• Title/Summary/Keyword: Copy

Search Result 1,686, Processing Time 0.023 seconds

Nitrifying-genes Dynamics in the Enriched Bacterial Consortium Inoculated with Humic Soil (부식토 유래 질산화세균 consortium의 질산화 유전자 거동 특성)

  • Seo, Yoon-Joo;Lee, Yun-Yeong;Choi, Hyung-Joo;Cho, Kyung-Suk
    • Microbiology and Biotechnology Letters
    • /
    • v.47 no.2
    • /
    • pp.296-302
    • /
    • 2019
  • In this study, the effects of ammonium concentration ($117.5-1155.0mg-N{\cdot}l^{-1}$), nitrite concentration ($0-50.0mg-N{\cdot}l^{-1}$), and temperature ($15-35^{\circ}C$) on nitrification performance and its functional genes (amoA-arc, amoA-bac, hao) in an enriched consortium inoculated with humic acid were determined. Notably, the maximum nitrification rate value was observed at $315mg-N{\cdot}l^{-1}$ of ammonium, but the highest functional gene copy numbers were obtained at $630mg-N{\cdot}l^{-1}$ of ammonium. No inhibition of the nitrification rate and functional gene copy numbers was observed via the added nitrites. The optimum temperature for maximum nitrification performance was observed to be $30^{\circ}C$. The amoA-bac copy numbers were also greater than those of amoA-arc under all test conditions. Notably, amoA-arc copy numbers and nitrification efficiency showed a positive relationship in network analysis. These results indicate that ammonium-oxidizing archaea and bacteria play important roles in the nitrification process.

The Secure Chip for Software Illegal Copy Protection (소프트웨어 불법복제방지를 위한 보안칩)

  • 오명신;한승조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.87-98
    • /
    • 2002
  • Software has been developed very fast as information has become important value. Illegal software copy has been the main problem of developing software business. Recently used protecting lock system for software copy has not guaranteed perfectly from easily cracked-defense system. This paper, therefore, proposes 96-bit block cipher with 112-bit length to replace a DES(Data Encryption Standard) algorithm. Security chip by ASIC(Application Specific Integrated Circuit) security module is presented for software copy protection. Then, an auto block protecting algorithm is designed for the security chip. Finally, controlling driver and library are built for the security chip.

Analysis of Rumen Fermentation and Methanogen Levels in Response to Various Alfalfa Hay, Oat Hay, and Feed Concentrate Ratios

  • Lee, Seul;Kim, Banji;Ryu, Chaehwa;Jeong, Jinyoung;Kim, Byeonghyeon;Baek, Youlchang
    • Journal of The Korean Society of Grassland and Forage Science
    • /
    • v.40 no.4
    • /
    • pp.279-284
    • /
    • 2020
  • This study aimed to analyze ruminal fermentation, methane emissions, and methanogen levels for different forage feed type and concentrate feed ratios. Alfalfa hay, oat hay, and a feed concentrate were used for in vitro fermentation experiments, at ratios of 9:1, 5:5, and 1:9 (forage:concentrate). After 24 h of incubation, rumen fermentation and methanogen level changes were evaluated. In the low forage treatments, the total gas, CH4, NH3-N, true dry matter digestibility, and total volatile fatty acid were higher than the other treatments, which were used as the parameters on which to assess rumen fermentation (P < 0.05). The feed ratio influenced the copy number for the total archaea and the genus Methanobrevibacter (P = 0.015, P = 0.010). The copy number result trend was like that for CH4 per digested dry matter (DDM). The PCR results and methanogen copy number analysis indicated that the composition of the methanogens affected the CH4 levels, not their copy number. The results of this study can be applied to predict rumen fermentation and methane emission patterns for cattle fed a variety of feedstuffs.

The change of PHP index and copy numbers of periodontal bacteria in patients with professional periodontal prevention management (PHP INDEX에 따른 전문가 치주예방관리 환자의 치주질환 원인균 copy 수 변화)

  • Mi-Young, Jin;Byeng-Chul, Yu
    • Journal of Korean Dental Hygiene Science
    • /
    • v.5 no.2
    • /
    • pp.155-164
    • /
    • 2022
  • Background: By regulating the factors that contribute to oral diseases in a healthy way, oral health can be maintained and prevented. Methods: The general characteristics, PHP index, oral health behavior, and clinical periodontal index of each group were calculated by frequency analysis, and a cross-analysis (χ2 test) was conducted to assess the homogeneity of the general characteristics, oral health behavior, and clinical periodontal index of the study subjects. An Oral bacteriological examination was performed by gargling with saliva. Results: The expert periodontal prevention group showed a decrease in the copy number of periodontal disease causative bacteria, and A. actinomycetemcomitans, P. gingivalis, T. forsythus, andT. denticolashowed a significant difference before and after treatment (p=0.021). In the periodontal treatment group, A. actinomycetemcomitans, P. gingivalis, T. forsythus, andT. denticolaall showed a decrease in copy number, but there was no significant difference. Conclusions: This study showed professional periodontal prevention management had some effect on periodontal bacterial reduction.

Functional Effects of Increased Copy Number of the Gene Encoding Proclavaminate Amidino Hydrolase on Clavulanic Acid Production in Streptomyces clavuligerus ATCC 27064

  • Song, Ju-Yeon;Kim, Eun-Sook;Kim, Dae-Wi;Jesen, Susan E.;Lee, Kye-Joon
    • Journal of Microbiology and Biotechnology
    • /
    • v.18 no.3
    • /
    • pp.417-426
    • /
    • 2008
  • The effect of increasing levels of proclavaminate amidino hydrolase (Pah) on the rate of clavulanic acid production in Streptomyces clavuligerus ATCC 27064 was evaluated by increasing dosoge of a gene (pah2) encoding Pah. A strain (SMF5703) harboring a multicopy plasmid containing the pah2 gene showed significantly retarded cell growth and reduced clavulanic acid production, possibly attributable to the deleterious effects of the multicopy plasmid. In contrast, a strain (SMF5704) carrying a single additional copy of pah2 introduced into chromosome via an integrative plasmid showed enhanced production of clavulanic acid and increased levels of pah2 transcripts. Analysis of transcripts of other genes involved in the clavulanic acid biosynthetic pathway revealed a pattern similar to that seen in the parent. From these results, it appears that clavulanic acid production can be enhanced by duplication of pah2 through integration of a second copy of the gene into chromosome. However, increasing the copy number of only one gene, such as pah2, does not affect the expression of other pathway genes, and so only modest improvements in clavulanic acid production can be expected. Flux controlled by Pah did increase when the copy number of pah2 was doubled, suggesting that under these growth conditions, Pah levels may be a limiting factor regulating the rate of clavulanic acid biosynthesis in S. clavuligerus.

Local animation structural Problem of screening and infringement copy right : in the centering of Chuncheon area (지역 애니메이션 상영 구조 문제와 저작권 침해 : 춘천 지역을 중심으로)

  • Seo, Jeong-Soo;Park, Ki-Bog
    • Cartoon and Animation Studies
    • /
    • s.15
    • /
    • pp.207-220
    • /
    • 2009
  • This paper researched that consumers who lived in the local small cites have a restricted and insufficient problem to screening the animation film comparing with those of capital area and the other broader local cities. And these kinds of problems caused more serious problems like a infringement of copy right as a result. This paper calculated and evaluated that the rate possibilities of criminal infringement copy right in supposing that giving the opportunity screening the all of the first-run movies the most highest criminal group in Chuncheon where the worst benefit area in aspect of screening circumstances. As a result of this research, this paper could suggest that the possibility to reduce the criminal infringement of copy right and the necessity of structural reconstruction throughout rebuilding of animation distribution and consciousness of consumers. Thus this paper try find out the importance of reducing the rate of criminal infringement copy right by recontruction of structrual access of local animation business.

  • PDF

Development of Restriction Fragment Length Polymorphism(RELP) Markers in Silkworm, Bombyx mori (누에 RFLP(제한단편 다형현상)마커 개발)

  • 고승주;김태산;이영승;황재삼;이상몽
    • Korean journal of applied entomology
    • /
    • v.36 no.1
    • /
    • pp.96-104
    • /
    • 1997
  • A silkworm Bombyx mori genomic DNA library was constructed from polyphagous J111 strain and unpolyphagous $C_3$ strain to develop the genomic study by DNA makers. Genomic DNAs of two strains were digested with restriction enzyme EcoRI and ligated into pUC18. The ligated plasmids were transferred into E. coli host strain DH5$\alpha$. When the genomic DNAs were hybridized with insert DNAs from transformant, could be categorized from hybridization patterns to three groups as high repetitive sequence, moderately repetitive sequence, and low-copy number sequences. A total of 219 clones containing single or low-copy number sequence inserts were examined for any polymorphisms between two strains of J111 and $C_3$. Forty six clones showed RFLPs and 10 of these clones were used as a probe of analysis of $F_2$ population derived from crossing between J111 and $C_3$ strain. The genetic inheritance tested with each clones will be important tools to construct the genetic map of the silkworm, Bombyx mori.

  • PDF

Microbial production of carotenoids for fortification of foods

  • Kim, Seon-Won;Keasling, J.D.
    • Proceedings of the Korean Society of Life Science Conference
    • /
    • 2001.11a
    • /
    • pp.3-8
    • /
    • 2001
  • Isopentenyl diphosphate (IPP) is the common, five-carbon building block in the biosynthesis of all carotenoids, IPP in Escherichia coli is synthesized through the non-mevalonate pathway. The first reaction of IPP biosynthesis in E. coli is the formation of 1-deoxy-D-xylulose-5-phosphate (DXP), catalyzed by DXP synthase and encoded by dxs. The second reaction in the pathway is the reduction of DXP to 2-C-methyl-D-erythritol-4-phosphate, catalyzed by DXP reductoisomerase and encoded by dxr. To determine if one or more of the reactions in the non-mevalonate pathway controlled flux to IPP, dxs and dxr were placed on several expression vectors under the control of three different promoters and transformed into three E. coli strains (DH5(, XL1-Blue, and JM101) that had been engineered to produce lycopene. Lycopene production was improved significantly in strains transformed with the dxs expression vectors. When the dxs gene was expressed from the arabinose-inducible araBAD promoter (PBAD) on a medium-copy plasmid, lycopene production was 2-fold higher than when dxs was expressed from the IPTG-inducible trc and lac promoters (Ptrc and Plac, respectively) on medium-copy and high-copy plasmids, Given the low final densities of cells expressing dxs from IPTG-inducible promoters, the low lycopene production was probably due to the metabolic burden of plasmid maintenance and an excessive drain of central metabolic intermediates. At arabinose concentrations between 0 and 1.33 mM, cells expressing both dxs and dxr from PBAD on a medium-copy plasmid produced 1.4 - 2.0 times more lycopene than cells expressing dxs only. However, at higher arabinose concentrations lycopene production in cells expressing both dxs and dxr was lower than in cells expressing dxs only. A comparison of the three E. coli strains transformed with the arabinose-inducible dxs on a medium-copy plamid revealed that lycopene production was highest in XL1-Blue.

  • PDF

Video Signature using Spatio-Temporal Information for Video Copy Detection (동영상 복사본 검출을 위한 시공간 정보를 이용한 동영상 서명 - 동심원 구획 기반 서술자를 이용한 동영상 복사본 검출 기술)

  • Cho, Ik-Hwan;Oh, Weon-Geun;Jeong, Dong-Seok
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.607-611
    • /
    • 2008
  • This paper proposes new video signature using spatio-temporal information for copy detection. The proposed video copy detection method is based on concentric circle partitioning method for each key frame. Firstly, key frames are extracted from whole video using temporal bilinear interpolation periodically and each frame is partitioned as a shape of concentric circle. For the partitioned sub-regions, 4 feature distributions of average intensity, its difference, symmetric difference and circular difference distributions are obtained by using the relation between the sub-regions. Finally these feature distributions are converted into binary signature by using simple hash function and merged together. For the proposed video signature, the similarity distance is calculated by simple Hamming distance so that its matching speed is very fast. From experiment results, the proposed method shows high detection success ratio of average 97.4% for various modifications. Therefore it is expected that the proposed method can be utilized for video copy detection widely.

  • PDF

A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection (SIFT 기반 카피-무브 위조 검출에 대한 타켓 카운터-포렌식 기법)

  • Doyoddorj, Munkhbaatar;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.163-172
    • /
    • 2014
  • The Scale Invariant Feature Transform (SIFT) has been widely used in a lot of applications for image feature matching. Such a transform allows us to strong matching ability, stability in rotation, and scaling with the variety of different scales. Recently, it has been made one of the most successful algorithms in the research areas of copy-move forgery detections. Though this transform is capable of identifying copy-move forgery, it does not widely address the possibility that counter-forensics operations may be designed and used to hide the evidence of image tampering. In this paper, we propose a targeted counter-forensics method for impeding SIFT-based copy-move forgery detection by applying a semantically admissible distortion in the processing tool. The proposed method allows the attacker to delude a similarity matching process and conceal the traces left by a modification of SIFT keypoints, while maintaining a high fidelity between the processed images and original ones under the semantic constraints. The efficiency of the proposed method is supported by several experiments on the test images with various parameter settings.