http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
( Yuan Qing Hu ),( Jin Lin Huang ),( Qiu Chun Li ),( Yu Wei Shang ),( Fang Zhe Ren ),( Yang Jiao ),( Zhi Cheng Liu ),( Zhi Ming Pan ),( Xin An Jiao ) 한국미생물 · 생명공학회 2014 Journal of microbiology and biotechnology Vol.24 No.3
Campylobacter jejuni is a prevalent foodborne pathogen worldwide. Human infection by C. jejuni primarily arises from contaminated poultry meats. Genes expressed in vivo may play an important role in the pathogenicity of C. jejuni. We applied an immunoscreening method, in vivo-induced antigen technology (IVIAT), to identify in vivo-induced genes during human infection by C. jejuni. An inducible expression library of genomic proteins was constructed from sequenced C. jejuni NCTC 11168 and was then screened using adsorbed, pooled human sera obtained from clinical patients. We successfully identified 24 unique genes expressed in vivo. These genes were implicated in metabolism, molecular biosynthesis, genetic information processing, transport, and other processes. We selected six genes with different functions to compare their expression levels in vivo and in vitro using real-time RT-PCR. The results showed that the selected six genes were significantly upregulated in vivo but not in vitro. In short, these identified in vivo-induced genes may contribute to human infection of C. jejuni, some of which may be meaningful vaccine candidate antigens or diagnosis serologic markers for campylobacteriosis. IVIAT may present a significant and efficient method for understanding the pathogenicity mechanism of Campylobacter and for finding targets for its prevention and control.
Hua-Yi Lin,De-Jun Pan,Xin-Xiang Zhao,Zhi-Ren Qiu 보안공학연구지원센터 2008 International Journal of Security and Its Applicat Vol.2 No.3
This study proposes a pre-deployment key management scheme that requires a few memory capacities and CPU computations to address secure data transmissions in Wireless Sensor Networks (WSNs). The proposed scheme exploits threshold key management mechanisms by Lagrange Interpolation polynomial generating a key set for sensor nodes, and uses symmetric and irreversible cryptography schemes to encrypt transmitted data by the generated keys with Message Authentication Code (MAC). The sensor nodes merely have to aggregate and encrypt received data without complicated cryptography operations. The proposed approach can achieve rapid and efficient secure data transmissions with low communications, and is proper to be implemented on large-scale sensor networks.