• 제목/요약/키워드: key

검색결과 33,807건 처리시간 0.056초

Biological Parameters of Rhipicephalus (Boophilus) microplus (Acari: Ixodidae) Fed on Rabbits, Sheep, and Cattle

  • Ma, Miling;Chen, Ze;Liu, Aihong;Ren, Qiaoyun;Liu, Junlong;Liu, Zhijie;Li, Youquan;Yin, Hong;Guan, Guiquan;Luo, Jianxun
    • Parasites, Hosts and Diseases
    • /
    • 제54권3호
    • /
    • pp.301-305
    • /
    • 2016
  • In order to determine the effect of various hosts on feeding performance of Rhipicephalus (Boophilus) microplus, we used 3 mammalian species as hosts, cattle (Qinchuan), sheep (Tan), and rabbits (Japanese white rabbit) for infesting ticks. Five hundreds of R. microplus larvae were exposed to each animal (3 animals/host species). Tick recoveries were 11.0%, 0.47%, and 5.5% from cattle, sheep, and rabbits, respectively. The averages of tick feeding periods were not significantly different on cattle, sheep, and rabbits, 28.8, 25.3, and 26.7 days, respectively. The average weights of individual engorged female from cattle, sheep, and rabbits were 312.5, 219.1, and 130.2 mg, respectively and those of egg mass weights each to 85.0, 96.6, and 17.8 mg. The highest egg hatching rate was in the ticks from cattle (96.0%), followed by those from rabbits (83.0%) and sheep (19.2%). These data suggest that rabbits could be as an alternative host to cultivate R. microplus for evaluating vaccines and chemical and biological medicines against the tick in the laboratory, although the biological parameters of ticks were less than those from cattle.

Selection of Reference Genes for Real-time Quantitative PCR Normalization in the Process of Gaeumannomyces graminis var. tritici Infecting Wheat

  • Xie, Li-hua;Quan, Xin;Zhang, Jie;Yang, Yan-yan;Sun, Run-hong;Xia, Ming-cong;Xue, Bao-guo;Wu, Chao;Han, Xiao-yun;Xue, Ya-nan;Yang, Li-rong
    • The Plant Pathology Journal
    • /
    • 제35권1호
    • /
    • pp.11-18
    • /
    • 2019
  • Gaeumannomyces graminis var. tritici is a soil borne pathogenic fungus associated with wheat roots. The accurate quantification of gene expression during the process of infection might be helpful to understand the pathogenic molecular mechanism. However, this method requires suitable reference genes for transcript normalization. In this study, nine candidate reference genes were chosen, and the specificity of the primers were investigated by melting curves of PCR products. The expression stability of these nine candidates was determined with three programs-geNorm, Norm Finder, and Best Keeper. $TUB{\beta}$ was identified as the most stable reference gene. Furthermore, the exopolygalacturonase gene (ExoPG) was selected to verify the reliability of $TUB{\beta}$ expression. The expression profile of ExoPG assessed using $TUB{\beta}$ agreed with the results of digital gene expression analysis by RNA-Seq. This study is the first systematic exploration of the optimal reference genes in the infection process of Gaeumannomyces graminis var. tritici.

Effects of different culture systems on the culture of prepuberal buffalo (Bubalus bubalis) spermatogonial stem cell-like cells in vitro

  • Li, Ting-Ting;Geng, Shuang-Shuang;Xu, Hui-Yan;Luo, Ao-Lin;Zhao, Peng-Wei;Yang, Huan;Liang, Xing-Wei;Lu, Yang-Qing;Yang, Xiao-Gan;Lu, Ke-Huan
    • Journal of Veterinary Science
    • /
    • 제21권1호
    • /
    • pp.13.1-13.14
    • /
    • 2020
  • Currently, the systems for culturing buffalo spermatogonial stem cells (SSCs) in vitro are varied, and their effects are still inconclusive. In this study, we compared the effects of culture systems with undefined (foetal bovine serum) and defined (KnockOut Serum Replacement) materials on the in vitro culture of buffalo SSC-like cells. Significantly more DDX4- and UCHL1-positive cells (cultured for 2 days at passage 2) were observed in the defined materials culture system than in the undefined materials system (p < 0.01), and these cells were maintained for a longer period than those in the culture system with undefined materials (10 days vs. 6 days). Furthermore, NANOS2 (p < 0.05), DDX4 (p < 0.01) and UCHL1 (p < 0.05) were expressed at significantly higher levels in the culture system with defined materials than in that with undefined materials. Induction with retinoic acid was used to verify that the cultured cells maintained SSC characteristics, revealing an SCP3+ subset in the cells cultured in the defined materials system. The expression levels of Stra8 (p < 0.05) and Rec8 (p < 0.01) were significantly increased, and the expression levels of ZBTB16 (p < 0.01) and DDX4 (p < 0.05) were significantly decreased. These findings provided a clearer research platform for exploring the mechanism of buffalo SSCs in vitro.

Secret Key Generation Using Reciprocity in Ultra-wideband Outdoor Wireless Channels

  • Huang, Jing Jing;Jiang, Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권2호
    • /
    • pp.524-539
    • /
    • 2014
  • To investigate schemes of secret key generation from Ultra-wideband (UWB) channel, we study a statistical characterization of UWB outdoor channel for a campus playground scenario based on extensive measurements. Moreover, an efficient secret key generation mechanism exploiting multipath relative delay is developed, and verification of this algorithm is conducted in UWB Line-of-sight (LOS) outdoor channels. For the first time, we compare key-mismatch probability of UWB indoor and outdoor environments. Simulation results demonstrate that the number of multipath proportionally affects key generation rate and key-mismatch probability. In comparison to the conventional method using received signal strength (RSS) as a common random source, our mechanism achieves better performance in terms of common secret bit generation. Simultaneously, security analysis indicates that the proposed scheme can still guarantee security even in the sparse outdoor physical environment free of many reflectors.

초기인증에서 키 분배 및 복구를 지원하는 공개키 암호 인증시스템에 관한 연구 (A Study on Public Key Cryptographic Authentication System Providing Key Distribution and Recovery in the Initial Authentication)

  • 신광철;조성제
    • 인터넷정보학회논문지
    • /
    • 제7권3호
    • /
    • pp.83-91
    • /
    • 2006
  • 본 논문에서는 인증서를 사용하는 모든 암호시스템 분야에 응용될 수 있는 인증 및 키 복원 프로토콜로 PKINIT를 응용한 안전한 초기인증 공개키 암호시스템 모델을 연구하였다. 멤버들에 대한 인증은 서버와 사용자간에 인증서를 기반으로 공개 키 암호에 의한 초기인증과 세션 키 분배, 응용자원 서버들과의 비밀통신에서 키의 유실을 고려한 키 복구지원 프로토콜을 제안하였다.

  • PDF

Secret Key Generation from Common Randomness over Ultra-wideband Wireless Channels

  • Huang, Jing Jing;Jiang, Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권10호
    • /
    • pp.3557-3571
    • /
    • 2014
  • We develop a secret key generation scheme using phase estimation in ultra-wideband (UWB) wireless fading channels. Based on the reciprocity theorem, two terminals extract the phase of the channel as a common random source to generate secret bits. Moreover, we study the secret key rate by a pair of nodes observing correlated sources and communicating to achieve secret key agreement over public communication channels. As our main results, we establish a more practical upper bound from Cramer-Rao bound (CRB) and compare it with a universally theoretical upper bound on the shared maximum key rate from mutual information of correlated random sources. Derivation and numerical examples are presented to demonstrate the bound. Simulation studies are also provided to validate feasibility and efficiency of the proposed scheme.

An Efficient Renewal Mechanism of Group Key Employing the Fiat-Shamir Method on Mobile Communications

  • Tak, Dong-Gil;Lee, Yeo-Jin;Lee, Jae-Hoon;Chung, Il-Yong
    • 한국멀티미디어학회논문지
    • /
    • 제9권12호
    • /
    • pp.1649-1656
    • /
    • 2006
  • Renewal of the group key on the mobile communication needs it can be not re-shared by all members of the group with the exception of excluded members but also prevented from making a fraudulent use of group key due to leakage of security information for terminal. In this paper, we propose an efficient renewal mechanism of group key in order for all members of the group to be able to get digital information and to perform the renewal of group key employing the Fiat-Shamir method. It can guarantee the security of a group key since a terminal renews a group key by using security information of an excluded terminal and the previous group key.

  • PDF

Optical Asymmetric Cryptography Modifying the RSA Public-key Protocol

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • 제4권2호
    • /
    • pp.103-114
    • /
    • 2020
  • A new optical asymmetric cryptosystem is proposed by modifying the asymmetric RSA public-key protocol required in a cryptosystem. The proposed asymmetric public-key algorithm can be optically implemented by combining a two-step quadrature phase-shifting digital holographic encryption method with the modified RSA public-key algorithm; then two pairs of public-private keys are used to encrypt and decrypt the plaintext. Public keys and ciphertexts are digital holograms that are Fourier-transform holograms, and are recorded on CCDs with 256-gray-level quantized intensities in the optical architecture. The plaintext can only be decrypted by the private keys, which are acquired by the corresponding asymmetric public-key-generation algorithm. Schematically, the proposed optical architecture has the advantage of producing a complicated, asymmetric public-key cryptosystem that can enhance security strength compared to the conventional electronic RSA public-key cryptosystem. Numerical simulations are carried out to demonstrate the validity and effectiveness of the proposed method, by evaluating decryption performance and analysis. The proposed method shows feasibility for application to an asymmetric public-key cryptosystem.

전단저항키 실험 및 내진성능평가 (Experimental and Analytical Evaluation of Seismic Performance of Shear-Resistance Key)

  • 박종철;강형택;박찬민
    • 한국콘크리트학회:학술대회논문집
    • /
    • 한국콘크리트학회 2000년도 가을 학술발표회논문집(I)
    • /
    • pp.523-528
    • /
    • 2000
  • In multi-span bridges, a shear key is often used to distribute the seismic force to the case, the shear key is sometimes required to be reinforced to withstand the seismic force. To improve the strength of shear key, the strength and failure mode of shear key have to be carefully estimated and the proper reinforcement scheme should be elaborated. The test results show that the strength of shear key is 2.5 times higher than the strength calculated by PCI design handbook. Also the strength of shear key is greatly improved by placing PT bars into shear key. In this study, the analytical method to evaluate the strength of sheat key and the reinforcement scheme are proposed.

  • PDF

프레임간 히스토그램 차이를 이용한 개선된 대표프레임 추출 알고리즘 (An Improved key Frame Selection Algorithm Based on Histogram Difference Between Frames)

  • 정지현;전승철;박성한
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(3)
    • /
    • pp.137-140
    • /
    • 2000
  • In this paper, we propose as new algorithm for the selection of key frames in a given video. For the selected key frames to be well defined, the selected key frames need to spread out on the whole temporal domain of the given video and guaranteed not to be duplicate. For this purpose, we take the first frame of each shot of the video as the candidate key frame to represent the video. To reduce the overall processing time, we eliminate some candidate key frames which are visually indistinct in the histogram difference. The key frames are then selected using a clustering processing based on the singly linked hierarchical tree. To make the selected key frames be distributed evenly on the whole video, the deviation and time difference between the selected key frames are used. The simulation results demonstrate that our method provides the better performance compared with previous methods.

  • PDF