• Title/Summary/Keyword: ID factor

Search Result 136, Processing Time 0.025 seconds

Effects of Gastrodia elata Blune Water Extract on RANKL-induced Osteoclast Differentiation (천마가 RANKL에 의해 유도된 파골세포의 분화에 미치는 효과)

  • Choi, Yun-Hong;Song, Jeong-Hoon;Jang, Sung-Jo;Kim, Jin-Kook;Choi, Min-Kyu
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.24 no.5
    • /
    • pp.807-813
    • /
    • 2010
  • Impairment of balance between bone-resorbing osteoclasts and bone-forming osteoblasts result in bone disease. Especially, increased osteoclast formation and activity are responsible for bone diseases such as osteoporosis, rheumatoid arthritis, periodontal disease. Natural metabolites of plants have recently received much attention as an alternative tools for the development of novel therapeutic strategy. The aim of this study was to search the natural products to inhibit osteoclast differentiation and was to evaluate of its mechanism. Water extract of Gastrodia elata Blune significantly inhibited receptor activator of nuclear factor-κB ligand (RANKL)-induced osteoclast differentiation in bone marrow macrophages (BMMs) in a dose dependent manner. However, water extract of Gastrodia elata Blune did not affect cytotoxicity when compared with control. The mRNA expression of c-Fos, NFATc1, and TRAP induced by RANKL was inhibited by water extract of Gastrodia elata Blune treatment. Also, water extract of Gastrodia elata Blune inhibited the protein expression of c-Fos and NFATc1 expression in BMMs treated with RANKL. Water extract of Gastrodia elata Blune suppressed the phosphorylation of p38 induced by RANKL. In general, RANKL considerably inhibited the expression level of Id2 and MafB known as negative regulators of osteoclastogenesis, but RANKL did not inhibit Id2 and MafB expression in BMMs when it was co-treated with Gastrodia elata Blune. Taken together, these results suggest that Gastrodia elata Blune may be a useful drug in the treatment of bone-related disease.

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks

  • Lu, Yanrong;Li, Lixiang;Peng, Haipeng;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1273-1288
    • /
    • 2016
  • With the swift growth of wireless technologies, an increasing number of users rely on the mobile services which can exchange information in mobile networks. Security is of key issue when a user tries to access those services in this network environment. Many authentication schemes have been presented with the purpose of authenticating entities and wishing to communicate securely. Recently, Chou et al. and Farash-Attari presented two ID authentication schemes. They both claimed that their scheme could withstand various attacks. However, we find that the two authentication schemes are vulnerable to trace attack while having a problem of clock synchronization. Additionally, we show that Farash-Attari's scheme is still susceptible to key-compromise impersonation attack. Therefore, we present an enhanced scheme to remedy the security weaknesses which are troubled in these schemes. We also demonstrate the completeness of the enhanced scheme through the Burrow-Abadi-Needham (BAN) logic. Security analysis shows that our scheme prevents the drawbacks found in the two authentication schemes while supporting better secure attributes. In addition, our scheme owns low computation overheads compared with other related schemes. As a result, our enhanced scheme seems to be more practical and suitable for resource-constrained mobile devices in mobile networks.

TGF-β Signaling and miRNAs Targeting for BMP7 in the Spleen of Two Necrotic Enteritis-Afflicted Chicken Lines

  • Truong, Anh Duc;Hong, Yeojin;Lee, Janggeun;Lee, Kyungbaek;Lillehoj, Hyun S.;Hong, Yeong Ho
    • Korean Journal of Poultry Science
    • /
    • v.44 no.3
    • /
    • pp.211-223
    • /
    • 2017
  • Transforming growth factor beta ($TGF-{\beta}$) signaling pathways are involved in the regulation of proliferation, differentiation, immunity, survival, and apoptosis of many cells. The aim of this study was to investigate the differential expression of $TGF-{\beta}$-related genes, and their interactions and regulators in the spleen of two genetically disparate chicken lines (Marek's disease resistant line 6.3 and Marek's disease-susceptible line 7.2) induced with necrotic enteritis (NE) by Eimeria maxima and Clostridium perfringens infection. By using high-throughput RNA-sequencing, we investigated 76 $TGF-{\beta}$-related genes that were significantly and differentially expressed in the spleens of the chickens. Approximately 20 $TGF-{\beta}$ pathway genes were further verified by qRT-PCR, and the results were consistent with our RNA sequencing data. All 76 identified genes were analyzed through Gene Ontology and mapped onto the KEGG chicken $TGF-{\beta}$ pathway. Our results demonstrated that several key genes, including $TGF-{\beta}$1-3, bone morphogenetic proteins (BMP)1-7, inhibitor of differentiation (ID) proteins ID1-3, SMAD1-9, and Jun, showed a markedly differential expression between the two chicken lines, relative to their respective controls. We then further predicted 24 known miRNAs that targeted BMP7 mRNA from 139 known miRNAs in the two chicken lines. Among these, six miRNAs were measured by qRT-PCR. In conclusion, this study is the first to analyze most of the genes, interactions, and regulators of the $TGF-{\beta}$ pathway in the innate immune responses of NE afflicted chickens.

A Divalent Immunotoxin Formed by the Disulfide Bond between Hinge Regions of Fab Domain

  • Choe, Seong Hyeok;Kim, Ji Eun;Lee, Yong Chan;Jang, Yeong Ju;Choe, Mu Hyeon
    • Bulletin of the Korean Chemical Society
    • /
    • v.22 no.12
    • /
    • pp.1361-1365
    • /
    • 2001
  • Recombinant immunotoxins are hybrid cytotoxic proteins designed to selectively kill cancer cells. A divalent immunotoxins, [B3(FabH1)-PE38]2, was constructed by recombining Fab domain of B3 antibody as a cell-targeting domain and Pseudo monas exotoxin A (PE) as a cytotoxic domain. Monoclonal antibody, B3, is the murine antibody (IgG1k) directed against Lewis Y-related carbohydrate antigens, which are abundant on the surface of many carcinomas. Fab fragment of this antibody was used in this study with the modified hinge sequence where last two cysteines out of three were mutated to serine. PE is a 66 kDa bacterial toxin that kills eukaryotic cells by inhibiting protein synthesis with ADP ribosylation of ribosomal elongation factor 2 (EF2). Fc region of B3 antibody was substituted with the truncated form of PE (38 kDa, PE38) on DNA level. [B3(FabH1)-PE38]2 was formed by disulfide bond between cysteines in the modified hinge region of B3(FabH1)-PE38. Each polypeptide for recombinant immunotoxins was overexpressed in Escherichia coli and collected as inclusion bodies. Each inclusion body was solubilized and refolded, and cytotoxic effects were measured. Divalent immunotoxins, [B3(FabH1)-PE38]2, had ID50 values of about 10 ng/mL on A431 cell lines and about 4 ng/mL on CRL1739 cell lines. Control immunotoxins, B3(scFv)-PE40, had ID50 values of about 28 ng/mL on A431 cell lines and about 41 ng/mL on CRL1739 cell lines. Divalent immunotoxins, [B3(FabH1)-PE38]2, had higher cytotoxic effects than B3(scFv)-PE40 control immunotoxins.

A Study of Authentication of Using Multi-factor (다중체계 인증을 이용한 중요 시스템 보안 접근에 관한 연구)

  • Choi, Byeong-Hun;Kim, Sang-Geun;Bae, Je-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.73-80
    • /
    • 2009
  • Internet accidents have skyrocketed every year. It always has been threatened by the methods such as hacking and Spyware. The majority of security accident is formed of the loss of authentication information, and the internal user who is not authorized. The importance of security is also emphasized when someone tries to do something accessing to the main information system. Accordingly, Biometrics has been used in many ways. OTP, however, must have a few devices accessing to several systems, and Biometrics involve some risk of mis-recognition rate and mis-denial rate. It also has the risk possible to access to the main information system when losing OTP. This research reduced risks about the loss as separating RFID leader for mobile, Tag and the accessor's cellular phone, and is about pseudo random validation key generated from the administration system through contact with RFID leader for mobile and Tag. As sending the key to user's cell phone which is already registered, security is strengthened more than existing connection methods through the ID and password. RFID for mobile not generalized to the present has been studied as a tool accessing to the main information system.

A Study on the Fingerprint Recognition Algorithm Using Enhancement Method of Fingerprint Ridge Structure

  • Jung, Yong-Hoon;Roh, Jeong-Serk;Rhee, Sang-Burm
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1788-1793
    • /
    • 2003
  • The present of state is situation that is realized by necessity of maintenance of public security about great many information is real condition been increasing continually in knowledge info-age been situating in wide field of national defense, public peace, banking, politics, education etc. Also, loss or forgetfulness, and peculation by ID for individual information and number increase of password in Internet called that is sea of information is resulting various social problem. By alternative about these problem, including Biometrics, several authentication systems through sign(Signature), Smart Card, Watermarking technology are developed. Therefore, This paper shows that extract factor that efficiency can get into peculiar feature in physical features for good fingerprint recognition algorithm implementation with old study finding that take advantage of special quality of these fingerprint.

  • PDF

A Study on Mobile OTP Generation Model (모바일 OTP 생성 모델에 관한 연구)

  • Jeong, Yoon-Su;Han, Sang-Ho;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.183-191
    • /
    • 2012
  • This study proposes dual certification model using both what users know and what users own. In detail, this mobile OTP generation model is made up of mobile OTP generation and extraction algorithm satisfying the conditions for reviewing mobile OTP implementation. In order to improve the security of the existing OTP-based systems, the suggested method utilizes user's ID and random number at the mobile OTP generation stage.

The study of the relationship between the similarity of cognitive map and the mental workload (인지지도 유사도와 정신적 작업부하와의 관계에 대한 연구)

  • Yu, Seung-Dong;Park, Peom
    • Journal of the Ergonomics Society of Korea
    • /
    • v.21 no.3
    • /
    • pp.47-58
    • /
    • 2002
  • The similarity of shape of shape of interface between human cognitive map and real product is the important factor to determine the human performance. Nevertheless, the degree of similarity between these has not been defined quantitatively in recent studies. Therefore, in this study, the cognitive map and the mental workload were measured by SMM(Sketch Map Method) and RNASA-TLX(Revision of NASA-Task Load Index). And the numerical expression of the accuracy point was suggested for the quantitative calculation of relative positional similarity between cognitive map and real product. In the experiment, nine subjects were participated and two kinds of vehicles were used. Mental workload was mental workload was measured immediately after the road test. The result of analysis on the relationship between accuracy and mental workload shows that the negative correlation exists on each vehicle, and the lower score of mental workloads id measured on the vehicle that has the higher score of accuracy between two vehicles.

Air-Conditioner Power Source device to meet the Harmonic guide lines (에어컨 전원장치의 고조파 저감)

  • Mun Sang-Pil;Suh Ki-Young;Lee Hyun-Woo;Kim Young-Mun
    • Proceedings of the KIPE Conference
    • /
    • 2001.12a
    • /
    • pp.171-174
    • /
    • 2001
  • This paper proposes a nonlinear impedance circuit composed by diodes and inductors or capacitors. This circuit needs no control circuits and switches, and the impedance .value is changed by the polarity of current or voltage. and this paper presents one of these applications to improve the input current of capacitor input diode rectifiers. The rectifier using the nonlinear impedance circuit id constructed with four diodes and four capacitors in addition to the conventional rectifiers, that is, it has eight diodes and five capacitors, including a DC link capacitor. It makes harmonic components of the input current reduce and the power factor improve. A circuit design method is shown by experimentation and confirmed simulation. It explained that compared conventional pulse width modulated (PWM) inverter with half pulse-width modulated (HPWM) inverter. Proposed HPWM inverter eliminated dead-time by lowering switching loss and holding over-shooting.

  • PDF

A study on air-conditioner single-phase voltage-doubler converter circuit (에어컨용 단상 배전압 컨버터 회로에 관한 연구)

  • Mun, Sang-Pil;Suh, Ki-Young;Lee, Hyun-Woo;Kim, Young-Mun
    • Proceedings of the KIEE Conference
    • /
    • 2001.07b
    • /
    • pp.1044-1048
    • /
    • 2001
  • This paper proposes a nonlinear impedance circuit composed by diodes and inductors or capacitors. This circuit needs no control circuits and switches, and the impedance value is changed by the polarity of current or voltage. This paper presents one of these applications to improve the input current of capacitor input diode rectifiers. The rectifier using the nonlinear impedance circuit id constructed with four diodes and four capacitors in addition to the conventional rectifiers, that is, it has eight diodes and five capacitors, including a DC link capacitor. It makes harmonic components of the input current reduce and the power factor improve. A circuit design method is shown by experimentation and confirmed simulation. It explained that compared conventional pulse-width modulated (PWM)inverter with half pulse-width modulated (HPWM) inverter proposed HPWM inverter eliminated dead-time by lowering switching loss and holding over-shooting.

  • PDF