2 resultados para processing engineering
em Abertay Research Collections - Abertay University’s repository
Resumo:
Background Sweet cherries (Prunus avium L.) are a nutritious fruit which are rich in polyphenols and have high antioxidant potential. Most sweet cherries are consumed fresh and a small proportion of the total sweet cherries production is value added to make processed food products. Sweet cherries are highly perishable fruit with a short harvest season, therefore extensive preservation and processing methods have been developed for the extension of their shelf-life and distribution of their products. Scope and Approach In this review, the main physicochemical properties of sweet cherries, as well as bioactive components and their determination methods are described. The study emphasises the recent progress of postharvest technology, such as controlled/modified atmosphere storage, edible coatings, irradiation, and biological control agents, to maintain sweet cherries for the fresh market. Valorisations of second-grade sweet cherries, as well as trends for the diversification of cherry products for future studies are also discussed. Key Findings and Conclusions Sweet cherry fruit have a short harvest period and marketing window. The major loss in quality after harvest include moisture loss, softening, decay and stem browning. Without compromising their eating quality, the extension in fruit quality and shelf-life for sweet cherries is feasible by means of combination of good handling practice and applications of appropriate postharvest technology. With the drive of health-food sector, the potential of using second class cherries including cherry stems as a source of bioactive compound extraction is high, as cherry fruit is well-known for being rich in health-promoting components.
Resumo:
Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This has given rise to the potential for malicious software targeting GPUs, which is of interest to forensic investigators examining the operation of software. The ability to carry out reverse-engineering of software is of great importance within the security and forensics elds, particularly when investigating malicious software or carrying out forensic analysis following a successful security breach. Due to the complexity of the Nvidia CUDA (Compute Uni ed Device Architecture) framework, it is not clear how best to approach the reverse engineering of a piece of CUDA software. We carry out a review of the di erent binary output formats which may be encountered from the CUDA compiler, and their implications on reverse engineering. We then demonstrate the process of carrying out disassembly of an example CUDA application, to establish the various techniques available to forensic investigators carrying out black-box disassembly and reverse engineering of CUDA binaries. We show that the Nvidia compiler, using default settings, leaks useful information. Finally, we demonstrate techniques to better protect intellectual property in CUDA algorithm implementations from reverse engineering.