Objective To establish a method cloning the exon 3 of eck gene from normal tissue and ZR 75 1 cell line (a human breast cancer cell line)and study whether these genes exist mutant. Methods Designed a pair of s...Objective To establish a method cloning the exon 3 of eck gene from normal tissue and ZR 75 1 cell line (a human breast cancer cell line)and study whether these genes exist mutant. Methods Designed a pair of specific primers and amplified the exon 3 of eck gene fragment from the extracted genomic DNA derived from normal epithelial cells from skin tissue and ZR 75 1 cell line respectively by PCR technique. Transformed the E.coil. JM109 with recombinant plamids constructed by inserting the amplified fragments into medium vector pUCm T and sequenced these amplified fragments after primary screening of endonuclease restriction digestion and PCR amplification. Results ① Obtained the genomic DNA of human normal epithelial cells and ZR 75 1 cell line respectively. ② Obtained the amplified fragments of human exon 3 of eck gene through PCR technique. ③ Obtained the cloning vectors of exon 3 of eck gene of human normal epithelial cells and ZR 75 1 cell line respectively. ④ ZR 75 1 cell line exists mutation of nucleotides. Conclusion Successfully established the method of cloning the human exon 3 of eck gene and found some mutations in the detected samples. This study lays a foundation for further studying the function of eck gene in tumorgenesis.展开更多
The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for ...The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for two party key agreement protocol, however most of the current secure protocols can not be prove to secure without Gap assumption. To avoid this phenomenon, by using twinning key technology we propose a new two party key agreement protocol TUP which is obtained by modifying the UP protocol, then in conjunction with the trapdoor test, we prove strictly that the new protocol is secure in eCK model. Compared with previous protocols, the security assumption of new proposal is more standard and weaker, and it also solves an open problem in ProvSec'09.展开更多
艾克工业公司(Eck Industries)是一家位于威斯康星州马尼托沃克(Manitowoc,WI)的错合金砂型铸造和金属型铸造厂,获得专有授权以商业化生产由美国能源部橡树岭国家实验室(U.S.Dept,of Energy’s Oak Ridge National Laboratory)开...艾克工业公司(Eck Industries)是一家位于威斯康星州马尼托沃克(Manitowoc,WI)的错合金砂型铸造和金属型铸造厂,获得专有授权以商业化生产由美国能源部橡树岭国家实验室(U.S.Dept,of Energy’s Oak Ridge National Laboratory)开发的Ce-Al合金。展开更多
文摘Objective To establish a method cloning the exon 3 of eck gene from normal tissue and ZR 75 1 cell line (a human breast cancer cell line)and study whether these genes exist mutant. Methods Designed a pair of specific primers and amplified the exon 3 of eck gene fragment from the extracted genomic DNA derived from normal epithelial cells from skin tissue and ZR 75 1 cell line respectively by PCR technique. Transformed the E.coil. JM109 with recombinant plamids constructed by inserting the amplified fragments into medium vector pUCm T and sequenced these amplified fragments after primary screening of endonuclease restriction digestion and PCR amplification. Results ① Obtained the genomic DNA of human normal epithelial cells and ZR 75 1 cell line respectively. ② Obtained the amplified fragments of human exon 3 of eck gene through PCR technique. ③ Obtained the cloning vectors of exon 3 of eck gene of human normal epithelial cells and ZR 75 1 cell line respectively. ④ ZR 75 1 cell line exists mutation of nucleotides. Conclusion Successfully established the method of cloning the human exon 3 of eck gene and found some mutations in the detected samples. This study lays a foundation for further studying the function of eck gene in tumorgenesis.
文摘The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for two party key agreement protocol, however most of the current secure protocols can not be prove to secure without Gap assumption. To avoid this phenomenon, by using twinning key technology we propose a new two party key agreement protocol TUP which is obtained by modifying the UP protocol, then in conjunction with the trapdoor test, we prove strictly that the new protocol is secure in eCK model. Compared with previous protocols, the security assumption of new proposal is more standard and weaker, and it also solves an open problem in ProvSec'09.
文摘艾克工业公司(Eck Industries)是一家位于威斯康星州马尼托沃克(Manitowoc,WI)的错合金砂型铸造和金属型铸造厂,获得专有授权以商业化生产由美国能源部橡树岭国家实验室(U.S.Dept,of Energy’s Oak Ridge National Laboratory)开发的Ce-Al合金。