• Title/Summary/Keyword: Id

Search Result 2,856, Processing Time 0.036 seconds

Effects of ID-CBT5101 in Preventing and Alleviating Osteoarthritis Symptoms in a Monosodium Iodoacetate-Induced Rat Model

  • Sim, Boo-Yong;Choi, Hak-Joo;Kim, Min-Goo;Jeong, Dong-Gu;Lee, Don-Gil;Yoon, Jong-Min;Kang, Dae-Jung;Park, Soobong;Ji, Joong-Gu;Joo, In-Hwan;Kim, Dong-Hee
    • Journal of Microbiology and Biotechnology
    • /
    • v.28 no.7
    • /
    • pp.1199-1208
    • /
    • 2018
  • Osteoarthritis is a disease that affects the articular cartilage and osseous tissue, and can be worsened by aging, overweight status, and post-traumatic arthritis. The present study aimed to evaluate the effect of ID-CBT5101 (tyndallized Clostridium butyricum) on bone metabolism and the inflammatory response in a monosodium iodoacetate-induced rat model of osteoarthritis. ID-CBT5101 was administered orally at doses of $10^8$ or $10^{10}CFU/day$ for 2 weeks before direct injection of monosodium iodoacetate ($3mg/50{\mu}l$ of 0.9% saline) into the intra-articular space of the rats' right knees. The rats subsequently received the same doses of oral ID-CBT5101 for another 4 weeks. We evaluated the treatment effects based on serum biomarkers, mRNA expression, morphological and histopathological analyses of the knee joints, and weight-bearing distribution analysis. Compared with those in control rats, the ID-CBT5101 treatments significantly reduced the serum concentration of inflammation and bone metabolism markers (i.e., COX-2, IL-6, $LTB_4$, and COMP), and significantly increased the concentration of $IFN-{\gamma}$ and glycosaminoglycans. In addition, the ID-CBT5101 treatments inhibited the mRNA expression of matrix metalloproteinases and tissue inhibitors of metalloproteinases (i.e., MMP-2, MMP-3, MMP-9, MMP-13, TIMP-1, and TIMP-2). Furthermore, the ID-CBT5101 treatments effectively preserved the knee cartilage and synovial membrane, and significantly decreased the amount of fibrous tissue. Moreover, compared with that of the negative control group, the ID-CBT5101 treatments increased the weight-bearing distribution by ${\geq}20%$. The results indicate that ID-CBT5101 prevented and alleviated osteoarthritis symptoms. Thus, ID-CBT5101 may be a novel therapeutic option for the management of osteoarthritis.

Physiological activities of Agrimonia pilosa extract (짚신나물(Agrimonia pilosa) 추출물의 생리활성)

  • Kim, Hyun-Soo
    • Food Science and Preservation
    • /
    • v.22 no.2
    • /
    • pp.261-266
    • /
    • 2015
  • In this study, we investigated the applicability of functional materials by examining various physiological activities with an extract from the Agrimonia pilosa root. The A. pilosa extract showed low cytotoxicity against murine melanoma B16F10 cells. With little or no cytotoxicity at various concentrations, the A. pilosa extract showed high levels of DPPH radical scavenging activity ($ID_{50}$, 20.70 mg/L) and anti-microbial activity against Bacillus subtilis, Escherichia coli, and Candida albicans. In particular, it had a high level of anti-microbial activities against Gram-positive bacteria. These results suggest that the A. pilosa extract can be used as a natural preservative. It also showed inhibition of tyrosinase activity ($ID_{50}$, 90.18 mg/L), as does kojic acid ($ID_{50}$, 89.13 mg/L), and especially, a higher decrease in melanin content ($ID_{50}$, 62.5 mg/L) than the arbutin level ($ID_{50}$, 100.7 mg/L) as a positive control. These findings suggest that the A. pilosa extract inhibits melanin synthesis by suppressing the intracellular tyrosinase expression. These results indicate that the A. pilosa extract may be an effective material for functional cosmetics, such as skin whitening materials.

A Strong Anonymity Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 강한 익명성 지원 구조)

  • Lee, Jung-Hyun;Kim, Tae-Yeon;Cho, Gi-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.11 no.3
    • /
    • pp.139-148
    • /
    • 2010
  • In the sensor network security area, previous works were mainly concentrated on achieving authentication, confidentiality, integrity and availability. But the ID exposure issue is recently an increasing concern in research community. To protect the ID exposure from various attacks, the most common approach is to make use of a dynamic pseudonym rather than the real ID. However, if a node's secret key (or hash key) and the current pseudonym (such as a random number) are exposed, the attacker can easily generate the previous/next pseudonyms. In this paper, we propose a security infra-structure scheme for enabling strong anonymity of sensor nodes. Our scheme ensures that the probability being able to generate a pseudonym is very low even if a sensor node has been compromised with an attacker. Security analyses have proven that our scheme is suitable for sensor network environments in terms of preserving of forward anonymity as well as backward anonymity.

Preventing ID Mapping Attacks on DHT Networks through Non-Voluntary Node Locating (비 자율적 노드 위치 결정을 통한 DHT 네트워크 ID 매핑 공격 방지)

  • Lee, Cheolho;Choi, Kyunghee;Chung, Kihyun;Kim, Jongmyung;Yun, Youngtae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.695-707
    • /
    • 2013
  • DHT(Distributed Hash Table) networks such as Kademlia are vulnerable to the ID mapping attack caused by the voluntary DHT mapping structure where the location of a node is solely determined by itself on the network topology. This causes security problems such as eclipse, DRDoS and botnet C&C on DHT networks. To prevent ID mapping attacks, we propose a non-voluntary DHT mapping scheme and perform analysis on NAT compatibility, attack resistance, and network dynamicity. Analysis results show that our approach may have an equivalent level of attack resistance comparing with other defense mechanisms and overcome their limitations including NAT compatibility and network dynamicity.

ID-based Tripartite Multiple Key Agreement Protocol Combined with Key Derivation Function (키 유도함수를 결합한 ID 기반 3자 복수키 동의 프로토콜)

  • Lee Sang-Gon;Lee Hoon-Jae
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.133-142
    • /
    • 2006
  • The purpose of the multiple key agreement protocol is to get efficiency in computational and communicational aspects compared to multiple executions of single key agreement protocol. However ID based tripartite multiple key agreement protocols have been proposed, it is reported that they can not resist unknown key-share attack or impersonation attack. How to design a secure and efficient ID-based authenticated tripartite multiple key agreement scheme to prevent all kinds of attacks remains an open problem. This paper proposes a multiple key agreement scheme combing the existing single key agreement protocol with a key derivation function. The proposed scheme can not only increase computational efficiency compared to the existing multiple key agreement protocol, but can ensure security of the proposed schemes by using a security proofed single key agreement protocol and key derivation function.

  • PDF

Differential Selection by Nematodes of an Introduced Biocontrol Fungus vs. Indigenous Fungi in Nonsterile Soil

  • Kim, Tae Gwan;Knudsen, Guy R.
    • Journal of Microbiology and Biotechnology
    • /
    • v.28 no.5
    • /
    • pp.831-838
    • /
    • 2018
  • Trophic interactions of introduced biocontrol fungi with soil animals can be a key determinant in the fungal proliferation and activity. This study investigated the trophic interaction of an introduced biocontrol fungus with soil nematodes. The biocontrol fungus Trichoderma harzianum ThzID1-M3 and the fungivorous nematode Aphelenchoides sp. (10 per gram of soil) were added to nonsterile soil, and microbial populations were monitored for 40 days. Similar results were obtained when the experiment was duplicated. ThzID1-M3 stimulated the population growth of indigenous nematodes (p < 0.05), regardless of whether Aphelenchoides sp. was added. Without ThzID1-M3, indigenous nematodes did not increase in number and the added Aphelenchoides sp. nematodes almost disappeared by day 10. With ThzID1-M3, population growth of nematodes was rapid between 5 and 10 days after treatment. ThzID1-M3 biomass peaked on day 5, dropped at day 10, and then almost disappeared at day 20, which was not influenced by the addition of nematodes. In contrast, a large quantity of ThzID1-M3 hyphae were present in a heat-treated soil in which nematodes were eliminated. Total fungal biomass in all treatments peaked on day 5 and subsequently decreased. Addition of nematodes increased the total fungal biomass (p < 0.05), but ThzID1-M3 addition did not affect the fungal biomass. Hyphae of total fungi when homogenously distributed did not support the nematode population growth; however, hyphae of the introduced fungus did when densely localized. The results suggest that soil fungivorous nematodes are an important constraint on the hyphal proliferation of fungal agents introduced into natural soils.

Implementation of a very small 13.56[MHz] RFID Reader ensuring machine ID recognition in a noise space within 3Cm (3Cm 이내의 잡음 공간 속 기계 ID 인식을 보장하는 초소형 13.56[MHz] RFID Reader의 구현)

  • Park, Seung-Chang;Kim, Dae-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.27-34
    • /
    • 2006
  • This paper has implemented a very small($1.4{\times}2.8[Cm^2]$) 13.56[MHz] RFID reader ensuring machine ID recognition correctly in a noise space of Tag-to-Reader within 3Cm. For operation of the RFID system, at first, this paper has designed the loop antenna of a reader and the fading model of back-scattering on microwave propagation following to 13.56[MHz] RFID Air Interface ISO/IEC specification. Secondly, this paper has proposed the automatically path selected RF switching circuit and the firmware operation relationship by measuring and analyzing the very small RFID RF issues. Finally, as a very small reader main body, this paper has shown the DSP board and software functions made for extraction of $1{\sim}2$ machine ID information and error prevention simultaneously with carrying of 13.56[MHz] RFID signals that the international standard specification ISO/IEC 18000-3 defined.

EMQT : A Study on Enhanced M-ary Query Tree Algorithm for Sequential Tag IDs (연속적인 태그 ID들을 위한 M-ary 쿼리 트리 알고리즘의 향상에 관한 연구)

  • Yang, Dongmin;Shin, Jongmin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.435-445
    • /
    • 2013
  • One of the most challenging issues in radio frequency identification (RFID) and near field communications (NFC) is to correctly and quickly recognize a number of tag IDs in the reader's field. Unlike the probabilistic anti-collision schemes, a query tree based protocol guarantees to identify all the tags, where the distribution of tag IDs is assumed to be uniform. However, in real implements, the prefix of tag ID is uniquely assigned by the EPCglobal and the remaining part is sequentially given by a company or manufacturer. In this paper, we propose an enhanced M-ary query tree protocol (EMQT), which effectively reduces unnecessary query-response cycles between similar tag IDs using m-bit arbitration and tag expectation. The theoretical analysis and simulation results show that the EMQT significantly outperforms other schemes in terms of identification time, identification efficiency and communications overhead.

Study on Scalable Video Coding Signals Transmission Scheme using LED-ID System (LED-ID 시스템을 이용한 SVC 신호의 전송 기법에 관한 연구)

  • Lee, Kyu-Jin;Cha, Dong-Ho;Hwang, Sun-Ha;Lee, Kye-San
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10B
    • /
    • pp.1258-1267
    • /
    • 2011
  • In this paper, using the indoor LED-ID communication system have researched for how to transmit video signals. In LED-ID communications use the LEDs for lighting features at the same time communication is an effective way to implement. This proposed system using Visible light(RGB) as way to transmit signals, depends on the mixture RGB, which decided the color of light, moreover, each things determined their performance. However, if the video signal were fixed allocated RGB to transmit such as the original system, the importance of the each signals a different occur the limit on the quality of the video than SVC signals. In order to solve this problem in this paper, according to the RGB mixture ratios analyze the performance for the White LED, which analyzed based on allocating the SVC signal by transmitting to improve the quality of the video was about how researched.

OpenID Based User Authentication Scheme for Multi-clouds Environment (멀티 클라우드 환경을 위한 OpenID 기반의 사용자 인증 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.215-223
    • /
    • 2013
  • As cloud computing is activated, a variety of cloud services are being distributed. However, to use each different cloud service, you must perform a individual user authentication process to service. Therefore, not only the procedure is cumbersome but also due to repeated authentication process performance, it can cause password exposure or database overload that needs to have user's authentication information each cloud server. Moreover, there is high probability of security problem that being occurred by phishing attacks that result from different authentication schemes and input scheme for each service. Thus, when you want to use a variety of cloud service, we proposed OpenID based user authentication scheme that can be applied to a multi-cloud environment by the trusted user's verify ID provider.