期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Construction and Identification of a Goat Pox Virus Transfer Vector to Express Peste des Petits Ruminants H gene 被引量:3
1
作者 邵长春 张强 +7 位作者 吴国华 颜新敏 李健 王建科 卢晓丽 赵志荀 崔丽凡 高世功 《Agricultural Science & Technology》 CAS 2009年第3期15-18,35,共5页
[Objective] This study was to develop a live vector vaccine of goat pox virus of Peste des petits ruminants(PPR). [Method] Using PCR amplification technique, PPR H gene was obtained, then ligated into pGEM-T easy vect... [Objective] This study was to develop a live vector vaccine of goat pox virus of Peste des petits ruminants(PPR). [Method] Using PCR amplification technique, PPR H gene was obtained, then ligated into pGEM-T easy vector; the recombinants were digested by Nhe Ⅰ and Hind Ⅲ, and ligated into pEGFP-N1-P7.5, yielding the recombinant vector pEGFP-N1-P7.5-H; next the expression cassette EGFP-N1-P7.5-H was first released from recombinant vector pEGFP-N1-P7.5-H by double digestion of Hind Ⅲ and Nhe Ⅰ and ligated into pUC119-TK that was digested by Kpn Ⅰ, yielding the transfer vector pUC119-TK-EGFP-P7.5-H. [Result] Identification and double enzyme digestion showed that the transfer vector pUC119-TK-EGFP-P7.5-H was correctly constructed. From the transfer vector transfected BHK-21 cells which infected GTPV AV41, specific fluorescence was observed at 48th h of transfection. [Conclusion] The construction of goat poxvirus live vector laid a foundation for the live vector vaccine of PPR vaccine. 展开更多
关键词 Goat pox virus H gene Transfer vector Construction identification
在线阅读 下载PDF
Predicting and Classifying User Identification Code System Based on Support Vector Machines
2
作者 陈民枝 陈荣昌 +1 位作者 梁倩华 陈同孝 《Journal of Donghua University(English Edition)》 EI CAS 2007年第2期280-283,共4页
In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking th... In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID, which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2class UID codes. The trained classifications will be the models used for identifying unreadable UID codes. Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images aad to keep track of users to prevent collaborative piracies. 展开更多
关键词 WATERMARK Support Vector Machines SVMs )User identification (UID) code COLLUSION
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部