Thursday, 27 April 2017

Investigation of the optimized dextran-degrading enzyme conditions on the decomposition of different molecular weights of pure dextran using response surface methodology

The elimination of various molecular weights of contaminated dextran in sugar processing is quite complicated, especially using enzymatic decomposition. Many factors including enzyme concentration, retention time, pH, temperature, and sucrose concentration affect enzyme hydrolysis. 

industrial biotechnology journal impact factor
The optimizing conditions of various molecular weights of dextran removal were investigated using response surface methodology. The optimum hydrolyzed conditions of 1,500? G/mL of all molecular weights of pure dextran from the one-factor-at-a-time (OFAT) experiments were: dextranase (Amano Enzyme Inc., Japan) at 5-15 ppmtotal soluble solids for 5-15 min at 50-65? C with pH 4.5-6.5 and sucroseconcentration at 15-25%. The results from the OFAT experiments used a Box-Benhken experimental design with four factors and three levels that achieved fit models that predicted the dextran removal under different conditions of various molecular weights of pure dextran. 

Monday, 10 April 2017

Securing cloud computing environment by mitigating DDoS attacks: Moving target defence approach

Cloud computing with its recent development, made it’s accessible by almost everyone. Millions and millions of people daily store their data in the cloud platform and utilize for various kind of need. 

journal of materials science impact factor
In this scenario, distributed denial of service (DDoS) attacks is one of the common issues in the day-to-day usage, which severally affects the availability of the resources or services. The challenge is to create a DDoS detection and mitigation system that can protect against both volumetric and application-specific resource starvation and exhaustion attacks. In this paper, a new method named MOTAG has been proposed. This method of moving-target defence to overcome DDoS attacks will repeatedly shuffle the assignments between client to server in order to identify the malicious clients first and then to quarantine them.