• Title/Summary/Keyword: S/key

Search Result 9,988, Processing Time 0.035 seconds

A study on advanced Kerberos Authentication between Realms based on PKINIT (PKINIT기반의 향상된 Kerberos 인증에 관한 연구)

  • 신광철;정진욱
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.12
    • /
    • pp.1541-1548
    • /
    • 2001
  • In this paper, We propose a new Kerberos certification mechanism that improve certification service based on PKINIT that announce in IETF CAT Working Group. Certification between area connected by chain through PKINIT that use X.509 and DS/DNS mutually for service. In order to provide regional services used private key and public key, X.509 of PKINIT is employed on session part and Kerberos's private key on actual authentication part. New mechanism be reduced communication overload doing to simplify certification formality between Client and remote KDC by KDC's certificate use to get ticket in remote sacred ground and remote KDC's reaffirmation process omitted.

  • PDF

miR-380-3p promotes β-casein expression by targeting αS1-casein in goat mammary epithelial cells

  • Ning Song;Jun Luo;Lian Huang;Xiaoying Chen;Huimin Niu;Lu Zhu
    • Animal Bioscience
    • /
    • v.36 no.10
    • /
    • pp.1488-1498
    • /
    • 2023
  • Objective: αS1-Casein is more closely associated with milk allergic reaction than other milk protein components. microRNA (miRNA) is a class of small non-coding RNAs that modulate multiple biological progresses by the target gene. However, the post-transcriptional regulation of αS1-casein expression by miRNA in ruminants remains unclear. This study aims to explore the regulatory roles of miR-380-3p on αS1-casein synthesis in goat mammary epithelial cells (GMEC). Methods: αS1-Casein gene and miR-380-3p expression was measured in dairy goat mammary gland by quantitative real-time polymerase chain reaction (qRT-PCR). miR-380-3p overexpression and knockdown were performed by miR-380-3p mimic or inhibitor in GMEC. The effect of miR-380-3p on αS1-casein synthesis was detected by qRT-PCR, western blot, luciferase and chromatin immunoprecipitation assays in GMEC. Results: Compared with middle-lactation period, αS1-casein gene expression is increased, while miR-380-3p expression is decreased during peak-lactation of dairy goats. miR-380-3p reduces αS1-casein abundance by targeting the 3'-untranslated region (3'UTR) of αS1-casein mRNA in GMEC. miR-380-3p enhances β-casein expression and signal transducer and activator of transcription 5a (STAT5a) activity. Moreover, miR-380-3p promotes β-casein abundance through target gene αS1-casein, and activates β-casein transcription by enhancing the binding of STAT5 to β-casein gene promoter region. Conclusion: miR-380-3p decreases αS1-casein expression and increases β-casein expression by targeting αS1-casein in GMEC, which supplies a novel strategy for reducing milk allergic potential and building up milk quality in ruminants.

Insecticidal Activity and Histopathological Effects of Vip3Aa Protein from Bacillus thuringiensis on Spodoptera litura

  • Song, Feifei;Lin, Yunfeng;Chen, Chen;Shao, Ensi;Guan, Xiong;Huang, Zhipeng
    • Journal of Microbiology and Biotechnology
    • /
    • v.26 no.10
    • /
    • pp.1774-1780
    • /
    • 2016
  • Vegetative insecticidal proteins (Vips) are insecticidal proteins synthesized by Bacillus thuringiensis during the vegetative stage of growth. In this study, Vip3Aa protein, obtained by in vitro expression of the vip3Aa gene from B. thuringiensis WB5, displayed high insecticidal activity against Spodoptera litura aside from Spodoptera exigua and Helicoverpa armigera. Bioassay results showed that the toxicity of Vip3Aa protein against S. litura larvae statistically decreased along with the increase of the age of the larvae, with LC50 = 2.609 ng/cm2 for neonatal larvae, LC50 = 28.778 ng/cm2 for first instar larvae, LC50 = 70.460 ng/cm2 for second instar larvae, and LC50 = 200.627 ng/cm2 for third instar larvae. The accumulative mortality of 100% larvae appeared at 72 h for all instars of S. litura larvae, when feeding respectively with 83.22, 213.04, 341.40, and 613.20 ng/cm2 of Vip3Aa toxin to the neonatal and first to third instar larvae. The histopathological effects of Vip3Aa toxin on the midgut epithelial cells of S. litura larvae was also investigated. The TEM observations showed wide damage of the epithelial cell in the midgut of S. litura larvae fed with Vip3Aa toxin.

Comparative analysis on design key-word of the four major international fashion collections - focus on 2018 fashion collection - (4대 해외 패션 컬렉션의 디자인 key-word 비교분석 - 2018년 패션 컬렉션을 중심으로 -)

  • Kim, Sae-Bom;Lee, Eun-Suk
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.21 no.3
    • /
    • pp.109-119
    • /
    • 2019
  • The purpose of this study is to examine fashion trends and the direction of the four fashion collections by analyzing the design key-words of the four major international fashion collections in 2018. The data of this study was collected by extracting the key-words from Marie Claire Korea in 2018, with the total of the collected data numbering 2,144. The data was analyzed by text mining using the R program and word-cloud, and a co-occurrence network analysis was conducted. The results of this study are as follows: First, the key-words of fashion collection designs in 2018 were fringe and ruffle detail, silk and denim fabric, vivid color, stripe and check pattern, pants suit item, and oversized silhouette, focusing on romanticism and sport. Second, seasonal characteristics of the fashion collections were pastel colors in S/S, primary and vivid colors in F/W. Details were embroidery and cutouts in S/S, patchwork and fringe in F/W. Third, the design trends of the four major fashion collections were presented in the Paris collection: stripes, check patterns, embroidery, lace, tailoring, draping, romanticism, and glamor. In the Milan collection, checks, prints, denim, and minidresses reflected sport and romanticism. The London collection included fringe, ruffles, floral patterns, flower patterns, and romanticism. The New York collections included vivid colors, neon colors, pastel colors, oversize silhouettes, bodysuits, and long dresses.

Educational Needs Assessment for the Development of Curriculum based on Key Competencies of National Competence Standard(NCS) for Department related Culinary Arts in a 2-Year College (전문대학 조리관련 학과의 국가직무능력표준(NCS) 직업기초능력 기반 교육과정 개발을 위한 교육요구도 분석)

  • Na, Tae-Kyun
    • Culinary science and hospitality research
    • /
    • v.23 no.5
    • /
    • pp.58-66
    • /
    • 2017
  • The purpose of this study was to assess priority of educational needs for the development of curriculum based on key competencies of NCS for departments related to culinary arts in a 2-year college. In order to achieve this objective, the survey has been distributed to cooks working in hotel restaurants or restaurant companies by social network service and a total of 360 responses were analyzed excluding 18 responses. The collected surveys were analysed by using paired t-test, Borich's needs analysis and the locus for focus analysis. The results of this study were as follows. First, the difference between the level of importance and present level about key competencies recognized by cooks working in restaurant company was statistically significant in 9 fields of key competencies excluding mathematical competence. The difference recognized by cooks working in hotel was statistically significant in all 10 fields of key competencies. Second, the results of Borich's needs assessment showed that the education needs of problem solving competence were the highest, followed by interpersonal, resource management, communication, information competence. Finally, considering both Borich's needs assessment and the locus for focus analysis, cooks working in hotel restaurants recognized that educational needs of communication, interpersonal, problem-solving, information competence were the top priority, and cooks working in restaurant companies recognized that educational needs of communication, interpersonal, skill, resource management competence were the top priority. Therefore, it is necessary to develop curriculum for culinary arts specialists based on key competence of top priority.

Expression, Purification and Properties of Shikimate Dehydrogenase from Mycobacterium Tuberculosis

  • Zhang, Xuelian;Zhang, Shunbao;Hao, Fang;Lai, Xuhui;Yu, Haidong;Huang, Yishu;Wang, Honghai
    • BMB Reports
    • /
    • v.38 no.5
    • /
    • pp.624-631
    • /
    • 2005
  • Tuberculosis, caused by Mycobacterium tuberculosis, continues to be one of the main diseases to mankind. It is urgent to discover novel drug targets for appropriate antimicrobial agents against this human pathogen. The shikimate pathway is onsidered as an attractive target for the discovery of novel antibiotics for its essentiality in bacteria and absence in mammalian cells. The Mycobacterium tuberculosis aroE-encoded shikimate dehydrogenase was cloned, expressed and purified. Sequence alignment analysis shows that shikimate dehydrogenase of Mycobacterium tuberculosis exhibit the pattern of G-X-(N/S)-V-(T/S)-X-PX-K, which is highly conserved within the shikimate dehydrogenase family. The recombinant shikimate dehydrogenase spectrum determined by CD spectroscopy showed that the percentages for $\alpha$-helix, $\beta$-sheet, $\beta$-turn, and random coil were 29.2%, 9.3%, 32.7%, and 28.8%, respectively. The enzymatic characterization demonstrates that it appears to be fully active at pH from 9.0 to 12, and temperature $63^{\circ}C$. The apparent Michaelis constant for shikimic acid and $NADP^+$ were calculated to be about $29.5\;{\mu}M$ and $63\;{\mu}M$. The recombinant shikimate dehydrogenase catalyzes the substrate in the presence of $NADP^+$ with an enzyme turnover number of $399\;s^{-1}$. Zymological studies suggest that the cloned shikimate dehydrogenase from M. tuberculosis has a pretty activity, and the work should help in the discovery of enzyme inhibitors and further of possible antimicrobial agents against Mycobacterium tuberculosis.

The characteristic of Cu2ZnSnS4 thin film solar cells prepared by sputtering CuSn and CuZn alloy targets

  • Lu, Yilei;Wang, Shurong;Ma, Xun;Xu, Xin;Yang, Shuai;Li, Yaobin;Tang, Zhen
    • Current Applied Physics
    • /
    • v.18 no.12
    • /
    • pp.1571-1576
    • /
    • 2018
  • Recent study shows that the main reason for limiting CZTS device performance lies in the low open circuit voltage, and crucial factor that could affect the $V_{oc}$ is secondary phases like ZnS existing in absorber layer and its interfaces. In this work, the $Cu_2ZnSnS_4$ thin film solar cells were prepared by sputtering CuSn and CuZn alloy targets. Through tuning the Zn/Sn ratios of the CZTS thin films, the crystal structure, morphology, chemical composition and phase purity of CZTS thin films were characterized by X-Ray Diffraction (XRD), scanning electron microscopy (SEM) equipped with an energy dispersive spectrometer (EDS) and Raman spectroscopy. The statistics data show that the CZTS solar cell with a ratio of Zn/Sn = 1.2 have the best power convention efficiency of 5.07%. After HCl etching process, the CZTS thin film solar cell with the highest efficiency 5.41% was obtained, which demonstrated that CZTS film solar cells with high efficiency could be developed by sputtering CuSn and CuZn alloy targets.

A design of ABC(Advanced Block Cipher) Algorithm (ABC(Advanced Block Cipher) 알고리즘 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yun, Dong-Sic
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.2
    • /
    • pp.64-69
    • /
    • 2010
  • This paper designs the ABC(Advanced Block Cipher) algorithm which is a 64byte block encryption algorithm, improves the performance of encryption process time, and makes an key exchange using EC-DH. The ABC algorithm reduces basic memory occupation rates using the original data position exchange method which is a data swap key without S-Box, IP-Box and etc. Also, it prepares the exposure of symmetric key using the unfixed encryption(decryption) key excepting the fixed encryption(decryption) key. Therefore, the proposed ABC algorithm in this paper is a proper encryption algorithm in lower memory environment and mobile banking.

  • PDF

Identification of Amino Acid Residues Involved in the Interaction between Measles Virus Haemagglutin (MVH) and Its Human Cell Receptor(Signaling Lymphocyte Activation Molecule, SLAM)

  • Xu, Qin;Zhang, Peng;Hu, Chunling;Liu, Xin;Qi, Yipeng;Liu, Yingle
    • BMB Reports
    • /
    • v.39 no.4
    • /
    • pp.406-411
    • /
    • 2006
  • Signaling lymphocyte activation molecule (SLAM; also known as CD150) is a newly identified cellular receptor for measles virus (MV). The interaction between MV Haemagglutin (MVH) and SLAM is an initial step for MV entry. We have identified several novel SLAM binding sites at residues S429, T436 and H437 of MVH protein and MVH mutants in these residues dramatically decrease the ability to interaction with the cell surface SLAM and fail to co-precipitation with SLAM in vivo as well as malfunction in syncytium formation. At the same time, K58, S59 and H61 of SLAM was also identified to be critical for MVH and SLAM binding. Further, these residues may be useful targets for the development of measles therapy.

The Key Management System using the Secret Sharing Scheme Applicable to Smart Card (스마트 카드에 적용 가능한 비밀분산법을 이용한 키 관리 시스템)

  • Son, Young-Seol;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.585-594
    • /
    • 2004
  • When several service providers want to work together with only one master key, they need to properly distribute the key to participants who come in for the co-work business and then securely manage the distributed keys. This paper describes the system that can efficiently and securely manage the master key on the basis of the secret sharing scheme that can reconstruct original secret information as the necessity of reconstructing original secret arises. The proposed system can distribute secret information to several groups and also redistribute the secret to subgroup in proportion to the participant's security level using smart card-based (t, t)-(k, n)-threshold secret scheme for securely keeping secret information and authentication of participant's identification.