• Title/Summary/Keyword: STAMP

Search Result 447, Processing Time 0.027 seconds

MicroRNA-26a Regulates RANKL-Induced Osteoclast Formation

  • Kim, Kabsun;Kim, Jung Ha;Kim, Inyoung;Lee, Jongwon;Seong, Semun;Park, Yong-Wook;Kim, Nacksung
    • Molecules and Cells
    • /
    • v.38 no.1
    • /
    • pp.75-80
    • /
    • 2015
  • Osteoclasts are unique cells responsible for the resorption of bone matrix. MicroRNAs (miRNAs) are involved in the regulation of a wide range of physiological processes. Here, we examined the role of miR-26a in RANKL-induced osteoclastogenesis. The expression of miR-26a was upregulated by RANKL at the late stage of osteoclastogenesis. Ectopic expression of an miR-26a mimic in osteoclast precursor cells attenuated osteoclast formation, actin-ring formation, and bone resorption by suppressing the expression of connective tissue growth factor/CCN family 2 (CTGF/CCN2), which can promote osteoclast formation via upregulation of dendritic cell-specific transmembrane protein (DC-STAMP). On the other hand, overexpression of miR-26a inhibitor enhanced RANKL-induced osteoclast formation and function as well as CTGF expression. In addition, the inhibitory effect of miR-26a on osteoclast formation and function was prevented by treatment with recombinant CTGF. Collectively, our results suggest that miR-26a modulates osteoclast formation and function through the regulation of CTGF.

A real-time sorting algorithm for in-beam PET of heavy-ion cancer therapy device

  • Ke, Lingyun;Yan, Junwei;Chen, Jinda;Wang, Changxin;Zhang, Xiuling;Du, Chengming;Hu, Minchi;Yang, Zuoqiao;Xu, Jiapeng;Qian, Yi;She, Qianshun;Yang, Haibo;Zhao, Hongyun;Pu, Tianlei;Pei, Changxu;Su, Hong;Kong, Jie
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3406-3412
    • /
    • 2021
  • A real-time digital time-stamp sorting algorithm used in the In-Beam positron emission tomography (In-Beam PET) is presented. The algorithm is operated in the field programmable gate array (FPGA) and a small amount of registers, MUX and memory cells are used. It is developed for sorting the data of annihilation event from front-end circuits, so as to identify the coincidence events efficiently in a large amount of data. In the In-Beam PET, each annihilation event is detected by the detector array and digitized by the analog to digital converter (ADC) in Data Acquisition Unit (DAQU), with a resolution of 14 bits and sampling rate of 50 MS/s. Test and preliminary operation have been implemented, it can perform a sorting operation under the event count rate up to 1 MHz per channel, and support four channels in total, count rate up to 4 MHz. The performance of this algorithm has been verified by pulse generator and 22Na radiation source, which can sort the events with chaotic order into chronological order completely. The application of this algorithm provides not only an efficient solution for selection of coincidence events, but also a design of electronic circuit with a small-scale structure.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.

Design and Implementation of The Vehicle Tracking Applications using Geospatial Query (공간 정보 질의를 이용한 차량 추적 애플리케이션의 설계 및 구현)

  • Ilham, Anugrah Moch;Jung, Jin-uk;Jin, Kyo-Hong;Hwang, Min-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.6
    • /
    • pp.637-644
    • /
    • 2019
  • In recent years, many public safety systems in the smart city are developed. These systems are taking responsibility to make a safe and comfortable city. In this paper, we propose vehicle tracking systems include a public safety system that enables the policeman to track the stolen vehicles more efficiently by providing the vehicle information in real time. When a vehicle is stolen, the vehicle owner can send a user emergency request. Then, the public safety server which supported by a geospatial query technique will give information such as time, distance, and routes to a policeman who is closest to the location of the vehicle to catch the thief. 300 simulations were performed to evaluate the performance of the system. We found that the average of times required when vehicle owner send a user emergency message on user application until policeman obtain a vehicle tracking request on police application below 1.2 seconds.

DoS-Resistance Authentication Protocol for Wreless LAN (DoS 공격에 강한 무선 랜 인증 프로토콜)

  • 김민현;이재욱;최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.3-10
    • /
    • 2004
  • A Wireless Lan has an importance of access control, because we can use wireless Internet via AP(Access Point). Moreover, to use wireless LAN, we will go through authentication process of EAP. DoS(Denial of Service) attack is one of the fatal attack about these AP access and authentication process. That is, if malicious attacker keeps away access of AP or consumes memory of server and calculation ability of CPU and etc. compulsorily in authentication process, legal user can't get any services. In this paper, we presents the way of protection against the each attack that is classified into access control, allocation of resource, attack on authentication protocol. The first thing, attack to access control, is improved by pre-verification and the parameter of security level. The second, attack of allocation of resource, is done by partial stateless protocol. And the weak of protocol is done by time-stamp and parameter of access limitation.

TILT CORRECTION FOR A WIDE-FIELD ON-AXIS TELESCOPE USING THE SYMMETRICITY OF OPTICAL ABERRATIONS

  • Lee, Chung-Uk;Kim, Yunjong;Kim, Seung-Lee;Lee, Dong-Joo;Cha, Sang-Mok;Lee, Yongseok;Kim, Dong-Jin
    • Journal of The Korean Astronomical Society
    • /
    • v.54 no.4
    • /
    • pp.113-119
    • /
    • 2021
  • It is difficult for observers to conduct an optical alignment at an observatory without the assistance of an optical engineer if optomechanical parts are to be replaced at night. We present a practical tilt correction method to obtain the optimal optical alignment condition using the symmetricity of optical aberrations of a wide-field on-axis telescope at night. We conducted coarse tilt correction by visually examining the symmetry of two representative star shapes obtained at two guide chips facing each other, such as east-west or north-south pairs. After coarse correction, we observed four sets of small stamp images using four guide cameras located at each cardinal position by changing the focus positions in 10-㎛ increments and passing through the optimum focus position in the range of ±200 ㎛. The standard deviation of each image, as a function of the focus position, was fitted with a second-order polynomial function to derive the optimal focus position at each cardinal edge. We derived the tilt angles from the slopes converted by the distance and the focus position difference between two paired guide chip combinations such as east-west and north-south. We used this method to collimate the on-axis wide-field telescope KMTNet in Chile after replacing two old focus actuators. The total optical alignment time was less than 30 min. Our method is practical and straightforward for maintaining the optical performance of wide-field telescopes such as KMTNet.

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.

Comparative analysis of the pig gut microbiome associated with the pig growth performance

  • Jun Hyung Lee;San Kim;Eun Sol Kim;Gi Beom Keum;Hyunok Doo;Jinok Kwak;Sriniwas Pandey;Jae Hyoung Cho;Sumin Ryu;Minho Song;Jin Ho Cho;Sheena Kim;Hyeun Bum Kim
    • Journal of Animal Science and Technology
    • /
    • v.65 no.4
    • /
    • pp.856-864
    • /
    • 2023
  • There are a variety of microorganisms in the animal intestine, and it has been known that they play important roles in the host such as suppression of potentially pathogenic microorganisms, modulation of the gut immunity. In addition, the gut microbiota and the livestock growth performance have long been known to be related. Therefore, we evaluated the interrelation between the growth performance and the gut microbiome of the pigs from 3 different farms, with pigs of varied ages ready to be supplied to the market. When pigs reached average market weight of 118 kg, the average age of pigs in three different farms were < 180 days, about 190 days, and > 200 days, respectively. Fecal samples were collected from pigs of age of 70 days, 100 days, 130 days, and 160 days. The output data of the 16S rRNA gene sequencing by the Illumina Miseq platform was filtered and analyzed using Quantitative Insights into Microbial Ecology (QIIME)2, and the statistical analysis was performed using Statistical Analysis of Metagenomic Profiles (STAMP). The results of this study showed that the gut microbial communities shifted as pigs aged along with significant difference in the relative abundance of different phyla and genera in different age groups of pigs from each farm. Even though, there was no statistical differences among groups in terms of Chao1, the number of observed operational taxonomic units (OTUs), and the Shannon index, our results showed higher abundances of Bifidobacterium, Clostridium and Lactobacillus in the feces of pigs with rapid growth rate. These results will help us to elucidate important gut microbiota that can affect the growth performance of pigs.

Hydroxychavicol Inhibits In Vitro Osteoclastogenesis via the Suppression of NF-κB Signaling Pathway

  • Sirada Srihirun;Satarat Mathithiphark;Chareerut Phruksaniyom;Pitchanun Kongphanich;Wisutthaporn Inthanop;Thanaporn Sriwantana;Salunya Tancharoen;Nathawut Sibmooh;Pornpun Vivithanaporn
    • Biomolecules & Therapeutics
    • /
    • v.32 no.2
    • /
    • pp.205-213
    • /
    • 2024
  • Hydroxychavicol, a primary active phenolic compound of betel leaves, previously inhibited bone loss in vivo by stimulating osteogenesis. However, the effect of hydroxychavicol on bone remodeling induced by osteoclasts is unknown. In this study, the anti-osteoclastogenic effects of hydroxychavicol and its mechanism were investigated in receptor activator of nuclear factor kappa-B ligand (RANKL)-induced osteoclasts. Hydroxychavicol reduced the number of tartrate resistance acid phosphatase (TRAP)-positive multinucleated, F-actin ring formation and bone-resorbing activity of osteoclasts differentiated from RAW264.7 cells in a concentration-dependent manner. Furthermore, hydroxychavicol decreased the expression of osteoclast-specific genes, including cathepsin K, MMP-9, and dendritic cell-specific transmembrane protein (DC-STAMP). For mechanistic studies, hydroxychavicol suppressed RANKL-induced expression of major transcription factors, including the nuclear factor of activated T-cells 1 (NFATc1), c-Fos, and c-Jun. At the early stage of osteoclast differentiation, hydroxychavicol blocked the phosphorylation of NF-κB subunits (p65 and Iκβα). This blockade led to the decrease of nuclear translocation of p65 induced by RANKL. In addition, the anti-osteoclastogenic effect of hydroxychavicol was confirmed by the inhibition of TRAP-positive multinucleated differentiation from human peripheral mononuclear cells (PBMCs). In conclusion, hydroxychavicol inhibits osteoclastogenesis by abrogating RANKL-induced NFATc1 expression by suppressing the NF-κB signaling pathway in vitro.

A Study on the Palsapum (八賜品, Eight-Bestowed Things), Treasure No. 440, in Tong-Yong Shrine to the Loyal Dead in Korea (보물 제440호 통영 충렬사 팔사품(八賜品) 연구)

  • Jang, Kyung-hee
    • Journal of Korean Historical Folklife
    • /
    • no.46
    • /
    • pp.195-237
    • /
    • 2014
  • Palsapum are ornaments to reveal the purpose of commander of three naval forces as well as symbols to remember the greatness of admiral Yi, Sun-Shin. In 1966, ther were designated as a treasure No. 440 based on their value; however, they have not received attention from academia because they are relics from China. This study compares and analyzes the document, paintings, and relevant references from Korea and China focusing on Palsapum, understands their formal characteristics, and examines their historical value such as years and location of creation. As a result, the study determines five of them are original, but three of them were newly created by the later generations. The five, Dodogin (都督印, Commander's seal)·Yeongpae (令牌, Commander's tablet)·Gwido (鬼刀, Replica of the devil sword)·Chamdo (斬刀, Replica of the decapitation swor d)·and Gognapal (bugle) were created by Ming Dynasty before 1598, and delivered by the hands of General Chen Lin. The other three, Dokjeongi (督戰 旗, Battle flag)·Hongsoryeonggi (紅小令旗, Commander's flag)·and Namsoryeonggi (藍小令旗, Commander's flag), were created in 19th century by Joseon Dynasty. After analysis on the former relics, the study determines that they are not official relics with the dignity of Ming Dynasty but personal relics with regional characteristics; in other words, Palsamun are not the royal gifts from Emperor Shenzong to Admiral Yi, Sun-Shin. but personal momentoes left by General Chen Lin in the Tongjeyoung to celebrate the admiral. The names, variety, numbers, and appurtenances of Palsapum have been changed with time as follows. First, the scholars of Jeseon in 17the century only focused on Dodogin. It was certainly created in Ming Dynasty; however, it was a personal stamp, so considered to be not from the emperor but from General Chen Lin. Second, Palsapum was called Palsamul and consisted of 14 pieces of 8 kinds in 18the century, ; it is confirmed on the 「Dosul(圖說, stories with pictures of」 『Yi Chungmugong Literary Collection』 The sizes of five relics including Dodogin are similar to the records, but their patterns and shapes are exotic, or cannot be found in Joseon. Thus, they reflect the regional characteristics of Guangdong province. Third, they were called Palsapum, and consisted on 15 pieces of 8 kinds in 19th century; it is confirmed on , a sixteen-fold folding screen drawn by Shin, Gwan-Ho in 1861. The stamp box, tablet bag, and three flags were newly created to engrave Joseon style letters and patterns on damageable materials such as leather and cloth. The relics easy to be destroyed have been renewed even after 19th century. Last, there are many misunderstandings about Palsapum by governmental indifference and improper management of records even though they were designated as a treasure in very early times. Thus, authorities should be concerned with Palsapum to provide the measures for stable maintenance of the relics; this will let people remember not only the history of cooperation between Korea and China to stop the Japanese ambition, but also Admiral Yi, Sun-Shin and General Chen Lin to bring victory in Japanese invasions of Korea.