibiotics were discontinued after negative culture results. Visual acuity returned to pre-injection levels in 10 eyes after 1 month and only in one eye pars plana vitrectomy was performed. Mean VA at the time of presentation with inflammation (1.76 ± 0.78 logMAR decreased significantly (P = 0.008 compared to the initial mean corrected VA (1.18 ± 0.55 logMAR; however, final mean corrected VA (1.02 ± 0.48 logMAR improved in comparison with the baseline but not to a significant level (P = 0.159. Conclusions: We report a cluster of sterile endophthalmitis following intravitreal injection of bevacizumab from the same batch of bevacizumab that has a favorable prognosis.

  8. Production of tea vinegar by batch and semicontinuous fermentation

    OpenAIRE

    Pardeep KAUR; Kocher, G. S.; Phutela, R. P.

    2010-01-01

    The fermented tea vinegar combines the beneficial properties of tea and vinegar. The complete fermentation takes 4 to 5 weeks in a batch culture and thus can be shortened by semi continuous/ continuous fermentation using immobilized bacterial cells. In the present study, alcoholic fermentation of 1.0 and 1.5% tea infusions using Saccharomyces cerevisae G was carried out that resulted in 84.3 and 84.8% fermentation efficiency (FE) respectively. The batch vinegar fermentation of these wines wit...

  9. JAVA Implementation of the Batched iLab Shared Architecture

    OpenAIRE

    Lenard Payne; Mark Schulz

    2013-01-01

    The MIT iLab Shared Architecture is limited currently to running on the Microsoft Windows platform. A JAVA implementation of the Batched iLab Shared Architecture has been developed that can be used on other operating systems and still interoperate with the existing Microsoft .NET web services of MIT’s iLab ServiceBroker. The Batched iLab Shared Architecture has been revised and separates the Labserver into a LabServer that handles experiment management and a LabEquipment that handles experime...

  10. Stochastic growth logistic model with aftereffect for batch fermentation process

    Energy Technology Data Exchange (ETDEWEB)

    Rosli, Norhayati; Ayoubi, Tawfiqullah [Faculty of Industrial Sciences and Technology, Universiti Malaysia Pahang, Lebuhraya Tun Razak, 26300 Gambang, Pahang (Malaysia); Bahar, Arifah; Rahman, Haliza Abdul [Department of Mathematical Sciences, Faculty of Science, Universiti Teknologi Malaysia, 81310 Johor Bahru, Johor (Malaysia); Salleh, Madihah Md [Department of Biotechnology Industry, Faculty of Biosciences and Bioengineering, Universiti Teknologi Malaysia, 81310 Johor Bahru, Johor (Malaysia)

    2014-06-19

    In this paper, the stochastic growth logistic model with aftereffect for the cell growth of C. acetobutylicum P262 and Luedeking-Piret equations for solvent production in batch fermentation system is introduced. The parameters values of the mathematical models are estimated via Levenberg-Marquardt optimization method of non-linear least squares. We apply Milstein scheme for solving the stochastic models numerically. The effciency of mathematical models is measured by comparing the simulated result and the experimental data of the microbial growth and solvent production in batch system. Low values of Root Mean-Square Error (RMSE) of stochastic models with aftereffect indicate good fits.

  11. Stochastic growth logistic model with aftereffect for batch fermentation process

    International Nuclear Information System (INIS)

    In this paper, the stochastic growth logistic model with aftereffect for the cell growth of C. acetobutylicum P262 and Luedeking-Piret equations for solvent production in batch fermentation system is introduced. The parameters values of the mathematical models are estimated via Levenberg-Marquardt optimization method of non-linear least squares. We apply Milstein scheme for solving the stochastic models numerically. The effciency of mathematical models is measured by comparing the simulated result and the experimental data of the microbial growth and solvent production in batch system. Low values of Root Mean-Square Error (RMSE) of stochastic models with aftereffect indicate good fits

  12. Lipid production in batch and fed-batch cultures of Rhodosporidium toruloides from 5 and 6 carbon carbohydrates

    Directory of Open Access Journals (Sweden)

    Wiebe Marilyn G

    2012-05-01

    Full Text Available Abstract Background Microbial lipids are a potential source of bio- or renewable diesel and the red yeast Rhodosporidium toruloides is interesting not only because it can accumulate over 50% of its dry biomass as lipid, but also because it utilises both five and six carbon carbohydrates, which are present in plant biomass hydrolysates. Methods R. toruloides was grown in batch and fed-batch cultures in 0.5 L bioreactors at pH 4 in chemically defined, nitrogen restricted (C/N 40 to 100 media containing glucose, xylose, arabinose, or all three carbohydrates as carbon source. Lipid was extracted from the biomass using chloroform-methanol, measured gravimetrically and analysed by GC. Results Lipid production was most efficient with glucose (up to 25 g lipid L−1, 48 to 75% lipid in the biomass, at up to 0.21 g lipid L−1 h−1 as the sole carbon source, but high lipid concentrations were also produced from xylose (36 to 45% lipid in biomass. Lipid production was low (15–19% lipid in biomass with arabinose as sole carbon source and was lower than expected (30% lipid in biomass when glucose, xylose and arabinose were provided simultaneously. The presence of arabinose and/or xylose in the medium increased the proportion of palmitic and linoleic acid and reduced the proportion of oleic acid in the fatty acids, compared to glucose-grown cells. High cell densities were obtained in both batch (37 g L−1, with 49% lipid in the biomass and fed-batch (35 to 47 g L−1, with 50 to 75% lipid in the biomass cultures. The highest proportion of lipid in the biomass was observed in cultures given nitrogen during the batch phase but none with the feed. However, carbohydrate consumption was incomplete when the feed did not contain nitrogen and the highest total lipid and best substrate consumption were observed in cultures which received a constant low nitrogen supply. Conclusions Lipid production in R. toruloides was lower from arabinose and mixed

  13. Ethanol production from Sorghum bicolor using both separate and simultaneous saccharification and fermentation in batch and fed batch systems

    DEFF Research Database (Denmark)

    Mehmood, Sajid; Gulfraz, M.; Rana, N. F.;

    2009-01-01

    were used in order to increase the monomeric sugar during enzymatic hydrolysis and it has been observed that the addition of these surfactants contributed significantly in cellulosic conversion but no effect was shown on hemicellulosic hydrolysis. Fermentability of hydrolyzate was tested using...... Saccharomyces cerevisiae Ethanol Red (TM) and it was observed that simultaneous saccharification and fermentation ( SSF) with both batch and fed batch resulted in better ethanol yield as compared to separate hydrolysis and fermentation ( SHF). Detoxification of furan during SHF facilitated reduction in...

  14. Continuous cellulosic bioethanol fermentation by cyclic fed-batch cocultivation.

    Science.gov (United States)

    Jiang, He-Long; He, Qiang; He, Zhili; Hemme, Christopher L; Wu, Liyou; Zhou, Jizhong

    2013-03-01

    Cocultivation of cellulolytic and saccharolytic microbial populations is a promising strategy to improve bioethanol production from the fermentation of recalcitrant cellulosic materials. Earlier studies have demonstrated the effectiveness of cocultivation in enhancing ethanolic fermentation of cellulose in batch fermentation. To further enhance process efficiency, a semicontinuous cyclic fed-batch fermentor configuration was evaluated for its potential in enhancing the efficiency of cellulose fermentation using cocultivation. Cocultures of cellulolytic Clostridium thermocellum LQRI and saccharolytic Thermoanaerobacter pseudethanolicus strain X514 were tested in the semicontinuous fermentor as a model system. Initial cellulose concentration and pH were identified as the key process parameters controlling cellulose fermentation performance in the fixed-volume cyclic fed-batch coculture system. At an initial cellulose concentration of 40 g liter(-1), the concentration of ethanol produced with pH control was 4.5-fold higher than that without pH control. It was also found that efficient cellulosic bioethanol production by cocultivation was sustained in the semicontinuous configuration, with bioethanol production reaching 474 mM in 96 h with an initial cellulose concentration of 80 g liter(-1) and pH controlled at 6.5 to 6.8. These results suggested the advantages of the cyclic fed-batch process for cellulosic bioethanol fermentation by the cocultures. PMID:23275517

  15. Discrete time analysis of batch processes in material flow systems

    OpenAIRE

    Schleyer, Marc

    2007-01-01

    Scope of this work is the development of appropriate models for the evaluation of batch processes in material flow systems. The presented analytical methods support the long range planning in an early planning stage, in which capacities are determined to minimize the facility costs under the condition of cycle time targets.

  16. Batch immunoextraction method for efficient purification of aromatic cytokinins

    Czech Academy of Sciences Publication Activity Database

    Hauserová, Eva; Swaczynová, Jana; Doležal, Karel; Lenobel, René; Popa, Igor; Hajdúch, M.; Vydra, D.; Fuksová, Květoslava; Strnad, Miroslav

    2005-01-01

    Roč. 1100, č. 1 (2005), s. 116-125. ISSN 0021-9673 R&D Projects: GA AV ČR IBS4055304 Institutional research plan: CEZ:AV0Z50380511; MSM6198959216 Keywords : antibody * 6-benzylaminopurine * batch immunoextraction Subject RIV: ED - Physiology Impact factor: 3.096, year: 2005

  17. Batch production of YBCO disks for levitation applications

    Czech Academy of Sciences Publication Activity Database

    Plecháček, V.; Jirsa, Miloš; Rameš, Michal; Muralidhar, M.

    2012-01-01

    Roč. 36, č. 2012 (2012), s. 538-543. ISSN 1875-3892 R&D Projects: GA MŠk(CZ) ME10069 Institutional research plan: CEZ:AV0Z10100520 Keywords : YBCO disk * batch production * levitation * levitation force * rapped magnetic field * critical current density Subject RIV: BM - Solid Matter Physics ; Magnetism

  18. Batch profiling calibration for robust NMR metabonomic data analysis.

    Science.gov (United States)

    Fages, Anne; Pontoizeau, Clément; Jobard, Elodie; Lévy, Pierre; Bartosch, Birke; Elena-Herrmann, Bénédicte

    2013-11-01

    Metabonomic studies involve the analysis of large numbers of samples to identify significant changes in the metabolic fingerprints of biological systems, possibly with sufficient statistical power for analysis. While procedures related to sample preparation and spectral data acquisition generally include the use of independent sample batches, these might be sources of systematic variation whose effects should be removed to focus on phenotyping the relevant biological variability. In this work, we describe a grouped-batch profile (GBP) calibration strategy to adjust nuclear magnetic resonance (NMR) metabolomic data-sets for batch effects either introduced during NMR experiments or samples work-up. We show how this method can be applied to data calibration in the context of a large-scale NMR epidemiological study where quality control samples are available. We also illustrate the efficiency of a batch profile correction for NMR metabonomic investigation of cell extracts, where GBP can significantly improve the predictive power of multivariate statistical models for discriminant analysis of the cell infection status. The method is applicable to a broad range of NMR metabolomic/metabonomic cohort studies. PMID:23975089

  19. Adaptation to high throughput batch chromatography enhances multivariate screening.

    Science.gov (United States)

    Barker, Gregory A; Calzada, Joseph; Herzer, Sibylle; Rieble, Siegfried

    2015-09-01

    High throughput process development offers unique approaches to explore complex process design spaces with relatively low material consumption. Batch chromatography is one technique that can be used to screen chromatographic conditions in a 96-well plate. Typical batch chromatography workflows examine variations in buffer conditions or comparison of multiple resins in a given process, as opposed to the assessment of protein loading conditions in combination with other factors. A modification to the batch chromatography paradigm is described here where experimental planning, programming, and a staggered loading approach increase the multivariate space that can be explored with a liquid handling system. The iterative batch chromatography (IBC) approach is described, which treats every well in a 96-well plate as an individual experiment, wherein protein loading conditions can be varied alongside other factors such as wash and elution buffer conditions. As all of these factors are explored in the same experiment, the interactions between them are characterized and the number of follow-up confirmatory experiments is reduced. This in turn improves statistical power and throughput. Two examples of the IBC method are shown and the impact of the load conditions are assessed in combination with the other factors explored. PMID:25914370

  20. Design of common heat exchanger network for batch processes

    International Nuclear Information System (INIS)

    Heat integration of energy streams is very important for the efficient energy recovery in production systems. Pinch technology is a very useful tool for heat integration and maximizing energy efficiency. Creating of heat exchangers network as a common solution for systems in batch mode that will be applicable in all existing time slices is very difficult. This paper suggests a new methodology for design of common heat exchanger network for batch processes. Heat exchanger network designs were created for all determined repeatable and non-repeatable time periods – time slices. They are the basis for creating the common heat exchanger network. The common heat exchanger network as solution, satisfies all heat-transfer needs for each time period and for every existing combination of selected streams in the production process. This methodology use split of some heat exchangers into two or more heat exchange units or heat exchange zones. The reason for that is the multipurpose use of heat exchangers between different pairs of streams in different time periods. Splitting of large heat exchangers would maximize the total heat transfer usage of heat exchange units. Final solution contains heat exchangers with the minimum heat load as well as the minimum need of heat transfer area. The solution is applicable for all determined time periods and all existing stream combinations. - Highlights: •Methodology for design of energy efficient systems in batch processes. •Common Heat Exchanger Network solution based on designs with Pinch technology. •Multipurpose use of heat exchangers in batch processes

  1. Reprocessing of spent fuel from AHWR: preliminary batch studies

    International Nuclear Information System (INIS)

    Scheme for the reprocessing of spent fuel from advanced heavy water reactor (AHWR) is under development. Present paper describes the results of some of the preliminary batch studies carried out to collect the data required for conducting counter-current studies. Studies are carried out using simulated solutions and include data on extraction as well as stripping. (author)

  2. Computer Simulation of Batch Grinding Process Based on Simulink 5.0

    Institute of Scientific and Technical Information of China (English)

    LI Xia; YANG Ying-jie; DENG Hui-yong; HUANG Guang-yao

    2005-01-01

    How to use Simulink software in grinding system was studied. The method of designing batch grinding subsystem and the steps of building batch grinding blockset were introduced. Based on batch grinding population balance model, batch grinding was simulated with Simulink. The results show that the simulation system designed with Simulink explain reasonably the impersonal rule of batch grinding. On the basis of batch grinding simulation, the computer simulation of mineral processing system with Simulink of grinding and classification, comminution, etc, can be properly explored.

  3. MASS PRODUCTION OF THE BENEFICIAL NEMATODE STEINERNEMA CARPOCAPSAE UTILIZING A FED-BATCH CULTURING PROCESS

    OpenAIRE

    Leonard D. Holmes; Inman III, Floyd L.; Sivanadane Mandjiny; Rinu Kooliyottil; Devang Upadhyay

    2013-01-01

    The present study deals with the batch and fed-batch mass production of Steinernema carpocapsae. S. carpocapsae is an entomoparasitic nematode that is used as a biological control agent of soil-borne crop insect pests. The ability and efficiency of fed-batch culture process was successful through the utilization of the nematode’s bacterial symbiont Xenorhabdus nematophila. Results from the fed-batch process were compared to those obtain from the standard batch process. The fed-batch process s...

  4. Glucoamylase production in batch, chemostat and fed-batch cultivations by an industrial strain of Aspergillus niger

    DEFF Research Database (Denmark)

    Pedersen, Henrik; Beyer, Michael; Nielsen, Jens

    2000-01-01

    The Aspergillus niger strain BO-1 was grown in batch, continuous (chemostat) and fed-batch cultivations in order to study the production of the extracellular enzyme glucoamylase under different growth conditions. In the pH range 2.5-6.0, the specific glucoamylase productivity and the specific...... growth rate of the fungus were independent of pH when grown in batch cultivations. The specific glucoamylase productivity increased linearly with the specific growth rate in the range 0-0.1 h(-1) and was constant in the range 0.1-0.2 h(-1) Maltose and maltodextrin were non-inducing carbon sources...... compared to glucose, and the maximum specific growth rate was 0.19 +/- 0.02 h(-1) irrespective of whether glucose or maltose was the carbon source. In fed-batch cultivations, glucoamylase titres of up to 6.5 g 1(-1) were obtained even though the strain contained only one copy of the glaA gene....

  5. MASS PRODUCTION OF THE BENEFICIAL NEMATODE STEINERNEMA CARPOCAPSAE UTILIZING A FED-BATCH CULTURING PROCESS

    Directory of Open Access Journals (Sweden)

    Leonard D. Holmes

    2013-04-01

    Full Text Available The present study deals with the batch and fed-batch mass production of Steinernema carpocapsae. S. carpocapsae is an entomoparasitic nematode that is used as a biological control agent of soil-borne crop insect pests. The ability and efficiency of fed-batch culture process was successful through the utilization of the nematode’s bacterial symbiont Xenorhabdus nematophila. Results from the fed-batch process were compared to those obtain from the standard batch process. The fed-batch process successively improved the mass production process of S. carpocapsae employing liquid medium technology. Within the first week of the fed-batch process (day six, the nematode density obtained was 202,000 nematodes mL−1; whereas on day six, batch culture mode resulted in a nematode density of 23,000 nematodes mL−1. The fed-batch process was superior to that of batch production with a yield approximately 8.8-fold higher. In fed-batch process, the nematode yield was improved 88.6 % higher within a short amount of time compared to the batch process. Fed-batch seems to make the process more efficient and possibly economically viable.

  6. [Analysis of the transcriptional profiling of cell cycle regulatory networks of recombinant Chinese hamster ovary cells in batch and fed-batch cultures].

    Science.gov (United States)

    Liu, Xingmao; Ye, Lingling; Liu, Hong; Li, Shichong; Wang, Qiwei; Wu, Benchuan; Chen, Zhaolie

    2011-08-01

    In the light of Chinese hamster ovary (CHO) cell line 11G-S expressing human recombinant pro-urokinase, the differences of gene expression levels of the cells in different growth phases in both batch and fed-batch cultures were revealed by using gene chip technology. Then, based on the known cell cycle regulatory networks, the transcriptional profiling of the cell cycle regulatory networks of the cells in batch and fed-batch cultures was analyzed by using Genmapp software. Among the approximate 19 191 target genes in gene chip, the number of down-regulated genes was more than those of up-regulated genes of the cells in both batch and fed-batch cultures. The number of down-regulated genes of the cells in the recession phase in fed-batch culture was much more than that of the cells in batch culture. Comparative transcriptional analysis of the key cell cycle regulatory genes of the cells in both culture modes indicated that the cell proliferation and cell viability of the cells in both batch and fed-batch cultures were mainly regulated through down-regulating Cdk6, Cdk2, Cdc2a, Ccne1, Ccne2 genes of CDKs, Cyclin and CKI family and up-regulating Smad4 gene. PMID:22097809

  7. On the choice of batch mode in order to maximize throughput

    OpenAIRE

    Weeda, P.J.

    1990-01-01

    An analysis of serial process configurations consisting of three processes and two machines shows interesting relations between the choice of batch mode (or batch structure), utilization of capacities and maximum throughput.

  8. Sorting Olive Batches for the Milling Process Using Image Processing

    Directory of Open Access Journals (Sweden)

    Daniel Aguilera Puerto

    2015-07-01

    Full Text Available The quality of virgin olive oil obtained in the milling process is directly bound to the characteristics of the olives. Hence, the correct classification of the different incoming olive batches is crucial to reach the maximum quality of the oil. The aim of this work is to provide an automatic inspection system, based on computer vision, and to classify automatically different batches of olives entering the milling process. The classification is based on the differentiation between ground and tree olives. For this purpose, three different species have been studied (Picudo, Picual and Hojiblanco. The samples have been obtained by picking the olives directly from the tree or from the ground. The feature vector of the samples has been obtained on the basis of the olive image histograms. Moreover, different image preprocessing has been employed, and two classification techniques have been used: these are discriminant analysis and neural networks. The proposed methodology has been validated successfully, obtaining good classification results.

  9. Empirical State Error Covariance Matrix for Batch Estimation

    Science.gov (United States)

    Frisbee, Joe

    2015-01-01

    State estimation techniques effectively provide mean state estimates. However, the theoretical state error covariance matrices provided as part of these techniques often suffer from a lack of confidence in their ability to describe the uncertainty in the estimated states. By a reinterpretation of the equations involved in the weighted batch least squares algorithm, it is possible to directly arrive at an empirical state error covariance matrix. The proposed empirical state error covariance matrix will contain the effect of all error sources, known or not. This empirical error covariance matrix may be calculated as a side computation for each unique batch solution. Results based on the proposed technique will be presented for a simple, two observer and measurement error only problem.

  10. Plutonium immobilization ceramic feed batching component test report

    International Nuclear Information System (INIS)

    The Plutonium Immobilization Facility will encapsulate plutonium in ceramic pucks and seal the pucks inside welded cans. Remote equipment will place these cans in magazines and the magazines in a Defense Waste Processing Facility (DWPF) canister. The DWPF will fill the canister with high level waste glass for permanent storage. Ceramic feed batching (CFB) is one of the first process steps involved with first stage plutonium immobilization. The CFB step will blend plutonium oxide powder before it is combined with other materials to make pucks. This report discusses the Plutonium Immobilization CFB process preliminary concept (including a process block diagram), batch splitting component test results, CFB development areas, and FY 1999 and 2000 CFB program milestones

  11. APPLICATION OF MODEL PREDICTIVE CONTROL TO BATCH POLYMERIZATION REACTOR

    Directory of Open Access Journals (Sweden)

    N.M. Ghasem

    2006-06-01

    Full Text Available The absence of a stable operational state in polymerization reactors that operates in batches is factor that determine the need of a special control system. In this study, advanced control methodology is implemented for controlling the operation of a batch polymerization reactor for polystyrene production utilizingmodel predictive control. By utilizing a model of the polymerization process, the necessary operational conditions were determined for producing the polymer within the desired characteristics. The maincontrol objective is to bring the reactor temperature to its target temperature as rapidly as possible with minimal temperature overshoot. Control performance for the proposed method is encouraging. It has been observed that temperature overshoot can be minimized by the proposed method with the use of both reactor and jacket energy balance for reactor temperature control.

  12. JAVA Implementation of the Batched iLab Shared Architecture

    Directory of Open Access Journals (Sweden)

    Lenard Payne

    2013-04-01

    Full Text Available The MIT iLab Shared Architecture is limited currently to running on the Microsoft Windows platform. A JAVA implementation of the Batched iLab Shared Architecture has been developed that can be used on other operating systems and still interoperate with the existing Microsoft .NET web services of MIT’s iLab ServiceBroker. The Batched iLab Shared Architecture has been revised and separates the Labserver into a LabServer that handles experiment management and a LabEquipment that handles experiment execution. The JAVA implementation provides a 3-tier code development model that allows code to be reused and to develop only the code that is specific to each experiment.

  13. On-line Scheduling Algorithm for Penicillin Fed-batch Fermentation

    Institute of Scientific and Technical Information of China (English)

    XUE Yao-feng; YUAN Jing-qi

    2005-01-01

    An on-line scheduling algorithm to maximize gross profit of penicillin fed-batch fermentation is proposed. According to the on-line classification method, fed-batch fermentation batches are classified into three categories. Using the scheduling strategy, the optimal termination sequence of batches is obtained. Pseudo on-line simulations for testing the proposed algorithm with the data from industrial scale penicillin fermentation are carried out.

  14. Health advantages of transition to batch management system in farrow-to-finish pig herds

    OpenAIRE

    Vangroenweghe, F; Suls, L; Van Driessche, E.; Maes, Dominiek; De Graef, E.

    2012-01-01

    Sow batch management systems have become more popular due to advantages in labour planning, piglet batch sizes, all-in all-out practices and health management. The present study investigated the potential health advantages of 10 selected farrow-to-finish pig herds before and after transition from a one week batch management system to a four or five week batch management system. Five different animal categories (gilts, sows, piglets, growers and finishers) were sampled at three time points (T0...

  15. vFlow: A GUI-Based Tool for Building Batch Applications for Cloud Computing

    OpenAIRE

    Gobjuka, Hassan; Ahmat, Kamal

    2011-01-01

    In this paper we introduce vFlow - A framework for rapid designing of batch processing applications for Cloud Computing environment. vFlow batch processing system extracts tasks from the vPlans diagrams, systematically captures the dynamics in batch application management tasks, and translates them to Cloud environment API, named vDocuments, that can be used to execute batch processing applications. vDocuments do not only enable the complete execution of low-level configuration management tas...

  16. Batch gating for data association in monocular SLAM

    OpenAIRE

    Guerra Paradas, Edmundo; Munguía Alcalá, Rodrigo Francisco; Bolea Monte, Yolanda; Grau Saldes, Antoni

    2013-01-01

    This work describes the development and implementation of a single-camera SLAM system, introducing a novel data validation algorithm. A 6-DOF monocular SLAM method developed is based on the Delayed Inverse-Depth (DI-D) Feature Initialization, with the addition of a new data association batch validation technique, the Highest Order Hypothesis Compatibility Test, HOHCT. The DI-D initializes new features in the system defining single hypothesis for the initial depth of features by stoch...

  17. Feasibility of extractive distillation process variants in batch rectifier column

    OpenAIRE

    Stéger, Csaba; Varga, Viktoria; Horvath, Laszlo; Rev, Endre; Fonyo, Zsolt; Meyer, Michel; Lelkes, Zoltan

    2005-01-01

    A systematic comparison is presented about the separation tasks of azeotropic and close-boiling mixtures applying batch extractive distillation (BED) in rectifier. All the eight possible mixture types with at most a single azeotrope (minimum and maximum boiling azeotropes with heavy, light, and intermediate boiling entrainers; and close boiling mixtures with heavy and light entrainers) are compared. The main results of the feasibility studies on the hitherto unpublished cases are presented. A...

  18. Optimization of Recipe Based Batch Control Systems Using Neural Networks

    OpenAIRE

    Šoštarec, A.; Gosak, D.; Hlupić, N.

    2012-01-01

    In the modern pharmaceutical industry many flexible batch plants operate under an integrated business and production system, using ISA S95 and ISA S88 standards for models and terminology, and implementing flexible recipe-based production. In the environment of constantly changing market conditions, adjustment to surroundings is a business necessity. To support necessary production improvement, regulatory authorities have introduced the risk based approach for the control of process dev...

  19. Mathematical modeling of recombinant Escherichia coli aerobic batch fermentations

    OpenAIRE

    Costa, Rafael S; Rocha, I; Ferreira, E. C.

    2008-01-01

    In this work, three competing unstructured mathematical models for the biomass growth by recombinant E. coli strains with different acetate inhibition kinetics terms were evaluated for batch processes at constant temperature and pH. The models considered the dynamics of biomass growth, acetate accumulation, substrate consumption, Green Fluorescence Protein (GFP) production and three metabolic pathways for E. coli. Parameter estimation and model validation was carried out usi...

  20. Integration of virtualized worker nodes in standard batch systems

    International Nuclear Information System (INIS)

    Current experiments in HEP only use a limited number of operating system flavours. Their software might only be validated on one single OS platform. Resource providers might have other operating systems of choice for the installation of the batch infrastructure. This is especially the case if a cluster is shared with other communities, or communities that have stricter security requirements. One solution would be to statically divide the cluster into separated sub-clusters. In such a scenario, no opportunistic distribution of the load can be achieved, resulting in a poor overall utilization efficiency. Another approach is to make the batch system aware of virtualization, and to provide each community with its favoured operating system in a virtual machine. Here, the scheduler has full flexibility, resulting in a better overall efficiency of the resources. In our contribution, we present a lightweight concept for the integration of virtual worker nodes into standard batch systems. The virtual machines are started on the worker nodes just before jobs are executed there. No meta-scheduling is introduced. We demonstrate two prototype implementations, one based on the Sun Grid Engine (SGE), the other using Maui/Torque as a batch system. Both solutions support local job as well as Grid job submission. The hypervisors currently used are Xen and KVM, a port to another system is easily envisageable. To better handle different virtual machines on the physical host, the management solution VmImageManager is developed. We will present first experience from running the two prototype implementations. In a last part, we will show the potential future use of this lightweight concept when integrated into high-level (i.e. Grid) work-flows.

  1. Voronoi model learning for batch mode reinforcement learning

    OpenAIRE

    Fonteneau, Raphaël; Ernst, Damien

    2010-01-01

    We consider deterministic optimal control problems with continuous state spaces where the information on the system dynamics and the reward function is constrained to a set of system transitions. Each system transition gathers a state, the action taken while being in this state, the immediate reward observed and the next state reached. In such a context, we propose a new model learning--type reinforcement learning (RL) algorithm in batch mode, finite-time and deterministic setting. The algori...

  2. Industrial and Municipal Wastewater Treatment in the Sequencing Batch Reactor

    OpenAIRE

    Vrtovsek, J.; Ros, M.

    2008-01-01

    A mixture of Industrial wastewater from chemical industry (varnish, paint and pigments production) and municipal wastewater was treated in pilot sequencing batch reactor (SBR). Results of the pilot experiments show that the foaming problem has great influence on the behavior of SBR, especially when the ratio between industrial and municipal wastewater is very high. Foaming problem was negligible when the mixture with φ; 20 % of the industrial wastewater and j = 80 % of the municipal wastewate...

  3. SEQUENCING BATCH REACTOR: A PROMISING TECHNOLOGY IN WASTEWATER TREATMENT

    OpenAIRE

    A.H Mahvi

    2008-01-01

    Discharge of domestic and industrial wastewater to surface or groundwater is very dangerous to the environment. Therefore treatment of any kind of wastewater to produce effluent with good quality is necessary. In this regard choosing an effective treatment system is important. Sequencing batch reactor is a modification of activated sludge process which has been successfully used to treat municipal and industrial wastewater. The process could be applied for nutrients removal, high biochemical ...

  4. EFFECT OF DYE CONCENTRATION ON SEQUENCING BATCH REACTOR PERFORMANCE

    OpenAIRE

    A. A. Vaigan ، M. R. Alavi Moghaddam ، H. Hashemi

    2009-01-01

    Reactive dyes have been identified as problematic compounds in textile industries wastewater as they are water soluble and cannot be easily removed by conventional aerobic biological treatment systems. The treatability of a reactive dye (Brill Blue KN-R) by sequencing batch reactor and the influence of the dye concentration on system performance were investigated in this study. Brill Blue KN-R is one of the main dyes that are used in textile industries in Iran. Four cylindrical Plexiglas reac...

  5. Transition to four batch loading scheme in Loviisa NPP

    International Nuclear Information System (INIS)

    The WWER-440 reactors of Loviisa NPP are operated with 1500 MWth power and reduced core. During recent years a 3-batch loading scheme has been used. Loviisa-1 is currently running with BNFL fuel equilibrium cycle and Loviisa-2 with TVEL fuel equilibrium cycle. Our goal is to move to a 4-batch scheme with TVEL fuel for both reactors. To achieve this goal the U-235 enrichment has to be increased from the current designs used. The fuel to be used in the near future is 4.37 % enriched fuel with six Gd2O3 doped rods. The characteristics and consequences of the core consisting of Gd-fuel are discussed based on our target equilibrium loading pattern. With the 4-batch loading scheme the discharge burnups exceed the current assembly burnup limit with a clear margin. Thus, we also have to prepare an application for the safety authority to increase the assembly average burnup limit from the current 45 MWd/kgU to about 56 MWd/kgU. First Gd-fuel assemblies are loaded into Loviisa-1 core in September 2009 and into Loviisa-2 core in October 2010. The reload batch of Loviisa-1 in 2009 consists of 60 Gd-assemblies and 24 non-Gd-assemblies plus 12 followers. In this paper some results are presented from Loviisa-1 zero power startup experiments and the first days of power operation. Among other aspects the six Gd2O3 doped pins used in the assembly have an effect on the pin power profile of the assembly during the first half of the cycle. The influence of the changing pin power profile on the outlet temperature measurements is briefly discussed based on expected effect and measurement (Authors)

  6. Biological Treatment of Dairy Wastewater by Sequencing Batch Reactor

    OpenAIRE

    A Mohseni-Bandpi, H Bazari

    2004-01-01

    A bench scale aerobic Sequencing Batch Reactor (SBR) was investigated to treat the wastewater from an industrial milk factory. The reactor was constructed from plexi glass material and its volume was 22.5 L. The reactor was supplied with oxygen by fine bubble air diffuser. The reactor was fed with milk factory and synthetic wastewater under different operational conditions. The COD removal efficiency was achieved more than 90%, whereas COD concentration varied from 400 to 2500 mg/l. The optim...

  7. Optimal parametric sensitivity control for a fed-batch reactor

    OpenAIRE

    Stigter, J.D.; Keesman, K. J.

    2001-01-01

    The paper presents a method to derive an optimal parametric sensitivity controller for optimal estimation of a set of parameters in an experiment. The method is demonstrated for a fed batch bio-reactor case study for optimal estimation of the saturation constant Ks and, albeit intuitively, the parameter combination "mu-max X/Y" where mu-max is the maximum growth rate [g/min], Y is the yield coefficient [g/g], and X is the (constant) biomass [g].

  8. SLUDGE BATCH 4 SIMULANT FLOWSHEET STUDIES: PHASE II RESULTS

    Energy Technology Data Exchange (ETDEWEB)

    Stone, M; David Best, D

    2006-09-12

    The Defense Waste Processing Facility (DWPF) will transition from Sludge Batch 3 (SB3) processing to Sludge Batch 4 (SB4) processing in early fiscal year 2007. Tests were conducted using non-radioactive simulants of the expected SB4 composition to determine the impact of varying the acid stoichiometry during the Sludge Receipt and Adjustment Tank (SRAT) process. The work was conducted to meet the Technical Task Request (TTR) HLW/DWPF/TTR-2004-0031 and followed the guidelines of a Task Technical and Quality Assurance Plan (TT&QAP). The flowsheet studies are performed to evaluate the potential chemical processing issues, hydrogen generation rates, and process slurry rheological properties as a function of acid stoichiometry. Initial SB4 flowsheet studies were conducted to guide decisions during the sludge batch preparation process. These studies were conducted with the estimated SB4 composition at the time of the study. The composition has changed slightly since these studies were completed due to changes in the sludges blended to prepare SB4 and the estimated SB3 heel mass. The following TTR requirements were addressed in this testing: (1) Hydrogen and nitrous oxide generation rates as a function of acid stoichiometry; (2) Acid quantities and processing times required for mercury removal; (3) Acid quantities and processing times required for nitrite destruction; and (4) Impact of SB4 composition (in particular, oxalate, manganese, nickel, mercury, and aluminum) on DWPF processing (i.e. acid addition strategy, foaming, hydrogen generation, REDOX control, rheology, etc.).

  9. Analyzing data flows of WLCG jobs at batch job level

    Science.gov (United States)

    Kuehn, Eileen; Fischer, Max; Giffels, Manuel; Jung, Christopher; Petzold, Andreas

    2015-05-01

    With the introduction of federated data access to the workflows of WLCG, it is becoming increasingly important for data centers to understand specific data flows regarding storage element accesses, firewall configurations, as well as the scheduling of batch jobs themselves. As existing batch system monitoring and related system monitoring tools do not support measurements at batch job level, a new tool has been developed and put into operation at the GridKa Tier 1 center for monitoring continuous data streams and characteristics of WLCG jobs and pilots. Long term measurements and data collection are in progress. These measurements already have been proven to be useful analyzing misbehaviors and various issues. Therefore we aim for an automated, realtime approach for anomaly detection. As a requirement, prototypes for standard workflows have to be examined. Based on measurements of several months, different features of HEP jobs are evaluated regarding their effectiveness for data mining approaches to identify these common workflows. The paper will introduce the actual measurement approach and statistics as well as the general concept and first results classifying different HEP job workflows derived from the measurements at GridKa.

  10. Fault Diagnosis of Batch Reactor Using Machine Learning Methods

    Directory of Open Access Journals (Sweden)

    Sujatha Subramanian

    2014-01-01

    Full Text Available Fault diagnosis of a batch reactor gives the early detection of fault and minimizes the risk of thermal runaway. It provides superior performance and helps to improve safety and consistency. It has become more vital in this technical era. In this paper, support vector machine (SVM is used to estimate the heat release (Qr of the batch reactor both normal and faulty conditions. The signature of the residual, which is obtained from the difference between nominal and estimated faulty Qr values, characterizes the different natures of faults occurring in the batch reactor. Appropriate statistical and geometric features are extracted from the residual signature and the total numbers of features are reduced using SVM attribute selection filter and principle component analysis (PCA techniques. artificial neural network (ANN classifiers like multilayer perceptron (MLP, radial basis function (RBF, and Bayes net are used to classify the different types of faults from the reduced features. It is observed from the result of the comparative study that the proposed method for fault diagnosis with limited number of features extracted from only one estimated parameter (Qr shows that it is more efficient and fast for diagnosing the typical faults.

  11. Spectrophotometric determination of fluoxetine by batch and flow injection methods.

    Science.gov (United States)

    Afkhami, Abbas; Madrakian, Tayyebeh; Khalafi, Lida

    2006-12-01

    A rapid, simple, and accurate spectrophotometric method is presented for the determination of fluoxetine by batch and flow injection analysis methods. The method is based on fluoxetine competitive complexation reaction with phenolphthalein-beta-cyclodextrin (PHP-beta-CD) inclusion complex. The increase in the absorbance of the solution at 554 nm by the addition of fluoxetine was measured. The formation constant for fluoxetin-beta-CD was calculated by non-linear least squares fitting. Fluoxetine can be determined in the range 7.0 x 10(-6)-2.4 x 10(-4) mol l(-1) and 5.0 x 10(-5)-1.0 x 10(-2) mol l(-1) by batch and flow methods, respectively. The limit of detection and limit of quantification were respectively 4.13 x 10(-6) mol l(-1) and 1.38 x 10(-5) mol l(-1) for batch and 2.46 x 10(-5) mol l(-1) and 8.22 x 10(-5) mol l(-1) for flow method. The sampling rate in flow injection analysis method was 80+/-5 samples h(-1). The method was applied to the determination of fluoxetine in pharmaceutical formulations and after addition to human urine samples. PMID:17139097

  12. 40 CFR 1065.546 - Validation of minimum dilution ratio for PM batch sampling.

    Science.gov (United States)

    2010-07-01

    ... for PM batch sampling. 1065.546 Section 1065.546 Protection of Environment ENVIRONMENTAL PROTECTION... Specified Duty Cycles § 1065.546 Validation of minimum dilution ratio for PM batch sampling. Use continuous... dilution ratios for PM batch sampling as specified in § 1065.140(e)(2) over the test interval. You may...

  13. 40 CFR Table 2 to Subpart Vvvvvv... - Emission Limits and Compliance Requirements for Batch Process Vents

    Science.gov (United States)

    2010-07-01

    ... Requirements for Batch Process Vents 2 Table 2 to Subpart VVVVVV of Part 63 Protection of Environment... of Part 63—Emission Limits and Compliance Requirements for Batch Process Vents As required in § 63.11496, you must comply with the requirements for batch process vents as shown in the following...

  14. 21 CFR 226.102 - Master-formula and batch-production records.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Master-formula and batch-production records. 226... Records and Reports § 226.102 Master-formula and batch-production records. (a) For each Type A medicated... batch size, or of appropriate size in the case of continuous systems to be produced from the...

  15. 40 CFR 63.1036 - Alternative means of emission limitation: Batch processes.

    Science.gov (United States)

    2010-07-01

    ... limitation: Batch processes. 63.1036 Section 63.1036 Protection of Environment ENVIRONMENTAL PROTECTION... § 63.1036 Alternative means of emission limitation: Batch processes. (a) General requirement. As an... operator of a batch process that operates in regulated material service during the calendar year may...

  16. 40 CFR 65.117 - Alternative means of emission limitation: Batch processes.

    Science.gov (United States)

    2010-07-01

    ... limitation: Batch processes. 65.117 Section 65.117 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... of emission limitation: Batch processes. (a) General requirement. As an alternative to complying with the requirements of §§ 65.106 through 65.114 and § 65.116, an owner or operator of a batch...

  17. 40 CFR 63.178 - Alternative means of emission limitation: Batch processes.

    Science.gov (United States)

    2010-07-01

    ... limitation: Batch processes. 63.178 Section 63.178 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Alternative means of emission limitation: Batch processes. (a) As an alternative to complying with the requirements of §§ 63.163 through 63.171 and §§ 63.173 through 63.176, an owner or operator of a batch...

  18. 40 CFR 1065.545 - Validation of proportional flow control for batch sampling.

    Science.gov (United States)

    2010-07-01

    ... control for batch sampling. 1065.545 Section 1065.545 Protection of Environment ENVIRONMENTAL PROTECTION... Specified Duty Cycles § 1065.545 Validation of proportional flow control for batch sampling. For any proportional batch sample such as a bag or PM filter, demonstrate that proportional sampling was...

  19. 40 CFR 63.487 - Batch front-end process vents-reference control technology.

    Science.gov (United States)

    2010-07-01

    ... § 63.487 Batch front-end process vents—reference control technology. (a) Batch front-end process vents... process vent, reduce organic HAP emissions for the batch cycle by 90 weight percent using a control device... control device as it relates to continuous front-end process vents shall be used. Furthermore,...

  20. 40 CFR 63.1407 - Non-reactor batch process vent provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Non-reactor batch process vent... § 63.1407 Non-reactor batch process vent provisions. (a) Emission standards. (1) Owners or operators of non-reactor batch process vents located at new or existing affected sources with 0.25 tons per year...

  1. 40 CFR 63.491 - Batch front-end process vents-recordkeeping requirements.

    Science.gov (United States)

    2010-07-01

    ... reactor for that recipe. (2) A description of, and an emission estimate for, each batch emission episode... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Batch front-end process vents... § 63.491 Batch front-end process vents—recordkeeping requirements. (a) Group determination records...

  2. OSAT: a tool for sample-to-batch allocations in genomics experiments

    Directory of Open Access Journals (Sweden)

    Yan Li

    2012-12-01

    Full Text Available Abstract Background Batch effect is one type of variability that is not of primary interest but ubiquitous in sizable genomic experiments. To minimize the impact of batch effects, an ideal experiment design should ensure the even distribution of biological groups and confounding factors across batches. However, due to the practical complications, the availability of the final collection of samples in genomics study might be unbalanced and incomplete, which, without appropriate attention in sample-to-batch allocation, could lead to drastic batch effects. Therefore, it is necessary to develop effective and handy tool to assign collected samples across batches in an appropriate way in order to minimize the impact of batch effects. Results We describe OSAT (Optimal Sample Assignment Tool, a bioconductor package designed for automated sample-to-batch allocations in genomics experiments. Conclusions OSAT is developed to facilitate the allocation of collected samples to different batches in genomics study. Through optimizing the even distribution of samples in groups of biological interest into different batches, it can reduce the confounding or correlation between batches and the biological variables of interest. It can also optimize the homogeneous distribution of confounding factors across batches. It can handle challenging instances where incomplete and unbalanced sample collections are involved as well as ideally balanced designs.

  3. Elucidating the Short Term Loss Behavior of Markovian-Modulated Batch-Service Queueing Model with Discrete-Time Batch Markovian Arrival Process

    OpenAIRE

    Yung-Chung Wang; Dong-Liang Cai; Li-Hsin Chiang; Cheng-Wei Hu

    2014-01-01

    This paper applies a matrix-analytical approach to analyze the temporal behavior of Markovian-modulated batch-service queue with discrete-time batch Markovian arrival process (DBMAP). The service process is correlated and its structure is presented through discrete-time batch Markovian service process (DBMSP). We examine the temporal behavior of packet loss by means of conditional statistics with respect to congested and noncongested periods that occur in an alternating manner. The congested ...

  4. Параллельное шифрование данных алгоритмом RSA

    OpenAIRE

    Неретин, А. А.

    2016-01-01

    In this paper a parallel RSA algorithm with preliminary shuffling of source text was presented.Dependence of an encryption speed on the number of encryption nodes has been analysed, The proposed algorithm was implemented on C# language.

  5. Batch Preheat for glass and related furnace processing operations

    Energy Technology Data Exchange (ETDEWEB)

    Energy & Environmental Resources, Inc

    2002-08-12

    The objectives that our development work addressed are: (1) Establish through lab tests a salt eutectic with a melting point of about 250 F and a working range of 250 to 1800 F. (2) Establish the most economical material of construction for the screened salt eutectics identified in the first objective. (3) Establish the material of construction for the salt heater liner. Objectives 2 and 3 were determined through corrosion tests using selected metallurgical samples. Successful completion of the above-stated goals will be incorporated in a heat recovery design that can be used in high temperature processes and furnaces, typical of which is the glass melting process. The process design incorporates the following unit operations: a vertical batch heater (whereby the batch flows down through tubes in a shell and tube exchanger; a molten salt eutectic is circulated on the shell side); a molten salt heater utilizing furnace flue gas in a radiation type heater (molten salt is circulated in the annular space between the inner and outer shells of the vertical heater, and flue gas passes from the furnace exhaust through the inner shell of the heater); a cantilever type molten salt circulating pump; and a jacketed mixer/conveyor to drive off moisture from the batch prior to feeding the batch to the vertical batch heater. Historically, radiation heaters, when applied to glass or fiberglass furnace recuperation, have experienced failures due to uneven heat flux rates, which increases internal stresses and spot overheating conditions. Low heat transfer coefficients result in requirements for large heat transfer surface areas in gas to gas or gas to air exchangers. Fouling is another factor that results in lower unit availability and reduced performance. These factors are accommodated in this process by the incorporation of several design features. The salt heater will be a vertical double wall radiation design, similar to radiation air heaters used in high temperature heat

  6. A Content-based Analysis of Shahriar's Azerbaijani Turkish Poem Getmə Tərsa Balası (A Christian Child in Terms of Religious Images and Interpretations

    Directory of Open Access Journals (Sweden)

    Mohammad Amin Mozaheb

    2016-03-01

    Full Text Available The present study aims to analyze Shahriar's Getmə Tərsa Balası (do not leave me the Christian Child poem in terms of religious images using content-based analysis. Initially, the poem published in Azerbaijani Turkish has been analyzed by the researchers to find out the main religious themes covering Islam and Christianity. Then, a number of images created by the poet, including Hell and Heaven, mosque versus church and Mount Sinai, have been extracted and discussed in detail by using the English translation of the verses. Finally, the results have been presented using the extracted themes. The findings showed that Shahriar started his poem from a worldly image in order to reach divine images.Keywords: Shahriar, Getmə Tərsa Balası (A Christian Child, Content-based analysis, Azerbaijani Turkish 

  7. Kinetic study of batch and fed-batch enzymatic saccharification of pretreated substrate and subsequent fermentation to ethanol

    OpenAIRE

    Gupta Rishi; Kumar Sanjay; Gomes James; Kuhad Ramesh

    2012-01-01

    Abstract Background Enzymatic hydrolysis, the rate limiting step in the process development for biofuel, is always hampered by its low sugar concentration. High solid enzymatic saccharification could solve this problem but has several other drawbacks such as low rate of reaction. In the present study we have attempted to enhance the concentration of sugars in enzymatic hydrolysate of delignified Prosopis juliflora, using a fed-batch enzymatic hydrolysis approach. Results The enzymatic hydroly...

  8. The use of computer as an instructional technology : internet as an instrument in the teaching and learning process in tertiary institutions (North West Province of R.S.A.) / Mohumi Dorothy Elisha (Nee Mahoko)

    OpenAIRE

    Elisha, Mohumi Dorothy

    2003-01-01

    The use of computer as an instructional technology: Internet as an instrument in the teaching and learning process in tertiary institutions in the North West Province of R.S.A. was surveyed to identify and reveal problems encountered by lecturers and students with regard to the use of computer as an instructional technology in the teaching and learning process. The main focus of the study was on the following areas, firstly, to find out whether tertiary institutions such as ...

  9. Dynamics of Random Sequential Adsorption (RSA) of linear chains consisting of n circular discs - Role of aspect ratio and departure from convexity

    Science.gov (United States)

    Shelke, Pradip B.; Limaye, A. V.

    2015-07-01

    We study Random Sequential Adsorption (RSA) of linear chains consisting of n circular discs on a two-dimensional continuum substrate. The study has been carried out for n = 2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 14, 16, 18, 20, 25, 30, 50, 70, 100 and 300. For all values of n, instantaneous coverage, Θ(t), in late time regime, is found to approach to jammed state coverage, Θ(∞), in a power law fashion, Θ(∞) - Θ(t) ~ t- p. It is observed that, with the increase in n, the exponent p goes on decreasing from the value 0.33 for n = 2 to the value 0.20 for n = 20 and then again starts rising to reach the value of 0.33 for large n. It is also found that for n ≤ 20, the exponent p has near perfect correlation with the coefficient of departure from convexity. On the other hand the jammed state coverage Θ(∞) is found to depend both on the coefficient of departure from convexity as well as on the aspect ratio of the chain.

  10. [Kinetics model for batch culture of white rot fungus].

    Science.gov (United States)

    Xiong, Xiao-ping; Wen, Xiang-hua; Xu, Kang-ning; Bian, Bing-hui

    2008-02-01

    In order to understand ligninolytic enzymes production process during culture of white rot fungus, accordingly to direct the design of fermentation process, a kinetics model was built for the batch culture of Phanerochaete chrysosporium. The parameters in the model were calibrated based on the experimental data from free and immobilized culture separately. The difference between each variable's values calculated based on kinetics model and experimental data is within 15%. Comparing parameters for the free and the immobilized culture, it is found that maximum biomass concentrations are both 1.78 g/L; growth rate ratio of immobilized culture (0.6683 d(-1)) is larger than that of free culture (0.5144 d(-1)); very little glucose is consumed for biomass growth in free culture while in immobilized culture much glucose is used and ammonium nitrogen is consumed at a greater rate. Ligninolytic enzymes production process is non-growth related; fungal pellets can produce MnP (231 U/L) in free culture with a production rate of 115.8 U x (g x d)(-1) before peak and 26.1 U x (g x d)(-1) after peak, thus fed-batch is a possible mode to improve MnP production and fermentation efficiency. MnP (410 U/L) and LiP (721 U/L) can be produced in immobilized culture, but MnP and LiP production rate decrease from 80.1 U x (g x d)(-1) and 248.9 U x (g x d)(-1) to 6.04 U x (g x d)(-1) and 0 U x (g x d)(-1), respectively, indicating a proper feed moment is before the enzymes peak during fed-batch culture. PMID:18613526

  11. A design algorithm for batch stirred tank transesterification reactors

    International Nuclear Information System (INIS)

    Highlights: ► Simplified algorithm for batch biodiesel reactor design was developed. ► C Sharp software tool for implementing the algorithm was also developed. ► 50 L/batch reactor was constructed and used to process neem oil biodiesel. ► Results showed that the produced neem biodiesel is a fuel grade product. ► Scale-up of the reactor was carried out using the developed software. - Abstract: A 50 L per batch, stirred tank reactor, suitable for carrying out transesterification of vegetable oils was designed and constructed. The major design assumptions included stainless steel plate thickness of 2 mm, reaction temperature of 60–65 °C and an initial/final fluid temperature of 25/70 °C. The calculated impeller Reynolds number was in the mixed regime zone of 10–104; the power number was varied between 1 and 5, while a typical propeller speed of 22.5 rev/s (or 1350 rev/min) was adopted. The limiting design conditions were maximum reactor diameter of 1.80 m, straight side height-to-diameter ratio in the range of 0.75–1.5 and minimum agitator motor power of 746 W (1 Hp). Based upon the design, a simple algorithm was developed and interpreted into Microsoft C Sharp computer programming language to enable scale up of the reactor. Performance testing of the realized reactor was carried out while using it to produce Neem oil biodiesel via base – catalyzed methanolysis, which yielded high quality fuel product.

  12. Moving from batch towards continuous organic‐chemical pharmaceutical production

    OpenAIRE

    Cervera Padrell, Albert Emili; Gernaey, Krist; Gani, Rafiqul; Kiil, Søren

    2011-01-01

    Farmaceutiske ingredienser er traditionelt blevet fremstillet i batch reaktorer, dvs i ’multipurpose’ omrørte tanke. Reaktioner og separationer har typisk været skræddersyet til disse enheder, og der har typisk været flere begrænsninger, når der overføres en organisk syntese fra laboratoriet til industriel skala. Opskalering resulterede dermed i mange tilfælde i et lavt udbytte og en relativt ineffektiv separation. Disse begrænsninger blev dog opvejet af en relativt hurtig implementering af p...

  13. Batch Mode Data Analysis at ORNL for Radiation Portal Monitoring

    International Nuclear Information System (INIS)

    The Global Nuclear Security Technology Division at Oak Ridge National Laboratory (ORNL) has developed two batch-mode data analysis tools to address the volume of data generated by radiation portal monitors (RPMs) deployed by the Second Line of Defense (SLD). The first of these tools, the ORNL Data Portal (ORNLDP), serves as both a repository and an analysis environment for the data generated by RPMs. The second tool, the In-Country Analysis Tool (ICAT), is portable and serves primarily as a small-scale analysis environment.

  14. Bounded Parallel-Batch Scheduling on Unrelated Parallel Machines

    Science.gov (United States)

    Miao, Cuixia; Zhang, Yuzhong; Wang, Chengfei

    In this paper, we consider the bounded parallel-batch scheduling problem on unrelated parallel machines. Problems R m |B|F are NP-hard for any objective function F. For this reason, we discuss the special case with p ij = p i for i = 1, 2, ⋯ , m , j = 1, 2, ⋯ , n. We give optimal algorithms for the general scheduling to minimize total weighted completion time, makespan and the number of tardy jobs. And we design pseudo-polynomial time algorithms for the case with rejection penalty to minimize the makespan and the total weighted completion time plus the total penalty of the rejected jobs, respectively.

  15. REAL WASTE TESTING OF SLUDGE BATCH 5 MELTER FEED RHEOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    Reboul, S.; Stone, M.

    2010-03-17

    Clogging of the melter feed loop at the Defense Waste Processing Facility (DWPF) has reduced the throughput of Sludge Batch 5 (SB5) processing. After completing a data review, DWPF attributed the clogging to the rheological properties of the Slurry Mix Evaporator (SME) project. The yield stress of the SB5 melter feed material was expected to be high, based on the relatively high pH of the SME product and the rheological results of a previous Chemical Process Cell (CPC) demonstration performed at the Savannah River National Laboratory (SRNL).

  16. Deposition of TiN films in a batch reactor

    OpenAIRE

    Hasper, Albert; Snijders, Gert-Jan; Vandezande, Lieve; De Blank, Marinus J.; Bankras, Radko Gerard

    2006-01-01

    Titanium nitride (TiN) films are formed in a batch reactor using titanium chloride (TiCl4) and ammonia (NH3) as precursors. The TiCl4 is flowed into the reactor in temporally separated pulses. The NH3 can also be flowed into the reactor in temporally spaced pulses which alternate with the TiCl4 pulses, or the NH3 can be flowed continuously into the reactor while the TiCl4 is introduced in pulses. The resulting TiN films exhibit low resistivity and good uniformity.

  17. Comparison of growth, acetate production, and acetate inhibition of Escherichia coli strains in batch and fed-batch fermentations.

    Science.gov (United States)

    Luli, G W; Strohl, W R

    1990-04-01

    The growth characteristics and acetate production of several Escherichia coli strains were compared by using shake flasks, batch fermentations, and glucose-feedback-controlled fed-batch fermentations to assess the potential of each strain to grow at high cell densities. Of the E. coli strains tested, including JM105, B, W3110, W3100, HB101, DH1, CSH50, MC1060, JRG1046, and JRG1061, strains JM105 and B were found to have the greatest relative biomass accumulation, strain MC1060 accumulated the highest concentrations of acetic acid, and strain B had the highest growth rates under the conditions tested. In glucose-feedback-controlled fed-batch fermentations, strains B and JM105 produced only 2 g of acetate.liter-1 while accumulating up to 30 g of biomass.liter-1. Under identical conditions, strains HB101 and MC1060 accumulated less than 10 g of biomass.liter-1 and strain MC1060 produced 8 g of acetate.liter-1. The addition of various concentrations of sodium acetate to the growth medium resulted in a logarithmic decrease, with respect to acetate concentration, in the growth rates of E. coli JM105, JM105(pOS4201), and JRG1061. These data indicated that the growth of the E. coli strains was likely to be inhibited by the acetate they produced when grown on media containing glucose. A model for the inhibition of growth of E. coli by acetate was derived from these experiments to explain the inhibition of acetate on E. coli strains at neutral pH. PMID:2187400

  18. Modeling and Simulation of Thermal Transfer in Batch Reactor

    Directory of Open Access Journals (Sweden)

    Baghli, H.

    2006-01-01

    Full Text Available Batch reactors are frequently used in chemical, petrochemical or biochemical industry, for the production of various quality products. Processes used are discontinuous and varied. Indeed, they are characterized by non stationary and non linear systems. An optimal control of the process; requires a modeling and a simulation of the thermal behaviors inside the agitated jacketed reactor in view of the improvement of a high product quality and conditions of security. In certain fields, where the cost and the difficulty of tests are limiting factors, it is advantageous to develop the numeric simulations of these chemical processes. Thus, this study concerns the modeling and simulation of the thermal transfer in an agitated jacketed batch reactor, it is based on a model developed from the global energy balance and empiric correlations which give relationships between thermal transfer coefficients and the stirrer speed. We have achieved the validation of the model by confronting model results with several sets of experiences; for two types of stirrers.

  19. Treatemnt of Wastewater with Modified Sequencing Batch Biofilm Reactor Technology

    Institute of Scientific and Technical Information of China (English)

    胡龙兴; 刘宇陆

    2002-01-01

    This paper describes the removel of COD and nitrogen from wastewater with modified sequencing batch biofilm reactor,The strategy of simultaneous feeding and draining was explored.The results show that introduction of a new batch of wastewater and withdrawal of the purifeid water can be conducted simultaneously with the maximum volumetric exchange rate of about 70%,Application of this feeding and draining mode leads to the reduction of the cycle time,the increase of the utilization of the reactor volume and the simplification of the reactor structure.The treatment of a synthetic wastewater containing COD and nitrogen was investigated.The operation mode of F(D)-O(i.e.,simultaneous feeding and draining followed by the aerobic condition)was adopted.It was found that COD was degraded very fast in the initial reaction period of time,then reduced slowly and the ammonia nitrogen and nitrate nitrogen concentrations decreased and increased with time respectively,while the nitrite nitrogen level increased first and then reduced.The relationship between the COD or ammonia nitrogen loading and its removal rate was examined,and the removal of COD,ammonia nitrogen and total nitrogen could exceed 95%,90%and 80% respectively,The fact that nitrogen could e removed more completely under constant aeration(aerobic condition)of the SBBR operation mode is very interesting and could be explained in several respects.

  20. Detection and isolation of Bluetongue virus from commercial vaccine batches.

    Science.gov (United States)

    Bumbarov, Velizar; Golender, Natalia; Erster, Oran; Khinich, Yevgeny

    2016-06-14

    In this report we describe the detection and identification of Bluetongue virus (BTV) contaminations in commercial vaccines. BTV RNA was detected in vaccine batches of Lumpy skin disease (LSD) and Sheep pox (SP) using quantitative PCR (qPCR) for VP1 and NS3 genes. Both batches were positive for VP1 and NS3 in qPCR. The LSD vaccine-derived sample was positive for VP1 and VP2 in conventional PCR. The SP vaccine-derived sample was examined by amplification of VP1, VP4, VP6, VP7, NS2 and NS3 gene segments in conventional PCR. The SP vaccine-derived sample was further propagated in embryonated chicken eggs (ECE) and Vero cells. Preliminary sequence analysis showed that the LSD vaccine-derived sequence was 98-99% similar to BTV9. Analysis of the six genomic segments from the SP vaccine-derived isolate showed the highest similarity to BTV26 (66.3-97.8%). These findings are particularly important due to the effect of BTV on cattle and sheep, for which the vaccines are intended. They also demonstrate the necessity of rigorous vaccine inspection and strict vaccine production control. PMID:27171751

  1. BEclear: Batch Effect Detection and Adjustment in DNA Methylation Data.

    Science.gov (United States)

    Akulenko, Ruslan; Merl, Markus; Helms, Volkhard

    2016-01-01

    Batch effects describe non-natural variations of, for example, large-scale genomic data sets. If not corrected by suitable numerical algorithms, batch effects may seriously affect the analysis of these datasets. The novel array platform independent software tool BEclear enables researchers to identify those portions of the data that deviate statistically significant from the remaining data and to replace these portions by typical values reconstructed from neighboring data entries based on latent factor models. In contrast to other comparable methods that often use some sort of global normalization of the data, BEclear avoids changing the apparently unaffected parts of the data. We tested the performance of this approach on DNA methylation data for various tumor data sets taken from The Cancer Genome Atlas and compared the results to those obtained with the existing algorithms ComBat, Surrogate Variable Analysis, RUVm and Functional normalization. BEclear constantly performed at par with or better than these methods. BEclear is available as an R package at the Bioconductor project http://bioconductor.org/packages/release/bioc/html/BEclear.html. PMID:27559732

  2. Xylitol production by Candida parapsilosis under fed-batch culture

    Directory of Open Access Journals (Sweden)

    Sandra A. Furlan

    2001-06-01

    Full Text Available Xylitol production by Candida parapsilosis was investigated under fed-batch cultivation, using single (xylose or mixed (xylose and glucose sugars as substrates. The presence of glucose in the medium induced the production of ethanol as secondary metabolite and improved specific rates of growth, xylitol formation and substrate consumption. Fractionated supply of the feed medium at constant sugar concentration did not promote any increase on the productivity compared to the single batch cultivation.A produção de xylitol por Candida parapsilosis foi investigada em regime de batelada alimentada, usando substratos açucarados de composição simples (xilose ou composta (xilose e glicose. A presença de glicose no meio induziu a formação de etanol como metabólito secundário. A suplementação fracionada do meio de alimentação numa concentração fixa de açúcar não resultou em aumento da produtividade em relação àquela alcançada em batelada simples.

  3. A batch-mode micromachining process for spherical structures

    International Nuclear Information System (INIS)

    This paper reports a self-aligned three-dimensional process (3D-SOULE) that incorporates batch-mode micro ultrasonic machining (µUSM), lapping and micro electro-discharge machining (µEDM) for fabrication of concave and mushroom-shaped spherical structures from hard and brittle materials. To demonstrate the process, 1 mm structures are fabricated from glass and ruby spheres. The µEDM technique is used to create the tool for μUSM from stainless steel spheres. Stainless steel 440, which provides a tool wear ratio <5%, is chosen as the tool material. A 2 × 2 array is used for batch processing. For an ultrasound generator frequency of 20 kHz and a vibration amplitude of 15 µm, machining rates of 24 and 12 µm min−1 are obtained for glass and ruby spheres, respectively. An approximate linear relationship is observed between the measured roughness (Ra) of the machined surface and the product of the fracture toughness (KIC) and the hardness (H) of the workpiece material (KIC3/2H1/2). (paper)

  4. SEQUENCING BATCH REACTOR: A PROMISING TECHNOLOGY IN WASTEWATER TREATMENT

    Directory of Open Access Journals (Sweden)

    A. H. Mahvi

    2008-04-01

    Full Text Available Discharge of domestic and industrial wastewater to surface or groundwater is very dangerous to the environment. Therefore treatment of any kind of wastewater to produce effluent with good quality is necessary. In this regard choosing an effective treatment system is important. Sequencing batch reactor is a modification of activated sludge process which has been successfully used to treat municipal and industrial wastewater. The process could be applied for nutrients removal, high biochemical oxygen demand containing industrial wastewater, wastewater containing toxic materials such as cyanide, copper, chromium, lead and nickel, food industries effluents, landfill leachates and tannery wastewater. Of the process advantages are single-tank configuration, small foot print, easily expandable, simple operation and low capital costs. Many researches have been conducted on this treatment technology. The authors had been conducted some investigations on a modification of sequencing batch reactor. Their studies resulted in very high percentage removal of biochemical oxygen demand, chemical oxygen demand, total kjeldahl nitrogen, total nitrogen, total phosphorus and total suspended solids respectively. This paper reviews some of the published works in addition to experiences of the authors.

  5. BEclear: Batch Effect Detection and Adjustment in DNA Methylation Data

    Science.gov (United States)

    Akulenko, Ruslan; Merl, Markus; Helms, Volkhard

    2016-01-01

    Batch effects describe non-natural variations of, for example, large-scale genomic data sets. If not corrected by suitable numerical algorithms, batch effects may seriously affect the analysis of these datasets. The novel array platform independent software tool BEclear enables researchers to identify those portions of the data that deviate statistically significant from the remaining data and to replace these portions by typical values reconstructed from neighboring data entries based on latent factor models. In contrast to other comparable methods that often use some sort of global normalization of the data, BEclear avoids changing the apparently unaffected parts of the data. We tested the performance of this approach on DNA methylation data for various tumor data sets taken from The Cancer Genome Atlas and compared the results to those obtained with the existing algorithms ComBat, Surrogate Variable Analysis, RUVm and Functional normalization. BEclear constantly performed at par with or better than these methods. BEclear is available as an R package at the Bioconductor project http://bioconductor.org/packages/release/bioc/html/BEclear.html. PMID:27559732

  6. RSA踪迹驱动指令Cache计时攻击研究*%Research on Trace Drive Instruction Cache Timing Attack on RSA

    Institute of Scientific and Technical Information of China (English)

    陈财森; 王韬; 郭世泽; 周平

    2013-01-01

      指令Cache攻击是基于获取算法执行路径的一种旁路攻击方式.首先,通过分析原有RSA指令Cache计时攻击存在可行性不高且能够获取的幂指数位不足等局限性,建立了新的基于监视整个指令 Cache 而不只是监视特定指令 Cache 的踪迹驱动计时攻击模型;然后,提出了一种改进的基于 SWE 算法窗口大小特征的幂指数分析算法;最后,在实际环境下,利用处理器的同步多线程能力确保间谍进程与密码进程能够同步运行.针对 OpenSSL v.0.9.8f中的RSA算法执行指令Cache计时攻击实验,实验结果表明:新的攻击模型在实际攻击中具有更好的可操作性;改进的幂指数分析算法能够进一步缩小密钥搜索空间,提高了踪迹驱动指令Cache计时攻击的有效性.对于一个512位的幂指数,新的分析算法能够比原有分析算法多恢复出大约50个比特位.%The I-cache timing attack which exploits the instruction path of a cipher is one type of side channel attack. First, by analyzing the complications in the previous I-cache timing attacks on RSA algorithm because of how hard it has been to put them into practice, and how the number of the inferred bits is insufficient, this paper builds a new trace driven I-cache timing attack model via spying on the whole I-cache, instead targeting the instruction cache to which the special function mapped. Next, an improved analysis algorithm of the exponent based on the characteristic of the side of window in sliding window exponentiation (SWE) algorithm is proposed. Finally, an I-cache timing attack is implemented on RSA of OpenSSL v.0.9.8f in a practical environment, using a simultaneous multithreading processor to insure that the spy process and the cipher process can run in parallel. Experimental results show that the proposed attack model has strong applicability in real environments;the improved analysis algorithm of the exponent can further

  7. RSA算法中Z*(φ)(n)的代数结构研究%Study on Algebraic Structure of Z*(φ)(n) in RSA Algorithm

    Institute of Scientific and Technical Information of China (English)

    裴东林; 胡建军; 李旭

    2013-01-01

    [Abstract] Based on the theory of quadratic residues, this paper considers the algebraic structure of Z*φ(n) in the two order strong RSA algorithm. It is proved that the element α of Z*φ(n) gets maximal order if and only if gcd(α±l,n1) = 1, and the numbers of quadratic residues in the group Z*φ(n) is φ(φ(n))/8 .Z*φ(n) is divided up by the group which is composed of all quadratic residues, and all cosets form a Klein eight-group. It proves that the group Z*φ(n) can be generated by seven elements of quadratic non-residues.%应用二次剩余理论,对二阶强RSA算法中Z*(φ)(n)的代数结构进行研究,证明Z*(φ)(n)中元素a取最大阶的充要条件为gcd(a±1,n1)=1,以及任意元素的阶Z*(φ)(n)中模(φ)(n)的二次剩余个数为(φ)(φ)(n))/8,以所有二次剩余构成的群对Z*(φ)(n)进行分割,利用所有陪集构成一个Klein八元群,在此基础上证明Z*(φ)(n)可由7个二次非剩余元素生成.

  8. Detection of Rsa Ⅰ gene polimorphism of low density lipoprotein receptor related protein and its influence on serum lipid level in hemodialysis patients%血液透析患者低密度脂蛋白受体相关蛋白Rsa Ⅰ位点基因多态性对血脂水平的影响

    Institute of Scientific and Technical Information of China (English)

    王玉新; 张以勤; 叶婧; 陆元善; 徐琴君; 邹和群

    2012-01-01

    Objectives To investigate the characteristics of dislipidemia and influence by low density lipoprotein receptor related protein (LRP) exon 3 Rsa Ⅰ gene polymorphism in hemodialysis patients.Methods serum total cholesterol (TC),triglyceride (TG),low density lipoprotein cholesterol (LDLC),high density lipoprotein cholesterol ( HDLC),apolipoproteins ( Apo A1,B,E) and lipoprotein (a) [Lp (a)] were measured,polymerase chain reaction - restriction fragment length polymophism ( PCR - RFLP) was used to detect LRP gene polymorphism in hemodialysis patients.Results The serum levels of TG and ApoB were higher significantly in the hemodialysis patients compared to contrals,and the levels of TC,LDLC,HDLC were lower compared to controls.Patients with cardiovascular disorder had higher TG level compared to patients without the disorder.The data of LRP polymorphism detected by PCR - RFLP showed that the allele frequency and the distribution of the LRP genotype of tetranucleotide reapeat sequence and exon 3 did not differ significantly between controls and hemodialysis patients.There was no statistic difference in serum lipid level between hemodialysis patients with different genotype of LRP exon 3.Conclusions Hemodialysis patients were liable to develop hypertrglyeridemia and hypocholesteroldemia.TG level might related to the development of cardiovascular disorder in hemodialysis patients.There is different influence of LRP Rsa Ⅰ gene polymorphism on lipid levels between controls and hemodialysis patients.%目的 探讨血液透析患者脂代谢紊乱的临床特征及低密度脂蛋白受体相关蛋白(LRP)外显子3RsaⅠ位点基因多态性对脂代谢的影响.方法 生化方法检测血液透析患者血清总胆固醇(TC)、甘油三酯(TG)、高密度脂蛋白胆固醇(HDLC)、低密度脂蛋白胆固醇(LDLC)、载脂蛋白(Apo)A1、ApoB、ApoE及脂蛋白(Lp)(a)水平,多聚合酶链反应-限制性片断长度多态性方法( PCR - RFLP)检测LRP外显子3Rsa

  9. Bagasse hydrolyzates from Agave tequilana as substrates for succinic acid production by Actinobacillus succinogenes in batch and repeated batch reactor.

    Science.gov (United States)

    Corona-González, Rosa Isela; Varela-Almanza, Karla María; Arriola-Guevara, Enrique; Martínez-Gómez, Álvaro de Jesús; Pelayo-Ortiz, Carlos; Toriz, Guillermo

    2016-04-01

    The aim of this work was to obtain fermentable sugars by enzymatic or acid hydrolyses of Agave tequilana Weber bagasse in order to produce succinic acid with Actinobacillus succinogenes. Hydrolyses were carried out with mineral acids (sulfuric and hydrochloric acids) or a commercial cellulolytic enzyme, and were optimized statistically by a response surface methodology, having as factors the concentration of acid/enzyme and time of hydrolysis. The concentration of sugars obtained at optimal conditions for each hydrolysis were 21.7, 22.4y 19.8g/L for H2SO4, HCl and the enzymatic preparation respectively. Concerning succinic acid production, the enzymatic hydrolyzates resulted in the highest yield (0.446g/g) and productivity (0.57g/Lh) using A. succinogenes in a batch reactor system. Repeated batch fermentation with immobilized A. succinogenes in agar and with the enzymatic hydrolyzates resulted in a maximum concentration of succinic acid of 33.6g/L from 87.2g/L monosaccharides after 5 cycles in 40h, obtaining a productivity of 1.32g/Lh. PMID:26802183

  10. A general framework for the synthesis and operational design of batch processes

    DEFF Research Database (Denmark)

    Papaeconomou, Eirini; Gani, Rafiqul; Jørgensen, Sten Bay

    2002-01-01

    , which is the sequence of batch operations performed in order to achieve a specific objective. Important features of the methodology are a set of rule-based algorithms that provide the operational model of the units. Such an algorithm is highlighted, together with the associated rules, for the......The objective of this paper is to present a general problem formulation and a general methodology for the synthesis of batch operations and the operational design of individual batch processes, such as mixing, reaction and separation. The general methodology described supplies the batch routes...... operational design of batch reactors. A case study involving the feasible operation of a batch reactor with multiple desirable and undesirable reactions and operational constraints is presented. Application results including verification of the generated operational sequences (alternatives) through dynamic...

  11. A General framework for the Synthesis and Operational Design of Batch Processes

    DEFF Research Database (Denmark)

    , which is the sequence of batch operations performed in order to achieve a specific objective. Important features of the methodology are a set of rule-based algorithms that provide the operational model of the units. Such an algorithm is highlighted, together with the associated rules, for the......The objective of this paper is to present a general problem formulation and a general methodlogy for the synthesis of batch operations and the operational design of individual batch processes, such as mixing, reaction and separation. The general methodology described supplies the batch routes...... operational design of batch reactors. A case study involving the feasible operation of a batch reactor with multiple desirable and undesirable reactions and operational constraints is presented. Application results including verification of the generated operational sequences (alternatives) through dynamic...

  12. FLOWSHEET FOR ALUMINUM REMOVAL FROM SLUDGE BATCH 6

    Energy Technology Data Exchange (ETDEWEB)

    Pike, J; Jeffrey Gillam, J

    2008-12-17

    Samples of Tank 12 sludge slurry show a substantially larger fraction of aluminum than originally identified in sludge batch planning. The Liquid Waste Organization (LWO) plans to formulate Sludge Batch 6 (SB6) with about one half of the sludge slurry in Tank 12 and one half of the sludge slurry in Tank 4. LWO identified aluminum dissolution as a method to mitigate the effect of having about 50% more solids in High Level Waste (HLW) sludge than previously planned. Previous aluminum dissolution performed in a HLW tank in 1982 was performed at approximately 85 C for 5 days and dissolved nearly 80% of the aluminum in the sludge slurry. In 2008, LWO successfully dissolved 64% of the aluminum at approximately 60 C in 46 days with minimal tank modifications and using only slurry pumps as a heat source. This report establishes the technical basis and flowsheet for performing an aluminum removal process in Tank 51 for SB6 that incorporates the lessons learned from previous aluminum dissolution evolutions. For SB6, aluminum dissolution process temperature will be held at a minimum of 65 C for at least 24 days, but as long as practical or until as much as 80% of the aluminum is dissolved. As planned, an aluminum removal process can reduce the aluminum in SB6 from about 84,500 kg to as little as 17,900 kg with a corresponding reduction of total insoluble solids in the batch from 246,000 kg to 131,000 kg. The extent of the reduction may be limited by the time available to maintain Tank 51 at dissolution temperature. The range of dissolution in four weeks based on the known variability in dissolution kinetics can range from 44 to more than 80%. At 44% of the aluminum dissolved, the mass reduction is approximately 1/2 of the mass noted above, i.e., 33,300 kg of aluminum instead of 66,600 kg. Planning to reach 80% of the aluminum dissolved should allow a maximum of 81 days for dissolution and reduce the allowance if test data shows faster kinetics. 47,800 kg of the dissolved

  13. Biological Treatment of Leachate using Sequencing Batch Reactor

    Directory of Open Access Journals (Sweden)

    WDMC Perera

    2014-12-01

    Full Text Available Normal 0 false false false EN-US X-NONE TA Abstract   In Sri Lanka municipal solid waste is generally disposed in poorly managed open dumps which lack liner systems and leachate collection systems. Rain water percolates through the waste layers to produce leachate which drains in to ground water and finally to nearby water bodies, degrading the quality of water. Leachate thus has become a major environmental concern in municipal waste management and treatment of leachate is a major challenge for the existing and proposed landfill sites.   The study was conducted to assess the feasibility of the usage of the Sequencing Batch Reactor in the treatment of the landfill leachate up to the proposed levels in the draft report of “Proposed Sri Lankan standard for landfill leachate to be disposed to the inland waters". Leachate collected from the open dumpsite at Meethotamulla, Western Province, Sri Lanka was used for leachate characterization.   SBR was constructed with a 10-liter working volume operated in an 18 hour cycle mode and each cycle consists of 15hours of aerobic, 2h settle and 0.5 h of fill/decant stages. The Dissolved Oxygen level within the SBR was maintained at 2 mg/l through the aerobic stage. Infeed was diluted with water during the acclimatization period and a leachate to water ratio of 55:45 was maintained. The removal efficiencies for different parameters were; COD (90.5%, BOD (92.6%, TS (92.1%, Conductivity (83.9%, Alkalinity (97.4%, Hardness (82.2%, Mg (80.5%, Fe (94.2%, Zn (63.4%, Cr (31.69%, Pb (99.6%, Sulphate (98.9%, and Phosphorus (71.4% respectively. In addition Ni and Cd were removed completely during a single SBR cycle. Thus the dilution of leachate in the dumpsites using municipal wastewater, groundwater or rainwater was identified as the most cost effective dilution methods. The effluent from the Sequencing batch reactor is proposed to be further treated using a constructed wetland before releasing to surface water.

  14. Transient and Stationary Losses in a Finite-Buffer Queue with Batch Arrivals

    OpenAIRE

    Andrzej Chydzinski; Blazej Adamczyk

    2012-01-01

    We present an analysis of the number of losses, caused by the buffer overflows, in a finite-buffer queue with batch arrivals and autocorrelated interarrival times. Using the batch Markovian arrival process, the formulas for the average number of losses in a finite time interval and the stationary loss ratio are shown. In addition, several numerical examples are presented, including illustrations of the dependence of the number of losses on the average batch size, buffer size, system load, aut...

  15. A Batch Optimization Solver for diffusion area scheduling in semiconductor manufacturing

    OpenAIRE

    Yugma, Claude; Artigues, Christian; Dauzère-Pérès, Stéphane; Derreumaux, Alexandre; Sibille, Olivier

    2007-01-01

    This paper presents a method and a software for solving a batching and scheduling problem in the diffusion area of a semiconductor plant, the ATMEL fabrication unit in Rousset, France. The diffusion area is one of the most complex area in the fab. A significant number of lots has to be processed while satisfying complex equipment process and line management constraints. The purpose of this study is to investigate approaches to group lots in batches, to assign the batches on the equipment and ...

  16. Data Driven Modeling for Monitoring and Control of Industrial Fed-Batch Cultivations

    DEFF Research Database (Denmark)

    Bonné, Dennis; Alvarez, María Antonieta; Jørgensen, Sten Bay

    2014-01-01

    A systematic methodology for development of a set of discrete-time sequence models for batch control based on historical and online operating data is presented and investigated experimentally. The modeling is based on the two independent characteristic time dimensions of batch processing, being t...... optimization of the bioreactor operations model. The modeling and preliminary control performance is demonstrated on an industrial fed-batch protein cultivation production process. The presented methods lend themselves directly for application as Process Analytical Technologies....

  17. A CATASTROPHIC-CUM-RESTORATIVE QUEUING SYSTEM WITH CORRELATED BATCH ARRIVALS AND VARIABLE CAPACITY

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar

    2008-07-01

    Full Text Available In this paper, we study a catastrophic-cum-restorative queuing system with correlated batch arrivals and service in batches of variable sizes. We perform the transient analysis of the queuing model. We obtain the Laplace Transform of the probability generating function of system size. Finally, some particular cases of the model have been derived and discussed. Keywords: Queue length, Catastrophes, Correlated batch arrivals, Broadband services, Variable service capacity, and Restoration.

  18. Simulation of kefiran production of Lactobacillus kefiranofaciens JCM6985 in fed-batch reactor

    OpenAIRE

    Benjamas Cheirsilp

    2006-01-01

    Kinetics of kefiran production by Lactobacillus kefiranofaciens JCM6985 has been investigated. A mathematical model taking into account the mechanism of exopolysaccharides production has been developed. Experiments were carried out in batch mode in order to obtain kinetic model parameters that were further applied to simulate fed-batch processes. A simplification of parameter fitting was also introduced for complicated model. The fed-batch mode allows more flexibility in the control of the su...

  19. Fed-batch Fermentation of Lactic Acid Bacteria to Improve Biomass Production: A Theoretical Approach

    Science.gov (United States)

    Beng Lee, Boon; Tham, Heng Jin; Chan, Eng Seng

    Recently, fed-batch fermentation has been introduced in an increasing number of fermentation processes. Previous researches showed that fed-batch fermentation can increase the biomass yield of many strains. Improvement of the biomass yield is interested because biomass from lactic acid bacteria (LAB) fermentation is widely used in food and pharmaceutical industry. The aim of this research is to study the ability and feasibility of fed-batch fermentation to improve biomass production of LAB. Appropriate model has been selected from literature. Monod equation described the substrate limitation of LAB and the product inhibition of LAB follows a non-competitive model. Furthermore, the lactic acid production follows Luedeking and Piret model. Then the models are applied to simulate the fermentation of batch and fed-batch cultures by using MATLAB. From the results of simulation, fed-batch fermentation showed that substrate limitation and substrate inhibition can be avoided. Besides that, the variable volume fed-batch fermentation also showed that product inhibition can be eliminated by diluting the product concentration with added fresh feed. However, it was found that fed-batch fermentation is not economically feasible because large amount of substrate is required to reduce the product inhibition effect. Therefore, fed-batch fermentation plays more importance role if the fermentation strain has high Ks value or low Kp value.

  20. Increased CPC batch size study for Tank 42 sludge in the Defense Waste Processing Facility

    International Nuclear Information System (INIS)

    A series of experiments have been completed at TNX for the sludge-only REDOX adjusted flowsheet using Tank 42 sludge simulant in response to the Technical Task Request HLW/DWPT/TTR-980013 to increase CPC batch sizes. By increasing the initial SRAT batch size, a melter feed batch at greater waste solids concentration can be prepared and thus increase melter output per batch by about one canister. The increased throughput would allow DWPF to dispose of more waste in a given time period thus shortening the overall campaign

  1. Role of batch depletion of broiler houses on the occurrence of Campylobacter spp. in chicken flocks

    DEFF Research Database (Denmark)

    Hald, Birthe; Rattenborg, Erik; Madsen, Mogens

    2001-01-01

    Aims: The effect of batch depletion of broiler houses for campylobacter occurrence in broiler flocks was estimated in 10 flocks, each comprising a separate female and male batch. Methods and Results: The chicks were sampled first bq; cloacal swabs in the broiler houses before the start of the...... batch depletion of broiler houses increased the prevalence of Campylobacter spp.-infected broilers in the flocks, that the introduction occurred a hen catching the first batch, and that campylobacter spreads through the entire flock within a week. Significance and Impact of the Study: The results from...

  2. Retardation characteristics of radionuclides in geologic media through batch and packed column experiments

    International Nuclear Information System (INIS)

    Batch and packed column experiments are performed to investigate the retardation characteristics of radionuclide,i.e, Cs-137 in geologic media. In batch experiment, the effects of important parameters on the sorption of radionuclide in geologic media, such as nuclide concentration, pH, and particle size are examined. The Kd value obtained from breakthrough curve was compared with that from the batch sorption experiment to investigate the applicability of the Kd value from batch experiment to prediction of radionuclide migration in dynamic flow through porous media. The proposed model of radionuclide migration in porous media is also verified using the experimental results. (Author)

  3. Treatment of Laboratory Wastewater by Sequence Batch reactor technology

    International Nuclear Information System (INIS)

    These studies were conducted on the characterization and treatment of sewage mixed with waste -water of research and testing laboratory (PCSIR Laboratories Lahore). In this study all the parameters COD, BOD and TSS etc of influent (untreated waste-water) and effluent (treated waste-water) were characterized using the standard methods of examination for water and waste-water. All the results of the analyzed waste-water parameters were above the National Environmental Quality Standards (NEQS) set at National level. Treatment of waste-water was carried out by conventional sequencing batch reactor technique (SBR) using aeration and settling technique in the same treatment reactor at laboratory scale. The results of COD after treatment were reduced from (90-95 %), BOD (95-97 %) and TSS (96-99 %) and the reclaimed effluent quality was suitable for gardening purposes. (author)

  4. Uranium Adsorption on Granular Activated Carbon – Batch Testing

    Energy Technology Data Exchange (ETDEWEB)

    Parker, Kent E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Golovich, Elizabeth C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Wellman, Dawn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2013-09-01

    The uranium adsorption performance of two activated carbon samples (Tusaar Lot B-64, Tusaar ER2-189A) was tested using unadjusted source water from well 299-W19-36. These batch tests support ongoing performance optimization efforts to use the best material for uranium treatment in the Hanford Site 200 West Area groundwater pump-and-treat system. A linear response of uranium loading as a function of the solution-to-solid ratio was observed for both materials. Kd values ranged from ~380,000 to >1,900,000 ml/g for the B-64 material and ~200,000 to >1,900,000 ml/g for the ER2-189A material. Uranium loading values ranged from 10.4 to 41.6 μg/g for the two Tusaar materials.

  5. Study on the numerical simulation of batch sieving process

    Institute of Scientific and Technical Information of China (English)

    JIAO Hong-guang; MA Jiao; ZHAO Yue-min; CHEN Lun-jian

    2006-01-01

    Screening was widely used in many sectors of industry. However, it is rather incomplete to the cognition of the sieving process for us due to the daedal separation process involving interactions of thousands of particulates. To address this problem, two dimensional numerical simulation of batch sieving process was performed by adopting advanced discrete element method (DEM), which is one of the highly nonlinear digitized dynamic simulative methods and can be used to reveal the quantitative change from particle dimension level. DEM simulation results show that the jam phenomena of sieve-plate apertures of the "blinding particles" in the screen feed can be demonstrated vividly and results also reveal that the velocity of particle moving on the screen plate will vary along with the screen length. This conclusion will be helpful to the design and operation of screen.

  6. Hadoop distributed batch processing for Gaia: a success story

    Science.gov (United States)

    Riello, Marco

    2015-12-01

    The DPAC Cambridge Data Processing Centre (DPCI) is responsible for the photometric calibration of the Gaia data including the low resolution spectra. The large data volume produced by Gaia (~26 billion transits/year), the complexity of its data stream and the self-calibrating approach pose unique challenges for scalability, reliability and robustness of both the software pipelines and the operations infrastructure. DPCI has been the first in DPAC to realise the potential of Hadoop and Map/Reduce and to adopt them as the core technologies for its infrastructure. This has proven a winning choice allowing DPCI unmatched processing throughput and reliability within DPAC to the point that other DPCs have started following our footsteps. In this talk we will present the software infrastructure developed to build the distributed and scalable batch data processing system that is currently used in production at DPCI and the excellent results in terms of performance of the system.

  7. Analytical study plan: Shielded Cells batch 1 campaign; Revision 1

    International Nuclear Information System (INIS)

    Radioactive operations in the Defense Waste Processing Facility (DWPF) will require that the Savannah River Technology Center (SRTC) perform analyses and special studies with actual Savannah River Site (SRS) high-level waste sludge. SRS Tank 42 and Tank 51 will comprise the first batch of sludge to be processed in the DWPF. Approximately 25 liters of sludge from each of these tanks will be characterized and processed in the Shielded Cells of SRTC. During the campaign, processes will include sludge characterization, sludge washing, rheology determination, mixing, hydrogen evolution, feed preparation, and vitrification of the waste. To complete the campaign, the glass will be characterized to determine its durability and crystallinity. This document describes the types of samples that will be produced, the sampling schedule and analyses required, and the methods for sample and analytical control

  8. Simulated annealing and joint manufacturing batch-sizing

    Directory of Open Access Journals (Sweden)

    Sarker Ruhul

    2003-01-01

    Full Text Available We address an important problem of a manufacturing system. The system procures raw materials from outside suppliers in a lot and processes them to produce finished goods. It proposes an ordering policy for raw materials to meet the requirements of a production facility. In return, this facility has to deliver finished products demanded by external buyers at fixed time intervals. First, a general cost model is developed considering both raw materials and finished products. Then this model is used to develop a simulated annealing approach to determining an optimal ordering policy for procurement of raw materials and also for the manufacturing batch size to minimize the total cost for meeting customer demands in time. The solutions obtained were compared with those of traditional approaches. Numerical examples are presented. .

  9. Sample Results From Routine Salt Batch 7 Samples

    International Nuclear Information System (INIS)

    Strip Effluent Hold Tank (SEHT) and Decontaminated Salt Solution Hold Tank (DSSHT) samples from several of the "microbatches" of Integrated Salt Disposition Project (ISDP) Salt Batch ("Macrobatch") 7B have been analyzed for 238Pu, 90Sr, 137Cs, cations (Inductively Coupled Plasma Emission Spectroscopy - ICPES), and anions (Ion Chromatography Anions - IC-A). The analytical results from the current microbatch samples are similar to those from previous macrobatch samples. The Actinide Removal Process (ARP) and the Modular Caustic-Side Solvent Extraction Unit (MCU) continue to show more than adequate Pu and Sr removal, and there is a distinct positive trend in Cs removal (increasing cesium decontamination), due to the use of the Next Generation Solvent (NGS). The bulk chemistry of the DSSHT and SEHT samples do not show any signs of unusual behavior.

  10. CONSOLIDATING BATCH AND TRANSACTIONAL WORKLOADS USING DEPENDENCY STRUCTURE PRIORITIZATION

    Directory of Open Access Journals (Sweden)

    S.NIVETHITHA

    2013-04-01

    Full Text Available Organizations offer efficient services to their customers through cloud. These services can either be a batch or transactional workloads. To offer a real-time service, there comes a need to schedule these workloads in an efficient way. An idea to consolidate these workloads enables us to cut down the energy consumption and infrastructure cost. It will be harder to consolidate both these workloads due to the difference in their nature, performance goals and control mechanisms. The proposed work implements the concept of Dependency Structure Prioritization (DSP to assign priority to the job. This work tends to make effective resource utilization through reducing the number of job migration and missed deadline jobs by considering the deadline and the priority of the job as the most important evaluation factor.

  11. Sample Results From Routine Salt Batch 7 Samples

    Energy Technology Data Exchange (ETDEWEB)

    Peters, T. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2016-01-14

    Strip Effluent Hold Tank (SEHT) and Decontaminated Salt Solution Hold Tank (DSSHT) samples from several of the “microbatches” of Integrated Salt Disposition Project (ISDP) Salt Batch (“Macrobatch”) 7B have been analyzed for 238Pu, 90Sr, 137Cs, cations (Inductively Coupled Plasma Emission Spectroscopy - ICPES), and anions (Ion Chromatography Anions - IC-A). The analytical results from the current microbatch samples are similar to those from previous macrobatch samples. The Actinide Removal Process (ARP) and the Modular Caustic-Side Solvent Extraction Unit (MCU) continue to show more than adequate Pu and Sr removal, and there is a distinct positive trend in Cs removal (increasing cesium decontamination), due to the use of the Next Generation Solvent (NGS). The bulk chemistry of the DSSHT and SEHT samples do not show any signs of unusual behavior.

  12. Biological Treatment of Dairy Wastewater by Sequencing Batch Reactor

    Directory of Open Access Journals (Sweden)

    A Mohseni-Bandpi, H Bazari

    2004-10-01

    Full Text Available A bench scale aerobic Sequencing Batch Reactor (SBR was investigated to treat the wastewater from an industrial milk factory. The reactor was constructed from plexi glass material and its volume was 22.5 L. The reactor was supplied with oxygen by fine bubble air diffuser. The reactor was fed with milk factory and synthetic wastewater under different operational conditions. The COD removal efficiency was achieved more than 90%, whereas COD concentration varied from 400 to 2500 mg/l. The optimum dissolved oxygen in the reactor was 2 to 3 mg/l and MLVSS was around 3000 mg/l. Easy operation, low cost and minimal sludge bulking condition make the SBR system an interesting option for the biological medium strength industrial wastewater treatment. The study demonstrated the capability of aerobic SBR for COD removal from dairy industrial wastewater.

  13. State estimation in a batch suspension polymerization reactor

    International Nuclear Information System (INIS)

    This paper concerns non-linear state estimation in a batch polymerization reactor where suspension polymerization of methyl methacrylate takes place. A kinetic model proposed in the literature is selected and its validity has been verified through an experimental set-up. Based on this model monomer conversion and average molecular weights of the polymer are estimated using only one output measurement (reactor temperature). The performance of the estimator, which has the structure of an extended Kalman filter, is examined through simulation and experimental studies in the presence of different levels of parameter uncertainties. The effects of adding fictitious noise and parameter state to the estimation algorithm are also investigated. To find the best fictitious state, the main parameters of polymerization model are divided into three groups. The parametric study of the MMA polymerization model indicates that, when the source of parameter uncertainty is unknown, the best selection of parameter state is the initial mass of monomer

  14. Hydrolyzed polyacrylamide biodegradation and mechanism in sequencing batch biofilm reactor.

    Science.gov (United States)

    Yan, Miao; Zhao, Lanmei; Bao, Mutai; Lu, Jinren

    2016-05-01

    An investigation was performed to study the performance of a sequencing batch biofilm reactor (SBBR) to treat hydrolyzed polyacrylamides (HPAMs) and to determine the mechanisms of HPAM biodegradation. The mechanisms for the optimized parameters that significantly improved the degradation efficiency of the HPAMs were investigated by a synergistic effect of the co-metabolism in the sludge and the enzyme activities. The HPAM and TOC removal ratio reached 54.69% and 70.14%. A significant decrease in the total nitrogen concentration was measured. The carbon backbone of the HPAMs could be degraded after the separation of the amide group according to the data analysis. The HPLC results indicated that the HPAMs could be converted to polymer fragments without the generation of the acrylamide monomer intermediate. The results from high-throughput sequencing analysis revealed proteobacterias, bacteroidetes and planctomycetes were the key microorganisms involved in the degradation. PMID:26896716

  15. QUARTZ MELT RATE FURNACE EVALUATION USING SLUDGE BATCH 3 FEED

    International Nuclear Information System (INIS)

    The Quartz Melt Rate Furnace (QMRF) was developed to study the melt rate and offgas composition of simulated Defense Waste Processing Facility (DWPF) melter feed. The objective of this testing was to evaluate whether the apparatus could be used to study the offgas chemistry of melting batches and perform small-scale slurry-fed melt rate tests. The furnace was tested in three different configurations: a dry-fed test with offgas analysis, a slurry-fed test without offgas analysis, and a slurry-fed test with offgas analysis. During the dry-fed test, offgas composition was successfully measured throughout the run and total offgas flow was calculated from the helium tracer concentration. During the slurry-feeding tests without offgas analysis, the furnace exhibited stable feeding behavior with no problems with feed tube pluggage. Feeding behavior was used to measure the melt rate of Sludge Batch 3 with Frit 320 and with Frit 418. Both frits had approximately the same melt rate during the tests based on amount of melter feed added per minute. During the slurry-fed test with offgas analysis, spikes in the data prevented overall offgas flow analysis from the helium tracer, but the ratio of different offgas species allowed the composition data to be compared between runs. Minor improvements were identified that would enhance the performance of the furnace and further testing should be performed to optimize the performance of the apparatus. These tests should focus on increasing the stability of offgas composition data by providing more surge capacity in the offgas system, determining the sensitivity of the furnace to melt rate during slurry-fed tests and refining the lid heat power to optimize melt rate measurements, and to develop the capability to utilize the system with radioactive feeds

  16. Optimal control of batch emulsion polymerization of vinyl chloride

    Energy Technology Data Exchange (ETDEWEB)

    Damslora, Andre Johan

    1998-12-31

    The highly exothermic polymerization of vinyl chloride (VC) is carried out in large vessels where the heat removal represents a major limitation of the production rate. Many emulsion polymerization reactors are operated in such a way that a substantial part of the heat transfer capacity is left unused for a significant part of the total batch time. To increase the reaction rate so that it matches the heat removal capacity during the course of the reaction, this thesis proposes the use of a sufficiently flexible initiator system to obtain a reaction rate which is high throughout the reaction and real-time optimization to compute the addition policy for the initiator. This optimization based approach provides a basis for an interplay between design and control and between production and research. A simple model is developed for predicting the polymerization rate. The model is highly nonlinear and open-loop unstable and may serve as an interesting case for comparison of nonlinear control strategies. The model is fitted to data obtained in a laboratory scale reactor. Finally, the thesis discusses optimal control of the emulsion polymerization reactor. Reduction of the batch cycle time is of major economic importance, as long as the quality parameters are within their specifications. The control parameterization had a major influence on the performance. A differentiable spline parameterization was applied and the optimization is illustrated in a number of cases. The best performance is obtained when the reactor temperature is obtained when the optimization is combined with some form of closed-loop control of the reactor temperature. 112 refs., 48 figs., 4 tabs.

  17. A Particle Batch Smoother Approach to Snow Water Equivalent Estimation

    Science.gov (United States)

    Margulis, Steven A.; Girotto, Manuela; Cortes, Gonzalo; Durand, Michael

    2015-01-01

    This paper presents a newly proposed data assimilation method for historical snow water equivalent SWE estimation using remotely sensed fractional snow-covered area fSCA. The newly proposed approach consists of a particle batch smoother (PBS), which is compared to a previously applied Kalman-based ensemble batch smoother (EnBS) approach. The methods were applied over the 27-yr Landsat 5 record at snow pillow and snow course in situ verification sites in the American River basin in the Sierra Nevada (United States). This basin is more densely vegetated and thus more challenging for SWE estimation than the previous applications of the EnBS. Both data assimilation methods provided significant improvement over the prior (modeling only) estimates, with both able to significantly reduce prior SWE biases. The prior RMSE values at the snow pillow and snow course sites were reduced by 68%-82% and 60%-68%, respectively, when applying the data assimilation methods. This result is encouraging for a basin like the American where the moderate to high forest cover will necessarily obscure more of the snow-covered ground surface than in previously examined, less-vegetated basins. The PBS generally outperformed the EnBS: for snow pillows the PBSRMSE was approx.54%of that seen in the EnBS, while for snow courses the PBSRMSE was approx.79%of the EnBS. Sensitivity tests show relative insensitivity for both the PBS and EnBS results to ensemble size and fSCA measurement error, but a higher sensitivity for the EnBS to the mean prior precipitation input, especially in the case where significant prior biases exist.

  18. Sludge Batch 2 (Marcobath 3) Flowsheet Studies with Simulants

    International Nuclear Information System (INIS)

    Sludge-only process simulations of the Sludge Receipt and Adjustment Tank (SRAT) and the Slurry Mix Evaporator (SME) cycle were conducted for the two most likely scenarios for Sludge Batch 2 (Macrobatch 3). The two scenarios are a roughly 50:50 blend of Tank 8 and Tank 40 washed sludge and Tank 40 washed sludge by itself. The testing used new simulants of Tank 8 and Tank 40 washed sludge prepared at the University of South Carolina. The washing endpoint was about 0.5 moles sodium per liter supernate. This report summarizes both the simulant preparation and process simulation activities. The rheology work requested in the Task Plan will be documented in a separate report. Two scoping SRAT simulations were conducted for Tank 40 sludge. This was followed by a complete SRAT and SME simulation using Sludge Batch 1B acid stoichiometry (137.5 percent). Four scoping SRAT simulations were conducted for the Tank 8/40 blend. Three complete SRAT and SME simulations using blended sludge were then performed. One was at the recommended acid stoichiometry of 125 percent. The second used identical acid stoichiometry with HM levels of noble metals. The final run was at worst case noble metals and assumed complete transfer of the Formic Acid Feed Tank. Testing was completed without any major incidents. Hydrogen flow rates in excess of the design bases (0.65 lbs./hr for the SRAT and 0.23 lbs./hr for the SME) are marked in bold. Full details on the noble metals concentrations can be found in the body of the report

  19. Sludge Batch 2 (Marcobath 3) Flowsheet Studies with Simulants

    Energy Technology Data Exchange (ETDEWEB)

    Koopman, D.C.

    2001-03-02

    Sludge-only process simulations of the Sludge Receipt and Adjustment Tank (SRAT) and the Slurry Mix Evaporator (SME) cycle were conducted for the two most likely scenarios for Sludge Batch 2 (Macrobatch 3). The two scenarios are a roughly 50:50 blend of Tank 8 and Tank 40 washed sludge and Tank 40 washed sludge by itself. The testing used new simulants of Tank 8 and Tank 40 washed sludge prepared at the University of South Carolina. The washing endpoint was about 0.5 moles sodium per liter supernate. This report summarizes both the simulant preparation and process simulation activities. The rheology work requested in the Task Plan will be documented in a separate report. Two scoping SRAT simulations were conducted for Tank 40 sludge. This was followed by a complete SRAT and SME simulation using Sludge Batch 1B acid stoichiometry (137.5 percent). Four scoping SRAT simulations were conducted for the Tank 8/40 blend. Three complete SRAT and SME simulations using blended sludge were then performed. One was at the recommended acid stoichiometry of 125 percent. The second used identical acid stoichiometry with HM levels of noble metals. The final run was at worst case noble metals and assumed complete transfer of the Formic Acid Feed Tank. Testing was completed without any major incidents. Hydrogen flow rates in excess of the design bases (0.65 lbs./hr for the SRAT and 0.23 lbs./hr for the SME) are marked in bold. Full details on the noble metals concentrations can be found in the body of the report.

  20. Integrating PROOF Analysis in Cloud and Batch Clusters

    International Nuclear Information System (INIS)

    High Energy Physics (HEP) analysis are becoming more complex and demanding due to the large amount of data collected by the current experiments. The Parallel ROOT Facility (PROOF) provides researchers with an interactive tool to speed up the analysis of huge volumes of data by exploiting parallel processing on both multicore machines and computing clusters. The typical PROOF deployment scenario is a permanent set of cores configured to run the PROOF daemons. However, this approach is incapable of adapting to the dynamic nature of interactive usage. Several initiatives seek to improve the use of computing resources by integrating PROOF with a batch system, such as Proof on Demand (PoD) or PROOF Cluster. These solutions are currently in production at Universidad de Oviedo and IFCA and are positively evaluated by users. Although they are able to adapt to the computing needs of users, they must comply with the specific configuration, OS and software installed at the batch nodes. Furthermore, they share the machines with other workloads, which may cause disruptions in the interactive service for users. These limitations make PROOF a typical use-case for cloud computing. In this work we take profit from Cloud Infrastructure at IFCA in order to provide a dynamic PROOF environment where users can control the software configuration of the machines. The Proof Analysis Framework (PAF) facilitates the development of new analysis and offers a transparent access to PROOF resources. Several performance measurements are presented for the different scenarios (PoD, SGE and Cloud), showing a speed improvement closely correlated with the number of cores used.

  1. Detección de Anomalías en Oráculos Criptográficos tipo RSA por medio de análisis probabilísticas y estadísticos

    OpenAIRE

    Castro Lechtaler, Antonio; Cipriano, Marcelo; Malvacio, Eduardo

    2013-01-01

    Esta línea de investigación persigue la elaboración de herramientas matemáticas susceptibles de ser sistematizadas en un software capaz de detectar anomalías y mal funcionamiento en servicios de infraestructura de clave pública (PKI) que utilicen el esquema RSA. Esta herramienta se puede aplicar en redes Públicas o Privados, Lan´s, o Wan´s e incluso Internet; en sistemas militares como del ámbito civil. Dada la complejidad de los sistemas actuales, se hace cada vez más complicada la det...

  2. Detección de posibles anomalías en la Infraestructura de Clave Pública (PKI) tipo RSA por medio de análisis probabilísticos y estadísticos

    OpenAIRE

    Castro Lechtaler, Antonio; Cipriano, Marcelo; García, Edith; Liporace, Julio César; Maiorano, Ariel

    2014-01-01

    Esta línea de investigación persigue la elaboración de herramientas matemáticas susceptibles de ser sistematizadas en un software capaz de detectar anomalías y mal funcionamiento en servicios de infraestructura de clave pública (PKI) que utilicen el esquema RSA. Esta herramienta se puede aplicar en redes Públicas o Privados, Lan´s, o Wan´s e incluso Internet; en sistemas militares como del ámbito civil. Errores – fortuitos o involucrados - o mal funcionamiento en el software que provee ...

  3. Detección de anomalías en oráculos criptográficos tipo RSA por medio de análisis probabilísticas y estadísticos

    OpenAIRE

    Castro Lechtaler, Antonio; Cipriano, Marcelo

    2012-01-01

    Esta línea de investigación persigue la elaboración de herramientas matemáticas susceptibles de ser sistematizadas en un software que sea capaz de detectar anomalías y mal funcionamiento en servicios de autenticación de usuarios o equipos, claves de sesión y cualquier otro servicio criptográfico que utilice el esquema RSA. Para aplicar en redes Públicas o Privados, Lan´s, o Wan´s o asimismo Internet. En entornos de aplicación dual, es decir tanto en sistemas militares como del ámbito civil. ...

  4. Meeting Report: Batch-to-Batch Variability in Estrogenic Activity in Commercial Animal Diets—Importance and Approaches for Laboratory Animal Research

    OpenAIRE

    Heindel, Jerrold J.; vom Saal, Frederick S.

    2007-01-01

    We report information from two workshops sponsored by the National Institutes of Health that were held to a) assess whether dietary estrogens could significantly impact end points in experimental animals, and b) involve program participants and feed manufacturers to address the problems associated with measuring and eliminating batch-to-batch variability in rodent diets that may lead to conflicting findings in animal experiments within and between laboratories. Data were presented at the work...

  5. Challenging Conventional Assumptions of Automated Information Retrieval with Real Users: Boolean Searching and Batch Retrieval Evaluations.

    Science.gov (United States)

    Hersh, William; Turpin, Andrew; Price, Susan; Kraemer, Dale; Olson, Daniel; Chan, Benjamin; Sacherek, Lynetta

    2001-01-01

    Describes research conducted at the TREC (Text Retrieval Conference) interactive track that compared Boolean and natural language searching, showing they achieved comparable results; and assessed the validity of batch-oriented retrieval evaluations, showing that the results from batch evaluations were not comparable to those obtained in…

  6. Variance bias analysis for the Gelbard's batch method

    International Nuclear Information System (INIS)

    In this paper, variances and the bias will be derived analytically when the Gelbard's batch method is applied. And then, the real variance estimated from this bias will be compared with the real variance calculated from replicas. Variance and the bias were derived analytically when the batch method was applied. If the batch method was applied to calculate the sample variance, covariance terms between tallies which exist in the batch were eliminated from the bias. With the 2 by 2 fission matrix problem, we could calculate real variance regardless of whether or not the batch method was applied. However as batch size got larger, standard deviation of real variance was increased. When we perform a Monte Carlo estimation, we could get a sample variance as the statistical uncertainty of it. However, this value is smaller than the real variance of it because a sample variance is biased. To reduce this bias, Gelbard devised the method which is called the Gelbard's batch method. It has been certificated that a sample variance get closer to the real variance when the batch method is applied. In other words, the bias get reduced. This fact is well known to everyone in the MC field. However, so far, no one has given the analytical interpretation on it

  7. 40 CFR 63.489 - Batch front-end process vents-monitoring equipment.

    Science.gov (United States)

    2010-07-01

    ... pressure drop. (B) If the scrubber is subject to regulations in 40 CFR parts 264 through 266 that have... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Batch front-end process vents... § 63.489 Batch front-end process vents—monitoring equipment. (a) General requirements. Each owner...

  8. 40 CFR 63.1324 - Batch process vents-monitoring equipment.

    Science.gov (United States)

    2010-07-01

    .... (B) If the scrubber is subject to regulations in 40 CFR parts 264 through 266 that have required a... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Batch process vents-monitoring... Batch process vents—monitoring equipment. (a) General requirements. Each owner or operator of a...

  9. Goal Selection and Program Monitoring Using Batch and Microcomputer Procedures: A Summary of the Presentation.

    Science.gov (United States)

    Brown, David A.

    The paper reviews the use of the microcomputer in special education program monitoring and contrasts its use with batch mainframe time-sharing computer systems. The mainframe system used by Custer State Hospital, the site of a residential training program for severely and profoundly handicapped persons, is described. The hospital's batch system is…

  10. 7 CFR 58.915 - Batch or continuous in-container thermal processing equipment.

    Science.gov (United States)

    2010-01-01

    ... hermetically sealed containers (21 CFR part 113). The equipment shall be maintained in such a manner as to... 7 Agriculture 3 2010-01-01 2010-01-01 false Batch or continuous in-container thermal processing... and Grading Service 1 Equipment and Utensils § 58.915 Batch or continuous in-container...

  11. Simple approximations for the batch-arrival mx/g/1 queue

    OpenAIRE

    Ommeren, van, F.J.

    1988-01-01

    In this paper we consider the MX/G/I queueing system with batch arrivals. We give simple approximations for the waiting-time probabilities of individual customers. These approximations are checked numerically and they are found to perform very well for a wide variety of batch-size and service-timed distributions.

  12. Implementation of Sliding Mode Controller with Boundary Layer for Saccharomyces cerevisiae Fed-batch Cultivation

    Directory of Open Access Journals (Sweden)

    Stoyan Tzonkov

    2005-04-01

    Full Text Available An implementation of sliding mode control for yeast fed-batch cultivation is presented in this paper. Developed controller has been implemented on two real fed-batch cultivations of Saccharomyces cerevisiae. The controller successfully stabilizes the process and shows a very good performance at high input disturbances.

  13. 40 CFR 1065.245 - Sample flow meter for batch sampling.

    Science.gov (United States)

    2010-07-01

    ... laminar flow element, an ultrasonic flow meter, a subsonic venturi, a critical-flow venturi or multiple... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Sample flow meter for batch sampling... Sample flow meter for batch sampling. (a) Application. Use a sample flow meter to determine sample......

  14. 40 CFR 417.10 - Applicability; description of the soap manufacturing by batch kettle subcategory.

    Science.gov (United States)

    2010-07-01

    ... manufacturing by batch kettle subcategory. 417.10 Section 417.10 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS SOAP AND DETERGENT MANUFACTURING POINT SOURCE CATEGORY Soap Manufacturing by Batch Kettle Subcategory § 417.10 Applicability; description of the...

  15. Degradation of the herbicide mecoprop in an aerobic aquifer determined by laboratory batch studies

    DEFF Research Database (Denmark)

    Heron, Gorm; Christensen, Thomas Højlund

    1992-01-01

    The potential of a shallow aerobic aquifer to degrade the herbicide Mecoprop (2-(2-methyl-4-chlorophenoxy)propionic acid) was evaluated in the laboratory using groundwater and sediment suspension batches. Mecoprop was added to the batches to obtain concentrations of 65, 140, 400 and 1400 μg...

  16. Batch estimation of statistical errors in the Monte Carlo calculation of local powers

    International Nuclear Information System (INIS)

    Highlights: → Batch methodology performs well on the practical grounds. → The sample variance without autocorrelation terms is utterly unacceptable. → Non-overlapping and overlapping batch means perform better than standardized time series. → Overlapping batch means can be improved based on autocovariance bias correction without the cost of instability. - Abstract: Batch methodology is among the techniques for computing the standard deviation of sample mean and is applicable to any output series from stationary iteration cycles. In the present article, three forms of the methodology are investigated: non-overlapping batch means (NBM), which dates back to , overlapping batch means (OBM) by , and standardized time series (STS) by . In particular, they are applied to the MC calculation of local powers of a pressurized water reactor. The numerical results reveal that the performance of NBM is equivalent to that of OBM, whereas STS performs poorly for small batch sizes. It is also shown that OBM can be improved based on the method of autocovariance bias correction. For a computational condition leading to 0.5-1.5% statistical errors, the improved OBM for a batch size of 10% of the stationary iteration cycle length yields 88-103% of the reference value of standard deviation at tally cells where the sample standard deviation yields 22-36% of the same reference value.

  17. Reportable Radionuclides In DWPF Sludge Batch 7A (Macrobatch 8)

    International Nuclear Information System (INIS)

    The Waste Acceptance Product Specifications (WAPS) 1.2 require that the waste producer 'shall report the curie inventory of radionuclides that have half-lives longer than 10 years and that are, or will be, present in concentrations greater than 0.05 percent of the total inventory for each waste type indexed to the years 2015 and 3115.' As part of the strategy to meet WAPS 1.2, the Defense Waste Processing Facility (DWPF) will report for each waste type all radionuclides that have half-lives longer than 10 years and contribute greater than 0.01 percent of the total curie inventory from the time of production through the 1100 year period from 2015 through 3115. The initial list of radionuclides to be reported is based on the design-basis glass identified in the Waste Form Compliance Plan (WCP) and Waste Form Qualification Report. However, it is required that the list be expanded if other radionuclides with half-lives greater than 10 years are identified that meet the 'greater than 0.01% of the curie inventory' criterion. Specification 1.6 of the WAPS, International Atomic Energy Agency Safeguards Reporting for High Level Waste (HLW), requires that the ratio by weights of the following uranium and plutonium isotopes be reported: U-233, U-234, U-235, U-236, and U-238; and Pu-238, Pu-239, Pu-240, Pu-241, and Pu-242. Therefore, the complete list of reportable radionuclides must also include these sets of U and Pu isotopes - and the U and Pu isotopic mass distributions must be identified. The DWPF receives HLW sludge slurry from Savannah River Site (SRS) Tank 40. For Sludge Batch 7a (SB7a), the waste in Tank 40 contained a blend of the heel from Sludge Batch 6 (SB6) and the Sludge Batch 7 (SB7) material transferred to Tank 40 from Tank 51. This sludge blend is also referred to as Macrobatch 8. Laboratory analyses of a Tank 40 sludge sample were performed to quantify the concentrations of pertinent radionuclides in the SB7a waste. Subsequently, radiological decay and in

  18. SULFATE SOLUBILITY LIMIT VERIFICATION FOR DWPF SLUDGE BATCH 7A

    Energy Technology Data Exchange (ETDEWEB)

    Billings, A.

    2011-04-19

    During processing at the Defense Waste Processing Facility (DWPF), high sulfate concentrations in the feed are a concern to DWPF as it can lead to the formation of a detrimental, sulfate-rich, molten salt phase on the surface of the glass melt pool. To avoid these issues, a sulfate concentration limit was implemented into the Product Composition Control System (PCCS). Related to SB7a frit development efforts, the Savannah River National Laboratory (SRNL) assessed the viability of using the current 0.6 wt % SO{sub 4}{sup 2-} limit set for SB6 (in glass) and the possibility of increasing the SO{sub 4}{sup 2-} solubility limit in PCCS to account for anticipated sulfur concentrations, targeted waste loadings, and inclusion of secondary streams (e.g., Actinide Removal Process (ARP)) with two recommended frits (Frit 418 and Frit 702) for SB7a processing. For a nominal SB7a blend with a 63 inch SB6 heel remaining in Tank 40 (projection SB7a-63), a 0.60 wt% SO{sub 4}{sup 2-} in glass limit was determined for waste loadings of 34 wt% up to 40 wt% with Frit 418 based on crucible melts with batched chemicals. SRNL also examined the inclusion of ARP for the same blending scenario (SB7a-63-ARP) with Frit 418 and at least a 0.6 wt% SO{sub 4}{sup 2-} level, and waste loadings of 34 wt% to 40 wt% were also acceptable. When a visible yellow and/or white sulfate salt layer was visible on the surface of any cooled glass, it was assumed to have surpassed the solubility limit of SO{sub 4}{sup 2-} for that particular composition. All of the glasses fabricated at these concentrations did not exhibit a sulfate rich salt layer on the surface of the glass melt and retained the majority of the batched SO{sub 4}{sup 2-}. At higher levels of SO{sub 4}{sup 2-} 'spiked' into the projected sludge compositions over the aforementioned interval of waste loadings, with Frit 418, low viscosity sulfur layers were observed on the surface of glass melts which confirm exceeding the solubility

  19. REPORTABLE RADIONUCLIDES IN DWPF SLUDGE BATCH 7A (MACROBATCH 8)

    Energy Technology Data Exchange (ETDEWEB)

    Reboul, S.; Diprete, D.; Click, D.; Bannochie, C.

    2011-12-20

    The Waste Acceptance Product Specifications (WAPS) 1.2 require that the waste producer 'shall report the curie inventory of radionuclides that have half-lives longer than 10 years and that are, or will be, present in concentrations greater than 0.05 percent of the total inventory for each waste type indexed to the years 2015 and 3115.' As part of the strategy to meet WAPS 1.2, the Defense Waste Processing Facility (DWPF) will report for each waste type all radionuclides that have half-lives longer than 10 years and contribute greater than 0.01 percent of the total curie inventory from the time of production through the 1100 year period from 2015 through 3115. The initial list of radionuclides to be reported is based on the design-basis glass identified in the Waste Form Compliance Plan (WCP) and Waste Form Qualification Report. However, it is required that the list be expanded if other radionuclides with half-lives greater than 10 years are identified that meet the 'greater than 0.01% of the curie inventory' criterion. Specification 1.6 of the WAPS, International Atomic Energy Agency Safeguards Reporting for High Level Waste (HLW), requires that the ratio by weights of the following uranium and plutonium isotopes be reported: U-233, U-234, U-235, U-236, and U-238; and Pu-238, Pu-239, Pu-240, Pu-241, and Pu-242. Therefore, the complete list of reportable radionuclides must also include these sets of U and Pu isotopes - and the U and Pu isotopic mass distributions must be identified. The DWPF receives HLW sludge slurry from Savannah River Site (SRS) Tank 40. For Sludge Batch 7a (SB7a), the waste in Tank 40 contained a blend of the heel from Sludge Batch 6 (SB6) and the Sludge Batch 7 (SB7) material transferred to Tank 40 from Tank 51. This sludge blend is also referred to as Macrobatch 8. Laboratory analyses of a Tank 40 sludge sample were performed to quantify the concentrations of pertinent radionuclides in the SB7a waste. Subsequently

  20. Inhibition of Sulfide Mineral Oxidation by Surface Coating Agents: Batch

    Science.gov (United States)

    Choi, J.; Ji, M. K.; Yun, H. S.; Park, Y. T.; Gee, E. D.; Lee, W. R.; Jeon, B.-H.

    2012-04-01

    Mining activities and mineral industries have impacted on rapid oxidation of sulfide minerals such as pyrite (FeS2) which leads to Acid Mine Drainage (AMD) formation. Some of the abandoned mines discharge polluted water without proper environmental remediation treatments, largely because of financial constraints in treating AMD. Magnitude of the problem is considerable, especially in countries with a long history of mining. As metal sulfides become oxidized during mining activities, the aqueous environment becomes acid and rich in many metals, including iron, lead, mercury, arsenic and many others. The toxic heavy metals are responsible for the environmental deterioration of stream, groundwater and soils. Several strategies to remediate AMD contaminated sites have been proposed. Among the source inhibition and prevention technologies, microencapsulation (coating) has been considered as a promising technology. The encapsulation is based on inhibition of O2 diffusion by surface coating agent and is expected to control the oxidation of pyrite for a long time. Potential of several surface coating agents for preventing oxidation of metal sulfide minerals from both Young-Dong coal mine and Il-Gwang gold mine were examined by conducting batch experiments and field tests. Powdered pyrite as a standard sulfide mineral and rock samples from two mine outcrops were mixed with six coating agents (KH2PO4, MgO and KMnO4 as chemical agents, and apatite, cement and manganite as mineral agents) and incubated with oxidizing agents (H2O2 or NaClO). Batch experiments with Young-Dong coal mine samples showed least SO42- production in presence of KMnO4 (16% sulfate production compared to no surface coating agents) or cement (4%) within 8 days. In the case of Il-Gwang mine samples, least SO42- production was observed in presence of KH2PO4 (8%) or cement (2%) within 8 days. Field-scale pilot tests at Il-Gwang site also showed that addition of KH2PO4 decreased sulfate production from 200 to