• 제목/요약/키워드: Host expansion

검색결과 71건 처리시간 0.028초

Attenuation of Hepatic Graft-versus-host Disease in Allogeneic Recipients of MyD88-deficient Donor Bone Marrow

  • Lim, Ji-Young;Lee, Young-Kwan;Lee, Sung-Eun;Ju, Ji-Min;Park, Gyeongsin;Choi, Eun Young;Min, Chang-Ki
    • IMMUNE NETWORK
    • /
    • 제15권3호
    • /
    • pp.125-134
    • /
    • 2015
  • Acute graft-versus-host-disease (GVHD) is characterized by selective damage to the liver, the skin, and the gastrointestinal tract. Following allogeneic hematopoietic stem cell transplantation, donor bone marrow (BM) cells repopulate the immune system of the recipient. We previously demonstrated that the acute intestinal GVHD (iGVHD) mortality rate was higher in MyD88-deficient BM recipients than that in the control BM recipients. In the present study, the role of MyD88 (expressed by donor BM) in the pathophysiology of hepatic GVHD (hGVHD) was examined. Unlike iGVHD, transplantation with MyD88-deficient T-cell depleted (TCD) BM attenuated hGVHD severity and was associated with low infiltration of T cells into the liver of the recipients. Moreover, GVHD hosts, transplanted with MyD88-deficient TCD BM, exhibited markedly reduced expansion of $CD11b^+Gr-1^+$ myeloidderived suppressor cells (MDSC) in the liver. Adoptive injection of the MDSC from wild type mice, but not MyD88-deficient mice, enhanced hepatic T cell infiltration in the MyD88-deficient TCD BM recipients. Pre-treatment of BM donors with LPS increased MDSC levels in the liver of allogeneic wild type BM recipients. In conclusion, hGVHD and iGVHD may occur through various mechanisms based on the presence of MyD88 in the non-T cell compartment of the allograft.

이동성 호스트를 위한 라우팅 경로 추적 기술 분석 (Analysis of the Routing Path Tracking Technology for Mobility Host)

  • 박진태;표경수;문일영
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 춘계학술대회
    • /
    • pp.638-640
    • /
    • 2016
  • 최근 ICT 기술의 발전으로 모든 사물이 네트워크를 통해 인간과 연결되는 초연결사회에 진입하게 되었다. IoT 기술의 등장과 스마트 단말의 개발, 기술의 확장, 스마트 센서의 대중화, 스마트 기기 보급 확산, 다양한 네트워크망의 구축으로 IoT 기술은 급속도로 성장하고 있다. 이러한 기술의 적용 대상이 스마트 디바이스뿐만 아니라 자동차 등 이동성을 가진 사물에 적용이 되면서 이를 위한 네트워크 기술이 중요하게 되었다. 실시간 서비스 이용과 데이터의 정확성과 같은 특징이 중요하게 된 것이다. IoT를 구현하기 위해서는 IP, 보안, 서비스모델 등 많은 것들을 고려해야 하지만, 본 논문에서는 이동성 호스트에 대한 효율적인 서비스 제공을 위한 라우팅 경로 추적 기술에 대해 논의 하고자 한다. 이에 본 논문에서는 현재 연구되고 있는 라우팅 경로 추적 기술에 대해 알아보고, 향후 이동성 호스트에 대한 라우팅 방법에 대해 언급하고자 한다.

  • PDF

GENOME STRUCTURE OF Bombyx mori NUCLEOPOLYHEDROVIRUS

  • SUSUMU MAEDA
    • 한국잠사학회:학술대회논문집
    • /
    • 한국잠사학회 1997년도 Progress and Future Development of Sericultural Science and Technology 40th Anniversary Commemoration Symposium
    • /
    • pp.73-101
    • /
    • 1997
  • Baculoviruses are characterized by large double-stranded circular DNA genomes and rod-shaped enveloped virions. Bombyx mori nucleopolyhedrovirus(BmNPV) is a major pathogen, which causes severe damage in sericulture. Currently, BmNPV is recogtnized as an improtant tool in molecular biology, especially for expression of useful genes in B.mori cells and silkworm larvae. Our laboratories have focused on the studies of the molecular mechanisms of BmNPV replication and the application of BmNPV to agriculture and medicine. The entire nucleotide sequence of the BmNPV genome has recently determined. The BmNPV genome possessed 135 putative genes and 7 homologous repeated sequence (hrs) regions. Relatively little space, a few to a few hundred base-pairs, was observed between the open reading frames and hrs. Termination codons often overlapped. These results showed a compactly packde BmNPV genome. Based on comparative sequence analyses, we speculated that the ancestor of BmNPV was a baculovirus similar to Autographa californica NPV(AcNPV). The function of the BmNPV genes were characterized by gene deletion analysis; p35 was found to be involved in blocking apoptosis and cysteine proteinase was found to be involved in horizontal virus transmission by degrading viral-infected larval host. By AcNPV and BmNPV coinfection experiments, we identified a BmNPV gene involved in expanding host specificity of AcNPV. The identified gene was likely encoded a DNA helicase based on the amino acid sequence analysis; a few amino acid substitutions in the putative DNA helicase gene resulted in the expansion of host range of AcNPV. These findings indicate that BmNPV evolved within a short period from an AcNPV-like ancestral virus due to rapid evolution including specific amino acid substitutions and gene deletions/insertions.

연속적 차분 확장 기반 가역 DNA 워터마킹 (Consecutive Difference Expansion Based Reversible DNA Watermarking)

  • 이석환;권기룡
    • 전자공학회논문지
    • /
    • 제52권7호
    • /
    • pp.51-62
    • /
    • 2015
  • 대용량의 DNA 정보 저장, DNA 서열 저작권 보호를 위한 DNA 워터마킹, 및 비밀 통신을 위한 DNA 스테가노그라픽에 대한 관심이 증대되면서, 원본 DNA 서열의 기능 유지와 복원이 가능한 가역성 DNA 워터마킹이 필요하다. 본 논문에서는 비부호영역 DNA 서열을 이용한 DE(Difference expansion) 기반 가역 DNA 워터마킹 기법을 제안한다. 가역 DNA 워터마킹에서는 생물학적 기능 변경이 없고, 문자 형태의 서열 내에 대용량의 데이터를 은닉하여야 하며, 원본 DNA 서열이 복원되어야 한다. 제안한 방법에서는 문자 서열을 십진수 형태의 수치계수로 변환한 다음, 인접 수치 계수 쌍의 DE 기반 다중비트 은닉 방법(DE-MBE, DE based multiple bits embedding)과 이전 은닉 수치계수를 예측으로 한 연속 DE 기반 다중비트 은닉 방법들(C-DE-MBE, consecutive DE based multiple bits embedding)에 의하여 워터마크가 은닉된다. 은닉 과정에서는 워터마크된 서열에 의하여 부호영역을 나타내는 허위 시작코돈 발생을 방지하기 위하여 비교 탐색을 수행한다. 실험 결과로부터 제안한 방법이 기존 방법에 비하여 높은 은닉 용량을 가지며, 허위 시작코돈이 발생되지 않으며, 기준 서열없이 원본 DNA 서열이 복원됨을 확인하였다.

Home Network Electrical Appliance Control With The UPnP Expansion

  • Cho, Kyung-Hee;Lee, Sung-Joo;Chung, Hyun-Sook
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제7권2호
    • /
    • pp.127-131
    • /
    • 2007
  • The control of electrical appliances residing in the home network can be accomplished via Internet with the UPnP expansion without modifying an existing UPnP. In this paper, we propose the Internet Gateway that consists of an UPnP IGD(Internet Gateway Device) DCP(Device Control Protocol) and an UPnP Bridge as a system to control electrical appliances of home network. UPnP IGD DCP is to enable the configurable initiation and sharing of Internet connections as well as assuring advanced connection-management features and management of host configuration service. It also supports transparent Internet access by non-UPnP-certified devices. UPnP Bridge searches for local home network devices by sending control messages, while control point of UPnP Bridge looks up devices of interest on the Internet, subsequently furnishing the inter-networking controlling among devices which belong to different home network systems. With our approach, devices on one home network can control home electrical appliances on the other home network via Internet through IGD DCP with control commands of UPnP.

Evidence for a decelerating cosmic expansion from supernova cosmology

  • Lee, Young-Wook
    • 천문학회보
    • /
    • 제46권1호
    • /
    • pp.27.3-27.3
    • /
    • 2021
  • Supernova (SN) cosmology is based on the assumption that the width-luminosity relation (WLR) in the type Ia SN luminosity standardization would not vary with progenitor age. Unlike this expectation, recent age datings of stellar populations in host galaxies have shown significant correlations between progenitor age and Hubble residual (HR). It was not clear, however, how this correlation arises from the SN luminosity standardization process, and how this would impact the cosmological result. Here we show that this correlation originates from a strong progenitor age dependence of the WLR and color-luminosity relation (CLR), in the sense that SNe from younger progenitors are fainter each at given light-curve parameters x1 and c. This is reminiscent of Baade's discovery of two Cepheid period-luminosity relations, and, as such, causes a serious systematic bias with redshift in SN cosmology. We illustrate that the differences between the high-z and low-z SNe in the WLR and CLR, and in HR after the standardization, are fully comparable to those between the correspondingly young and old SNe at intermediate redshift, indicating that the observed dimming of SNe with redshift is most likely an artifact of over-correction in the luminosity standardization. When this systematic bias with redshift is properly taken into account, there is no evidence left for an accelerating universe, and the SN data now support a decelerating cosmic expansion. Since the SN cosmology has long been considered as the most direct evidence for an accelerating universe with dark energy, this finding poses a serious question to one of the cornerstones of the concordance model.

  • PDF

최소자승 예측오차 확장 기반 가역성 DNA 워터마킹 (Least Square Prediction Error Expansion Based Reversible Watermarking for DNA Sequence)

  • 이석환;권성근;권기룡
    • 전자공학회논문지
    • /
    • 제52권11호
    • /
    • pp.66-78
    • /
    • 2015
  • 바이오컴퓨팅 기술이 발전함에 따라 DNA 정보를 매개물로 한 DNA 워터마킹에 대한 연구가 이루어지고 있다. 그러나 DNA 정보는 일반 멀티미디어 데이터와는 달리 생물학적으로 중요한 정보이므로, 원본 DNA가 복원이 되는 가역성 DNA 워터마킹 기술이 필요하다. 본 논문에서는 최소자승 (Least square) 예측오차 확장 (prediction error expansion) 기반으로 비부호 DNA 서열의 가역성 워터마킹 기법을 제안한다. 제안한 방법에서는 비부호 영역의 4-문자 염기서열들을 인접한 개 염기에 의한 정수형 부호계수로 변환한다. 그리고 현재 부호계수에 대한 최소자승 예측 오차를 구한 다음, 예측오차 확장 조건에 따라 결정된 비트수만큼 예측오차를 확장한다. 이때 은닉된 인접 염기서열 간의 비교탐색을 통하여 허위개시코돈 생성을 방지한다. 실험 결과로부터 제안한 예측오차 확장 방법이 기존 방법과 평균 예측오차 확장 방법보다 높은 워터마크 용량을 가지며, 생물학적 변이 및 허위개시코돈이 발생되지 않음을 확인하였다.

An Intelligent Intrusion Detection Model

  • Han, Myung-Mook
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2003년도 ISIS 2003
    • /
    • pp.224-227
    • /
    • 2003
  • The Intrsuion Detecion Systems(IDS) are required the accuracy, the adaptability, and the expansion in the information society to be changed quickly. Also, it is required the more structured, and intelligent IDS to protect the resource which is important and maintains a secret in the complicated network environment. The research has the purpose to build the model for the intelligent IDS, which creates the intrusion patterns. The intrusion pattern has extracted from the vast amount of data. To manage the large size of data accurately and efficiently, the link analysis and sequence analysis among the data mining techniqes are used to build the model creating the intrusion patterns. The model is consist of "Time based Traffic Model", "Host based Traffic Model", and "Content Model", which is produced the different intrusion patterns with each model. The model can be created the stable patterns efficiently. That is, we can build the intrusion detection model based on the intelligent systems. The rules prodeuced by the model become the rule to be represented the intrusion data, and classify the normal and abnormal users. The data to be used are KDD audit data.

  • PDF

FMS 구축을 위한 제어 module 개발 (Development of control module for FMS construction)

  • 최홍태;배용환;박재홍;이석희
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1992년도 한국자동제어학술회의논문집(국내학술편); KOEX, Seoul; 19-21 Oct. 1992
    • /
    • pp.1090-1095
    • /
    • 1992
  • This paper describes the systematic control method of process information transfer and machine cell control in FMS implementation. We have constructed an experimental FMS computer network and control system. The system hardware consists of host computer to manage process data and information transfer of machine cells, cell control computers to control machine cells(NC lathe, machining center). On the other hand, software is made up of oredr management module, NC program searching and generation module, NC part program error check module and cell control module. In this study, we could arrive at conclusion as following : The first, each task could be accomplihed by the efficient information transfer in hierachical computer network. The second, data base system of part programs and process control data is needed for the efficint information transfer and production management. Lastly, expansion of FMS control system could be achieved by the hierachical and decentralized computer control system.

  • PDF

The Square Kilometre Array in Australia

  • Bock, Douglas C.J.
    • 천문학회보
    • /
    • 제37권2호
    • /
    • pp.63-63
    • /
    • 2012
  • The Square Kilometre Array (SKA) will be the world's largest and most sensitive radio telescope. It will address a wide range of fundamental questions in physics, astrophysics, cosmology and astrobiology. Australia, one of the two countries selected to host the SKA, has spent several years preparing by opening up the Murchison Radio-astronomy Observatory (MRO) as a uniquely radio quiet site in Western Australia, and by constructing the world's most powerful radio survey telescope, the Australian SKA Pathfinder (ASKAP). The SKA will be built in two phases. Phase I will include ASKAP, which will use novel phased-array feeds and grow to become "SKA-survey". Phase I will also include a dish array ("SKA-mid") in South Africa and a low-frequency array ("SKA-low") in Australia, and is slated for operation from about 2020. Phase II of the SKA will consist of further expansion of SKA-low and SKA-mid and is due for completion in the middle of the next decade.

  • PDF