[Objective] This study was to develop a live vector vaccine of goat pox virus of Peste des petits ruminants(PPR). [Method] Using PCR amplification technique, PPR H gene was obtained, then ligated into pGEM-T easy vect...[Objective] This study was to develop a live vector vaccine of goat pox virus of Peste des petits ruminants(PPR). [Method] Using PCR amplification technique, PPR H gene was obtained, then ligated into pGEM-T easy vector; the recombinants were digested by Nhe Ⅰ and Hind Ⅲ, and ligated into pEGFP-N1-P7.5, yielding the recombinant vector pEGFP-N1-P7.5-H; next the expression cassette EGFP-N1-P7.5-H was first released from recombinant vector pEGFP-N1-P7.5-H by double digestion of Hind Ⅲ and Nhe Ⅰ and ligated into pUC119-TK that was digested by Kpn Ⅰ, yielding the transfer vector pUC119-TK-EGFP-P7.5-H. [Result] Identification and double enzyme digestion showed that the transfer vector pUC119-TK-EGFP-P7.5-H was correctly constructed. From the transfer vector transfected BHK-21 cells which infected GTPV AV41, specific fluorescence was observed at 48th h of transfection. [Conclusion] The construction of goat poxvirus live vector laid a foundation for the live vector vaccine of PPR vaccine.展开更多
In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking th...In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID, which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2class UID codes. The trained classifications will be the models used for identifying unreadable UID codes. Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images aad to keep track of users to prevent collaborative piracies.展开更多
文摘[Objective] This study was to develop a live vector vaccine of goat pox virus of Peste des petits ruminants(PPR). [Method] Using PCR amplification technique, PPR H gene was obtained, then ligated into pGEM-T easy vector; the recombinants were digested by Nhe Ⅰ and Hind Ⅲ, and ligated into pEGFP-N1-P7.5, yielding the recombinant vector pEGFP-N1-P7.5-H; next the expression cassette EGFP-N1-P7.5-H was first released from recombinant vector pEGFP-N1-P7.5-H by double digestion of Hind Ⅲ and Nhe Ⅰ and ligated into pUC119-TK that was digested by Kpn Ⅰ, yielding the transfer vector pUC119-TK-EGFP-P7.5-H. [Result] Identification and double enzyme digestion showed that the transfer vector pUC119-TK-EGFP-P7.5-H was correctly constructed. From the transfer vector transfected BHK-21 cells which infected GTPV AV41, specific fluorescence was observed at 48th h of transfection. [Conclusion] The construction of goat poxvirus live vector laid a foundation for the live vector vaccine of PPR vaccine.
文摘In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID, which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2class UID codes. The trained classifications will be the models used for identifying unreadable UID codes. Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images aad to keep track of users to prevent collaborative piracies.