• Title/Summary/Keyword: ID4

Search Result 764, Processing Time 0.031 seconds

Antimutagenic Activities of 24 Synthetic Flavones with The Salmonella Microsomal Assay

  • Laget, M.;De Meo, M.;Wallet, J.C.;Gaydou, E.M.;Guiraud, H.;Dumenil, G.
    • Archives of Pharmacal Research
    • /
    • v.18 no.6
    • /
    • pp.415-422
    • /
    • 1995
  • Twenty-four flavones were synthesized with various hydroxyl and/or methoxyl groups on A and B rings. Their antimutagenic properties were evaluated against ben:w(a)pyrene (BaP) and a pool of mutagenic urine concentrate (U) using a modified liquid incubation method of Ames test. The tester strain was Salmonella typhimurium TA98+S9 Mix. The antimutagenic activities were calculated by non linear regression analysis and the doses of flavones (in nmoles) required for a 50% reduction of induced revertants with BaP and U were defined as the inhibition doses (TEX>$ID_{508}{\;}and{\;}ID_{508}$ respectively). Seventeen flavones possessed significant antimutagenic activity against BaP. $ID_{508}$ ranged from 15.1 nmoles (F22) to 1000.6 nmoles (F13). Eighteen f1avones showed significant antimutagenic activity against U. $ID_{50U}$ ranged from 23.5 nmoles (F22) to 354.6 nmoles (F3). The 2',3',4'-trihydroxyflavone (F22, $ID_{508}=15.1$ nmoles, $ID_{50U}=23.5$ nmoles) and the 2',3',4',7-tetrahydroxyflavone (F20, $ID_{508}=37.8$ nmoles; $ID_{50U}=62.3$ nmoles) had antimutagenic activities similar to those of chlorophyllin ($ID_{508}=19.6$ nmoles and $ID_{50U}=44.2$ nmoles) and were evaluated against B(alP 7,8-dihydrodiol-9,10-epoxide. Against this last mutagen, the flavones which included three OH in B ring showed the highest activity and this property seemed independent of the substituent groups on A ring.

  • PDF

LATERAL CEPHALOMETRIC ANALYSIS OF ASYMPTOMATIC VOLUNTEERS AND SYMPTOMATIC PATIENTS WITH TEMPOROMANDIBULAR INTERNAL DERANGEMENT (악관절 내장증 환자와 정상인의 두부방사선규격사진의 분석비교)

  • Shin, Sang-Hun;Park, Sung-Jin
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.25 no.4
    • /
    • pp.330-336
    • /
    • 1999
  • Study of dentofacial structure relationships relative to TMJ internal derangement is required to increase the predictability of TMJ internal derangement. But few studies have been reported. The purpose of this study is to reveal any correlation of dentofacial characteristics with TMJ internal derangement by lateral cephalometric analysis. Patients were devided into two groups. (1) Symptomatic patients with TMJ internal derangement (2) Asymptomatic volunteers with no TMJ internal derangement. Twenty symptomatic patients with TMJ internal derangement(7male, 13female) were selected from our clinic and had undergone a standarized clinical examination, panorama, transcranical view, TMJ tomography. Twenty asymptomatic volunteers(9male, 11female) were selected from our clinic with no pain, no limitation of motion. All subjects had undergone lateral cephalometric analysis. The results were obtained as follows. 1. No significant difference between ID and normal group is detected in cranial base. 2. Maxilla position of ID group is located more posterioly than normal group. 3. Mandible position of ID group is located more posteriorly than normal group and facial profile is hyperdivergent. 4. Posterior facial height of ID group is less than normal group thus facial profile is hyperdivergent. The patients, as mentioned, have a high prevalance of ID thus it should be careful in TMJ ID diagnosis and treatment.

  • PDF

NON-INTERACTIVE IDENTITY-BASED DNF SIGNATURE SCHEME AND ITS EXTENSIONS

  • Lee, Kwang-Su;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Bulletin of the Korean Mathematical Society
    • /
    • v.46 no.4
    • /
    • pp.743-769
    • /
    • 2009
  • An ID-based DNF signature scheme is an ID-based signature scheme with an access structure which is expressed as a disjunctive normal form (DNF) with literals of signer identities. ID-based DNF signature schemes are useful to achieve not only signer-privacy but also a multi-user access control. In this paper, we formally define a notion of a (non-interactive) ID-based DNF signature and propose the first noninteractive ID-based DNF signature schemes that are secure under the computational Diffie-Hellman and subgroup decision assumptions. Our first scheme uses random oracles, and our second one is designed without random oracles. To construct the second one, we use a novel technique that converts a non-interactive witness indistinguishable proof system of encryption of one bit into a corresponding proof system of encryption of a bit-string. This technique may be of independent interest. The second scheme straightforwardly yields the first ID-based ring signature that achieves anonymity against full key exposure without random oracles. We finally present two extensions of the proposed ID-based DNF signature schemes to support multiple KGCs and different messages.

Performance of LED-ID System for Home Networking Applicaion (홈 네트워킹을 위한 LED-ID 시스템 성능분석)

  • Choi, Jae-Hyuck;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.169-176
    • /
    • 2010
  • We propose a Z-HBT line coding for a LED-ID system. Z-HBT line coding is defined as follows. First, we apply half bit transition to one bit. Second, we decode encoded bits using difference of bit transition level in one bit duration. As a result, we obtain advantages about synchronization problem and noise effect mitigation at the receiver. We set up outdoor the LED-ID simulation environment. At simulation results, we show 2-3dB gain as compared with existing line coding schemes. The results of the paper can be applied to design and implementation of LED-ID systems for indoor wireless multimedia services.

Implementation of Expert System Simulation based on 2th Security of Network (네트워크 2중 보안을 위한 전문가시스템 시뮬레이션의 구현)

  • Lee Chang-Jo
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.309-325
    • /
    • 2000
  • Organizations rely on Secure ID resources today to handle vast amounts of information. Because the data can vary widely in type and in degree of sensitivity, employees need to be able to exercise flexibility in handling and protecting it. It would not be practical or cost-effective to require that all data be handled in the same manner or be subject to the same protection requirements. Without some degree of standardization, however inconsistencies can develop at introduce risks. Policy formulation is an important step toward standardization of security activities for ID resources. ID security policy is generally formulated from the input of many members of an organization, including security officials, line managers, and ID resource specialists. However, policy is ultimately approved and issued by the organization's senior management. In environments where employees feel inundated with policies, directives, guidelines and procedures, an ID security policy should be introduced in a manner that ensures that management's unqualified support is clear. The organization's policy is management's vehicle for emphasizing the commitment to ID security and making clear the expectations for employee involvement and accountability. This paper will discuss ID security Policy in terms of the different types (program-level and issue-specific), components, and Implementation of Expert System Simulation based on 4GL, PowerBuilder.

  • PDF

Anti-obesity Effects of Ethanolic Extract of Polygonatum sibiricum Rhizome in High-fat Diet-fed Mice (고지방식이로 비만이 유도된 마우스에서 황정 주정 추출물의 항비만 효과)

  • Ko, Jong-Hee;Jeon, Woo-Jin;Kwon, Hyuk-Sang;Yeon, Seung-Woo;Kang, Jae-Hoon
    • Korean Journal of Food Science and Technology
    • /
    • v.47 no.4
    • /
    • pp.499-503
    • /
    • 2015
  • We investigated the anti-obesity effects of ethanolic extract (ID1216) of Polygonatum sibiricum rhizome and its potential underlying mechanism in an animal model. ID1216 treatment decreased body weight gain and white adipose tissue weight in the prevention study. The mRNA levels of sirtuin-1 (SIRT1), peroxisome proliferator-activated receptor ${\gamma}$ coactivator-$1{\alpha}$ ($PGC1{\alpha}$), and peroxisome proliferator-activated receptor ${\alpha}$ ($PPAR{\alpha}$) significantly increased in the epididymal white adipose tissue of ID1216-administered mice. The stimulation effects of ID1216 on these gene expressions were also observed in a cell-based assay using differentiated 3T3-L1 adipocytes. In addition, similar to orlistat, ID1216 treatment improved weight gain and reduced epididymal fat in the treatment model. These results suggest that ID1216 has potential as an anti-obesity agent by modulating the expression of genes related to thermogenesis, lipid metabolism and fatty acid oxidation.

Analysis of Inadvertent Intradiscal Injections during Lumbar Transforaminal Epidural Injection

  • Hong, Ji Hee;Lee, Sung Mun;Bae, Jin Hong
    • The Korean Journal of Pain
    • /
    • v.27 no.2
    • /
    • pp.168-173
    • /
    • 2014
  • Background: Recently, there have been several case reports and retrospective studies about the incidence of intradiscal (ID) injection during transforaminal epidural steroid injection (TFESI). Inadvertent ID injection is not a rare complication, and it carries the risk of developing diskitis, although there has been no report of diskitis after TFESI. We prospectively evaluated the incidence of inadvertent ID injection during lumbar TFESI and analyzed the contributing factors. Methods: Ten patients received 2-level TFESI, and the remaining 229 patients received 1-level TFESI. When successful TFESI was performed, 2 ml of contrast dye was injected under real-time fluoroscopy to check for any inadvertent ID spread. A musculoskeletal radiologist analyzed all magnetic resonance images (MRIs) of patients who demonstrated inadvertent ID injection. When reviewing MRIs, the intervertebral foramen level where ID injection occurred was carefully examined, and any anatomical structure which narrowing the foramen was identified. Results: Among the 249 TFESI, we identified 6 ID injections; thus, there was an incidence of 2.4%. Four patients had isthmic spondylolisthesis, and the level of spondylolisthesis coincided with the level of ID injection. We further examined the right or left foramen of the spondylolisthesis level and identified the upward migrated disc material that was narrowing the foramen. Conclusions: Inadvertent ID injection during TFESI is not infrequent, and pain physicians must pay close attention to the type and location of disc herniation.

IdMapper: A Java Application for ID Mapping across Multiple Cross-referencing Providers

  • Lee, Hoo-Keun;Kim, Hyeon-Jin;Yu, Ung-Sik
    • Genomics & Informatics
    • /
    • v.7 no.4
    • /
    • pp.208-211
    • /
    • 2009
  • We developed an identifier mapping application for bioinformatics research in Java programming language. It is easy to use and provides many usability functionalities that are expected as essentials for a professional application. It supports three widely used mapping services and can convert many ids from one source database into many target databases at once. Id mapping across service providers is possible by remapping the resultant ids. Because it adheres to the NetBeans platform architecture, it can be incorporated into other NetBeans platform applications as an id mapping provider without adaption or modification.

A Study on the Analysis of Authentication and ID-based key Management Protocol in Online Game Environment (온라인 게임 환경에서 인증 및 ID 기반 키 관리프로토콜 분석 연구)

  • Lee, Yang-Sun;Park, Sang-Oh
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.664-671
    • /
    • 2011
  • The development of IT technology and breakthrough of the network and the wired network, wireless network boundaries disappear and wired and wireless integrated service environment is the advent in online game environment. However, the wired and wireless integrated service environment appropriate security technology is still inactive, wired and wireless integration environment due to the characteristic as well as security threats wired network and security threats in wireless networks should be considered. Therefore, This wired and wireless integrated environment has been considering studied various, Among them wired and wireless environment considering the lightweight of ID-based authentication and key management has been in progress. In recent, Moon et al. pervasive environment in authentication and ID-based key management protocol is proposed. However, Moon et al.'s scheme is use the ID-based public-key approach to decreased the amount of computation. However, pairing by using a technique similar to the existing public key scheme can represent the amount of computation. Therefore, In this paper the way of Moon etc in security vulnerability analysis.

E-ID 카드 현황 및 고려사항

  • Cho, Jin-Man;Jin, Seung-Hun;Jo, Hyun-Suk
    • Review of KIISC
    • /
    • v.21 no.4
    • /
    • pp.32-39
    • /
    • 2011
  • 최근 행정안전부에서 주민등록 관련 법령을 정비하고 주민등록증의 갱신을 준비하고 있다. 이에 전자여권 등 E-ID 카드에 대한 특정, 현황을 살펴보고, E-ID 카드 도입시 검토해야 할 고려사항을 제시하고자 한다.