12,416 research outputs found

    High energy-charged cell factory for heterologous protein synthesis

    Get PDF
    Overexpression of gluconeogenic phosphoenolpyruvate carboxykinase (PCK) under glycolytic conditions enables Escherichia coli to maintain a greater intracellular ATP concentration and, consequently, to up-regulate genes for amino acid and nucleotide biosynthesis. To investigate the effect of a high intracellular ATP concentration on heterologous protein synthesis, we studied the expression of a foreign gene product, enhanced green fluorescence protein (eGFP), under control of the T7 promoter in E. coli BL21(DE3) strain overexpressing PCK. This strain was able to maintain twice as much intracellular ATP and to express two times more foreign protein than the control strain. These results indicate that a high energy-charged cell can be beneficial as a protein-synthesizing cell factory. The potential uses of such a cell factory are discussed

    Characteristic polynomials of graphs having a semifree action

    Get PDF
    AbstractJ.H. Kwak and J. Lee (Linear and Multilinear Algebra 32 (1992) 61–73) computed the characteristic polynomial of a finite graph G having an abelian automorphism group which acts freely on G. For a finite weighted symmetric pseudograph G having an abelian automorphism group which acts semifreely on G, K. Wang (Linear Algebra Appl. 51 (1983) 121–125) showed that the characteristic polynomial of G is factorized into a product of a polynomial associated to the orbit graph and a polynomial associated to the free part of the action. But he did not explicitly compute the characteristic polynomial of such a graph G.In this paper, we introduce a new method to construct a finite pseudograph G having an automorphism group which acts semifreely on G, and obtain an explicit formula to compute the characteristic polynomial of such a graph by using the construction method

    Generalized gravity model for human migration

    Full text link
    The gravity model (GM) analogous to Newton's law of universal gravitation has successfully described the flow between different spatial regions, such as human migration, traffic flows, international economic trades, etc. This simple but powerful approach relies only on the 'mass' factor represented by the scale of the regions and the 'geometrical' factor represented by the geographical distance. However, when the population has a subpopulation structure distinguished by different attributes, the estimation of the flow solely from the coarse-grained geographical factors in the GM causes the loss of differential geographical information for each attribute. To exploit the full information contained in the geographical information of subpopulation structure, we generalize the GM for population flow by explicitly harnessing the subpopulation properties characterized by both attributes and geography. As a concrete example, we examine the marriage patterns between the bride and the groom clans of Korea in the past. By exploiting more refined geographical and clan information, our generalized GM properly describes the real data, a part of which could not be explained by the conventional GM. Therefore, we would like to emphasize the necessity of using our generalized version of the GM, when the information on such nongeographical subpopulation structures is available.Comment: 14 pages, 6 figures, 2 table

    OPTIMAL REGRESSION MODEL FOR PREDICTING THE WINNING GAME AND CONTRIBUTING FACTORS IN ICE HOCKEY WORLD CHAMPIONSHIP

    Get PDF
    The purpose of this study was to present the statistical model to predict the winning of ice hockey game and determine the contributing factors for win in the world ice hockey championship. In order to find the optimal regression model for ice hockey, we compared two regression model (logistic and linear model) with the database of all games and the separate databases of top/bottom teams. The logistic regression model using the separate database was most accurately predicted the actual outcome of games. This model and database further revealed that goalkeeping and scoring efficiencies and the number of shots on goal were significantly contributing factors to win. In addition, the results for prediction analysis of winning rate for each team indicated that offensive skills were more important factors than defense power to increase winning rate for teams

    Success Story of Professional Laundry Service in Korea

    Get PDF
    The purpose of this study is to analyze a professional laundry service company, Cleantopia, comprising a nearly 80% market share in Korea. The key to Cleantopia’s success relates to its management policy of “principle and innovation.” Cleantopia adopted various marketing strategies to realize its management philosophy: cultivating talented personnel, customer satisfaction, and social contribution. Another success factor is its active engagement in technological exchanges with developed countries and industrial-academic cooperation

    RowHammer: Reliability Analysis and Security Implications

    Full text link
    As process technology scales down to smaller dimensions, DRAM chips become more vulnerable to disturbance, a phenomenon in which different DRAM cells interfere with each other's operation. For the first time in academic literature, our ISCA paper exposes the existence of disturbance errors in commodity DRAM chips that are sold and used today. We show that repeatedly reading from the same address could corrupt data in nearby addresses. More specifically: When a DRAM row is opened (i.e., activated) and closed (i.e., precharged) repeatedly (i.e., hammered), it can induce disturbance errors in adjacent DRAM rows. This failure mode is popularly called RowHammer. We tested 129 DRAM modules manufactured within the past six years (2008-2014) and found 110 of them to exhibit RowHammer disturbance errors, the earliest of which dates back to 2010. In particular, all modules from the past two years (2012-2013) were vulnerable, which implies that the errors are a recent phenomenon affecting more advanced generations of process technology. Importantly, disturbance errors pose an easily-exploitable security threat since they are a breach of memory protection, wherein accesses to one page (mapped to one row) modifies the data stored in another page (mapped to an adjacent row).Comment: This is the summary of the paper titled "Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors" which appeared in ISCA in June 201
    • …
    corecore