• Title/Summary/Keyword: Group Key

Search Result 2,567, Processing Time 0.033 seconds

Expression pattern of prohibitin, capping actin protein of muscle Z-line beta subunit and tektin-2 gene in Murrah buffalo sperm and its relationship with sperm motility

  • Xiong, Zhaocheng;Zhang, Haihang;Huang, Ben;Liu, Qingyou;Wang, Yingqun;Shi, Deshun;Li, Xiangping
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.31 no.11
    • /
    • pp.1729-1737
    • /
    • 2018
  • Objective: The aim of the current study is to investigate the relationship between prohibitin (PHB), capping actin protein of muscle Z-line beta subunit (CAPZB), and tektin-2 (TEKT2) and sperm motility in Murrah buffalo. Methods: We collected the high-motility and low-motility semen samples, testis, ovary, muscle, kidney, liver, brain and pituitary from Murrah buffalo, and analysed the expression of PHB, CAPZB, and TEKT2 in mRNA (message RNA) and protein level. Results: Quantitative reverse transcription-polymerase chain reaction (qRT-PCR) result showed that the expression of PHB was higher and CAPZB, TEKT2 were specifically expressed in testis as compared to the other 6 tissues, and that in testis, the expression of TEKT2 was higher than that of CAPZB and PHB. Immunohistochemistry test revealed that all three genes were located on the convoluted seminiferous tubule and enriched in spermatogenic cells. Both qRT-PCR and Western Blot results showed that the expression levels of PHB, CAPZB, and TEKT2 were significantly lower in the low-motility semen group compared to the high-motility semen group (p<0.05). Conclusion: The expression levels of PHB, CAPZB, and TEKT2 in Murrah buffalo sperm have a high positive correlation with sperm motility. And the three genes may be potential molecular markers for the decline of buffalo sperm motility.

Relationship between the structure and composition of rumen microorganisms and the digestibility of neutral detergent fibre in goats

  • Liu, Kaizhen;Wang, Lizhi;Yan, Tianhai;Wang, Zhisheng;Xue, Bai;Peng, Quanhui
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.32 no.1
    • /
    • pp.82-91
    • /
    • 2019
  • Objective: This experiment was conducted to compare the structure and composition of ruminal microorganisms in goats with high and low neutral detergent fibre (NDF) digestibility. Methods: Nineteen crossbred goats were used as experimental animals and fed the same total mixed rations during the 30-day pre-treatment and 6-day digestion trialperiods. All faeces were collected during the digestion period for measuring the NDF digestibility. Then, high and the low NDF digestibility individuals were chosen for the high NDF digestibility group (HFD) and low NDF digestibility group (LFD), respectively. Rumen contents were collected for total microbial DNA extraction. The V4 region of the bacterial 16S rRNA gene was amplified using universal primers of bacteria and sequenced using high-throughput sequencer. The sequences were mainly analysed by QIIME 1.8.0. Results: A total of 18,694 operational taxonomic units were obtained, within 81.98% belonged to bacteria, 6.64% belonged to archaea and 11.38% was unassigned microorganisms. Bacteroidetes, Firmicutes, and Proteobacteria were the predominant microbial phyla in both groups. At the genus level, the relative abundance of fifteen microorganisms were significantly higher (p<0.05) and six microorganisms were extremely significantly higher (p<0.01) in LFD than HFD. Overall, 176 core shared genera were identified in the two groups. The relative abundance of 2 phyla, 5 classes, 10 orders, 13 families and 15 genera had a negative correlation with NDF digestibility, but only the relative abundance of Pyramidobacter had a positive correlation with NDF digestibility. Conclusion: There were substantial differences in NDF digestibility among the individual goats, and the NDF digestibility had significant correlation with the relative abundance of some ruminal microorganisms.

Babeisa duncani infection alters gut microbiota profile in hamsters

  • Shangdi Zhang;Jinming Wang;Xiaoyun Li;Yanbo Wang;Yueli Nian;Chongge You;Dekui Zhang;Guiquan Guan
    • Parasites, Hosts and Diseases
    • /
    • v.61 no.1
    • /
    • pp.42-52
    • /
    • 2023
  • The genus Babesia includes parasites that can induce human and animal babesiosis, which are common in tropical and subtropical regions of the world. The gut microbiota has not been examined in hamsters infected by Babesia duncani. Red blood cells infected with B. duncani were injected into hamsters through intraperitoneal route. To evaluate the changes in gut microbiota, DNAs were extracted from small intestinal contents, acquired from hamsters during disease development. Then, the V4 region of the 16S rRNA gene of bacteria was sequenced using the Illumina sequencing platform. Gut microbiota alternation and composition were assessed according to the sequencing data, which were clustered with >97.0% sequence similarity to create amplicon sequence variants (ASVs). Bacteroidetes and Firmicutes were made up of the major components of the gut microbiota in all samples. The abundance of Bacteroidetes elevated after B. duncani infection than the B. duncani-free group, while Firmicutes and Desulfobacterota declined. Alpha diversity analysis demonstrated that the shown ASVs were substantially decreased in the highest parasitemia group than B. duncani-free and lower parasitemia groups. Potential biomarkers were discovered by Linear discriminant analysis Effect Size (LEfSe) analysis, which demonstrated that several bacterial families (including Muribaculaceae, Desulfovibrionaceae, Oscillospiraceae, Helicobacteraceae, Clostridia UGG014, Desulfovibrionaceae, and Lachnospiraceae) were potential biomarkers in B. duncani-infected hamsters. This research demonstrated that B. duncani infectious can modify the gut microbiota of hamsters.

Secure and Energy-Efficient Join-Leave Operations in ZigBee Network

  • Kim, Bong-Whan;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2874-2892
    • /
    • 2013
  • Since security plays an important role in several ZigBee applications, such as Smart Energy and medical sensor applications, ZigBee Specification includes various security mechanisms to protect ZigBee frames and infrastructure. Among them, the Join and Leave operations of ZigBee are investigated in this paper. The current Join-Leave operation is protected by the network key (a kind of group key). We claim it is not adequate to employ the network key for such purpose, and propose a new Join-Leave operation protected by the application link key (a kind of pairwise key), which is based on a more efficient key management scheme than that of ZigBee. Hence, the original Join operation consists of a total of 12 command frames, while the new Join operation consists of only 6 command frames. In particular, the security of the proposed Join-Leave operation is equivalent to or better than that of the original Join-Leave operation. The new Join-Leave operation is extensively analyzed in terms of security and efficiency, and compared with the original Join-Leave operation of ZigBee.

Volumetric 3D Display System Based on Rotating Dot-Matrix LEDs

  • Lin, Yuanfang;Liu, Xu;Zhang, Xiaojie;Yao, Yi;Liu, Xiangdong
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.440-441
    • /
    • 2004
  • A volumetric three-dimensional (3D) display system was presented, which utilizes a rotating two-dimensional (2D) display panel of light emitting diodes (LEDs) to generate more than 10 million volume pixels (voxels) within a cylindrical volume of 165 mm in height and 292 mm in diameter. Due to persistence of vision, momentarily addressed voxel information is perceived and fused into a 3D image. Important cues for depth perception, such as binocular parallax, accommodation, convergence and motion parallax are satisfied automatically and naturally, thus it is suitable for individual or group viewing, without the need for any special visual aids.

  • PDF

An advanced key distribution mechanism and security protocol to reduce a load of the key management system (키 관리시스템의 부하절감을 위한 향상된 키 분배 메커니즘과 보안프로토콜)

  • Jeon, Jeong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.35-47
    • /
    • 2006
  • In an Ubiquitous Environment, the growth of various services and equipment is forecasted to increase both the multicast users and diverse hacking attacks of the multicast key. Rapid increasing of multicast users and application security protocols reduce the performance of the Central key management system. Accordingly. We propose to elevate the functionality of the key management mechanism for greater efficiency and stability of the multicast services. in this paper The existing key management mechanism comparison and simulation will analyze these problems. We propose the advanced SMKD (Secure Multicast Key Distribution) mechanism application of the small group and key length control new security protocol by methods to solve these problems. The SMKD Model in this paper will help reduce loading the key distribution and encryption execution of a central key management system, and this model can also ensure stability to a central key management system by efficient key management.

  • PDF

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

3D Content Model Hashing Based on Object Feature Vector (객체별 특징 벡터 기반 3D 콘텐츠 모델 해싱)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.75-85
    • /
    • 2010
  • This paper presents a robust 3D model hashing based on object feature vector for 3D content authentication. The proposed 3D model hashing selects the feature objects with highest area in a 3D model with various objects and groups the distances of the normalized vertices in the feature objects. Then we permute groups in each objects by using a permutation key and generate the final binary hash through the binary process with the group coefficients and a random key. Therefore, the hash robustness can be improved by the group coefficient from the distance distribution of vertices in each object group and th hash uniqueness can be improved by the binary process with a permutation key and a random key. From experimental results, we verified that the proposed hashing has both the robustness against various mesh and geometric editing and the uniqueness.

An Efficient and Secure Group Key Distribution Protocol for IP-based Pay-TV Systems (IP기반의 Pay-TV 시스템을 위한 안전하고 효율적인 그룹 키 분배 프로토콜)

  • Kim, Jung-Yoon;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.199-208
    • /
    • 2009
  • Recently,IP-based broadcasting systems,such as Mobile-TV and IP-TV, have been widely deployed. These systems require a security system to allow only authorized subscribers access to broadcasting services. We analyzed the Conditional Access System, which is a security system used in the IP-based Pay-TV systems. A weakness of the system is that it does not scale well when the system experiences frequent membership changes. In this paper, we propose a group key distribution protocol which overcomes the scalability problem by reducing communication and computation overheads without loss of security strength. Our experimental results show that computation delay of the proposed protocol is smaller than one of the Conditional Access System. This is attributed to the fact that the proposed protocol replaces expensive encryption and decryption with relatively inexpensive arithmetic operations. In addition, the proposed protocol can help to set up a secure channel between a server and a client with the minimum additional overhead.

An Enhanced Scheme of PUF-Assisted Group Key Distribution in SDWSN (SDWSN 환경의 PUF 기반 그룹 키 분배 방법 개선)

  • Oh, Jeong Min;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.29-43
    • /
    • 2019
  • In recent years, as the network traffic in the WSN(Wireless Sensor Network) has been increased by the growing number of IoT wireless devices, SDWSN(Software-Defined Wireless Sensor Network) and its security that aims a secure SDN(Software-Defined Networking) for efficiently managing network resources in WSN have received much attention. In this paper, we study on how to efficiently and securely design a PUF(Physical Unclonable Function)-assisted group key distribution scheme for the SDWSN environment. Recently, Huang et al. have designed a group key distribution scheme using the strengths of SDN and the physical security features of PUF. However, we observe that Huang et al.'s scheme has weak points that it does not only lack of authentication for the auxiliary controller but also it maintains the redundant synchronization information. In this paper, we securely design an authentication process of the auxiliary controller and improve the vulnerabilities of Huang et al.'s scheme by adding counter strings and random information but deleting the redundant synchronization information.