• Title/Summary/Keyword: Tags

Search Result 1,307, Processing Time 0.029 seconds

A TMT-based quantitative proteomic analysis provides insights into the protein changes in the seeds of high- and low- protein content soybean cultivars

  • Min, Cheol Woo;Gupta, Ravi;Truong, Nguyen Van;Bae, Jin Woo;Ko, Jong Min;Lee, Byong Won;Kim, Sun Tae
    • Journal of Plant Biotechnology
    • /
    • v.47 no.3
    • /
    • pp.209-217
    • /
    • 2020
  • The presence of high amounts of seed storage proteins (SSPs) improves the overall quality of soybean seeds. However, these SSPs pose a major limitation due to their high abundance in soybean seeds. Although various technical advancements including mass-spectrometry and bioinformatics resources were reported, only limited information has been derived to date on soybean seeds at proteome level. Here, we applied a tandem mass tags (TMT)-based quantitative proteomic analysis to identify the significantly modulated proteins in the seeds of two soybean cultivars showing varying protein contents. This approach led to the identification of 5,678 proteins of which 13 and 1,133 proteins showed significant changes in Daewon (low-protein content cultivar) and Saedanbaek (high-protein content cultivar) respectively. Functional annotation revealed that proteins with increased abundance in Saedanbaek were mainly associated with the amino acid and protein metabolism involved in protein synthesis, folding, targeting, and degradation. Taken together, the results presented here provide a pipeline for soybean seed proteome analysis and contribute a better understanding of proteomic changes that may lead to alteration in the protein contents in soybean seeds.

Construction of the cDNA Library from Bombyx mori Larvae and Analysis of the Partial cDNA Sequences (누에 유충의 cDNA 유전자 은행 제작 및 cDNA 클론의 부분염기서울 분석)

  • 김상현;윤은영
    • Journal of Sericultural and Entomological Science
    • /
    • v.38 no.1
    • /
    • pp.13-18
    • /
    • 1996
  • To secure the genetic resources of silkworm, Bomyx mori, the cDNA library was constructed with mRNA isolated from fifth instar larvae. Titer of the cDNA library was about 1.3 X 106 plaques in total. We presumed that the titer covered all transcripts existed in Bombyx mori. Meanwhile, it is knowen that partial cDNA sequences, Expressed Sequence Tags(ESTs), have a good value for the discovery of novel genes and the elucidation of their structures. For this purpose, partial cDNA sequencing was carried out from randomly selected cDNA clones in the library. Partial cDNA sequences of 37 clones were determined and an average of 212 nucleotides of sequence can be read from the clone. The ESTs were searched in GenBAnk database and fifteen ESTs showed significant similarities to enlisted sequences. They included the genes of storage protein, heat shock protein, actin, catalase and so forth. We presumed that the 22 unmatched ESTs were novel genes.

  • PDF

Isolation and Characterization of Inducible Genes from Bombyx mori Injected with E. coli by Differential Screening (누에에의 차별화 선별을 통한 면역 관련 유도 유전자의 분리와 특성)

  • 김상현;제연호
    • Journal of Sericultural and Entomological Science
    • /
    • v.38 no.1
    • /
    • pp.19-24
    • /
    • 1996
  • To investigate the genes which is related to immune reaction of Bombyx mori, differential screening was carried out using naive and induced B. mori mRNA probe. To begin with, we constructed the cDNA library with mRNA isolated from fifth instar larvae injected with E. coli(4 X 106 cells/larva) using Uni ZAP XR vector kit. Thirty-two inducible cDNAs showing higher intensity on the induced mRNA probing membranes were selected. Partial nucleotide sequences of 29 clones were determined and their expessed sequence tags (ESTs) were produced. Nineteen ESTs in 29 ESTs were matched in GenBank database and the rest of them were found to be unknown. These unmatched ESTs were presumed to be novel genes. The nineteen ESTs contained variable genes related to biological process in Bombyx mori and four classes immune genes. Four clones, BmInc 6, 8, 18 and 27 were similar to two antibacterial peptide genes, hemolin gene and transferrin gene, respectively.

  • PDF

Survey of Expressed Sequence Tags from Tissue-Specific cDNA Libraries in Hemibarbus mylodon, an Endangered Fish Species (멸종위기 어류 어름치 Hemibarbus mylodon (Cypriniformes)로부터 조직별 EST library 제작 및 발현 유전자 탐색)

  • Bang, In-Chul;Lim, Yoon-Hee;Cho, Young-Sun;Lee, Sang-Yoon;Nam, Yoon-Kwon
    • Journal of Aquaculture
    • /
    • v.20 no.4
    • /
    • pp.248-254
    • /
    • 2007
  • Representative cDNA libraries were constructed from various tissue sources of Hemibarbus mylodon, an endangered freshwater fish species in Korea, for the mining of expressed sequence tags (ESTs). Randomized and non-normalized EST analysis was performed with 7 unidirectional cDNA libraries generated from brain, intestine, kidney, liver, muscle, ovary or testis. Of 3,383 ESTs in total, the number of singleton was 2,029, and 333 contigs containing 1,354 ESTs were assembled (percent of unigene = 70.0%). Abundantly expressed gene transcripts and broad clustering of putative gene function were tissue-specific in general, and the redundancy was also variable among those libraries. Over half of H. mylodon ESTs were matched with orthologues from other teleosts among which zebrafish gene sequences were the most frequent in those matches. This initial setting of EST libraries achieved in the present study would be a fundamental basis for the banking of gene resources from this endangered fish species.

FQTR : Novel Hybrid Tag Anti-Collision Protocols in RFID System (FQTR : RFID 시스템을 위한 새로운 하이브리드 태그 충볼 방지 프로토콜)

  • Jung, Seung-Min;Cho, Jung-Sik;Kim, Sung-Kwon
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.7
    • /
    • pp.560-570
    • /
    • 2009
  • RFID, Radio Frequency Identification, is a technology of automated identification replacing bar-code. RFID technology has advantages that it recognizes fast and it is strong to contamination using wireless communication. However, there are difficult problems that should be solved for popularization of RFID. Among of these, tag anti-collision problem is dealed in this paper. It affected the performance of RFID system directly. This paper analyzes conventional algorithms and proposes new algorithms of tag anti-collision. The algorithm proposed was composed of appropriate properties to each phase of distribution and recognition as hybrid between ALOHA-based algorithm and QT-based algorithm. At phase of distribution, the number of tags recognizing at a frame was reduced using ALOHA-based algorithm. It addressed the delay problem because of deep depth of tree. At phase of recognition, it solved ALOHA-based chronic problem that couldn't recognize all the tags sometimes. Moreover, QTR algorithm that recognize by reversed tag IDs was adopted for the performance. The FQTR algorithm proposed in this paper showed brilliant performance as compared with convention algorithms by simulation.

Enhanced Q-Algorithm for Fast Tag Identification in EPCglobal Class-1 Gen-2 RFID System (EPCglobal Class-1 Gen-2 RFID 시스템에서 고속 태그 식별을 위한 개선된 Q-알고리즘)

  • Lim, In-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.3
    • /
    • pp.470-475
    • /
    • 2012
  • In Q-algorithm of EPCglobal Class-1 Gen-2 RFID system, the initial value of $Q_{fp}$, which is the slot-count parameter, is not defined in the standard. And the values of weight C, which is the parameter for incrementing or decrementing the slot-count size, are not determined. Therefore, if the number of tags is small and we let the initial $Q_{fp}$ be large, the number of empty slot will be large. On the other hand, if we let the initial $Q_{fp}$ be small in spite of many tags, almost all the slots will be collided. Also, if the reader selects an inappropriate weight, there are a lot of empty or collided slots. As a result, the performance will be declined because the frame size does not converge to the optimal point quickly during the query round. In this paper, we propose a scheme to allocate the optimal initial $Q_{fp}$ through the tag number estimation and select the weight based on the slot-count size of current query round.

Central energy metabolism remains robust in acute steatotic hepatocytes challenged by a high free fatty acid load

  • Niklas, Jens;Bonin, Anne;Mangin, Stefanie;Bucher, Joachim;Kopacz, Stephanie;Matz-Soja, Madlen;Thiel, Carlo;Gebhardt, Rolf;Hofmann, Ute;Mauch, Klaus
    • BMB Reports
    • /
    • v.45 no.7
    • /
    • pp.396-401
    • /
    • 2012
  • Overnutrition is one of the major causes of non-alcoholic fatty liver disease (NAFLD). NAFLD is characterized by an accumulation of lipids (triglycerides) in hepatocytes and is often accompanied by high plasma levels of free fatty acids (FFA). In this study, we compared the energy metabolism in acute steatotic and non-steatotic primary mouse hepatocytes. Acute steatosis was induced by pre-incubation with high concentrations of oleate and palmitate. Labeling experiments were conducted using [$U-^{13}C_5$,$U-^{15}N_2$] glutamine. Metabolite concentrations and mass isotopomer distributions of intracellular metabolites were measured and applied for metabolic flux estimation using transient $^{13}C$ metabolic flux analysis. FFAs were efficiently taken up and almost completely incorporated into triglycerides (TAGs). In spite of high FFA uptake rates and the high synthesis rate of TAGs, central energy metabolism was not significantly changed in acute steatotic cells. Fatty acid ${\beta}$-oxidation does not significantly contribute to the detoxification of FFAs under the applied conditions.

Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 RFID 인증 프로토콜의 안전성 분석과 개선)

  • Kim, Jiye;Won, Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.581-591
    • /
    • 2016
  • RFID(Radio Frequency IDentification) is a key technology in ubiquitous computing and is expected to be employed in more fields in the near future. Nevertheless, the RFID system is vulnerable to attacks by eavesdropping or altering of the messages transmitted in wireless channels. In 2013, Oh et al. proposed a mutual authentication protocol between a tag and a reader in RFID systems. Their protocol is designed to resist location tracking for privacy protection. However, all tags and readers use only one network-wide key in their protocol and tags are usually vulnerable to physical attacks. We found that their protocol is still vulnerable to tag/reader impersonation attacks and location tracking if an attacker obtains the network-wide key from a tag. In this paper, we propose a security improved authentication protocol for privacy protection in RFID systems. In addition, we demonstrate that the proposed scheme is efficient in terms of computation and communication costs.

Dual-Radio Tag System for RFID Tag Mesh Networking (RFID 태그간 메쉬 네트워킹을 위한 듀얼 라디오 태그 시스템)

  • Kim, Jin-Hwan;Yoo, Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11B
    • /
    • pp.1272-1282
    • /
    • 2009
  • This paper consists of two parts: the protocol for tag-to-tag mesh network and the implementation of dual-radio RFID system. Recently, RFID has been adopted in ports or warehouse, being attached to containers and palettes for loading/unloading automation. However, the RFID system has encountered one problem - some tags cannot receive any command from reader intermittently due to signal interference by containers or field equipments (e. g. cranes and yard tractors). This area where reader signal cannot reach is called dead-zone. The proposed method for solving the dead-zone problem is as follows. A zone which can be communicated directly between readers and tags communicates in 433MHz frequency band in compliance with ISO/IEC 18000-7 standard. On the other hand, dead-zone communicates in 2.4GHz frequency band by using tag-to-tag mesh network in compliance with IEEE 802.15.4 standard. The proposed method can not only save much cost to install additional readers but also help resolve the dead-zone problem. Furthermore, it can provide the easier, faster, and more economical network infrastructure.

Laboratory Tagging Experiment of Sea Urchin, Hemicentrotus pulcherrimus (A. Agassiz) (말똥성게, Hemicentrotus pulcherrimus(A. Agassiz)의 실내 표지방류 실험)

  • HUR Sung-Bum;YOO Sung-Kyoo;RHO Sum
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.18 no.4
    • /
    • pp.363-368
    • /
    • 1985
  • Tagged and untagged sea urchins, Hemicentrotus pulcherrimus (A. Agassiz) were reared for 84 days in the laboratory, Vinyl tape and trapall paper were used as tag materials. The natural mortality, mortality by predation and shedding rate of tags of the tagged groups were examined, and the results were compared with those of untagged control group. The results of Chi-square test of natural mortality between tagged and control groups were very significative, however, the comparison between the two tagged groups was insignificative. No effect of tag attachment seems to be present at the point of natural predation by starfish, and $x^2-test$ between two the tagged groups on the loss rate of tags showed also insignificance. The mortality shortly after tagging seems to be negligible, and the distinct decreasing effect on growth due to tag attachment was not revealed because of insufficient individuals and rearing periods.

  • PDF