首页 > 最新文献

Women In Research最新文献

英文 中文
Genetic Algorithm Approach for Optimization of Biomass Estimation at LiDAR 激光雷达生物质估算优化的遗传算法方法
Pub Date : 2018-08-02 DOI: 10.1007/978-981-10-7641-1_2
Sonika, Aditi Jain
{"title":"Genetic Algorithm Approach for Optimization of Biomass Estimation at LiDAR","authors":"Sonika, Aditi Jain","doi":"10.1007/978-981-10-7641-1_2","DOIUrl":"https://doi.org/10.1007/978-981-10-7641-1_2","url":null,"abstract":"","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133787592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anomaly Detection Using Dynamic Sliding Window in Wireless Body Area Networks 基于动态滑动窗口的无线体域网络异常检测
Pub Date : 2018-08-02 DOI: 10.1007/978-981-10-7641-1_8
G. S. Smrithy, R. Balakrishnan, N. Sivakumar
{"title":"Anomaly Detection Using Dynamic Sliding Window in Wireless Body Area Networks","authors":"G. S. Smrithy, R. Balakrishnan, N. Sivakumar","doi":"10.1007/978-981-10-7641-1_8","DOIUrl":"https://doi.org/10.1007/978-981-10-7641-1_8","url":null,"abstract":"","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Security Assessment of SAODV Protocols in Mobile Ad hoc Networks 移动自组织网络中SAODV协议的安全评估
Pub Date : 2018-08-02 DOI: 10.1007/978-981-10-7641-1_30
Megha Soni, B. K. Joshi
{"title":"Security Assessment of SAODV Protocols in Mobile Ad hoc Networks","authors":"Megha Soni, B. K. Joshi","doi":"10.1007/978-981-10-7641-1_30","DOIUrl":"https://doi.org/10.1007/978-981-10-7641-1_30","url":null,"abstract":"","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Security Issues and Trust Management in Cloud Computing 云计算中的安全问题和信任管理
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909068
Shimpy Harbajanka, Preeti Saxena
Cloud computing is the growing technology. It offers many services. The cloud service provider facilitates on demand services therefore the data on the hosting server increases significantly and so the data access. To reduce the maintenance cost of data management and for protecting data loss, data outsourcing technique are adopted. To manage the trust of end user the cryptographic techniques are popular. During data access, data may be loss or may be attacked by the intruder so a trust management system needs to be developed. Existing trust management system relies only on customer feedback. A need is identified that should also consider other parameters for establishing trust. A system proposed that implements the trust management system for cloud computing, that assures secure data access through trustworthy cloud service provider. Here, the trust evaluation method is proposed in which weighted trust factor is calculated considering multiple attributes. The trust factor helps users to identify trustworthy cloud service provider through which they can use cloud services.
云计算是一项正在发展的技术。它提供许多服务。云服务提供商促进了按需服务,因此托管服务器上的数据显著增加,因此数据访问也显著增加。为了降低数据管理的维护成本和防止数据丢失,采用了数据外包技术。为了管理终端用户的信任,加密技术得到了广泛的应用。在数据访问过程中,数据可能会丢失或受到入侵者的攻击,因此需要开发信任管理系统。现有的信任管理体系仅依赖于客户反馈。确定了还应考虑建立信任的其他参数的需求。提出了一种实现云计算信任管理系统的系统,通过可信的云服务提供商保证数据的安全访问。本文提出了考虑多个属性的加权信任系数的信任评估方法。信任因素帮助用户识别值得信赖的云服务提供商,通过这些提供商他们可以使用云服务。
{"title":"Security Issues and Trust Management in Cloud Computing","authors":"Shimpy Harbajanka, Preeti Saxena","doi":"10.1145/2909067.2909068","DOIUrl":"https://doi.org/10.1145/2909067.2909068","url":null,"abstract":"Cloud computing is the growing technology. It offers many services. The cloud service provider facilitates on demand services therefore the data on the hosting server increases significantly and so the data access. To reduce the maintenance cost of data management and for protecting data loss, data outsourcing technique are adopted. To manage the trust of end user the cryptographic techniques are popular. During data access, data may be loss or may be attacked by the intruder so a trust management system needs to be developed. Existing trust management system relies only on customer feedback. A need is identified that should also consider other parameters for establishing trust. A system proposed that implements the trust management system for cloud computing, that assures secure data access through trustworthy cloud service provider. Here, the trust evaluation method is proposed in which weighted trust factor is calculated considering multiple attributes. The trust factor helps users to identify trustworthy cloud service provider through which they can use cloud services.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129245217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Key Management Techniques for Securing MANET 安全无线网络的密钥管理技术
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909080
Neha Singh, Saurabh Singh, Naveen Kumar, Rakesh Kumar
A Mobile Ad hoc Network (MANET) is a spontaneous network consisting of wireless nodes which are mobile and self-configuring in nature. Devices in MANET can move freely in any direction independently and change its link frequently to other devices. MANET does not have centralized infrastructure and its characteristics makes this network vulnerable to various kinds of attacks. Data transfer is a major problem due to its nature of unreliable wireless medium. Commonly used technique for secure transmission in wireless network is cryptography. Use of cryptography key is often involved in most of cryptographic techniques. Key management is main component in security issues of MANET and various schemes have been proposed for it. In this paper, a study on various kinds of key management techniques in MANET is presented.
移动自组织网络(MANET)是由具有移动和自配置性质的无线节点组成的自发网络。MANET中的设备可以在任意方向上独立地自由移动,并且可以频繁地改变与其他设备的链路。MANET没有集中的基础设施,其特点使得该网络容易受到各种攻击。由于无线介质不可靠的特性,数据传输成为一个主要问题。在无线网络中常用的安全传输技术是加密技术。加密密钥的使用是大多数加密技术中经常涉及的问题。密钥管理是无线局域网安全问题的主要组成部分,针对密钥管理提出了各种方案。本文对无线无线局域网中的各种密钥管理技术进行了研究。
{"title":"Key Management Techniques for Securing MANET","authors":"Neha Singh, Saurabh Singh, Naveen Kumar, Rakesh Kumar","doi":"10.1145/2909067.2909080","DOIUrl":"https://doi.org/10.1145/2909067.2909080","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a spontaneous network consisting of wireless nodes which are mobile and self-configuring in nature. Devices in MANET can move freely in any direction independently and change its link frequently to other devices. MANET does not have centralized infrastructure and its characteristics makes this network vulnerable to various kinds of attacks. Data transfer is a major problem due to its nature of unreliable wireless medium. Commonly used technique for secure transmission in wireless network is cryptography. Use of cryptography key is often involved in most of cryptographic techniques. Key management is main component in security issues of MANET and various schemes have been proposed for it. In this paper, a study on various kinds of key management techniques in MANET is presented.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129894560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Study of Optimal Clustering Techniques in Wireless Sensor Network: A Survey 无线传感器网络中最优聚类技术的比较研究
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909074
Jaheda S. Ambekari, Sumedha Sirsikar
Energy consumption affects Wireless Sensor Networks (WSN) lifetime and may cause network degradation. Communication distance between the sensor nodes and base station affects network energy. The more communication distance between two nodes the more energy consumed. Clustering technique is used to reduce the energy consumption in the wireless data transmission. To develop an energy-efficient system using clustering, there are three requirements. First, to determine the optimum number of sensor nodes in a specific cluster, Second, to find the optimal number of clusters in the network and the third is to determine the correct position of Cluster Head (CH) in a particular cluster. Selecting an optimal number of clusters in WSNs gives greater improvement in system scalability, increases energy efficiency, and enhances network lifetime, in the network. For a large WSN lifetime of network depends on the cluster diameter and number of hops. The energy cost of network is directly proportional to the number of clusters. Clustering technique balances the load distribution in network and reduces traffic transmission.
能量消耗会影响无线传感器网络(WSN)的寿命,并可能导致网络降级。传感器节点与基站之间的通信距离会影响网络能量。两个节点之间的通信距离越远,消耗的能量就越多。采用聚类技术降低无线数据传输中的能量消耗。要开发使用集群的节能系统,有三个要求。首先,确定特定集群中传感器节点的最优数量,其次,找到网络中最优的集群数量,第三,确定特定集群中簇头(CH)的正确位置。在无线传感器网络中选择最优的簇数可以极大地提高系统的可扩展性、提高能源效率和延长网络寿命。对于较大的WSN网络,其生存期取决于簇的直径和跳数。网络的能源成本与集群数量成正比。聚类技术平衡了网络中的负载分布,减少了流量的传输。
{"title":"Comparative Study of Optimal Clustering Techniques in Wireless Sensor Network: A Survey","authors":"Jaheda S. Ambekari, Sumedha Sirsikar","doi":"10.1145/2909067.2909074","DOIUrl":"https://doi.org/10.1145/2909067.2909074","url":null,"abstract":"Energy consumption affects Wireless Sensor Networks (WSN) lifetime and may cause network degradation. Communication distance between the sensor nodes and base station affects network energy. The more communication distance between two nodes the more energy consumed. Clustering technique is used to reduce the energy consumption in the wireless data transmission. To develop an energy-efficient system using clustering, there are three requirements. First, to determine the optimum number of sensor nodes in a specific cluster, Second, to find the optimal number of clusters in the network and the third is to determine the correct position of Cluster Head (CH) in a particular cluster. Selecting an optimal number of clusters in WSNs gives greater improvement in system scalability, increases energy efficiency, and enhances network lifetime, in the network. For a large WSN lifetime of network depends on the cluster diameter and number of hops. The energy cost of network is directly proportional to the number of clusters. Clustering technique balances the load distribution in network and reduces traffic transmission.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115353274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Significance of Ticket Analytics in Effective Software Maintenance: Awareness 票证分析在有效软件维护中的意义:意识
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909091
Sharon Christa V. Suma, Asst Professor Professor
Software even though intangible should undergo evolution to fit into the ever changing real world scenarios. In this context software maintenance is an inevitable activity; further optimizing the activities related to maintenance is not possible due to the lacuna in various aspects of the pre-production phases. Since 1969, the issues raised by Lehman related to software maintenance remain the same. Each issue faced by the maintenance team directly reflects in the quality of the software product. According to the related work, very few research is going on in the field of software maintenance and still scarce when it comes to research on incident and associated ticket; a part of corrective maintenance. In depth research on incident tickets should be viewed as critical since, it provides information related to the kind of maintenance activities that is performed in any timestamp. Therefore classifying and analyzing tickets becomes a critical task in managing the operations of the service since each incident will be having a service level agreement associated with it. Further, incident analysis is essential to identify the patterns associated. Due to the existence of huge population of software in each organization and millions of incidents get reported per software product every year, it is practically impossible to manually analyze all the tickets. This paper focuses on projecting the importance of ticket analytics to maintain the quality of software products and also identifying the incidents and related tickets based on various factors which are supported by a case study from the data collected from various organizations.
软件即使是无形的,也应该经历进化以适应不断变化的现实世界场景。在这种情况下,软件维护是一项不可避免的活动;进一步优化与维护相关的活动是不可能的,因为在预生产阶段的各个方面存在空白。自1969年以来,雷曼提出的与软件维护有关的问题仍然没有改变。维护团队面临的每一个问题都直接反映在软件产品的质量上。从相关工作来看,软件维护领域的研究很少,对事故及相关票证的研究还比较少;纠正性维护的一部分。对事件票据的深入研究应该被视为至关重要的,因为它提供了与在任何时间戳中执行的维护活动类型相关的信息。因此,对票据进行分类和分析成为管理服务操作的关键任务,因为每个事件都有一个与之关联的服务水平协议。此外,事件分析对于识别相关模式至关重要。由于每个组织中存在大量的软件,并且每个软件产品每年都会报告数百万个事件,因此实际上不可能手动分析所有的问题。本文的重点是预测票据分析对维护软件产品质量的重要性,并根据从各个组织收集的数据进行案例研究的各种因素确定事件和相关票据。
{"title":"Significance of Ticket Analytics in Effective Software Maintenance: Awareness","authors":"Sharon Christa V. Suma, Asst Professor Professor","doi":"10.1145/2909067.2909091","DOIUrl":"https://doi.org/10.1145/2909067.2909091","url":null,"abstract":"Software even though intangible should undergo evolution to fit into the ever changing real world scenarios. In this context software maintenance is an inevitable activity; further optimizing the activities related to maintenance is not possible due to the lacuna in various aspects of the pre-production phases. Since 1969, the issues raised by Lehman related to software maintenance remain the same. Each issue faced by the maintenance team directly reflects in the quality of the software product. According to the related work, very few research is going on in the field of software maintenance and still scarce when it comes to research on incident and associated ticket; a part of corrective maintenance. In depth research on incident tickets should be viewed as critical since, it provides information related to the kind of maintenance activities that is performed in any timestamp. Therefore classifying and analyzing tickets becomes a critical task in managing the operations of the service since each incident will be having a service level agreement associated with it. Further, incident analysis is essential to identify the patterns associated. Due to the existence of huge population of software in each organization and millions of incidents get reported per software product every year, it is practically impossible to manually analyze all the tickets. This paper focuses on projecting the importance of ticket analytics to maintain the quality of software products and also identifying the incidents and related tickets based on various factors which are supported by a case study from the data collected from various organizations.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123514305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Double Layer Anti-Reflective Coating of SiO2/ZnO for Photovoltaic Cell 光伏电池用SiO2/ZnO双层抗反射涂层
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909087
Neha Mahnot, R. Mehra, Shikha Maheshwary
In this paper silicon based photo voltaic (PV) cells has been designed using double layer (SiO2/ZnO) anti-reflective coating (ARC). Here reflection spectrum of single layer anti-reflective coating (SLAR) of SiO2&ZnO individually and double layer anti-reflective coatings (DLAR) of SiO2/ZnO are compared. ZnO is a wide band semiconductor which provides good transparency and high electron mobility. The results indicated that the DLAR of SiO2/ZnO proved to be a valuable achievement to obtain highly absorbent surfaces. The results are obtained with planar surface of crystalline silicon substrate using Air Mass 1.5 Global (AM 1.5 G) spectrums. The average reflectance of 6.5% has been achieved within the range of 300-1400nm as maximum solar spectral irradiance of AM 1.5 G is in this region.
本文设计了采用双层(SiO2/ZnO)抗反射涂层(ARC)的硅基光伏电池。本文比较了SiO2/ZnO单层增透膜(SLAR)和SiO2/ZnO双层增透膜(DLAR)的反射光谱。ZnO是一种具有良好透明性和高电子迁移率的宽带半导体。结果表明,SiO2/ZnO的DLAR是获得高吸水性表面的一项有价值的成果。利用空气质量1.5全局(AM 1.5 G)光谱在晶体硅衬底的平面上得到了结果。由于AM 1.5 G的最大太阳光谱辐照度在300-1400nm范围内,平均反射率达到6.5%。
{"title":"Double Layer Anti-Reflective Coating of SiO2/ZnO for Photovoltaic Cell","authors":"Neha Mahnot, R. Mehra, Shikha Maheshwary","doi":"10.1145/2909067.2909087","DOIUrl":"https://doi.org/10.1145/2909067.2909087","url":null,"abstract":"In this paper silicon based photo voltaic (PV) cells has been designed using double layer (SiO2/ZnO) anti-reflective coating (ARC). Here reflection spectrum of single layer anti-reflective coating (SLAR) of SiO2&ZnO individually and double layer anti-reflective coatings (DLAR) of SiO2/ZnO are compared. ZnO is a wide band semiconductor which provides good transparency and high electron mobility. The results indicated that the DLAR of SiO2/ZnO proved to be a valuable achievement to obtain highly absorbent surfaces. The results are obtained with planar surface of crystalline silicon substrate using Air Mass 1.5 Global (AM 1.5 G) spectrums. The average reflectance of 6.5% has been achieved within the range of 300-1400nm as maximum solar spectral irradiance of AM 1.5 G is in this region.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131526416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of Internet of Things (IoT) in Healthcare: A Survey 物联网(IoT)在医疗保健中的应用:一项调查
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909079
A. Yeole, D. Kalbande
In today's world of connectivity, with the advancement of Internet of Things (IoT) all entities are connected to each other by some communication means. The Internet of Things for the medical equipment will produce data that can go a long way in not only increasing equipment efficiency, but also patient health. The Internet of Things (IoT) is increasingly being recognized by industry and different services mainly in healthcare. This paper describes the various Internet of Things (IoT) enable devices and its practices in the area of healthcare for toddler, children, chronic care, monitoring of critical patients, operation theaters and medicine dispenser.
在当今的互联世界中,随着物联网(IoT)的发展,所有实体都通过某种通信手段相互连接。医疗设备的物联网将产生的数据不仅可以大大提高设备效率,还可以提高患者的健康水平。物联网(IoT)越来越多地得到行业和不同服务(主要是医疗保健)的认可。本文介绍了各种物联网(IoT)使能设备及其在幼儿、儿童、慢性护理、重症患者监测、手术室和药物分配器等医疗保健领域的实践。
{"title":"Use of Internet of Things (IoT) in Healthcare: A Survey","authors":"A. Yeole, D. Kalbande","doi":"10.1145/2909067.2909079","DOIUrl":"https://doi.org/10.1145/2909067.2909079","url":null,"abstract":"In today's world of connectivity, with the advancement of Internet of Things (IoT) all entities are connected to each other by some communication means. The Internet of Things for the medical equipment will produce data that can go a long way in not only increasing equipment efficiency, but also patient health. The Internet of Things (IoT) is increasingly being recognized by industry and different services mainly in healthcare. This paper describes the various Internet of Things (IoT) enable devices and its practices in the area of healthcare for toddler, children, chronic care, monitoring of critical patients, operation theaters and medicine dispenser.","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131910771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Extending Storage Life of Pears Using a Formulation Developed from a Terpenoidal Oligomer from Lac 用从紫胶中提取的萜类低聚物开发的配方延长梨的贮藏寿命
Pub Date : 2016-03-21 DOI: 10.1145/2909067.2909086
Anjali Bishnoi, H. M. Chawla
A novel edible coating formulation developed from a terpenoidal oligomer P-104 has been used as postharvest treatment to maintain pear quality. The changes in weight, color, texture, pH, total soluble solids and microbial populations of coated and uncoated pears with storage time were measured at regular intervals throughout the storage period to evaluate the effect of coating on fruit quality. Coated pears showed significant decrease in water loss, total color change, firmness, pH and microbial populations resulting the increase in shelf life of coated pears upto 15 days at room temperature in the month of August (35±2 °C).
以萜类低聚物P-104为原料研制出一种新型可食用包衣配方,用于梨采后保鲜。在贮藏期间,定期测定包衣和未包衣梨的重量、颜色、质地、pH、可溶性固形物总量和微生物数量随贮藏时间的变化,以评价包衣对果实品质的影响。包衣梨在8月份(35±2℃)室温条件下的保鲜期可达15天,其水分流失量、总色变化、硬度、pH值和微生物数量均有显著降低。
{"title":"Extending Storage Life of Pears Using a Formulation Developed from a Terpenoidal Oligomer from Lac","authors":"Anjali Bishnoi, H. M. Chawla","doi":"10.1145/2909067.2909086","DOIUrl":"https://doi.org/10.1145/2909067.2909086","url":null,"abstract":"A novel edible coating formulation developed from a terpenoidal oligomer P-104 has been used as postharvest treatment to maintain pear quality. The changes in weight, color, texture, pH, total soluble solids and microbial populations of coated and uncoated pears with storage time were measured at regular intervals throughout the storage period to evaluate the effect of coating on fruit quality. Coated pears showed significant decrease in water loss, total color change, firmness, pH and microbial populations resulting the increase in shelf life of coated pears upto 15 days at room temperature in the month of August (35±2 °C).","PeriodicalId":371590,"journal":{"name":"Women In Research","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125472652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Women In Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1