• Title/Summary/Keyword: Tags

Search Result 1,307, Processing Time 0.026 seconds

EST-based Survey of Gene Expression in Seven Tissue Types from the Abalone Haliotis discus hannai

  • Park, Eun-Mi;Nam, Bo-Hye;Kim, Young-Ok;Kong, Hee-Jeong;Kim, Woo-Jin;Lee, Sang-Jun;Kong, In-Soo;Choi, Tae-Jin
    • Fisheries and Aquatic Sciences
    • /
    • v.10 no.3
    • /
    • pp.119-126
    • /
    • 2007
  • The analysis of expressed sequence tags (ESTs) is an efficient approach for gene discovery, expression profiling, and the development of resources for functional genomics. To analyze the transcriptome of the abalone Haliotis discus hannai, we conducted EST analysis using seven cDNA libraries made from gill, gut, hepatopancreas, skin, muscle, testis, and ovary. Redundant ESTs were assembled into overlapping contiguous sequences using the assembly program ICAtools. We found that the total 1,393 ESTs formed 135 clusters and 951 singletons, indicating that the overall redundancy of the library was 22%. Of the 1,393 clones, BLAST identified 1,278 clones (91.7%) as known genes; 115 clones (8.3%) did not match any previously described gene. Based on the major functions of their encoded proteins, the identified clones were classified into 16 broad categories. Sequence analysis revealed the presence of micro satellite-containing genes that may be valuable for further gene mapping studies. This study contributes to the identification of numerous EST clones that can be applied to further clarifying the genetics and developmental biology of abalone.

Multi-Tag Beamforming Scheme Based on Backscatter Communication for RF Energy Harvesting Networks (RF 에너지 하베스팅 네트워크를 위한 Backscatter 통신 기반의 다중 태그 빔포밍 기법)

  • Hong, Seung Gwan;Hwang, Yu Min;Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.2
    • /
    • pp.60-64
    • /
    • 2016
  • In this paper, we propose a scheme for MIMO beamforming for the backscatter communication using a multi-tag to improve the efficiency of energy harvesting and the BER of received signals. We obtain a normal channel information through a communication between the H-AP and multi-tag. The H-AP sets parameters for the transmission scenario of the spatial channel model (SCM) using the obtained channel information and generates a SCM channel information. Then, the H-AP transmits signals that have optimal transmission power to increase the signal-to-interference-plus-noise ratio (SINR) to each of tags. Tags perform a backscatter communication with signals. The receiver performs a time switching technique of energy harvesting using backscatter signals from the multi-tag. Simulation results demonstrate effectiveness of the proposed scheme, and the harvesting efficiency and BER at the receiver is greatly improved.

Analysis of partial cDNA sequence from Theileria sergenti

  • Park, Jin-ho;Chae, Joon-seok;Kim, Dae-hyuk;Jang, Yong-suk;Kwon, Oh-deog;Lee, Joo-mook
    • Korean Journal of Veterinary Research
    • /
    • v.39 no.4
    • /
    • pp.797-805
    • /
    • 1999
  • T sergenti cDNA library were constructed to get a more broad information about the structural, functional or antigenic properties of the proteins, and analyzes for their partial cDNA sequences and expression sequences tags(ESTg). The mRNA were purified from T sergenti isolates to identify the information of antigen gene, then first and second strand cDNA was synthesized. EcoR I adaptor ligation and Xho I enzyme restriction were used to the synthesized cDNA, and ligated into a Uni-ZAP XR vector. T sergenti cDNA library was constructed with packaging and amplification in vitro. Antibody screening was performed with constructed T sergenti cDNA library using antisera against T sergenti. Among those clones, eight phagemids were rescued from the recombinant in vivo excision with f1 helper phage. Using the analysis of endonuclease restriction and PCR, the recombinant cDNA were proved having a 0.5-3.0kb of inserts. The eight of partial cDNA clones' sequences were obtained and examined for their homology using BLASTN and BLASTX. The eight of sequenced clones were classified into three groups according to the basis of database searches. A total 3,045bp of partial cDNA sequence were determined from six clones. The putatively identified clones contain a cytochrome c gene, a heat shock protein gene, a cyclophilin gene, and a ribosomal protein gene. The unidentified clones have a homology to ATP-binding protein(mtrA) gene of S argillaceus, DNA-binding protein(DBP) gene of Pseudorabies virus 85kDa merozoite protein gene of B bovis, mRNA spm1 protein of T annulata and glycine-rich RNA-binding protein mRNA of O sativa etc.

  • PDF

An Integrated RFID Service Management Policy Infromation Model (통합 RFID 서비스 관리 정책 모델)

  • Ahn, Hyung-Jin;Bang, Hyo-Chan;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.177-187
    • /
    • 2009
  • Typical RFID-device applications have provided users to each vendor-specific interface for supporting control and management of RF-tags and readers within their managed domain. Also, typical RFID-business applications have been implemented by using each event-data structure of RF-readers or RFID middlewares. RFID infrastructure managers, thus, are difficult to handle individual control and management specifications for managed RF-tags, devices and systems. Most RFID application services, also, are attached to providing visibility and traceability of an RF-tag item. To solve these problems, this paper proposes an RFID service management policy information model which supports to define unified control and management for heterogeneous RFID devices, middlewares and applications. This paper describes an example procedure that an RFID service management policy definition based on the proposed model is adaptively transformed and executed on a specific RFID sub-infrastructure.

  • PDF

A Qualitative Exploration of Folksonomy Users' Tagging Behaviors (폭소노미에 따른 웹 분류 연구 - 이용자 태깅 행위 분석을 중심으로 -)

  • Park, Hee-Jin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.1
    • /
    • pp.189-210
    • /
    • 2011
  • This study aims to explore how users are tagging in order to utilize a folksonomy and whether they understand the social and interactive aspects of tagging in three different folksonomic systems, Connotea (www.connotea.org), Delicious(http://delicious.com), and CiteULike(www.citeulike.org). The study uses internet questionnaires, qualitative diary studies, and follow-up interviews to understand twelve participants' tagging activities associated with folksonomic interactions. The flow charts developed from the twelve participants showed that tagging was a quite complex process, in which each tagging activity was interconnected, and a variety of folksonomic system features were employed. Three main tagging activities involved in the tagging processes have been identified: item selection, tag assignment, and tag searching and discovery. During the tag assignment, participants would describe their tagging motivations related to various types of tags. Their perception of the usefulness of types of tags was different when their purpose was for social sharing rather than personal information management. While tagging, participants recognized the social potential of a folksonomic system and used interactive aspects of tagging via various features of the folksonomic system. It is hoped that this empirical study will provide insight into theoretical and practical issues regarding users' perceptions and use of folksonomy in accessing, sharing, and navigating internet resources.

A STUDY ON THE SHEAR BOND STRENGTH OF RESIN CEMENTS (수종 레진시멘트의 전단결합강도에 관한 연구)

  • Yang, Mi-Young;Park, Sang-Jin
    • Restorative Dentistry and Endodontics
    • /
    • v.22 no.1
    • /
    • pp.132-143
    • /
    • 1997
  • Recently composite resin luting cement have been widely used according as esthetic requirement was increased. The purpose of this study was to evaluate of shear bond strength of four resin cements to bovine dentin. The materials used in this study were All-Bond 2(dentin bonding agent), Duolink cement, Bistite resin cement, Twinlook cement, Clearfil CR inlay cement. A total 40 acrylic cylinders with bovine dentin were divided into four groups. Four experimental groups were as follows; Group l(AB) : Specimens bonded with All-Bond 2 and Duolink Cement Group 2(BT) : Specimens bonded with Bistite Resin Cement Group 3(TL) : Specimens bonded with Twinlook Cement Group 4(CR) : Specimens bonded with Clearfil CR Inlay Cement Mter 1 hour of bonding, all specimens were stored for 24 hours in water at $37^{\circ}C$ and tested with Instron universal testing machine between bovine dentin and resin cements. The data were evaluated statistically at the 95% confidence level with a one-way analysis of variance and Tukey's range statistics. The following results obtained; 1. The group l(AB) was highest shear bond strength and the group 3(TL) was 10west(p>0.05). 2. Group 2(BT), 4(CR) were similar shear bond strength and there was no significant difference(p<0.05). 3. Group 1(AB), 4(CR) with acid etching were showed resin tags on the opened dentinal tubules, but Group 2(BT), 3(TL) without acid etching were not showed resin tags. 4. Group l(AB) was showed intimate adaptation than other groups.

  • PDF

Backward Channel Protection Method For RFID Tag Security in the Randomized Tree Walking Algorithm (랜덤화된 트리워킹 알고리즘에서의 RFID 태그 보안을 위한 백워드 채널 보호 방식)

  • Choi Wonjoon;Roh Byeong-hee;Yoo S. W.;Oh Young Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5C
    • /
    • pp.415-421
    • /
    • 2005
  • Passive RFID tag does not have its own power, so it has very poor computation abilities and it can deliver signals in very short range. From the facts, most RFID Tag security schemes assumed that the backward channel from tags to a reader is safe from eavesdropping. However, eavesdroppers near a tag can overhear message from a tag illegally. In this paper, we propose a method to protect the backward channel from eavesdropping by illegal readers. The proposed scheme can overcome the problems of conventional schemes such as randomized tree walking, which have been proposed to secure tag information in tree-walking algorithm as an anti-collision scheme for RFID tags. We showed the efficiency of our proposed method by using an analytical model, and it is also shown that the proposed method can provide the probability of eavesdropping in some standardized RFID tag system such as EPCglobal, ISO, uCode near to '0'.

A STUDY ON THE RESIN IMPREGNATION AND SHEAR BOND STRENGTH BY VARIOUS DENTIN CONDITIONERS (수종 상아질 표면처리제에 의한 레진 침투 및 전단결합강도에 관한 연구)

  • Lee, Kwang-Won;Lee, Myung-Jong
    • Restorative Dentistry and Endodontics
    • /
    • v.15 no.1
    • /
    • pp.201-216
    • /
    • 1990
  • A variety of surface pre-treatments have been advocated to prepare the dentin prior to placement of a bonding agent. The purpose of this study was to evaluate the effect of various dentin conditioners upon the degree of resin impregnation to the dentinal tubules and the shear bond strength of a new dentinal bonding agent (Scotchbond 2) used in conjunction with a visible light cured composite (Silux). The healthy eighty human molars extracted due to periodontal or orthodontic reasons were used and randomly divided into five groups. All the grinded dentin surfaces were conditioned with 3% $H_2O_2$, Cavity Cleanser (Columbus/Bayer), Dentin Conditioner (GC Inter. Corp.), Scotchprep (3M Co.) according to the manufacturer's directions. The specimens were then demineralized in 10% HCl for 20 sec. and 24 hrs. in order to observe the resin tags in Hitachi X-450 scanning electron microscope at 25KV. Also, shear strengths were obtained using an Instron Testing Machine with a cross head speed of 1 mm/min. The following results were obtained ; 1. In group treating with Dentin Conditioner and Scotchprep, the resin strings were formed on most of the surfaces and penetrated more than $50{\mu}m$ into the tubules. 2. The inner surface of resin treated with Cavity Cleanser, indicating the resin strings formed partly and penetrated about in depth of $30{\mu}m$. 3. In control and experimental group treated with 3% $H_2O_2$, the resin tags were not formed, if any, penetrated shortly. 4. Shear bond strengths in groups treating with Dentin Conditioner and Scotchprep were statistically significant increase than with 3% $H_2O_2$. (P<0.01). 5. The Scotchprep treatment group was significantly higher in shear strength than groups treated with no conditioning and Cavity Cleanser.(P<0.01) 6. Shear bond strengths evaluated were gradually increase in proportion to the tag length of resin impregnation.

  • PDF

Post Clustering Method using Tag Hierarchy for Blog Search (블로그 검색에서의 태그 계층구조를 이용한 포스트 군집화)

  • Lee, Ki-Jun;Kim, Kyung-Min;Lee, Myung-Jin;Kim, Woo-Ju;Hong, June-S.
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.301-319
    • /
    • 2011
  • Blog plays an important role as new type of knowledge base distinguishing from traditional web resource. While information resources in their existing website dealt with a wide range of topics, information resources of the blog are concentrated in specific units of information depending on the user's interests and have the criteria of classification forresources published by tagging. In this research, we build a tag hierarchy utilizing title keywords and tags of the blog, and propose apost clustering methodology applying the tag hierarchy. We then generate the tag hierarchy reflected the relationship between tags and develop the tag clustering methodology according to tag similarity. In this paper, we analyze the possibility of applying the proposed methodology with real-world examples and evaluate its performances through developed prototype system.

Implementation of RFID-based Information Management System for Bullfights (싸움소를 위한 RFID 기반 정보 관리시스템의 구현)

  • Cho, Yong-Hyun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.6
    • /
    • pp.768-774
    • /
    • 2008
  • This paper implements a information management system for a bullfights using RFID technology in which the objects containing electronic tag are automatically identified by using radio frequency wave. The presented system is composed of the information systems for career and train, and the real-time informant system to provide various informations to remote bull breeders and administers. As the first step for implementation, we analyze the requirements for information management systems based on the RFID and suggests design considerations. Based on the analysis, we implement an efficient RFID middleware system for tracking a tag location based on antenna transfer method and managing an intelligent tag information which efficiently manages a bullfight informations in field. And we also implement the web-based integrated management system for managing and providing a bullfight informations. The career management system sequentially recognizes a tags, and the training system concurrently recognizes the man tags.