• Title/Summary/Keyword: CERT

Search Result 65, Processing Time 0.027 seconds

Engineering the Cellular Protein Secretory Pathway for Enhancement of Recombinant Tissue Plasminogen Activator Expression in Chinese Hamster Ovary Cells: Effects of CERT and XBP1s Genes

  • Rahimpour, Azam;Vaziri, Behrouz;Moazzami, Reza;Nematollahi, Leila;Barkhordari, Farzaneh;Kokabee, Leila;Adeli, Ahmad;Mahboudi, Fereidoun
    • Journal of Microbiology and Biotechnology
    • /
    • v.23 no.8
    • /
    • pp.1116-1122
    • /
    • 2013
  • Cell line development is the most critical and also the most time-consuming step in the production of recombinant therapeutic proteins. In this regard, a variety of vector and cell engineering strategies have been developed for generating high-producing mammalian cells; however, the cell line engineering approach seems to show various results on different recombinant protein producer cells. In order to improve the secretory capacity of a recombinant tissue plasminogen activator (t-PA)-producing Chinese hamster ovary (CHO) cell line, we developed cell line engineering approaches based on the ceramide transfer protein (CERT) and X-box binding protein 1 (XBP1) genes. For this purpose, CERT S132A, a mutant form of CERT that is resistant to phosphorylation, and XBP1s were overexpressed in a recombinant t-PA-producing CHO cell line. Overexpression of CERT S132A increased the specific productivity of t-PA-producing CHO cells up to 35%. In contrast, the heterologous expression of XBP1s did not affect the t-PA expression rate. Our results suggest that CERT-S132A-based secretion engineering could be an effective strategy for enhancing recombinant t-PA production in CHO cells.

Investigation of dust particle removal efficiency of self-priming venturi scrubber using computational fluid dynamics

  • Ahmed, Sarim;Mohsin, Hassan;Qureshi, Kamran;Shah, Ajmal;Siddique, Waseem;Waheed, Khalid;Irfan, Naseem;Ahmad, Masroor;Farooq, Amjad
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.665-672
    • /
    • 2018
  • A venturi scrubber is an important element of Filtered Containment Venting System (FCVS) for the removal of aerosols in contaminated air. The present work involves computational fluid dynamics (CFD) study of dust particle removal efficiency of a venturi scrubber operating in self-priming mode using ANSYS CFX. Titanium oxide ($TiO_2$) particles having sizes of 1 micron have been taken as dust particles. CFD methodology to simulate the venturi scrubber has been first developed. The cascade atomization and breakup (CAB) model has been used to predict deformation of water droplets, whereas the Eulerian-Lagrangian approach has been used to handle multiphase flow involving air, dust, and water. The developed methodology has been applied to simulate venturi scrubber geometry taken from the literature. Dust particle removal efficiency has been calculated for forced feed operation of venturi scrubber and found to be in good agreement with the results available in the literature. In the second part, venturi scrubber along with a tank has been modeled in CFX, and transient simulations have been performed to study self-priming phenomenon. Self-priming has been observed by plotting the velocity vector fields of water. Suction of water in the venturi scrubber occurred due to the difference between static pressure in the venturi scrubber and the hydrostatic pressure of water inside the tank. Dust particle removal efficiency has been calculated for inlet air velocities of 1 m/s and 3 m/s. It has been observed that removal efficiency is higher in case of higher inlet air velocity.

A Anonymous Crypto-Cert Signature Mechanism (익명성을 보장하는 Crypto-Cert 서명 메커니즘)

  • 박희운;이임영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.11a
    • /
    • pp.617-622
    • /
    • 2001
  • 컴퓨터 및 네트워크의 급속한 성장은 정보 사회로의 발전을 이행해 왔으며, 수많은 정보들이 네트워크를 통해 공유 및 교환되고 있다. 이들은 공개된 네트워크를 전재로 수행되므로, 다양한 형태의 공격으로부터 노출되어 있다. 이를 공격에 대응하고 나아가 사용자 및 메시지 인증을 수행키 위해 각광을 받고 있는 방법 중에 하나로서 디지털 서명을 들 수 있다. 그러나 일반 디지털 서명 방식은 누구나 서명 확인이 가능하므로 서명자의 익명성과 비밀성을 보장해야 하는 전자 투표, 전자 회의 및 전자 입찰 등과 같은 응용 분야에 적용할 경우에는 문제점을 드러내고 있다. 따라서 이들 응용 분야들은 기본적으로 서명자의 신원을 보장하여야 하며, 필요할 경우 이를 확인할 수 있어야 한다. 현재 이와 관련하여 부인 방지 서명 방식과 이를 개선한 수신자 지정 서명 방식이 제안되어 있다. 그러나 이 방식들은 서명자의 익명성이 수신자에게 의존하기 때문에 수신자에 의해 신원이 노출될 수 있었다. 동시에 이들 방식은 메시지 부가형 서명에 기초하므로 전송되는 서명 정보상의 메시지가 제 3자에게 노출되는 결과를 초래한다. 본 고에서는 서명자의 익명성을 보장하면서, 오직 수신자만이 서명자의 신분을 확인할 수 있는 Crypto-Cert 디지털 서명 방식에 대해 고찰한다. 특히 본 방식에서는 필요할 경우 서명자의 신원을 확인할 수 있으며, 전송 메시지에 대해 기밀성을 확보하고 있으므로 다양한 응용 분야에 적용가능하다.

  • PDF

Design of Emergency Response e-Discovery Systems using Encryption and Authentication (e-Discovery 시스템 설계와 관리를 위한 인증과 암호화)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.139-142
    • /
    • 2011
  • 해외 기술 유출 사고로 인하여 한국 경제에 약 수조원의 피해가 발생하였다. 기업의 기술 유출과 사고 책임 소재를 증명하기 위한 e-Discovery시스템과 기업CERT/CC에 연구가 필요하다. 본 논문에서는 e-Discovery의 개념과 관련법안 및 권고안, 포렌식 수사절차에 대해 연구하고, 국내 e-Discovery 사고 사례와 해외 e-Discovery 사고 사례를 연구한다. e-Discovery가 도입되면 기업 CERT/CC에서 필요한 e-Discovery 시스템을 설계한다. e-Discovery 시스템의 접근과 인증을 위한 사용자인증과 기기 인증에 대한 기술과 암호화 기술을 연구한다. 본 논문 연구를 통하여 e-Discovery 제도의 도입과 포렌식 기술 발전에 기초자료로 활용될 것이다.

  • PDF

Cyber Attack Type and CERT (인터넷 침해유형과 대응조직)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.911-914
    • /
    • 2014
  • The internet is established as the basic infrastructure of our life and we live in cyberspace on internet, and additionally many problems on cyberspace arise. One among them is the most serious cyber attack of the information society. The cyber attacks increase each year, attack type and the intelligence is evolving, and then the cyber ecosystem is getting more complicated. In this study, we analyze the Internet last incident status and type of Internet invasion and hacking methods, and analyze the corresponding national and international organizations and associations active status.

  • PDF

PR페이지 - Fogra, 후지제록스 디지털 인쇄기 컬러 품질 인증

  • 대한인쇄문화협회
    • 프린팅코리아
    • /
    • v.13 no.2
    • /
    • pp.90-90
    • /
    • 2014
  • 한국후지제록스(대표 우에노 야스아키)는 지난 1월 17일 '컬러 J75/C75 프레스'를 포함한 후지제록스의 컬러 디지털 인쇄기 전 제품이 독일인쇄기술협회(Fogra)로부터 'FograCert VPS(Validation Printing System)' 인증을 획득했다고 밝혔다.

  • PDF

Services analysis and improvement of MKE(Ministry of Knowledge Economy) Cyber Security Center (지식경제사이버안전센터의 대응활동분석과 개선방안)

  • Lee, Seung-Won;Roh, Young-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.249-258
    • /
    • 2012
  • Cyber attacks expose sensitive information and cause fatal damage in both the public and the private sectors. Therefore, MKE (Ministry of Knowledge Economy) Cyber Security Center was founded on July 25, 2008, to perform three major roles. First, it detects and analyzes cyber attacks for the both sectors. Second, its ISAC (Information Sharing & Analysis Center) service analyzes and evaluates the vulnerability of the communication and network infrastructure to security threats, including control systems. Third, it provides CERT/CC (Computer Emergency Response Team Coordination Center) service to prevent and to respond to computer security incidents. This study focuses on the MKE Cyber Security Center's service analysis, which is playing an increasingly larger role in the both sectors. Based on this analysis, after grasping the response services activity and pointing out the problems, this study suggests improvements to the MKE Cyber Security Center.

A Study on Security Police against Problem of Using Secure USB according to National Assembly Network Separation (국회 네트워크 분리에 따른 보안 USB 메모리의 사용 문제점 및 보안 대책 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.471-474
    • /
    • 2012
  • The administration of government agencies and Law enforcement agencies is utilize. that network separation and Establish CERT for network security. However, the legislature has a basic security system. so a lot of relative vulnerability. In this paper, study for security National Assembly and the National Assembly Secretariat, at Library of National Assembly on legislative National Assembly for information security and network configuration, network and external Internet networks is to divide the internal affairs. Network separation in accordance with the movement of materials to use secure USB memory, the user has the uncomfortable issues. Problem analysis and security vulnerabilities on the use of USB memory is study the problem. User efficiency and enhance security.

  • PDF