985 resultados para STORAGE MECHANISM
Resumo:
Most of the fish marketed throughout Nigeria are in either smoked or dried form. The technological requirement for other forms of preservation like chilling and freezing cannot be afforded by the small scale fisher folk. Considerable quantities of fish processed for distant consumer markets are lost at handling, processing, storage and marketing stages. Significant losses occur through infestation by mites, insects, fungal infestation and fragmentation during transportation. This paper attempts to describe the effect of these losses on fish quality and suggests methods of protecting fish from agents of deterioration
Resumo:
Production of mince from Tilapia using a combination of physical and chemical methods was found to improve the storage life of the mince in the deep freezer. Though the chemical composition of the mince was slightly affected, the mince was microbiologically stable throughout the five weeks frozen storage. Fish cakes prepared traditionally from tilapia minces were more acceptable than oven dried cakes. Production of fish cakes form tilapia will improve utilization of this species in areas where small size tilapia are regarded as fish of low economic value
Resumo:
The study was carried out to asses the nutritional qualities of smoked O. niloticus and to discover the best methods of storage to minimize spoilage and infestation of smoked fish. Result showed that the protein contents in A and D decreased while the protein contents of b and C increased. The lipid content increased only in A while it decreased in B-C and D. The moisture content generally increased over the period of storage and there was an increase in ash content only in C while it decreased in A, B and D. The samples packed in polythene bag suffered about 35% mould infection and a few were attached by rodents with some fouling. Samples packed in jute bag were in good condition but were slightly attached by insect. All samples packed in carton and basket were still in good state but there were insect attack in those packed in carton
Resumo:
This study focuses on mechanism of ceramic coating on Al-Si alloys with bulk primary Si using plasma electrolytic oxidation (PEO) technology. Al-Si alloys with 27-32% Si in weight were used as substrates. The morphologies, composition and microstructure of PEO coatings were investigated by scanning electron microscopy (SEM) with energy dispersive X-ray system (EDX). Results showed that the PEO process had four different stages. The effect of bulk Si is greatly on the morphology and composition of coatings at first three stages. Anodic oxide films formed on Al and Si phases, respectively. When the voltage exceeded 40 V, glow appeared and concentrated on the localized zone of interface of Al and Si phase. Al-Si-O compounds formed and covered on the dendrite Si phase surface, and the coating on bulk Si, which was silicon oxide, was rougher than that on other phase. If the treatment time was long enough, the coatings with uniform surface morphologies and elements distribution will be obtained but the microstructure of inner layer is looser due to the bulk Si.
Resumo:
In response to infection or tissue dysfunction, immune cells develop into highly heterogeneous repertoires with diverse functions. Capturing the full spectrum of these functions requires analysis of large numbers of effector molecules from single cells. However, currently only 3-5 functional proteins can be measured from single cells. We developed a single cell functional proteomics approach that integrates a microchip platform with multiplex cell purification. This approach can quantitate 20 proteins from >5,000 phenotypically pure single cells simultaneously. With a 1-million fold miniaturization, the system can detect down to ~100 molecules and requires only ~104 cells. Single cell functional proteomic analysis finds broad applications in basic, translational and clinical studies. In the three studies conducted, it yielded critical insights for understanding clinical cancer immunotherapy, inflammatory bowel disease (IBD) mechanism and hematopoietic stem cell (HSC) biology.
To study phenotypically defined cell populations, single cell barcode microchips were coupled with upstream multiplex cell purification based on up to 11 parameters. Statistical algorithms were developed to process and model the high dimensional readouts. This analysis evaluates rare cells and is versatile for various cells and proteins. (1) We conducted an immune monitoring study of a phase 2 cancer cellular immunotherapy clinical trial that used T-cell receptor (TCR) transgenic T cells as major therapeutics to treat metastatic melanoma. We evaluated the functional proteome of 4 antigen-specific, phenotypically defined T cell populations from peripheral blood of 3 patients across 8 time points. (2) Natural killer (NK) cells can play a protective role in chronic inflammation and their surface receptor – killer immunoglobulin-like receptor (KIR) – has been identified as a risk factor of IBD. We compared the functional behavior of NK cells that had differential KIR expressions. These NK cells were retrieved from the blood of 12 patients with different genetic backgrounds. (3) HSCs are the progenitors of immune cells and are thought to have no immediate functional capacity against pathogen. However, recent studies identified expression of Toll-like receptors (TLRs) on HSCs. We studied the functional capacity of HSCs upon TLR activation. The comparison of HSCs from wild-type mice against those from genetics knock-out mouse models elucidates the responding signaling pathway.
In all three cases, we observed profound functional heterogeneity within phenotypically defined cells. Polyfunctional cells that conduct multiple functions also produce those proteins in large amounts. They dominate the immune response. In the cancer immunotherapy, the strong cytotoxic and antitumor functions from transgenic TCR T cells contributed to a ~30% tumor reduction immediately after the therapy. However, this infused immune response disappeared within 2-3 weeks. Later on, some patients gained a second antitumor response, consisted of the emergence of endogenous antitumor cytotoxic T cells and their production of multiple antitumor functions. These patients showed more effective long-term tumor control. In the IBD mechanism study, we noticed that, compared with others, NK cells expressing KIR2DL3 receptor secreted a large array of effector proteins, such as TNF-α, CCLs and CXCLs. The functions from these cells regulated disease-contributing cells and protected host tissues. Their existence correlated with IBD disease susceptibility. In the HSC study, the HSCs exhibited functional capacity by producing TNF-α, IL-6 and GM-CSF. TLR stimulation activated the NF-κB signaling in HSCs. Single cell functional proteome contains rich information that is independent from the genome and transcriptome. In all three cases, functional proteomic evaluation uncovered critical biological insights that would not be resolved otherwise. The integrated single cell functional proteomic analysis constructed a detail kinetic picture of the immune response that took place during the clinical cancer immunotherapy. It revealed concrete functional evidence that connected genetics to IBD disease susceptibility. Further, it provided predictors that correlated with clinical responses and pathogenic outcomes.
Resumo:
In this paper, the glass formation theory is applied to study the formation mechanism of the low leaching glassy slag during the process of plasma waste treatment. The research shows that SiO2 acts as network former to form a 3-dimensional Si-O tetrahedral network in which heavy metals are bonded or encapsulated, so the Si-O tetrahedron protect heavy metals against leaching from the vitrified slag or acid corrosion. For given chemical compositions of waste, the formation ability of the vitrified slag can be represented by the ratio of the whole oxygen ions to the whole network former ions in glass (O/Si) which is appropriate in the range of 2~3. A plasma arc reactor is used to conduct the vitrification experiments of two kinds of fly ashes with additives in which effects of various parameters including arc power, cooling speed, treatment temperature are studied. The chemical compositions of fly ashes are analyzed by X-ray fluorescence (XRF) spectrometry. The experimental results show that both cooling speed and O/Si have important influence on the formation of the vitrified slag, which is qualitatively in accordance with the predictions of the glass formation theory.
Resumo:
Various hazardous wastes with additives have been vitrified to investigate the formation mechanism of the glassy slag by a 30 kW DC plasma-arc reactor developed by the Institute of Mechanics, Chinese Academy of Sciences. The average temperature in the reaction area is controlled at 1500°C. The chemical compositions of three sorts of fly ashes are analyzed by XRF (X-Ray Fluorescence). Fly ashes with vitrifying additives can be vitrified to form glassy slag, which show that the ratio of the whole oxygen ions to the whole network former ions in glass (R) is appropriate in the range of 2~3 to form durable vitrified slag. In this experiment, the arc power is controlled below 5 kW to inhibit waste evaporation. To enhance the effects of heat transfer to wastes, ferrous powder has been added into the graphite crucible, which aggregates as ingot below the molten silicate after vitrification. The slag fails to form glass if the quenching rate is less than 1 K/min. Therefore, the slag will break into small chips due to the sharp quenching rate, which is more than 100 K/sec.
Resumo:
This dissertation contains three essays on mechanism design. The common goal of these essays is to assist in the solution of different resource allocation problems where asymmetric information creates obstacles to the efficient allocation of resources. In each essay, we present a mechanism that satisfactorily solves the resource allocation problem and study some of its properties. In our first essay, ”Combinatorial Assignment under Dichotomous Preferences”, we present a class of problems akin to time scheduling without a pre-existing time grid, and propose a mechanism that is efficient, strategy-proof and envy-free. Our second essay, ”Monitoring Costs and the Management of Common-Pool Resources”, studies what can happen to an existing mechanism — the individual tradable quotas (ITQ) mechanism, also known as the cap-and-trade mechanism — when quota enforcement is imperfect and costly. Our third essay, ”Vessel Buyback”, coauthored with John O. Ledyard, presents an auction design that can be used to buy back excess capital in overcapitalized industries.
Resumo:
The roles of the folate receptor and an anion carrier in the uptake of 5- methyltetrahydrofolate (5-MeH_4folate) were studied in cultured human (KB) cells using radioactive 5-MeH_4folate. Binding of the 5-MeH_4folate was inhibited by folic acid, but not by probenecid, an anion carrier inhibitor. The internalization of 5-MeH_4folate was inhibited by low temperature, folic acid, probenecid and methotrexate. Prolonged incubation of cells in the presence of high concentrations of probenecid appeared to inhibit endocytosis of folatereceptors as well as the anion carrier. The V_(max) and K_M values for the carrier were 8.65 ± 0.55 pmol/min/mg cell protein and 3.74 ± 0.54µM, respectively. The transport of 5-MeH4folate was competitively inhibited by folic acid, probenecid and methotrexate. The carrier dissociation constants for folic acid, probenecid and methotreate were 641 µM, 2.23 mM and 13.8 µM, respectively. Kinetic analysis suggests that 5-MeH_4folate at physiological concentration is transported through an anion carrier with the characteristics of the reduced-folate carrier after 5-MeH_4folate is endocytosed by folate receptors in KB cells. Our data with KB cells suggest that folate receptors and probenecid-sensitive carriers work in tandem to transport 5-MeH_4folate to the cytoplasm of cells, based upon the assumption that 1 mM probenecid does not interfere with the acidification of the vesicle where the folate receptors are endocytosed.
Oligodeoxynucleotides designed to hybridize to specific mRNA sequences (antisense oligonucleotides) or double stranded DNA sequences have been used to inhibit the synthesis of a number of cellular and viral proteins (Crooke, S. T. (1993) FASEB J. 7, 533-539; Carter, G. and Lemoine, N. R. (1993) Br. J. Cacer 67, 869-876; Stein, C. A. and cohen, J. S. (1988) Cancer Res. 48, 2659-2668). However, the distribution of the delivered oligonucleotides in the cell, i.e., in the cytoplasm or in the nucleus has not been clearly defined. We studied the kinetics of oligonucleotide transport into the cell nucleus using reconstituted cell nuclei as a model system. We present evidences here that oligonucleotides can freely diffuse into reconstituted nuclei. Our results are consistent with the reports by Leonetti et al. (Proc. Natl. Acad. Sci. USA, Vol. 88, pp. 2702-2706, April 1991), which were published while we were carrying this research independently. We also investigated whether a synthetic nuclear localization signal (NLS) peptide of SV40 T antigen could be used for the nuclear targeting of oligonucleotides. We synthesized a nuclear localization signal peptide-conjugated oligonucleotide to see if a nuclear localization signal peptide can enhance the uptake of oligonucleotides into reconstituted nuclei of Xenopus. Uptake of the NLS peptide-conjugated oligonucleotide was comparable to the control oligonucleotide at similar concentrations, suggesting that the NLS signal peptide does not significantly enhance the nuclear accumulation of oligonucleotides. This result is probably due to the small size of the oligonucleotide.
Resumo:
This study examines binding of α- and β-D-glucose in their equilibrium mixture to the glucose transporter (GLUT1) in human erythrocyte membrane preparations by an ^1H NMR method, the transferred NOE (TRNOE). This method is shown theoretically and experimentally to be a sensitive probe of weak ligand-macromolecule interactions. The TRNOEs observed are shown to arise solely from glucose binding to GLUT1. Sites at both membrane faces contribute to the TRNOEs. Binding curves obtained are consistent with a homogeneous class of sugar sites, with an apparent KD which varies (from ~30 mM to ~70 mM for both anomers) depending on the membrane preparation examined. Preparations with a higher proportion of the cytoplasmic membrane face exposed to bulk solution yield higher apparent KKDs. The glucose transport inhibitor cytochalasin B essentially eliminates the TRNOE. Nonlinearity was found in the dependence on sugar concentration of the apparent inhibition constant for cytochalasin B reversal of the TRNOE observed in the α anomer (and probably the β anomer); such nonlinearity implies the existence of ternary complexes of sugar, inhibitor and transporter. The inhibition results furthermore imply the presence of a class of relatively high-affinity (KD < 2mM) sugar sites specific for the α anomer which do not contribute to NMR-observable binding. The presence of two classes of sugar-sensitive cytochalasin B sites is also indicated. These results are compared with predictions of the alternating conformer model of glucose transport. Variation of apparent KD in the NMR-observable sites, the formation of ternary complexes and the presence of an anomer-specific site are shown to be inconsistent with this model. An alternate model is developed which reconciles these results with the known transport behavior of GLUT1. In this model, the transporter possesses (at minimum) three classes of sugar sites: (i) transport sites, which are alternately exposed to the cytoplasmic or the extracellular compartment, but never to both simultaneously, (ii) a class of sites (probably relatively low-affinity) which are confined to one compartment, and (iii) the high-affinity α anomer-specific sites, which are confined to the cytoplasmic compartment.
Resumo:
Investigation were carried out on the effect of some locally available species in the enhancement of the organoleptic quality and the storage periods of smoked Heterotis niloticus using Pprosopis africana as common smoke sources. Samples of fresh H. niloticus were bought, cut into chunks while extract juice from pepper, ginger rhizomes, garlic, onion bulb were used as sources of spices. Samples of fish were divided randomly into five (5) batches dipped into spice extract juices for 10 minutes drained and smoked with common firewood. Treatment without spice extract juice served as control. Each batch of fish was smoked for 7 hours on a drum-made smoking kiln products were individually packaged in polythene bag stored at room temperature and used for sensory evaluation and microbial analysis. Results of the sensory evaluation indicated that there was significant difference (P<0.005) for taste, appearance, colour and overall acceptance for the treatments. Ginger juice extract had the best overall acceptance. Similarly there was significant difference (P>0.05) in the microbial analysis. The garlic juice extract had the longest storage period with minimum total plate and mould count after 8 weeks
Resumo:
Storage systems are widely used and have played a crucial rule in both consumer and industrial products, for example, personal computers, data centers, and embedded systems. However, such system suffers from issues of cost, restricted-lifetime, and reliability with the emergence of new systems and devices, such as distributed storage and flash memory, respectively. Information theory, on the other hand, provides fundamental bounds and solutions to fully utilize resources such as data density, information I/O and network bandwidth. This thesis bridges these two topics, and proposes to solve challenges in data storage using a variety of coding techniques, so that storage becomes faster, more affordable, and more reliable.
We consider the system level and study the integration of RAID schemes and distributed storage. Erasure-correcting codes are the basis of the ubiquitous RAID schemes for storage systems, where disks correspond to symbols in the code and are located in a (distributed) network. Specifically, RAID schemes are based on MDS (maximum distance separable) array codes that enable optimal storage and efficient encoding and decoding algorithms. With r redundancy symbols an MDS code can sustain r erasures. For example, consider an MDS code that can correct two erasures. It is clear that when two symbols are erased, one needs to access and transmit all the remaining information to rebuild the erasures. However, an interesting and practical question is: What is the smallest fraction of information that one needs to access and transmit in order to correct a single erasure? In Part I we will show that the lower bound of 1/2 is achievable and that the result can be generalized to codes with arbitrary number of parities and optimal rebuilding.
We consider the device level and study coding and modulation techniques for emerging non-volatile memories such as flash memory. In particular, rank modulation is a novel data representation scheme proposed by Jiang et al. for multi-level flash memory cells, in which a set of n cells stores information in the permutation induced by the different charge levels of the individual cells. It eliminates the need for discrete cell levels, as well as overshoot errors, when programming cells. In order to decrease the decoding complexity, we propose two variations of this scheme in Part II: bounded rank modulation where only small sliding windows of cells are sorted to generated permutations, and partial rank modulation where only part of the n cells are used to represent data. We study limits on the capacity of bounded rank modulation and propose encoding and decoding algorithms. We show that overlaps between windows will increase capacity. We present Gray codes spanning all possible partial-rank states and using only ``push-to-the-top'' operations. These Gray codes turn out to solve an open combinatorial problem called universal cycle, which is a sequence of integers generating all possible partial permutations.
Resumo:
The work presented in this thesis revolves around erasure correction coding, as applied to distributed data storage and real-time streaming communications.
First, we examine the problem of allocating a given storage budget over a set of nodes for maximum reliability. The objective is to find an allocation of the budget that maximizes the probability of successful recovery by a data collector accessing a random subset of the nodes. This optimization problem is challenging in general because of its combinatorial nature, despite its simple formulation. We study several variations of the problem, assuming different allocation models and access models, and determine the optimal allocation and the optimal symmetric allocation (in which all nonempty nodes store the same amount of data) for a variety of cases. Although the optimal allocation can have nonintuitive structure and can be difficult to find in general, our results suggest that, as a simple heuristic, reliable storage can be achieved by spreading the budget maximally over all nodes when the budget is large, and spreading it minimally over a few nodes when it is small. Coding would therefore be beneficial in the former case, while uncoded replication would suffice in the latter case.
Second, we study how distributed storage allocations affect the recovery delay in a mobile setting. Specifically, two recovery delay optimization problems are considered for a network of mobile storage nodes: the maximization of the probability of successful recovery by a given deadline, and the minimization of the expected recovery delay. We show that the first problem is closely related to the earlier allocation problem, and solve the second problem completely for the case of symmetric allocations. It turns out that the optimal allocations for the two problems can be quite different. In a simulation study, we evaluated the performance of a simple data dissemination and storage protocol for mobile delay-tolerant networks, and observed that the choice of allocation can have a significant impact on the recovery delay under a variety of scenarios.
Third, we consider a real-time streaming system where messages created at regular time intervals at a source are encoded for transmission to a receiver over a packet erasure link; the receiver must subsequently decode each message within a given delay from its creation time. For erasure models containing a limited number of erasures per coding window, per sliding window, and containing erasure bursts whose maximum length is sufficiently short or long, we show that a time-invariant intrasession code asymptotically achieves the maximum message size among all codes that allow decoding under all admissible erasure patterns. For the bursty erasure model, we also show that diagonally interleaved codes derived from specific systematic block codes are asymptotically optimal over all codes in certain cases. We also study an i.i.d. erasure model in which each transmitted packet is erased independently with the same probability; the objective is to maximize the decoding probability for a given message size. We derive an upper bound on the decoding probability for any time-invariant code, and show that the gap between this bound and the performance of a family of time-invariant intrasession codes is small when the message size and packet erasure probability are small. In a simulation study, these codes performed well against a family of random time-invariant convolutional codes under a number of scenarios.
Finally, we consider the joint problems of routing and caching for named data networking. We propose a backpressure-based policy that employs virtual interest packets to make routing and caching decisions. In a packet-level simulation, the proposed policy outperformed a basic protocol that combines shortest-path routing with least-recently-used (LRU) cache replacement.
Resumo:
In this paper, we briefly summarize two typical morphology characteristics of the self-organized void array induced in bulk of fused silica glass by a tightly focused femtosecond laser beam, such as the key role of high numerical aperture in the void array formation and the concentric-circle-like structure indicated by the top view of the void array. By adopting a physical model which combines the nonlinear propagation of femtosecond laser pulses with the spherical aberration effect (SA) at the interface of two mediums of different refractive indices, reasonable agreements between the simulation results and the experimental results are obtained. By comparing the fluence distributions of the case with both SA and nonlinear effects included and the case with only consideration of SA, we suggest that spherical aberration, which results from the refractive index mismatch between air and fused silica glass, is the main reason for the formation of the self-organized void array. (c) 2008 American Institute of Physics.
Resumo:
We investigate the mechanism of selective metallization on glass surfaces with the assistance of femtosecond laser irradiation followed by electroless plating. Irradiation of femtosecond laser makes it possible to selectively deposit copper microstructures in the irradiated area on glass surfaces coated with silver nitrate films. The energy-dispersive X-ray (EDX) analyses reveal that silver atoms are produced on the surface of grooves formed by laser ablation, which serve as catalysis seeds for subsequent electroless copper plating. (C) 2008 Elsevier B.V. All rights reserved.