7 research outputs found

    Novel Umami Peptides from <i>Hypsizygus marmoreus</i> and Interaction with Umami Receptor T1R1/T1R3

    No full text
    Umami peptides are important taste components of foods. In this study, umami peptides from Hypsizygus marmoreus hydrolysate were purified through ultrafiltration, gel filtration chromatography, and RP-HPLC, and then identified using LC-MS/MS. The binding mechanism of umami peptides with the receptor, T1R1/T1R3, was investigated using computational simulations. Five novel umami peptides were obtained: VYPFPGPL, YIHGGS, SGSLGGGSG, SGLAEGSG, and VEAGP. Molecular docking results demonstrated that all five umami peptides could enter the active pocket in T1R1; Arg277, Tyr220, and Glu301 were key binding sites; and hydrogen bonding and hydrophobic interaction were critical interaction forces. VL-8 had the highest affinity for T1R3. Molecular dynamics simulations demonstrated that VYPFPGPL (VL-8) could be steadily packed inside the binding pocket of T1R1 and the electrostatic interaction was the dominant driving force of the complex (VL-8-T1R1/T1R3) formation. Arg residues (151, 277, 307, and 365) were important contributors to binding affinities. These findings provide valuable insights for the development of umami peptides in edible mushrooms

    Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM

    No full text
    In order to further improve the information effectiveness of digital image transmission, an image-encryption algorithm based on 2D-Logistic-adjusted-Sine map (2D-LASM) and Discrete Wavelet Transform (DWT) is proposed. First, a dynamic key with plaintext correlation is generated using Message-Digest Algorithm 5 (MD5), and 2D-LASM chaos is generated based on the key to obtain a chaotic pseudo-random sequence. Secondly, we perform DWT on the plaintext image to map the image from the time domain to the frequency domain and decompose the low-frequency (LF) coefficient and high-frequency (HF) coefficient. Then, the chaotic sequence is used to encrypt the LF coefficient with the structure of “confusion-permutation”. We perform the permutation operation on HF coefficient, and we reconstruct the image of the processed LF coefficient and HF coefficient to obtain the frequency-domain ciphertext image. Finally, the ciphertext is dynamically diffused using the chaotic sequence to obtain the final ciphertext. Theoretical analysis and simulation experiments show that the algorithm has a large key space and can effectively resist various attacks. Compared with the spatial-domain algorithms, this algorithm has great advantages in terms of computational complexity, security performance, and encryption efficiency. At the same time, it provides better concealment of the encrypted image while ensuring the encryption efficiency compared to existing frequency-domain methods. The successful implementation on the embedded device in the optical network environment verifies the experimental feasibility of this algorithm in the new network application
    corecore