• Title/Summary/Keyword: UE

Search Result 354, Processing Time 0.026 seconds

Genetic Organization of the dhlA Gene Encoding 1,2-Dichloroethane Dechlorinase from Xanthobacter flavus UE15

  • Song, Ji-Sook;Lee, Dong-Hun;Lee, Kyoung;Kim, Chi-Kyung
    • Journal of Microbiology
    • /
    • v.42 no.3
    • /
    • pp.188-193
    • /
    • 2004
  • Xanthobacter flavus strain UE15 was isolated in wastewater obtained from the Ulsan industrial complex, Korea. This strain functions as a 1,2-dichloroethane (1,2-DCA) degrader, via a mechanism of hydrolytic dechlorination, under aerobic conditions. The UE15 strain was also capable of dechlorinating other chloroaliphatics such as 2-chloroacetic acid and 2-chloropropionic acid. The dhlA gene encoding 1,2-DCA dechlorinase was cloned from the genomic DNA of the UE15 strain, and its nucleotide sequence was determined to consist of 933 base pairs. The deduced amino acid sequence of the DhlA dechlorinase exhibited 100% homology with the corresponding enzyme from X. autotrophicus GJ10, but only 27 to 29% homology with the corresponding enzymes from Rhodococcus rhodochrous, Pseudomonas pavonaceae, and Mycobacterium sp. strain GP1, which all dechlorinate haloalkane compounds. The UE15 strain has an ORF1 (1,356 bp) downstream from the dhlA gene. The OFR1 shows 99% amino acid sequence homology with the transposase reported from X. autotrophicus GJ10. The transposase gene was not found in the vicinity of the dhlA in the GJ10 strain, but rather beside the dhlB gene coding for haloacid dechlorinase. The dhlA and dhlB genes were confirmed to be located at separate chromosomal loci in the Xanthobacter flavus UE15 strain as well as in X. autotrophicus GJ10. The dhlA and transposase the UE15 strain were found to be parenthesized by a pair of insertion sequences, 181247, which were also found on both sides of the transposase gene in the GJ10 strain. This unique structure of the dhlA gene organization in X. flavus strain UE15 suggested that the dechlorinase gene, dhlA, is transferred with the help of the transposase gene.

The Excavated Costume of Jeon-Ui Lee Unearthed in Ue-Ryoung (宜寧 全義李氏墓 출토복식에 관한 고찰)

  • Park, Fil-Soon;Park, Yoon-Mee;Jeong, Bok-Nam
    • The Research Journal of the Costume Culture
    • /
    • v.13 no.1
    • /
    • pp.102-120
    • /
    • 2005
  • Three Jang-Ue's and eleven drapery were investigated in the excavated costume in Ue-Ryeong, Gyeong-Sang-Nam-Do. Three Jang-Ue's have three different colors. the length, the width, and the wide of quilting are different as well. The outer collar of a coat is a double collar while the inturned collar is a single collar. In case of Dark blue and Pink Jang-Ue. The large section of cloth forming the body of a Korean coat is getting narrower while the reinforcing cloth strip is getting wider as the time is passing by. All the three Jang-Ue's have the different handling methods of a attached to the top border of a Korean coat, and Pink Jang-Ue doesn't have a attached to the tip border of a Korean coat. The handling method of the hemline are all different. And the handling method of the cuffs are all different. The silk is main in the woven goods, partly hemp, mixed fabrics and cotton. Especially complex gauze with supplementary wefts that were found unusually in Cho-Sun Dynasty are very import to study the complex gauze. The fond relics of the Jeon-Ui Lee family reveal various formational methods and specific characters of the excavated costume. There fore these that bring the Jang-Ue shape and the textile's feature in Gyeong-Sang-Nam-Do region, from 16th to 17th are very valuable.

  • PDF

RF Transceiver Implementation to Evaluate the Requirements of 3G W-CDMA User Equipment (3G W-CDMA UE 요구사항 평가를 위한 RF 트랜시버 구현)

  • Il-Kyoo Lee;Seung-Hyeub Oh
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.14 no.2
    • /
    • pp.148-156
    • /
    • 2003
  • This paper describes the RF performance issues of UE for W-CDMA system based on 3 GPP specifications. The parameters of transmitter and receiver are derived from the viewpoint of RF performance. In order for UE to achieve high performance, the transceiver performance requirements such as ACLR, EVM, Peak Code Domain Error, spectrum emission mask, frequency error stability and TX power control dynamic range for transmitter and reference sensitivity level, blocking characteristics, noise figure, ACS, AGC dynamic range for receiver are considered. On the basis of the required parameters, the UE RF transceiver is implemented and then the evaluation of RF performance is accomplished through practical test scenarios.

Performance Analysis of Optimal Tracking Load Balance Scheme in Hierarchical LTE Networks (계층적 LTE 네트워크에서 최적의 트래킹 로드밸런스 기법의 성능분석)

  • Jeon, Minsu;Jeong, Jongpil
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.9-21
    • /
    • 2013
  • Tracking is a process which explores user equipment (UE) in the area of tracking in terms of cells. In this paper, two tracking schemes based on macrocell-microcell tiers in hierarchical LTE networks, PMMT and IMMT, are evaluated. In this network, UE can receive a signal from macrocells and overlapping microcells, and can be called from each macrocell or microcell-tier in the PMMT. Also, the UE can be called from the combined macrocell-tier and microcell-tier in the IMMT. Finally, we analyze the optimization of load balance between marcocell-tier and microcell-tier, and an analytical model is developed to evaluate those two arrangements.

Model for Unplanned Self Extubation of ICU Patients Using System Dynamics Approach (시스템다이내믹스를 활용한 중환자실 환자의 비계획적 자가 발관 모델)

  • Song, Yu Gil;Yun, Eun Kyoung
    • Journal of Korean Academy of Nursing
    • /
    • v.45 no.2
    • /
    • pp.280-292
    • /
    • 2015
  • Purpose: In this study a system dynamics methodology was used to identify correlation and nonlinear feedback structure among factors affecting unplanned extubation (UE) of ICU patients and to construct and verify a simulation model. Methods: Factors affecting UE were identified through a theoretical background established by reviewing literature and preceding studies and referencing various statistical data. Related variables were decided through verification of content validity by an expert group. A causal loop diagram (CLD) was made based on the variables. Stock & Flow modeling using Vensim PLE Plus Version 6.0b was performed to establish a model for UE. Results: Based on the literature review and expert verification, 18 variables associated with UE were identified and CLD was prepared. From the prepared CLD, a model was developed by converting to the Stock & Flow Diagram. Results of the simulation showed that patient stress, patient in an agitated state, restraint application, patient movability, and individual intensive nursing were variables giving the greatest effect to UE probability. To verify agreement of the UE model with real situations, simulation with 5 cases was performed. Equation check and sensitivity analysis on TIME STEP were executed to validate model integrity. Conclusion: Results show that identification of a proper model enables prediction of UE probability. This prediction allows for adjustment of related factors, and provides basic data do develop nursing interventions to decrease UE.

A UE Position Tracking Method for Optical Beamforming Transmission in Visible Light Communications (가시광 통신 시스템에서 광 빔포밍 전송을 위한 유저 단말 추적 방법)

  • Hwang, Yu Min;Kim, Kyung Ho;Song, Yu Chan;Lee, Sang Woon;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.85-90
    • /
    • 2014
  • In this paper, we propose a novel UE(User Equipment) position tracking algorithm of visible light signals, and analyze BER performance when optical beamforming scheme is applied in VLC(Visible Light Communications) system. The optical beamforming scheme as an interference mitigation method provides good optical channel conditions between UE(Rx) and LED light(Tx), and lead to better BER performance because UE is able to get a better RSSI(Received Signal strength indication) value. For the system BER, the proposed UE position tracking method for optical beamforming transmission demonstrates the performance enhancement compared to a system not applied the optical beamforming transmission scheme, and up to about 5~6dB SNR performance gain is achieved. The results of the paper can be applied to design of various VLC and LBS applications for ubiquitous home network systems.

Potential use of ultrasound in antioxidant extraction from Ecklonia cava

  • Lee, Seung-Hong;Kang, Min-Cheol;Moon, Sang-Ho;Jeon, Byong-Tae;Jeon, You-Jin
    • ALGAE
    • /
    • v.28 no.4
    • /
    • pp.371-378
    • /
    • 2013
  • Water and methanolic extracts of Ecklonia cava, a marine brown alga, were prepared by ultrasonic extraction (UE) and conventional extraction (CE) methods. The radical-scavenging activity and the inhibitory effects against hydrogen peroxide ($H_2O_2$)-induced DNA damage of the extracts were investigated. All extracts prepared by CE exhibited higher total polyphenolic content than that in the extracts prepared by UE. Extraction yield and total phenolic content increased as the UE time increased. The radical-scavenging activities increased as the UE time increased. All extracts prepared by CE exhibited higher 1,1-diphenyl-2-pricrylhydrazyl (DPPH) and hydroxyl radical-scavenging activities than did those prepared by UE. Extracts prepared by UE showed stronger scavenging activities on alkyl radical and $H_2O_2$ than those prepared by CE did. Methanolic extract with UE 12 h (100MEU-12h) and methanolic extract with CE 24 h (100MEC-24h) were selected and evaluated by comet assay for their inhibitory effect against $H_2O_2$-induced DNA damage. 100MEU-12h showed slightly greater protective effect against $H_2O_2$-induced DNA damage than 100MEC-24h. Thus, UE can be effectively used as a seaweed extraction technique, and there is potential for scale-up of the extraction process.

Analysis of Deregistration Attacks in 5G Standalone Non-Public Network

  • Kim, Keewon;Park, Kyungmin;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.81-88
    • /
    • 2021
  • In this paper, we analyze the possibility of deregistration attack in 5G SNPN (Standalone Non-Public Network) based on 3GPP standard document. In the deregistraion attack, the attacker pretends to be a UE that is normally registered with AMF (Access and Mobility Management Function) and attempts to establish a spoofed RRC (Radio Resource Control) connection, causing AMF to deregister the existing UE. The existing deregistration attack attempts a spoofed RRC connection to the AMF in which the UE is registered. In addition, this paper analyzes whether deregistration attack is possible even when an attacker attempts to establish a spoofed RRC connection to a new AMF that is different from the registered AMF. When the 5G mobile communication network system is implemented by faithfully complying with the 3GPP standard, it is determined that a deregistration attack of a UE is impossible.

Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.113-120
    • /
    • 2022
  • In this paper, we analyze the feasibility of the IP spoofing attack exploiting null security algorithms in 5G networks based on 3GPP standard specifications. According to 3GPP standard specifications, the initial Registration Request message is not protected by encryption and integrity. The IP spoofing attack exploits the vulnerability that allows a malicious gNB (next generation Node B) to modify the contents of the initial Registration Request message of a victim UE (User Equipment) before forwarding it to AMF (Access and Mobility Management Function). If the attack succeeds, the victim UE is disconnected from the 5G network and a malicious UE gets Internet services, while the 5G operator will charge the victim UE. In this paper, we analyze the feasibility of the IP spoofing attack by analyzing whether each signaling message composing the attack conforms to the 3GPP Rel-17 standard specifications. As a result of the analysis, it is determined that the IP spoofing attack is not feasible in the 5G system implemented according to the 3GPP Rel-17 standard specifications.