http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Liang-Kun Chen,Ching-Chi Hsieh,Yi-Chao Huang,Yuan-Jung Huang,Chun-Fan Lung,Wei-En Hsu,Chao-Ling Yao,Tsung-Yu Tseng,Chi-Chung Wang,Yi-Chiung Hsu 한국생물공학회 2023 Biotechnology and Bioprocess Engineering Vol.28 No.3
Most of the gas exchange in the human body is carried out by the lungs, and the physiological activities of the lungs are uninterrupted. Due to the deterioration of the external environment, pulmonary cell lesions are common clinical lung diseases. Mechanical cyclic stretching is one kind of bionic technology to observe lung cancer cells. The A549 cell line is the human lung adenocarcinoma cell line derived from a primary lung tumor. This study investigated the effects of mechanical cyclic stretching on A549 cell activity and gene expression profile. Whereas mechanical cyclic stretching had no significant difference in colony formation and cell migration of A549 cells, the cell invasion increased significantly in A549 cells after stretching. In addition, the microarray data showed that mechanical cyclic stretching altered gene expression, induced inflammation of cells, and activation of Wnt/β- catenin and tumor necrosis factor pathways. More importantly, mechanical cyclic stretching activated the expression of tumor necrosis factor-alpha (TNF-α) protein. Therefore, the increase of cell invasion induced by mechanical cyclic stretching might be associated with the activation of TNF-α in human lung adenocarcinoma cells.
Liang Chi,Won Mee Jang,Lim Nguyen 한국통신학회 2012 Journal of communications and networks Vol.14 No.3
We propose self-encoded spread spectrum with two different iterative detection methods in multi-channel communication. The centralized iterative detection outperforms the iterative detection distributed over multiple channels. The results show that self-encoded spread spectrum with the centralized iterative detection is an excellent candidate for cognitive radio network.
Liang, Chi-Te,Lin, Li-Hung,Kuang Yoa, Chen,Lo, Shun-Tsung,Wang, Yi-Ting,Lou, Dong-Sheng,Kim, Gil-Ho,Yuan-Huei, Chang,Ochiai, Yuichi,Aoki, Nobuyuki,Chen, Jeng-Chung,Lin, Yiping,Chun-Feng, Huang,Lin, Sh Springer 2011 Nanoscale research letters Vol.6 No.1
<P>A direct insulator-quantum Hall (I-QH) transition corresponds to a crossover/transition from the insulating regime to a high Landau level filling factor ν > 2 QH state. Such a transition has been attracting a great deal of both experimental and theoretical interests. In this study, we present three different two-dimensional electron systems (2DESs) which are in the vicinity of nanoscaled scatterers. All these three devices exhibit a direct I-QH transition, and the transport properties under different nanaoscaled scatterers are discussed.</P>
Chi, Liang,Jang, Won-Mee,Nguyen, Lim The Korea Institute of Information and Commucation 2012 Journal of communications and networks Vol.14 No.3
We propose self-encoded spread spectrum with two different iterative detection methods in multi-channel communication. The centralized iterative detection outperforms the iterative detection distributed over multiple channels. The results show that self-encoded spread spectrum with the centralized iterative detection is an excellent candidate for cognitive radio network.
Liang Chi,Xian Li,Qinghua Liu,Ying Liu 한국통합생물학회 2019 Animal cells and systems Vol.23 No.3
Photoperiod is believed to regulate growth in fish, although the mechanism involved is still unclear. In this paper, we report a relationship between leptin-receptor A1 (AsLRa1), melatonin-receptor (AsMR) and photoperiod in Atlantic salmon. Atlantic salmon (mean weight 1071.70 ± 155.54 g) were reared under six photoperiod regimes, four constant light regimes 24L:0D, 18L:6D, 12L:12D and 8L:16D, hours of light (L) and dark (D) and two varying light regimes, LL-SL = 24L:0D-8L:16D, and SL-LL = 8L:16D-24L:0D over a period of seven months. The results showed that AsLRa1 transcripts were mainly existed in the hypothalamus and saccus vasculosus (SV), AsMR was mainly expressed in the hypothalamus. Long photoperiod inhibited the expression of AsLRa1 and AsMR transcripts in the Atlantic salmon brain. The expression pattern of AsLRa1 was similar to the expression pattern of AsMR in the hypothalamus. Food intake was higher in fish with lower AsLRa1 transcript levels. This demonstrated that photoperiod influenced somatic growth by changing expression of AsLRa1 in the hypothalamus and SV to affect appetite. In addition, we found that the SV appears to act as a seasonal sensor regulating reproduction in a similar way to the hypothalamus.
Liu, Chi-Jen,Wang, Chang-Hai,Chien, Chia-Chi,Yang, Tsung-Yeh,Chen, Shin-Tai,Leng, Wei-Hua,Lee, Cheng-Feng,Lee, Kuen-Ho,Hwu, Y,Lee, Yao-Chang,Cheng, Chia-Liang,Yang, Chung-Shi,Chen, Y J,Je, J H,Margari IOP Pub 2008 Nanotechnology Vol.19 No.29
<P>We explored a very interesting gold nanoparticle system—pegylated gold in colloidal solution—and analyzed its uptake by mice colorectal adenocarcinoma CT26 tumor cells and the impact on the cell’s response to x-ray irradiation. We found that exposure to polyethylene glycol (PEG) modified (‘pegylated’) 4.7 ± 2.6 nm gold nanoparticles synthesized by a novel synchrotron-based method enhances the response of CT26 cells to x-ray irradiation. Transmission electron microscopy (TEM) and confocal microscopy revealed that substantial amounts of such nanoparticles are taken up and absorbed by the cells and this conclusion is supported by quantitative induced coupled plasma (ICP) results. Standard tests indicated that the internalized particles are highly biocompatible but strongly enhance the cell damage induced by x-ray irradiation. Synchrotron radiation Fourier transform infrared (SR-FTIR) spectromicroscopy analyzed the chemical aspects of this phenomenon: the appearance of C = O stretching bond spectral features could be used as a marker for cell damage and confirmed the enhancement of the radiation-induced toxicity for cells.</P>
The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment
( Liang Hu ),( Ling Chi ),( Hong-tu Li ),( Wei Yuan ),( Yu Yu Sun ),( Jian-feng Chu ) 한국인터넷정보학회 2012 KSII Transactions on Internet and Information Syst Vol.6 No.1
As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber`s legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.
Chi, L.,Na, M.H.,Jung, H.K.,Vadevoo, S.M.P.,Kim, C.W.,Padmanaban, G.,Park, T.I.,Park, J.Y.,Hwang, I.,Park, K.U.,Liang, F.,Lu, M.,Park, J.,Kim, I.S.,Lee, B.H. Elsevier Science Publishers 2015 Journal of controlled release Vol.209 No.-
A growing body of evidence suggests that pathological lesions express tissue-specific molecular targets or biomarkers within the tissue. Interleukin-4 receptor (IL-4R) is overexpressed in many types of cancer cells, including lung cancer. Here we investigated the properties of IL-4R-binding peptide-1 (IL4RPep-1), a CRKRLDRNC peptide, and its ability to target the delivery of liposomes to lung tumor. IL4RPep-1 preferentially bound to H226 lung tumor cells which express higher levers of IL-4R compared to H460 lung tumor cells which express less IL-4R. Mutational analysis revealed that C1, R2, and R4 residues of IL4RPep-1 were the key binding determinants. IL4RPep-1-labeled liposomes containing doxorubicin were more efficiently internalized in H226 cells and effectively delivered doxorubicin into the cells compared to unlabeled liposomes. In vivo fluorescence imaging of nude mice subcutaneously xenotransplanted with H226 tumor cells indicated that IL4RPep-1-labeled liposomes accumulate more efficiently in the tumor and inhibit tumor growth more effectively compared to unlabeled liposomes. Interestingly, expression of IL-4R was high in vascular endothelial cells of tumor, while little was detected in vascular endothelial cells of control organs including the liver. IL-4R expression in cultured human vascular endothelial cells was also up-regulated when activated by a pro-inflammatory cytokine tumor necrosis factor-α. Moreover, the up-regulation of IL-4R expression was observed in primary human lung cancer tissues. These results indicate that IL-4R-targeting nanocarriers may be a useful strategy to enhance drug delivery through the recognition of IL-4R in both tumor cells and tumor endothelial cells.
An Image Hiding Scheme by Linking Pixels in the Circular Way
( Chi-shiang Chan ),( Yuan-yu Tsai ),( Chao-liang Liu ) 한국인터넷정보학회 2012 KSII Transactions on Internet and Information Syst Vol.6 No.6
The proposed method in this paper is derived from Mielikainen`s hiding method. However, there exist some significant differences between two methods. In Mielikainen`s method, pixels are partitioned into pairs and a LSB matching function is applied to two pixels for hiding. On the contrary, the proposed method partitions pixels into groups with three pixels in each group. The bits of pixels in each group are linked by using an exclusive OR (XOR) operator in a circular way. If the number of different values between the calculated XOR values and the secret bits is smaller than or equal to 2 in a group, the proposed method can guarantee that at most one pixel is needed to be modified by adding/subtracting its value to/from one, and three secret bits can be embedded to three pixels. Through theoretical analysis, the amount of the embedded secret data in the proposed method is larger than those in other methods under the same amount of pixel modifications. Taking real images in our experiments, the quality of stego-images in the proposed method is higher than those in other methods.