• Title/Summary/Keyword: Tag-out

Search Result 214, Processing Time 0.036 seconds

Screening of High Temperature-Tolerant Oleaginous Diatoms

  • Zhang, Lingxiang;Hu, Fan;Wan, Xiu;Pan, Yufang;Hu, Hanhua
    • Journal of Microbiology and Biotechnology
    • /
    • v.30 no.7
    • /
    • pp.1072-1081
    • /
    • 2020
  • Screening suitable strains with high temperature adaptability is of great importance for reducing the cost of temperature control in microalgae cultivation, especially in summer. To obtain high temperature-tolerant diatoms, water samples were collected in summer from 7 different regions of China across the Northeast, North and East. A total of 731 water samples was collected and from them 131 diatom strains were isolated and identified based on the 18S rRNA sequences. Forty-nine strains out of the 131 diatoms could survive at 30℃, and 6 strains with relatively high biomass and lipid content at high temperature were selected and were found to be able to grow at 35℃. Cyclotella sp. HB162 had the highest dry biomass of 0.46 g/l and relatively high triacylglycerol (TAG) content of 237.4 mg/g dry biomass. The highest TAG content of 246.4 mg/g dry biomass was obtained in Fistulifera sp. HB236, while Nitzschia palea HB170 had high dry biomass (0.33 g/l) but relatively low TAG content (105.9 mg/g dry biomass). N. palea HB170 and Fistulifera sp. HB236 presented relatively stable growth rates and lipid yields under fluctuating temperatures ranging from 28 to 35℃, while Cyclotella HB162 maintained high lipid yield at temperatures below 25℃. The percentage of saturated fatty acids and monounsaturated fatty acids in all the 6 strains was 84-91% in total lipids and 90-94% in TAGs, which makes them the ideal feedstock for biodiesel.

Design and Evaluation of a User Tag-based Retrieval Model for Electronic Journals within Electronic Resource Management Systems (전자자원관리시스템의 이용자 태그 기반의 전자저널 검색 모형 설계 및 평가에 관한 연구)

  • Kang, Jeong-Won;Kim, Hyun-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.43 no.4
    • /
    • pp.241-264
    • /
    • 2009
  • The study proposed an electronic journal retrieval model to be used to improve the retrieval efficiency of e-journals. To do this, firstly, we reviewed the literature on users' information behavior and on ERM (Electronic Resource Management) systems. Secondly, we conducted an e-mail survey of 96 participants (professors and graduate students) to find out about their information behavior on how to access, use and evaluate electronic resources as well as scientific information. Thirdly, we administered case studies on two ERMSs, Ex Libris' Verde and Innovative's Millennium. The proposed model will be operated within ERM systems and it enables to the supply of both system- and user-based services by combining taxonomy-based ERM systems with tag folksonomy. The model is unique in that it includes not only the automatic tagging functions that can be performed using log files but also the tag management functions including grouping similar or related tags.

Development and Validation of Single Nucleotide Polymorphism (SNP) Markers from an Expressed Sequence Tag (EST) Database in Olive Flounder (Paralichthys olivaceus)

  • Kim, Jung Eun;Lee, Young Mee;Lee, Jeong-Ho;Noh, Jae Koo;Kim, Hyun Chul;Park, Choul-Ji;Park, Jong-Won;Kim, Kyung-Kil
    • Development and Reproduction
    • /
    • v.18 no.4
    • /
    • pp.275-286
    • /
    • 2014
  • To successful molecular breeding, identification and functional characterization of breeding related genes and development of molecular breeding techniques using DNA markers are essential. Although the development of a useful marker is difficult in the aspect of time, cost and effort, many markers are being developed to be used in molecular breeding and developed markers have been used in many fields. Single nucleotide polymorphisms (SNPs) markers were widely used for genomic research and breeding, but has hardly been validated for screening functional genes in olive flounder. We identified single nucleotide polymorphisms (SNPs) from expressed sequence tag (EST) database in olive flounder; out of a total 4,327 ESTs, 693 contigs and 514 SNPs were detected in total EST, and these substitutions include 297 transitions and 217 transversions. As a result, 144 SNP markers were developed on the basis of 514 SNP to selection of useful gene region, and then applied to each of eight wild and culture olive flounder (total 16 samples). In our experimental result, only 32 markers had detected polymorphism in sample, also identified 21 transitions and 11 transversions, whereas indel was not detected in polymorphic SNPs. Heterozygosity of wild and cultured olive flounder using the 32 SNP markers is 0.34 and 0.29, respectively. In conclusion, we identified SNP and polymorphism in olive flounder using newly designed marker, it supports that developed markers are suitable for SNP detection and diversity analysis in olive flounder. The outcome of this study can be basic data for researches for immunity gene and characteristic with SNP.

An Implementation of XML document searching system based on Structure and Semantics Similarity (구조와 내용 유사도에 기반한 XML 웹 문서 검색시스템 구축)

  • Park Uchang;Seo Yeojin
    • Journal of Internet Computing and Services
    • /
    • v.6 no.2
    • /
    • pp.99-115
    • /
    • 2005
  • Extensible Markup Language (XML) is an Internet standard that is used to express and convert data, In order to find the necessary information out of XML documents, you need a search system for XML documents, In this research, we have developed a search system that can find documents that matches the structure and content of a given XML document, making the best use of XML structure, Search metrics take account of the similarity in tag names, tag values, and the structure of tags, After a search, the system displays the ranked results in the order of aggregate similarity, Three methods of query are provided: keyword search which is conventional; search with tag names and their values; and search with XML documents, These three methods enable users to choose the method that best suits their preference, resulting in the increase of the usefulness of the system.

  • PDF

Expression of Human Serine Palmitoyltransferase Genes for Antibody Development (Antibody 제작을 위한 human serine palmitoyltransferase 유전자의 발현)

  • 김희숙
    • Journal of Life Science
    • /
    • v.14 no.2
    • /
    • pp.315-319
    • /
    • 2004
  • For antibody development of human serine palmitoyltransferase (SPT, EC 2.3.1.50), SPTLC1 and SPTLC2 genes were subcloned in pRset vector and expressed in E. coli BL21 (DE3)pLys cells. Eucaryotic SPT is a membrane-bound heterodimer enzyme, while all other members are soluble homodimer enzymes. cDNA library were obtained from total RNA from human embryo kidney cell line, HEK293, using RT-PCR and PCR with specific primers was carried out for preparing SPTLC1 and SPTLC2 genes. pRset vector which can express hexahistidine-tag fusion protein was used and the DNA sequences of pRsetB/SPTLC1 and pRsetA/SPTLC2 were confirmed. Recombinant BL21 cells with SPTLC subunits were selected with LB plate containing ampicillin and chroramphenicol. SPTLC1 and SPTLC2 proteins were induced with 1 mM IPTG and seperated on 10% SDS-PAGE gel. Expressed proteins were confirmed by western blotting with His-tag antibody.

Robust Matrix-based RFID Mutual Authentication Protocol (견고한 행렬기반 RFID 상호인증 프로토콜)

  • Yoon, Eun-Jun;Ha, Kyeoung-Ju;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11C
    • /
    • pp.883-891
    • /
    • 2008
  • In 2006, Lee and Ahn proposed a matrix-based RFID authentication protocol which eliminates the security problems in HB and $HB^+$ RFID authentication protocols. Their proposed protocol provides the following three merits: (1) it reduces the computational costs of the RFID tag. (2) it reduces the communication overhead between the reader and the tag. (3) it protects the user privacy. However, this paper points out that Lee and Ahn's proposed protocol is insecure to various attacks because it does not provide mutual authentication which the RFID tag does not authenticate the legality of the RFID reader unlike their claims. In addition, this paper proposes an improved matrix-based RFID mutual authentication protocol that can provide the mutual authentication. As a result, the proposed protocol not only can provide strong security and but also guarantee high efficiency because it reduces the communication rounds compare with Lee-Ahn's protocol.

A Novel Carrier Leakage Suppression Scheme for UHF RFID Reader (UHF 대역 RFID 리더 반송파 누설 억압 연구)

  • Jung, Jae-Young;Park, Chan-Won;Yeom, Kyung-Whan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.4
    • /
    • pp.489-499
    • /
    • 2011
  • RFID technologies, which allow collecting, storing, processing, and tracking information by wirelessly recognizing the inherent ID of object through an attached electronic tag, have a variety of application areas. This paper presents a novel carrier leakage suppression RF(CLS-RF) front-end for ultra-high-frequency RF identification reader. The proposed reader CLS-RF front-end structure generates the carrier leakage replica through the nonlinear path that contains limiter. The limiting function only preserves the frequency and phase information of the leakage signal and rejects the amplitude modulated tag signal in the envelope. The carrier leakage replica is then injected into the linear path that contains phase shifter. Therefore, the carrier leakage signal is effectively cancelled out, while not affecting the gain of the desired tag backscattering signal. We experimentally confirm that the prototype shows a significant improvement in the leakage to signal ratio by up to 36 dB in 910 MHz, which is consistent with our simulation results.

Multi-hop RFID Reader and Tag Communication Architecture for Port Logistics (항만 물류용 RFID 리더-태그 간 다중 홉 통신 구조)

  • Yoo, Young-Hwan;Kim, Jin-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.532-541
    • /
    • 2009
  • The RFID technology has attracted much attention these days due to the far better efficiency than the bar-code and magnetic card system. As an important usage, the 433 MHz active RFID tag was already adopted to the container ports in the United States and Europe for container loading/unloading automation and equipment location. However, there is one problem to be solved for the complete automation. RFID readers support only the direct communication with tags within their RF communication range. Then there are a lot of containers and equipments such as crane, yard tractor, and forklift in ports; and because they are made of metal, they interfere the RF communication, resulting in the occurrence of the dead-zone. In the dead-zone, RFID tags cannot receive any signal from readers. There may be several solutions to resolve the dead-zone problem. Among them, this paper suggests the most economical solution where RFID tags in the dead-zone can communicate with readers via neighbor tags in the multi-hop manner The new RFID communication architecture should be carefully designed in order to maintain the compatibility with the previous standard. Our experiment shows that the proposed architecture works well even in the case where some tags are out of the RF range of reader.

Improved cryptanalysis of lightweight RFID mutual authentication Protocols LMAP, $M^2AP$, EMAP (경량 RFID 상호인증 프로토콜 LMAP, $M^2AP$, EMAP에 대한 향상된 취약성 분석)

  • Kwon, Dae-Sung;Lee, Joo-Young;Koo, Bon-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.103-113
    • /
    • 2007
  • In this paper, we present a security analysis of Lightweight RFID Mutual Authentication Protocols-LMAP[10], $M^2AP$[11], EMAP[12]. Based on simple logic operations, the protocols were designed to be suitable for lightweight environments such as RFID systems. In [8,9], it is shown that these protocols are vulnerable to do-synchronization attacks with a high probability. The authors also presented an active attack that partially reveals a tag's secret values including its ID. In this paper, we point out an error from [9] and show that their do-synchronization attack would always succeed. We also improve the active attack in [9] to show an adversary can compute a tag's ID as well as certain secret keys in a deterministic way. As for $M^2AP$ and EMAP, we show that eavesdropping $2{\sim}3$ consecutive sessions is sufficient to reveal a tag's essential secret values including its ID that allows for tracing, do-synchronization and/or subsequent impersonations.

The Vibration Bell System Development Using NFC Tag and Smart Phone (NFC Tag와 스마트폰을 이용한 진동벨 시스템 개발)

  • Lim, Jong Bum;Lim, Yang Mi
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.8
    • /
    • pp.968-979
    • /
    • 2015
  • In this paper, we study a vibration bell App which shows waiting sequence numbers by utilizing smartphones to solve an inconveniently long waiting time from ordering to getting foods in restaurants and coffee shops. Unlike existing independently developed hardware and software, the vibration bell App is developed to manage and integrate customer management service, POS service in shops, and group shop management services. The functions of the vibration bell App include two-way communications based on NFC- issuing waiting sequence numbers and electronic coupon, showing event information, and transferring user information. Furthermore, the user's personal information is minimized by recognizing the pre-existing information of the user's smartphone. Replacing the shop's vibration bell system with the vibration bell APP, the shops can reduce the cost of construction and maintenance by up to 1/10, compared to the cost of for existing vibration bell systems. Moreover, the customer's preference and current sales trend can be easily figured out. Thus, it will have a great effect on the future marketing strategies.