• Title/Summary/Keyword: P2Y2

Search Result 86,156, Processing Time 0.088 seconds

In Vitro Construction and Characterization of the Bacteriophage P4 Derivative, P4 sid71 cosP2, Containing the Bacteriophage P2 cos Region (박테리오파지 P2의 cos 지역을 함유하는 박테리오파지 P4 유도체인 P4 sid71 cosP2의 In vitro 조성과 정성 연구)

  • Kim, Kyoung-Jin
    • Korean Journal of Microbiology
    • /
    • v.49 no.1
    • /
    • pp.99-104
    • /
    • 2013
  • Bacteriophage P2 sir mutants are inefficient helpers for their satellite bacteriophage P4. The term, "P2 sir-associated helper inefficiency" has been used to define this phenomenon and it has been suggested that the DNA sequence difference between the cos region of P2 and that of P4 is responsible. To test this hypothesis, P4 derivative phage, P4 sid71 cosP2, containing the cos region of P2 and sid71 allele was constructed through several in vitro DNA manipulation steps. Its burst size was determined using a one-step growth experiment. The results showed that the substitution of the cos region of P2 for the cos region of P4 in P4 sid71 cosP2 overcame "P2 sir-associated helper inefficiency". P4 sid71 cosP2 stock phages prepared with P2 wild type helper and P2 sir helper were analyzed using a CsCl buoyant equilibrium density gradient experiment. The results revealed that the phage particles containing three copies of the P4 genome were the predominant particles in both cases.

The Stimulatory Effect of P2Y6 Receptor Antagonist on RANKL-induced Osteoclastogenesis (P2Y6 수용체 길항제의 파골세포 분화 촉진 효과 규명)

  • Noh, A Long Sae Mi;Moon, Miran;Yim, Mijung
    • YAKHAK HOEJI
    • /
    • v.59 no.5
    • /
    • pp.207-214
    • /
    • 2015
  • P2Y receptors, a type of P2 receptor family, are G-protein coupled receptors and 8 subtypes have been characterized ($P2Y_1$, $P2Y_2$, $P2Y_4$, $P2Y_6$, $P2Y_{11-14}$). Recently, several studies have shed light on the role of P2Y receptors in bone biology. Among them, little is known on the role of $P2Y_6$ receptor on osteoclast differentiation. Thus, we investigated the role of $P2Y_6$ receptor on osteoclastogenesis using $P2Y_6$ receptor selective antagonist, MRS 2578. When osteoblasts and bone marrow cells were co-cultured in the presence of $VitD_3$ and $PGE_2$, $P2Y_6$ antagonist increased the formation of TRAP positive osteoclasts. To elucidate the target cells of $P2Y_6$ antagonist, we first checked the effect of MRS 2578 on osteoblasts. Treatment of MRS 2578 did not affect OPG : RANKL mRNA ratio in osteoblasts. Next, we checked the effects of $P2Y_6$ antagonist on osteoclast precursors using mouse bone marrow macrophages (BMMs). Addition of MRS 2578 increased the number of osteoclasts in RANKL-treated BMMs. Although $P2Y_6$ antagonist had no effect on RANKL-induced NFATc1, c-Fos and MafB expression levels, it significantly stimulated RANKL-induced Blimp1 mRNA expression in BMMs. Taken together, these data indicate that $P2Y_6$ antagonist increases osteoclast formation by upregulation of Blimp1 expression.

Joint Buying P2P System for User Convenient Social Network (사용자 편의적 소셜 네트워크 공동구매 P2P 시스템)

  • Kim, Boon-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.915-920
    • /
    • 2011
  • P2P technology is the concept to share resources efficiently in distributed environments that a lot of research is underway. a lot. In these P2P systems, the server to support the contents-information have less overloads than the composed system as the server to have resources generally. In this paper, we suggest a P2P system to support conveniences to choice time for users that were connected with the information of joint-buying based on social network. Social networks based on co-purchasing information and price alerts using the P2P system is provided by the peer, this relay information is provided by the P2P server.

P2P System for Simultaneous Support of Menu and Social Network Joint Buying Information (메뉴와 소셜 네트워크 공동구매 정보 동시제공 P2P 시스템)

  • Kim, Boon-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.3
    • /
    • pp.445-449
    • /
    • 2011
  • A P2P technique is the concept to share sources efficiently in distributed environment that is studying a lot. In these P2P systems, the server to support the contents-information have less overloads than the composed system as the server to have resources generally. In this paper, we suggest a P2P system to support conveniences for users that were connected with the information of joint-buying based on social network. The joint-buying information based on social network is supported by peers using a p2p system and these information to intermediate are supported by a P2P server.

EMBEDDING OF WEIGHTED $L^p$ SPACES AND THE $\bar{\partial}$-PROBLEM

  • Cho, Hong-Rae
    • East Asian mathematical journal
    • /
    • v.19 no.1
    • /
    • pp.73-80
    • /
    • 2003
  • Let D be a bounded domain in $\mathbb{C}^n$ with $C^2$ boundary. In this paper, we prove the following inequality $${\parallel}u{\parallel}_{p_2,{\alpha}_2}{\lesssim}{\parallel}u{\parallel}_{p_1,{\alpha}_1}+{\parallel}\bar{\partial}u{\parallel}_{p_1,{\alpha}_1+p_1}/2$$, where $1{\leq}p_1{\leq}p_2<\infty,\;{\alpha}_j>0,(n+{\alpha}_1)/p_1=(n+{\alpha}_1)/p_1=(n+{\alpha}_2)/p_2$, and $1/p_2{\geq}1/p_1-1/2n$.

  • PDF

Cross-Correlation Distribution of a p-ary m-Sequence Family Constructed by Decimation (Decimation에 의해 생성된 p-진 m-시퀀스 군의 상호 상관 값의 분포)

  • Seo, Eun-Young;Kim, Young-Sik;No, Jong-Seon;Shin, Dong-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9C
    • /
    • pp.669-675
    • /
    • 2008
  • For an odd prime p, n=4k and $d=((p^2k+1)/2)^2$, there are $(p^{2k}+1)/2$ distinct decimated sequences, s(dt+1), $0{\leq}l<(p^{2k}+1)/2$, of a p-ary m-sequence, s(t) of period $p^n-1$. In this paper, it is shown that the cross-correlation function between s(t) and s(dt+l) takes the values in $\{-1,-1{\pm}\sqrt{p^n},-1+2\sqrt{p^n}\}$ and their, cross-correlation distribution is also derived.

Network load balancing and system construction of the Internet system which is based on P2P (P2P기반 인터넷 부하 분산 시스템 구축)

  • 이정환
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.716-719
    • /
    • 2003
  • P2P (Peer to Peer) is part that is discussed much in the latest Internet and is interested. P2P changes the structure of Client-Server into Information sharing between client that is the structure of p2p. But perfect P2P system has many problems awaiting solution. In this treatise we can realize network communication to compose one virtual server and one virtual client which is intergrated several client and distributed computer that decentralize network traffic into the traffic of several pc by sharing resource and cpu between client. Our nam purpose is not real P2P system but realization, organization of the P2P internet system which is composed by distributed computing and network load balancing in P2P internet system environment.

  • PDF

Measurement and Analysis of P2P Traffic in Campus Networks Under Firewall (방화벽이 존재하는 캠퍼스 망에서의 P2P 트래픽 측정 및 분석)

  • Lee, Young-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.750-757
    • /
    • 2005
  • This paper reports on the study of P2P traffic behaviors in a high-speed campus network under a simple firewall which drops packets with default port numbers for the well-blown P2P applications. Among several ways of detecting P2P traffic, the easiest method is to filter out packets with the default port number of each P2P application. After deploying the port-based firewall against P2P-traffic, it is expected that the amount of P2P traffic will be decreased. However, during the eight-month measurement period, three new commercial P2P applications have been identified and their traffic usages have reached up to $30/5.6\%$ of the total outbound/inbound traffic volumes at the end of the measurement period. In addition, the most famous P2P application, eDonkey, has adapted and has escaped detection through port hopping. The measurement result shows that the amount of eDonkey traffic is around $6.7/4.0\%$ of the total outbound/inbound traffic volume. From the measurement results, it is observed that the port-based firewall is not effective to limit the usage of P2P applications and that the P2P traffic is steadily growing due to not only the evolution of existing P2P applications such as port hopping but also appearances of new P2P applications.

Analyzing cinematic consumption patterns of the p2p users (P2P 영화파일공유 이용자의 영화소비패턴 분석)

  • Yi, Sun-Hi;Choe, Soo-Young
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.728-736
    • /
    • 2007
  • P2P 파일공유는 1999년 처음 등장한 이래 저작권 침해로 디지털 콘텐츠 시장을 파괴하는 '해적'으로 간주 되어왔다. 하지만 최근 들어 P2P 시장의 산업적 가능성을 새롭게 주목하는 움직임이 나타나고 있다. 아울러 학계에서는 P2P의 경제적 영향력을 공급자 편향의 시각이 아닌 소비자 측면을 포함한 균형적 관점으로 바라보기 시작했다. 본 연구 역시 균형적 관점에서 P2P를 바라보려는 접근법의 일환으로, P2P 영화파일 공유 이용자들의 영화소비패턴을 실증적으로 살펴보고자 하였다. 실제 P2P 영화파일 공유 이용자들에 대한 설문결과, 이용자들은 단일한 영화소비성향을 가지고 있지 않았으며 다운로드와 극장 관람빈도가 모두 높은 이른바 '얼리어답터'형과 다운로드를 극장관람의 대체재로 여기는 소위 '해적'형이 공존하고 있었다. 이 중 그간 산업계에서 우려하던 해적형의 비율은 10% 정도로 낮았고, 대부분의 P2P 이용자들은 오히려 일반 극장 관람객보다 더 적극적으로 극장소비를 하는 사람들로 영화산업에 긍정적인 기여를 하는 것으로 밝혀졌다. 이러한 소비자 분석결과는 향후 본격화되고 있는 P2P 다운로드 유료화 시장에 대한 전망을 밝게 하는 것으로, 현재 유료화에 있어 가장 중시해야 할 것은 불법 무료 다운로드에 대한 경계가 아니라, 소비자 편의적인 시스템의 개발임을 시사한다.

  • PDF

Risk Analysis on Vulnerabilities and Threats for Domestic P2P Service Environments (국내 P2P 서비스 환경 하에서의 보안 취약점 및 위협 요소 분석)

  • Shin, Weon;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1447-1454
    • /
    • 2012
  • Recently P2P is the most popular network service on Internet and is applied various areas such as streaming, file sharing and software distribution, but there are many security threats depending on vulnerabilities by P2P network environments. Conceptually P2P network is a overlay network based on Internet, and it has security concerns of itself as well as those of Internet environments. In this paper, we analyze the vulnerabilities and threats for domestic P2P services through various experiments and describe their risk analysis. We expect that this work contributes to new domestic P2P services in consideration of service qualities and security vulnerabilities.