1
|
Han J, Kong T, Wang Q, Jiang J, Zhou Q, Li P, Zhu B, Gu Q. Regulation of microbial metabolism on the formation of characteristic flavor and quality formation in the traditional fish sauce during fermentation: a review. Crit Rev Food Sci Nutr 2022; 63:7564-7583. [PMID: 35253552 DOI: 10.1080/10408398.2022.2047884] [Citation(s) in RCA: 9] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
Abstract
Fish sauce is a special flavored condiment formed by traditional fermentation of low-value fish in coastal areas, which are consumed and produced in many parts of the world, especially in Southeast Asia. In the process of fish sauce fermentation, the diversity of microbial flora and the complex metabolic reactions of microorganisms, especially lipid oxidation, carbohydrate fermentation and protein degradation, are accompanied by the formation of flavor substances. However, the precise reaction of microorganisms during the fersmentation process is difficult to accurately control in modern industrial production, which leads to the loss of traditional characteristic flavors in fermented fish sauces. This paper reviews the manufacturing processes, core microorganisms, metabolic characteristics and flavor formation mechanisms of fermented fish sauces at home and abroad. Various methods have been utilized to analyze and characterize the composition and function of microorganisms. Additionally, the potential safety issues of fermented fish sauces and their health benefits are also reviewed. Furthermore, some future directions and prospects of fermented fish sauces are also reviewed in this paper. By comprehensive understanding of this review, it is expected to address the challenges in the modern production of fish sauce thereby expanding its application in food or diet.
Collapse
Affiliation(s)
- Jiarun Han
- Key Laboratory for Food Microbial Technology of Zhejiang Province, College of Food Science and Biotechnology, Zhejiang Gongshang University, Hangzhou, Zhejiang, China
| | - Tao Kong
- Key Laboratory for Food Microbial Technology of Zhejiang Province, College of Food Science and Biotechnology, Zhejiang Gongshang University, Hangzhou, Zhejiang, China
| | - Qi Wang
- Department of Food Science, University of Massachusetts, Amherst, MA, USA
| | - Jialan Jiang
- Key Laboratory for Food Microbial Technology of Zhejiang Province, College of Food Science and Biotechnology, Zhejiang Gongshang University, Hangzhou, Zhejiang, China
| | - Qingqing Zhou
- Key Laboratory for Food Microbial Technology of Zhejiang Province, College of Food Science and Biotechnology, Zhejiang Gongshang University, Hangzhou, Zhejiang, China
| | - Ping Li
- Key Laboratory for Food Microbial Technology of Zhejiang Province, College of Food Science and Biotechnology, Zhejiang Gongshang University, Hangzhou, Zhejiang, China
| | - Beiwei Zhu
- Key Laboratory for Food Microbial Technology of Zhejiang Province, College of Food Science and Biotechnology, Zhejiang Gongshang University, Hangzhou, Zhejiang, China
- School of Food Science and Technology, Dalian Polytechnic University, Dalian, Liaoning, China
| | - Qing Gu
- Key Laboratory for Food Microbial Technology of Zhejiang Province, College of Food Science and Biotechnology, Zhejiang Gongshang University, Hangzhou, Zhejiang, China
| |
Collapse
|
2
|
Nie AZ, Gao MM, Jia WR, Zhu CS, Zhang XC, Zhou Z, Zhang B. [Discussion on safety of Xanthii Fructus and consideration on its rational use]. Zhongguo Zhong Yao Za Zhi 2019; 44:5336-5344. [PMID: 32237377 DOI: 10.19540/j.cnki.cjcmm.20190701.403] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
Xanthii Fructus is a traditional Chinese medicine for the treatment of sinusitis and headache,rich in medicinal materials and is widely used for more than 1 800 years. Modern pharmacological studies have showed that Xanthii Fructus has anti-inflammatory,analgesic,anti-tumor,anti-bacterial,hypoglycemic,anti-allergic,immunomodulatory and other pharmacological effects,which can be commonly used in the treatment of diseases relating to immune abnormalities,such as rheumatoid arthritis,acute and chronic rhinitis,allergic rhinitis,and skin diseases,with a high medicinal value. Toxicological studies have shown that Xanthii Fructus poisoning can cause substantial damage to organs,such as the liver,kidney,and gastrointestinal tract,especially to liver. Because of the coexisting of its efficacy and toxicity,Xanthii Fructus often leads to a series of safety problems in the clinical application process. This study attempts to summarize its characteristics of adverse reactions,analyze the root cause of the toxicity of Xanthii Fructus from such aspects as processing,dose,course of treatment and eating by mistake,discuss the substance of its efficacy/toxicity from chemical compositions,and put forward exploratory thinking about how to promote its clinical rational application from the aspects such as strict processing,reasonable compatibility,medication information,contraindication,strict control of the dose,and course of treatment,so as to promote the safe and reasonable application of Xanthii Fructus.
Collapse
Affiliation(s)
- An-Zheng Nie
- the First Affiliated Hospital of Zhengzhou University Zhengzhou 450052,China
| | - Mei-Mei Gao
- the First Affiliated Hospital of Zhengzhou University Zhengzhou 450052,China
| | - Wen-Rui Jia
- the First Affiliated Hospital of Zhengzhou University Zhengzhou 450052,China
| | - Chun-Sheng Zhu
- the First Affiliated Hospital of Zhengzhou University Zhengzhou 450052,China
| | - Xiao-Chuan Zhang
- the First Affiliated Hospital of Zhengzhou University Zhengzhou 450052,China
| | - Zheng Zhou
- the First Affiliated Hospital of Zhengzhou University Zhengzhou 450052,China
| | - Bing Zhang
- Beijing University of Chinese Medicine Beijing 100029,China
| |
Collapse
|
3
|
Gharaveis A, Hamilton DK, Pati D, Shepley M. The Impact of Visibility on Teamwork, Collaborative Communication, and Security in Emergency Departments: An Exploratory Study. HERD 2017; 11:37-49. [PMID: 29069916 DOI: 10.1177/1937586717735290] [Citation(s) in RCA: 25] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.
Collapse
|
4
|
Abstract
The increased penetration of mobile devices has created opportunities in the health sector and led to emerging of mobile health systems. As much as the mobile health systems have registered tremendous progress, they have been faced with privacy and usability issues. Due to the sensitivity of health information, there is an ethical need to equip mobile health systems with adequate privacy measures. However, these systems should also be useable by the intended users. Even though many researchers are working on solutions, the issues still persist. External factors such as cultural differences have also contributed to the issues, yet they have been under researched. In this article, we conduct a systematic literature review of 22 articles, categorize and present privacy and usability issues and possible solutions. We then discuss the relevance and implications of external factors to the findings on privacy and usability. We end with recommendations to address these external factors.
Collapse
Affiliation(s)
- Jane Katusiime
- Humboldt-Universität zu Berlin, Germany; Mbarara University of Science and Technology, Uganda
| | | |
Collapse
|
5
|
Shahzad A, Landry R, Lee M, Xiong N, Lee J, Lee C. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols. Sensors (Basel) 2016; 16:s16060821. [PMID: 27314351 PMCID: PMC4934247 DOI: 10.3390/s16060821] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/09/2016] [Revised: 05/18/2016] [Accepted: 05/27/2016] [Indexed: 11/16/2022]
Abstract
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.
Collapse
Affiliation(s)
- Aamir Shahzad
- École de Technologie Supérieure, 1100 Notre-Dame Street West, Montreal, QC H3C 1K3, Canada.
- Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chonbuk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea.
| | - René Landry
- École de Technologie Supérieure, 1100 Notre-Dame Street West, Montreal, QC H3C 1K3, Canada.
| | - Malrey Lee
- Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chonbuk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea.
| | - Naixue Xiong
- Shanghai Key Lab of Modern Optical System, and Engineering Research Center of Optical Instrument and System, Ministry of Education, University of Shanghai for Science and Technology, No. 516 Jun Gong Road, Shanghai 200093, China.
- Department of Business and Computer Science, Southwestern Oklahoma State University, Oklahoma, OK 73096, USA.
| | - Jongho Lee
- Department of Fire Service Administration, WonKwang University, Iksan 570-749, Korea.
| | - Changhoon Lee
- Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Seoul 01811, Korea.
| |
Collapse
|
6
|
Hayajneh T, Mohd BJ, Imran M, Almashaqbeh G, Vasilakos AV. Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks. Sensors (Basel) 2016; 16:424. [PMID: 27023540 DOI: 10.3390/s16040424] [Citation(s) in RCA: 53] [Impact Index Per Article: 6.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/31/2015] [Revised: 03/08/2016] [Accepted: 03/17/2016] [Indexed: 11/17/2022]
Abstract
There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes.
Collapse
|