• Title/Summary/Keyword: Active Tag

Search Result 165, Processing Time 0.024 seconds

Development of High-Intergrated DNA Array on a Microchip by Fluidic Self-assembly of Particles (담체자기조직화법에 의한 고집적 DNA 어레이형 마이크로칩의 개발)

  • Kim, Do-Gyun;Choe, Yong-Seong;Gwon, Yeong-Su
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.51 no.7
    • /
    • pp.328-334
    • /
    • 2002
  • The DNA chips are devices associating the specific recognition properties of two DNA single strands through hybridization process with the performances of the microtechnology. In the literature, the "Gene chip" or "DNA chip" terminology is employed in a wide way and includes macroarrays and microarrays. Standard definitions are not yet clearly exposed. Generally, the difference between macro and microarray concerns the number of active areas and their size, Macroarrays correspond to devices containing some tens spots of 500$\mu$m or larger in diameter. microarrays concern devices containing thousnads spots of size less than 500$\mu$m. The key technical parameters for evaluating microarray-manufacturing technologies include microarray density and design, biochemical composition and versatility, repreducibility, throughput, quality, cost and ease of prototyping. Here we report, a new method in which minute particles are arranged in a random fashion on a chip pattern using random fluidic self-assembly (RFSA) method by hydrophobic interaction. We intend to improve the stability of the particles at the time of arrangement by establishing a wall on the chip pattern, besides distinction of an individual particle is enabled by giving a tag structure. This study demonstrates the fabrication of a chip pattern, immobilization of DNA to the particles and arrangement of the minute particle groups on the chip pattern by hydrophobic interaction.ophobic interaction.

Characterization of a Paenibacillus woosongensis ${\beta}$-Xylosidase/${\alpha}$-Arabinofuranosidase Produced by Recombinant Escherichia coli

  • Kim, Yeon-A;Yoon, Ki-Hong
    • Journal of Microbiology and Biotechnology
    • /
    • v.20 no.12
    • /
    • pp.1711-1716
    • /
    • 2010
  • A gene encoding the ${\beta}$-xylosidase/${\alpha}$-arabinofuranosidase (XylC) of Paenibacillus woosongensis was cloned into Escherichia coli. This xylC gene consisted of 1,425 nucleotides, encoding a polypeptide of 474 amino acid residues. The deduced amino acid sequence exhibited an 80% similarity with those of both Clostridium stercorarium ${\beta}$-xylosidase/${\alpha}$-N-arabinosidase and Bacillus cellulosilyticus ${\alpha}$-arabinofuranosidase, belonging to the glycosyl hydrolase family 43. The structural gene was subcloned with a C-terminal His-tag into a pET23a(+) expression vector. The His-tagged XylC, purified from a cell-free extract of a recombinant E. coli BL21(DE3) Codon Plus carrying a xylC gene by affinity chromatography, was active on para-nitrophenyl-${\alpha}$-arabinofuranoside (pNPA) as well as para-nitrophenyl-${\beta}$-xylopyranoside (pNPX). However, the enzymatic activities for the substrates were somewhat incongruously influenced by reaction pHs and temperatures. The enzyme was also affected by various chemicals at different levels. SDS (5 mM) inhibited the enzymatic activity for pNPX, while enhancing the enzymatic activity for pNPA. Enzyme activity was also found to be inhibited by addition of pentose or hexose. The Michaelis constant and maximum velocity of the purified enzyme were determined for hydrolysis of pNPX and pNPA, respectively.

Construction and Characterization of an Enhanced GFP-Tagged TIM-1 Fusion Protein

  • Qing, Jilin;Xiao, Haibing;Zhao, Lin;Qin, Guifang;Hu, Lihua;Chen, Zhizhong
    • Journal of Microbiology and Biotechnology
    • /
    • v.24 no.4
    • /
    • pp.568-576
    • /
    • 2014
  • TIM-1 (also known as KIM-1 and HAVcr-1) is a type I transmembrane glycoprotein member of the TIM family that may play important roles in innate and adaptive immune responses. The overexpression of proteins associated with membrane proteins is a major obstacle to overcome in studies of membrane protein structures and functions. In this study, we successfully coupled the overexpression of the TIM-1 protein with a C-terminal enhanced green fluorescent protein (GFP) tag in Escherichia coli. To the best of our knowledge, this report is the first to describe the overexpression of human TIM-1 in E. coli. The purified TIM-1-EGFP fusion protein recognized and bound directly to apoptotic cells and did not to bind to viable cells. Furthermore, we confirmed that the interactions of TIM-1-EGFP with apoptotic cells were blocked by TIM-1-Fc fusion proteins. This fusion protein represents a readily obtainable source of biologically active TIM-1 that may prove useful in future studies of human TIM-1.

Location Error Analysis of an Active RFID-Based RTLS in Multipath and AWGN Environments

  • Myong, Seung-Il;Mo, Sang-Hyun;Yang, Hoe-Sung;Cha, Jong-Sub;Lee, Heyung-Sub;Seo, Dong-Sun
    • ETRI Journal
    • /
    • v.33 no.4
    • /
    • pp.528-536
    • /
    • 2011
  • In this paper, we analyze the location accuracy of real-time locating systems (RTLSs) in multipath environments in which the RTLSs comply with the ISO/IEC 24730-2 international standard. To analyze the location error of RTLS in multipath environments, we consider a direct path and indirect path, in which time and phase are delayed, and also white Gaussian noise is added. The location error depends strongly on both the noise level and phase difference under a low signal-to-noise ratio (SNR) regime, but only on the noise level under a high SNR regime. The phase difference effect can be minimized by matching it to the time delay difference at a ratio of 180 degrees per 1 chip time delay (Tc). At a relatively high SNR of 10 dB, a location error of less than 3 m is expected at any phase and time delay value of an indirect signal. At a low SNR regime, the location error range increases to 8.1 m at a 0.5 Tc, and to 7.3 m at a 1.5 Tc. However, if the correlation energy is accumulated for an 8-bit period, the location error can be reduced to 3.9 m and 2.5 m, respectively.

Design and Implementation of the Foot-and-Mouth Disease Prevention System using RTLS (RTLS를 이용한 구제역 예방 시스템의 설계 및 구현)

  • Lee, Ki-Young;Kim, Kyu-Ho;Kwun, Tae-Min;Lim, Myung-Jae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.69-74
    • /
    • 2011
  • In this paper, we propose a foot-and-mouth disease prevention system using the RTLS technology and $A^*$ algorithm-based optimal path search method to avoid foot-and-mouth disease areas. The main features and contributions of the proposed system are as follows. First, the proposed system is developed based on active-tag for identifying status and location information of livestock. Second, the system is newly designed based on $A^*$ algorithm for supporting optimal path search services. The performance evaluation of the proposed system is performed via simulation. The results of performance evaluation show that the proposed system can efficiently support the optimal path search services.

The Study on the Activation of Public Library Services Utilizing Twitter (트위터를 활용한 공공도서관 서비스 활성화 방안 연구)

  • Oh, Eui-Kyung
    • Journal of Information Management
    • /
    • v.43 no.2
    • /
    • pp.133-150
    • /
    • 2012
  • This study showed the activation of public library services utilizing twitter. Top five American public library twitter's 1,373 tweets collected, analyzed by content types and examined applicability into public library services. Based on the results, it suggested that public library services can be activated by auto-tweeting informations within home page, re-tweeting of timely informations, generating HASH tag, using diverse social medias, active re-tweeting/replying, and utilizing twitter programs such as twit-bot. Finally, the study proposed that evaluations about twitter services such as satisfaction survey should be carried out.

Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System (효율성을 고려한 해시 함수 기반의 안전한 RFID 인증 프로토콜)

  • Kim, Ik-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.428-434
    • /
    • 2009
  • Many RFID authentication protocols have been proposed to build a secure ubiquitous environment. However, existing protocols do not respond recent attacks appropriately and they perform many hash operations to authenticate a large number of tags. In this paper, we propose a hash function-based secure authentication protocol for improving efficiency in RFID system. The proposed protocol is safe to passive attacks and active attacks, and requires only 2 hash operations in a tag and 3 hash operations in a database. Accordingly, the proposed protocol is very effective in RFID system environment which is composed to low-cost tags and a database handling many tags.

A Security Model for Duplication Resistant eSeal (복제 공격 저항성을 갖는 전자봉인 보안 모델)

  • Kim, Joo-Hae;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.111-116
    • /
    • 2007
  • An eSeal(Electrical Seal) is an active RFID device which installed on the door of a container. The main role of the tag is to make sure the seal is not breaking by unauthorized people. Because an eSeal uses RFID system, we need to prevent eavesdrop and impersonate. Moreover, an eSeal which uses a secure protocol must not be able to duplicate. If duplication resistant property is not provide to a eSeal, an attacker may replace a object in the sealed container and reseal the container with duplicated eseal to hide breaking of the eSeal. In this paper, we provide a protocol which resist duplicate an eSeal during prevent eavesdrop and impersonation.

Functional Characteristics of Whey Protein-Derived Peptides Produced Using Lactic Acid Bacteria Hydrolysis

  • Jae-Yong Lee;Dong-Gyu Yoo;Yu-Bin Jeon;Se-Hui Moon;Ok-Hee Kim;Dong-Hyun Lee;Cheol-Hyun Kim
    • Journal of Dairy Science and Biotechnology
    • /
    • v.41 no.1
    • /
    • pp.34-43
    • /
    • 2023
  • Hydrolysis of whey-derived proteins using lactic acid bacteria (LAB) utilizes the mass culture method and fermentation of LAB to produce effective bioactive peptides. Whey protein has the biological potential of its precursors, but the active fragments may not be released depending on the hydrolysis method. As an alternative to these problems, the nutritional and bioactive functionality of the hydrolysis method have been reported to be improved using LAB for whey protein. Peptide fractions were obtained using a sample fast protein liquid chromatography device. Antioxidant activity was verified for each of the five fractions obtained. In vitro cell experiments showed no cytotoxicity and inhibited nitric oxide production. Cytokine (IL [interleukin]-1α, IL-6, tumor necrosis factor-α) production was significantly lower than that of lipopolysaccharides (+). As a result of checking the amino acid content ratio of the fractions selected through the AccQ-Tag system, 17 types of amino acids were identified, and the content of isoleucine, an essential amino acid, was the highest. These properties show their applicability for the production of functional products utilizing dietary supplements and milk. It can be presented as an efficient method in terms of product functionality in the production of uniform-quality whey-derived peptides.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF