RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Genomic Analysis of Dairy Starter Culture Streptococcus thermophilus MTCC 5461

        ( Prajapati Jashbhai B ),( Neelam M Nathani ),( Amrutlal K Patel ),( Suja Senan ),( Chaitanya G Joshi ) 한국미생물 · 생명공학회 2013 Journal of microbiology and biotechnology Vol.23 No.4

        The lactic acid bacterium Streptococcus thermophilus is widely used as a starter culture for the production of dairy products. Whole-genome sequencing is expected to utilize the genetic basis behind the metabolic functioning of lactic acid bacterium (LAB), for development of their use in biotechnological and probiotic applications. We sequenced the whole genome of Streptococcus thermophilus MTCC 5461, the strain isolated from a curd source, by 454 GS-FLX titanium and Ion Torrent PGM. We performed comparative genome analysis using the local BLAST and RDP for 16S rDNA comparison and by the RAST server for functional comparison against the published genome sequence of Streptococcus thermophilus CNRZ 1066. The whole genome size of S. thermophilus MTCC 5461 is of 1.73Mb size with a GC content of 39.3%. Streptococcal virulence-related genes are either inactivated or absent in the strain. The genome possesses coding sequences for features important for a probiotic organism such as adhesion, acid tolerance, bacteriocin production, and lactose utilization, which was found to be conserved among the strains MTCC 5461 and CNRZ 1066. Biochemical analysis revealed the utilization of 17 sugars by the bacterium, where the presence of genes encoding enzymes involved in metabolism for 16 of these 17 sugars were confirmed in the genome. This study supports the facts that the strain MTCC 5461 is nonpathogenic and harbors essential features that can be exploited for its probiotic potential.

      • A Review : Black Hole & Gray Hole Attack in MANET

        Sweta Dixit,Krishna Kumar Joshi,Neelam Joshi 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.4

        In past few years, mobile ad hoc network has gaining more attention of researchers. Mobile Adhoc Network (MANET) are most widely used all over the world, due to its ability to communicate each other without the use of any fixed network. It applications used in military network, disaster relief operations and also in commercial environments. Due to open, dynamic and infrastructure-less nature, the ad hoc networks are vulnerable to various attacks. The black hole and grayhole attack is one of them in MANET. Security is an necessary requirement in MANET. Without any proper security solution, the malicious node in the network will act as a normal node which causes eaves dropping and selective forwarding attack generally known as Gray Hole attack. In this paper we survey on MANET applications, routing protocols, different types of attacks and also the review of researchers.

      • A Novel Approach Of Trust Based Routing To Select Trusted Location In AODV Based VANET : A Survey

        Kumud Dixit,Krishna Kumar Joshi,Neelam Joshi 보안공학연구지원센터 2015 International Journal of Hybrid Information Techno Vol.8 No.7

        During the last few years, a vehicular ad hoc network (VANETs) was extensively focused by researchers. A vehicular ad hoc network (VANETs) is a subclass of Mobile ad hoc networks builds to make sure the safety of traffic. VANET is a type of mobile peer to peer network, although it exhibits some different characters (fast moving, short lived connection etc). VANET is different from MANET due to large scale networks, higher mobility of nodes, geographically constrained topology and frequent network partitioning. In this paper, we present a survey on trust based routing in AODV based VANET to find secure location. In this first discussed about VANETs, their applications, characteristics, attacks, routing protocols and present a review of various researchers on trust based VANET.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼