• Title/Summary/Keyword: 도메인네임

Search Result 65, Processing Time 0.027 seconds

Prostate Apoptosis Response-4 (Par-4) as a Cancer Therapeutic Target (암 치료 표적으로써 prostate apoptosis response-4 (Par-4))

  • Woo, Seon Min;Kwon, Taeg Kyu
    • Journal of Life Science
    • /
    • v.25 no.8
    • /
    • pp.947-952
    • /
    • 2015
  • Prostate apoptosis response-4 (Par-4) was originally identified in androgen-independent prostate cancer cells undergoing apoptosis. Par-4 is ubiquitously expressed in normal cells and tissues, but it is downregulated in several types of cancers. Par-4 is a 38 kDa tumor suppressor protein encoded by the PARW gene. Par-4 promotes apoptosis in a variety of cancerous cells, but not in normal cells. In this review, we focused on the structure, expression and function of Par-4 in apoptotic signaling pathway. Functional domains of Par-4 include two nuclear localization sequences (NLS), a leucine zipper (LZ) domain, a nuclear export sequence (NES) and selective for apoptosis in cancer cell (SAC) domain. Many studies have underlined the importance of Par-4 in preventing cancer development. The activity of Par-4 is differently regulated by localization of intracellular and extracellular Par-4. Intracellular Par-4 inhibits Akt- and NF-κB-mediated cell survival pathways and downregulates Bcl-2 expression. Extracellular Par-4 activates the extrinsic apoptotic pathway by binding to cell surface receptor GRP78, a stress response protein that is in the endoplasmic reticulum (ER). Endogenous Par-4 sensitizes cancer cells to various apoptotic stimuli, while exogenous Par-4 enhances SAC domain-dependent apoptosis in cancer cells, but not normal cells. Therefore, Par-4 is an attractive target for cancer therapy.

An Operations and Management Framework for The Integrated Software Defined Network Environment (소프트웨어 정의 네트워크 통합 운영 및 관리 프레임워크)

  • Kim, Dongkyun;Gil, Joon-Min
    • Journal of Digital Contents Society
    • /
    • v.14 no.4
    • /
    • pp.557-564
    • /
    • 2013
  • An important research challenge about the traditional Internet environment is to enable open networking architecture on which end users are able to innovate the Internet based on the technologies of network programmability, virtualization, and federation. The SDN (Software Defined Network) technology that includes OpenFlow protocol specifications, is suggested as a major driver for the open networking architecture, and is closely coupled with the classical Internet (non-SDN). Therefore, it is very important to keep the integrated SDN and non-SDN network infrastructure reliable from the view point of network operators and engineers. Under this background, this paper proposes an operations and management framework for the combined software defined network environment across not only a single-domain network, but also multi-domain networks. The suggested framework is designed to allow SDN controllers and DvNOC systems to interact with each other to achieve sustainable end-to-end user-oriented SDN and non-SDN integrated network environment. Plus, the proposed scheme is designed to apply enhanced functionalities on DvNOC to support four major network failure scenarios over the combined network infrastructure, mainly derived from SDN controllers, SDN devices, and the connected network paths.

Identification of Amino Acids Involved in the Sensory Function of the PrrB Histidine Kinase by Site-directed Mutagenesis (Site-directed mutagenesis에 의한 PrrB histidine kinase의 신호인지 기능에 관련된 아미노산의 발굴)

  • Kim Yong-Jin;Ko In-Jeong;Oh Jeong-Il
    • Journal of Life Science
    • /
    • v.16 no.3 s.76
    • /
    • pp.485-492
    • /
    • 2006
  • The PrrBA two-component system is one of the major regulatory systems that control expression of photosynthesis genes in response to changes in oxygen tension in the anoxygenic photosynthetic bacterium, Rhodobacter sphaeroides. The system consists of the PrrB histidine kinase and the PrrA response regulator. The N-terminal transmembrane domain of PrrB serves as a signal-sensing domain and comprises six transmembrane helices forming three periplasmic loops and two cytoplasmic loops. The $3^{rd}$ and $4^{th}$ transmembrane helices and the $2^{nd}$ periplasmic loop were suggested to play a crucial role in redox-sensory function. In this study we demonstrated that mutations of Asp-90, Gln-93, Leu-94, Leu-98, and Asn-106 in the $2^{nd}$ periplasmic loop and its neighboring region led to severe defects in PrrB sensory function, indicating that these amino acids might be related to the redox-sensing function of PrrB. The mutant forms (D90E, D90N, and D90A) of PrrB were heterologously overexpressed in Escherichia coli, purified by means of affinity chromatography and their autokinase activities were comparatively assessed. The D90N form of PrrB was shown to possess higher autokinase activity than the wild-type form of PrrB, whereas the D90E form of PrrB displayed lower autokinase activity than the wild-type form of PrrB. The D90A mutation led to the loss of PrrB autokinase activity.

Agent-Based Decision-Supporting System for Taguchi Experiment Planning (에이전트기반 다구찌 실험계획 의사결정지원시스템)

  • 조성진;이재원;김준식;김호윤
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.2
    • /
    • pp.1-17
    • /
    • 2001
  • This paper deals with an agent-based decision-supporting system for Taguchi experiment planning. Among the four major parts of Taguchi experiment, the planning phase includes the most important decision-making issues such as determination of experiment objectives, quality characteristics, and control factors. The planning phase, however, has not been paid proper attention by experiment designers. In this research, an agent-based decision-supporting system for Taguchi experiment planning has been developed to facilitate the planning tasks of experiment designer. The decision-supporting system is composed of two agent-based mechanisms. The first employs an Internet agent that collects the domain knowledge from knowledge providers who may be distributed in remote places. Another agent then visualizes the collected knowledge and reports it to the experiment designer. Engineers who would normally have difficulties in collaborating because of limitations on their time or because they are in different places can easily work together in the same experiment team and brainstorm to make good decisions. The second agent-based mechanism offers context-sensitive advice generated by another intelligent agent during the experiment planning process. it prevents the experiment designer from making improper decisions, which will increase the feasibility of the experiment and minimize the unnecessary expense of time and resources.

  • PDF

The Law and Case Study on the Domain Name Protection (도메인네임의 보호(保護)에 관한 법리(法理) 및 사례연구(事例硏究))

  • Kim, Yeon-Ho
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.15
    • /
    • pp.169-209
    • /
    • 2001
  • As a domain name can be registered simply by filing an application for registration, disputes over the domain name between the holder of domain name and the holder of trademark increased. Since the holder of trademark who was late for registering domain name is willing to pay for the return of domain name, cybersquatters increased. Cybersqatters are not genuine users of the Internet. This article is to compare the construction of law by American Courts and by Korean Courts and to assert the creation of the law similar to the law of US as to anti-cybersqatting. American Courts applied the Trademark Act and the Anti-Dilution Act to resolve the disputes over domain name. To apply the Trademark Act, the Court required the plaintiffs to prove that the goods or the services expressed by the domain name should be identical or similar to the goods or the services represented by the trademark. However, there were many cases where the holder of domain name used it for the goods or the services irrelevant to those of the holder of trademark. Also, the Anti-Dilution Act could not successfully protect the holder of trademark from cybersquatters because it required that the trademark should be famous or distinctive. As a result, the US promulgated a new law which is designed to prohibit cybersquatters from being free of sanction by the existing laws. Korea Courts applied the Trademark Act and the Unfair Competition Prohibition Act to the cases disputing domain name. Likewise in the US, Korean Courts must cope with the issue of identity of the goods or the services, and the famousness or distinctiveness of trademark. The Courts hesitate to give a winning judgement to the holder of trademark simply because the domain name of alleged violator confused the trademark. Some scholars advocate the broadening of construction of the Unfair Competition Prohibition Act to illegalize cybersquatting but it is beyond the meaning of the law. Accordingly, it is a time to make a law similar to the Anti-Cybersquatting Act of the US. The law must be a fair and reasonable compromise to resolve the collision between system of registration of domain name and the system of registration of trademark. Some commentators advocate that the registration of domain name should be examined just as the one of trademark and to facilitate it, the Patent and Trademark Office should have jurisdiction of registration of domain name. But it abandons the distinction of domain name and trademark and results in obstructing e-commerce. By adopting the Anti-Cybersqatting Act, we can prohibit it. In other cases, we get a reasonable adjustment between the holder of domain name and the holder of trademark through the Trademark Act and the Unfair Competition Prohibition Act.

  • PDF

Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.105-114
    • /
    • 2020
  • In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization's defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements.

The effect of Swd2's binding to Set1 on the dual functions of Swd2 in Saccharomyces cerevisiae (Saccharomyces cerevisiae의 Swd2와 Set1의 결합이 Swd2의 이중적인 기능에 미치는 영향)

  • Park, Shinae;Lee, Jung-Shin
    • Korean Journal of Microbiology
    • /
    • v.53 no.4
    • /
    • pp.286-291
    • /
    • 2017
  • In eukaryotic cells, histone modification is an important mechanism to regulate the chromatin structure. The methylation of the fourth lysine on histone H3 (H3K4) by Set1 complex is one of the various well-known histone modifications. Set1 complex has seven subunits including Swd2, which is known to be important for H2B ubiquitination dependent on H3K4 methylation. Swd2 was reported to regulate Set1's methyltransferase activity by binding to near RNA recognition motif (RRM) domain of Set1 and to act as a component of CPF (Cleavage and Polyadenylation Factors) complex involved in RNA 3' end processing. According to the recent reports, two functions of Swd2 work independently of each other and the lethality of Swd2 knockout strain was known to be caused by its function as a component of CPF complex. In this study, we found that Swd2 could influence the Set1's stability as well as histone methyltransferase activity through the association with RRM domain of Set1. Also, we found that ${\Delta}swd2$ mutant bearing truncated-Set1, which cannot interact with Swd2, lost its lethality and grew normally. These results suggest that the dual functions of Swd2 in H3K4 methylation and RNA 3' end processing are not independent in Saccharomyces cerevisiae.

SnSA Design and Embodiment for ESM of Small Scale Network (소규모 네트워크의 통합보안관제를 위한 SnSA 설계 및 구현)

  • 이동휘;신영준;김귀남
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.85-97
    • /
    • 2003
  • At the end of last January, 2003, a domestic top-level domain name server (DNS) shut down the server and it caused the wired and wireless internet services to be completely paralyzed in the aftermath of a virus attack incurring a various range of losses nationwide. The main reason of this event is the lack of our awareness of cyber security. In particular, in the small-scale network, there are few security administrators and no operating devices to protect information as well. Under this circumstance, using ESM center to service real-time security supervision and correspondence for network, it can be one option. However, due to the economic efficiency, most of security systems have been being developed focusing on the large-scale network first. Therefore, ESM centers which inspect security state of network concentrate on IDC or large-scale network services. This dissertation studies economical ESM service by designing exclusive SnSA for small-scale network for widespread use. Firstly, network invasion feeler function N_SnSA and host invasion feeler function H_SnSA are embodied to collect more informations in the small-scale network. Secondarily, the existing vulnerability is studied to find the solutions linked with a low cost to a Public center such as Kyonggi Univ ESM center.

  • PDF

A Sentence Theme Allocation Scheme based on Head Driven Patterns in Encyclopedia Domain (백과사전 영역에서 중심어주도패턴에 기반한 문장주제 할당 기법)

  • Kang Bo-Young;Myaeng Sung-Hyon
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.5
    • /
    • pp.396-405
    • /
    • 2005
  • Since sentences are the basic propositional units of text, their themes would be helpful for various tasks that require knowledge about the semantic content of text. Despite the importance of determining the theme of a sentence, however, few studies have investigated the problem of automatically assigning the theme to a sentence. Therefore, we propose a sentence theme allocation scheme based on the head-driven patterns of sentences in encyclopedia. In a serious of experiments using Dusan Dong-A encyclopedia, the proposed method outperformed the baseline of the theme allocation performance. The head-driven pattern 4, which is reconfigured based on the predicate, showed superior performance in the theme allocation with the average F-score of $98.96\%$ for the training data, and $88.57\%$ for the test data.

Response System for DRDoS Amplification Attacks (DRDoS 증폭 공격 대응 시스템)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.22-30
    • /
    • 2020
  • With the development of information and communication technology, DDoS and DRDoS continue to become security issues, and gradually develop into advanced techniques. Recently, IT companies have been threatened with DRDoS technology, which uses protocols from normal servers to exploit as reflective servers. Reflective traffic is traffic from normal servers, making it difficult to distinguish from security equipment and amplified to a maximum of Tbps in real-life cases. In this paper, after comparing and analyzing the DNS amplification and Memcached amplification used in DRDoS attacks, a countermeasure that can reduce the effectiveness of the attack is proposed. Protocols used as reflective traffic include TCP and UDP, and NTP, DNS, and Memcached. Comparing and analyzing DNS protocols and Memcached protocols with higher response sizes of reflective traffic among the protocols used as reflective traffic, Memcached protocols amplify ±21% more than DNS protocols. The countermeasure can reduce the effectiveness of an attack by using the Memcached Protocol's memory initialization command. In future studies, various security-prone servers can be shared over security networks to predict the fundamental blocking effect.