摘要:
The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds, i.e., chlorogenic lactone compounds that contribute at least partially to the bitter taste of many coffee beverages. The present invention further relates to the use of these receptors in assays for identifying ligands that modulate the activation of these taste receptors by chlorogenic lactones and related compounds and which may be used as additives and/or removed from foods, beverages and medicinals in order to modify (block) T2R-associated bitter taste. A preferred embodiment is the use of the identified compounds as additives in coffee and coffee-flavored foods, beverages and medicinals.
摘要:
This invention relates to chimeric taste receptors comprising the extracellular portion of one T1R or a variant or fragment thereof, either T1R1 or T1R2, and the transmembrane portion of another T1R or a variant or fragment thereof, either T1R1 or T1R2, preferably associated with a T1R3 polypeptide and a suitable G protein. These chimeric taste receptors and cells which express such chimeric taste receptors are useful in assays for identifying sweet and umami ligands as well in assays for identifying sweet and umami enhancers. Additionally, these chimeric taste receptors and cells which express same can be used to map and determine where specific sweet and umami ligands interact with their respective receptors and to elucidate the mechanism of receptor activation.
摘要:
This invention relates to a method for protecting high layer service in the multi-layer communication equipment, include that low layer processing module which provides low layer transmission passages for high layer processing module, and high layer processing module which sets up transparent VP link passage from up and down node by the service of said module, in order to make the service processed by the said module avoid influence. Once detecting the fault of the said processing module, high layer processing module will message the low layer processing module, and the low layer processing module will set up bypass connection after detecting the fault of the high layer processing module, then isolate the failed high layer process module. According to the present invention, extra network passages are not necessary, the means of protecting network is not limited. The present invention aims to protect effectively ATM traffic when the processing ability of ATM layer invalidate between MSPP and MSTP. The present invention solves the problem that will influence the other node of the network beyond the said node service in the case of device maintenance.
摘要:
This invention relates to chimeric taste receptors comprising the extracellular portion of one T1R or a variant or fragment thereof, either T1R1 or T1R2, and the transmembrane portion of another T1R or a variant or fragment thereof, either T1R1 or T1R2, preferably associated with a T1R3 polypeptide and a suitable G protein. These chimeric taste receptors and cells which express such chimeric taste receptors are useful in assays for identifying sweet and umami ligands as well in assays for identifying sweet and umami enhancers. Additionally, these chimeric taste receptors and cells which express same can be used to map and determine where specific sweet and umami ligands interact with their respective receptors and to elucidate the mechanism of receptor activation.
摘要:
Techniques for suspending a TCP three-way handshake, offering the partial connection to an L-7 application or module at a proxy to perform further processing, and then allowing the L-7 application or module to instruct the proxy's network kernel to perform various actions are described. In various embodiments these actions may include: silently dropping the connection, verbosely rejecting the connection, accepting and processing the connection locally, or forwarding the connection to another proxy or the original destination. This additional functionality is provided, in one particular embodiment, via extensions to the POSIX socket API.
摘要:
Slice-based prioritized secure video streaming comprises a transmitter receiving a slice comprising a plurality of macroblocks and selecting an encryption key based at least in part on a relative importance of secure transmission of the macroblocks. If the importance is high, a master key is selected. If the importance is medium, a first key derivable by applying a one-way function to the master key is selected. If the importance is low, a second key derivable by applying the one-way function to the first key is selected. The slice is encrypted using the encryption key. A receiver receives the encrypted slice, decrypts a header of the slice using the master key, to obtain an indication of a relative importance of secure transmission of the macroblocks. The receiver selects a decryption key based at least in part on the indication, and decrypts the slice using the decryption key.
摘要:
The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds present in, e.g., coffee. Also, the invention relates to the discovery of specific compounds and compositions containing that function as bitter taste blockers and the use thereof as bitter taste blockers or flavor modulators in, e.g., coffee and coffee flavored foods, beverages and medicaments. Also, the present invention relates to the discovery of a compound that antagonizes numerous different human T2Rs and the use thereof in assays and as a bitter taste blocker in compositions for ingestion by humans and animals.
摘要:
A method summarizes a video acquired of a scene spatially and temporally by specifying a spatial query and a temporal query. Frames of the video are selected according to the spatial query and the temporal query, and then the selected frames are composited into an image that represents spatial and temporal characteristics of the scene.
摘要:
Determining a power control group boundary includes receiving a plurality of samples having power control groups, where each power control group corresponds to a time period. The following are repeated for a predetermined number of iterations: a window is set at a point of a sample; a number of power control bits within the window at the point is determined; and the window is moved to a point of a next sample. A point at which the window has the largest number of power control bits is identified. A power control group boundary is determined in accordance with the window at the identified point.