http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
B 세포에서 Epstein-Barr virus microRNA들의 전사 및 성숙
김도년,오상택,이재면,이원근,이숙경,Kim Do Nyun,Oh Sang Taek,Lee Jae Myun,Lee Won-Keun,Lee Suk Kyeong 한국생명과학회 2005 생명과학회지 Vol.15 No.6
우리는 바이러스로는 최초로 miRNA를 생성한다고 보고된 Epstein-Barr virus (EBV)를 대상으로 EBV miRNA biogenesis를 연구했다. 먼저 EVB에 감염된 B 세포인 B95-8로부터 보고된 5 종의 EBV miRNA들인 BHRF1-1, BHRF1-2, BHRF1-3, BART1, 및 BART2 모두가 발현됨을 확인하였다. 그 다음 성숙된 EBV miRNA 서열로부터 예측되는 pri- 와 pre-miRNA들이 B95-8에서 각각 검출되어 EBV miRNA들도 이미 알려진 동물세포 miRNA와 유사한 생성 및 성숙과정을 거칠 가능성을 확인하였다 게놈 상에 2~7개씩 밀집하여 존재하는 동물세포 miRNA들과 유사하게 EBV 게놈의 2부 위에 밀집해서 존재하는 EBV miRNA들도 polycistronic하게 발현되는지 조사한 결과 B95-8에서 BHRF1-1, BHRF1-2 및 BHRF1-3를 포함하는 1,602 뉴클레오타이드의 긴 전사체가 RT-PCR로 확인되었다. 반면 BART1과 BART2는 mono cistronic하게 전사될 가능성이 확인되었다. 본 연구를 통하여 EBV miRNA들도 동물세포 miRNA들과 유사하게 poly cistronic 하게 발현될 수 있으며 pri-와 pre-miRNA 과정을 거쳐 성숙된 miRNA로 생성될 가능성을 확인하였다. We investigated microRNA (miRNA) biogenesis of Epstein-Barr virus (EBV) which is the first virus shown to produce viral miRNAs. As expected, expression of all the reported EBV miRNAs were detected by Northen blot in an EBV-infected B cell line, B95-8; BHRF1-1, BHIU1-2, BHRF1-3, BART1, and BART2. The putative EBV pri-miRWAs and pre-miRNAs predicted from the known mature EBV miRNA sequences were detected by RT-PCR in B95-8 cells. Many animal miRNA genes exist as clusters of 2-7 genes and they are expressed polycistronically. As the EBV miRNAs are clustered in two regions of the EBV genome, we examined whether these clustered EBV miRNA genes are also expressed polycistronically. A long polycistronic transcript with the expected size (1602 bp) corresponding to the BHRF1-1~BHRF1-2~BHRF1-3 was amplified. However, any polycistronic transcript containing both BART1 and BART2 was detectable in B95-8. These results suggest that EBV miRNAs may be processed in a similar way with animal miRNAs and that some of the clustered EBV miRNAs can be transcribed polycistronically.
김도년 민사법의 이론과 실무학회 2012 民事法理論과 實務 Vol.15 No.2
An electronic document is not denied the effect as a document just for being in the electronic form unless there is a special regulation by the Framework act on electronic commerce. However, while an actual document is investigated for evidence through the method of documentary evidence, but there is no regulation on how the evidence investigation should be conducted for electronic documents. That is, the legal procedure law for electronic documents rely on the provisions of the civil procedure law which is a general law, and there is no special regulation regarding the probative force as such is yielded to free non-concrete evidence. Therefore, even if the basic conditions of an electronic document are present, such must be verified individually in case the authenticity is in doubt. Therefore, apart from the conditions to secure authenticity of the electronic documents, the method and procedure for authenticity verification are needed. This is a very practical and urgent matter, and thus this report intends to propose a direction in verification and identification of forgery and falsification regarding the forgery/falsification potential of the electronic documents. The verification method of forgery and falsification of an electronic document is first approached from the perspective encompassing the document originally formed electronically and digitalized document, but the detailed verification methods shall be typed. The document originally formed electronically can employ a special system or electronic signature for identification of forgery and falsification to type the verification method. For digitalized documents, such can be classified into those following the notification of Ministry of Knowledge and Economy and those that are not, and the verification method can be typed accordingly. Especially for digitalized documents, if the document has been scanned into an image file, there is the potential to confirm the authenticity of the document through the characteristics in the document scan process and imaging process other than the certification information such as electronic signatures, and moreover, the normal document verification method can be applied to the identification of electronic documents, further improving the authentication of authenticity for electronic documents.