• Title/Summary/Keyword: Maritime

Search Result 12,074, Processing Time 0.044 seconds

Estimation of resistance coefficient of PHC bored pile by Load Test (재하시험에 의한 PHC 매입말뚝의 저항계수 산정)

  • Park, Jong-Bae;Kwon, Young-Hwan
    • Land and Housing Review
    • /
    • v.8 no.4
    • /
    • pp.233-247
    • /
    • 2017
  • In Europe and the USA, the use of limit state design method has been established, and the Korea Ministry of Land, Transport and Maritime Affairs has implemented the bridge substructure design standard based on the critical state. But Korean piling methods and ground conditions are different from Europe and USA, the limit state design method can not be used immediately. In this study, the resistance coefficient was proposed by comparing and analyzing the results of the static load test(9 times) and dynamic load tests(9 times of EOID and 9 times of Restrike) with the bearing capacity calculated by Meyerhof(LH design standard, Road bridge design standard) method and surcharge load method(using Terzaghi's bearing capacity coefficient and Hansen & Vesic's bearing capacity coefficient). The previous LHI study showed the resistance coefficient of the LH design standard was 0.36 ~ 0.44, and this research result showed the resistance coefficient was 0.39 ~ 0.48 which is about 8% higher than the previous study. In this study, we tried to obtain the resistance coefficient mainly from the static load test and the resistance coefficient was 0.57 ~ 0.69(Meyhof method : LH design standard) based on the ultimate bearing capacity and the resistance coefficient was 0.49 ~ 0.60(Meyhof method : LH design standard) based on the Davissons bearing capacity. The difference of the resistance coefficient between the static and dynamic load test was greater than that we expected, we proposed the resistance coefficient(0.52 ~ 0.62 : Meyerhof method: LH design standard) using the modified bearing capacity of the dynamic load test. Summarizing the result, the coefficient of resistance obtained from the static and dynamic load tests was 0.35 ~ 0.76, which is greater than 0.3 suggested by the Road bridge design standard, so the economical design might be possible using the coefficient of resistance proposed by this study.

Effect of n-3 Fatty Acid Deficiency on Fatty Acid Composition in Brain, Retina and Liver Using a Novel Artificial Rearing System (인공 사육 동물 모델 시스템을 이용한 n-3 지방산 결핍이 쥐의 뇌, 망막, 간의 지방산 조성에 미치는 영향)

  • Lim, Sun-Young
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.34 no.4
    • /
    • pp.466-475
    • /
    • 2005
  • Docosahexaenoic acid (22:6n-3, DHA) is highly enriched in membrane of brain and retina, and plays an important role in maintaining an optimal function of the central nervous system. We investigated the effect of n-3 fatty acid deficiency on rat brain, retina and liver fatty acyl composition at two different ages (3 wks and 15 wks) under DHA deficient condition. Rat pups born to dams fed a diet with $3.1\%$ of total fatty acids as $\alpha-linolenic$ acid (LNA) were fed using an artificial rearing system either an n-3 deficient (n-3 Def) or n-3 adequate (n-3 Adq) diet. Both diets contained $17.1\%$ linoleic acid (LA) but the n-3 Adq diet also contained $3.1\%$ LNA. Rats consuming the n-3 Def diet showed a lower brain $(50\%\;in\;13\;wks\;and\;70\%\;in\;15\;wks,\;p<0.05)$ and retinal $(50\%\;in\;13\;wks\;and\;63\%\;in\;15\;wks,\;p<0.05)$ DHA than those on the n-3 Adq diet, which was largely compensated for by an increase in docosapentaenoic acid (22:5n-6, DPAn-6). In the liver of the n-3 Def group, the percentage of DHA decreased by $97\%$ at 3 wks of age with an apparent increase in DPAn-6 relative to the n-3 Adq group (p<0.05), while there was a $65\%$ lower liver DHA in n-3 Def group at 15 wks of age than the n-3 Adq group (p<0.05). Liver arachidonic acid (20:4n-6, AA) was increased at 3 wks of age but decreased at 15 wks of age in the n-3 Def group compared with n-3 Adq group (p<0.05). In conclusion, the replacement of DHA by DPAn-6 in brain and retina fatty acid composition may be related to the suboptimal function in spatial learning, memory and visual acuity. This artificial rearing method presents a first generation model for n-3 deficiency that is similar to the case of human nutrition that commonly employed two generation model.

A Numerical Study on the CO2 Leakage Through the Fault During Offshore Carbon Sequestration (해양지중에 저장된 이산화탄소의 단층을 통한 누출 위험 평가에 관한 수치해석 연구)

  • Kang, Kwangu;Huh, Cheol;Kang, Seong-Gil
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.18 no.2
    • /
    • pp.94-101
    • /
    • 2015
  • To mitigate the greenhouse gas emission, many carbon capture and storage projects are underway all over the world. In Korea, many studies focus on the storage of $CO_2$ in the offshore sediment. Assurance of safety is one of the most important issues in the geological storage of $CO_2$. Especially, the assessment of possibility of leakage and amount of leaked $CO_2$ is very crucial to analyze the safety of marine geological storage of $CO_2$. In this study, the leakage of injected $CO_2$ through fault was numerically studied. TOUGH2-MP ECO2N was used to simulate the subsurface behavior of injected $CO_2$. The storage site was 150 m thick saline aquifer located 825 m under the continental shelf. It was assumed that $CO_2$ leak was happened through the fault located 1,000 m away from the injection well. The injected $CO_2$ could migrate through the aquifer by both pressure difference driven by injection and buoyancy force. The enough pressure differences made it possible the $CO_2$ to migrate to the bottom of the fault. The $CO_2$ could be leaked to seabed through the fault due to the buoyancy force. Prior to leakage of the injected $CO_2$, the formation water leaked to seabed. When $CO_2$ reached the seabed, leakage of formation water stopped but the same amount of sea water starts to flow into the underground as the amount of leaked $CO_2$. To analyze the effect of injection rate on the leakage behavior, the injection rate of $CO_2$ was varied as 0.5, 0.75, and $1MtCO_2/year$. The starting times of leakage at 1, 0.75 and $0.5MtCO_2/year$ injection rates are 11.3, 15.6 and 23.2 years after the injection, respectively. The leakage of $CO_2$ to the seabed continued for a period time after the end of $CO_2$ injection. The ratios of total leaked $CO_2$ to total injected $CO_2$ at 1, 0.75 and $0.5MtCO_2/year$ injection rates are 19.5%, 11.5% and 2.8%, respectively.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Inhibitory Effect of Linum usitatissimum and Perilla frutescens as Sources of Omega-3 Fatty Acids on Mutagenicity and Growth of Human Cancer Cell Lines (식물성 오메가-3계 지방산 급원인 아마씨 및 들깨의 항돌연변이 및 암세포 증식 억제 효과)

  • Lim, Sun-Young
    • Journal of Life Science
    • /
    • v.19 no.12
    • /
    • pp.1737-1742
    • /
    • 2009
  • It has been known that Linum usitatissimum and Perilla frutescens are dietary sources of possible chemopreventive compounds such as lignans and $\alpha$-linolenic acid. Here, we investigated and compared the inhibitory effects of methanol extracts from Linum usitatissimum and Perilla frutescens on mutagenicity using the Ames test, and growth of human cancer cells (AGS human gastric adenocarcinoma, HT-29 human colon cancer, Hep 3B hepatocellular carcinoma cells). In the Ames test system using Salmonella typhimurium TA100, aflatoxin $B_1$ ($AFB_1$)-induced mutagenicity was significantly inhibited by treatment with the methanol extract from either Linum usitatissimum or Perilla frutescens (p<0.05) in a dose dependent manner. As for N-methyl-N'-nitro-N-nitrosoguamidine (MNNG)-induced mutagenicity, the methanol extracts (5 mg/assay) from Linum usitatissimum and Perilla frutescens showed 63% and 78% inhibitory rates, respectively, indicating that Perilla frutescens possessed stronger antimutagenic activity than did Linum usitatissimum. Inhibitory effects of methanol extracts from Linum usitatissimum and Perilla frutescens on the growth of human cancer cells (AGS, HT-29 and Hep 3B) appeared to increase dose dependently, and the inhibition was more effective against AGS and HT-29 compared to Hep 3B cells. Our results suggested that the methanol extract from Perilla frutescens showed stronger antimutagenic activity than that from Linum usitatissimumas assayed by the Ames mutagenic test, whereas the methanol extract from Linum usitatissimum was more effective than its counterpart for growth inhibition of human cancer cells. It is concluded that intake of Linum usitatissimum and Perilla frutescens as sources of omega-3 fatty acids will be beneficial for preventing cancer.

Temporal and Spatial Variations of Primary Productivity in Estuary of Youngsan River and Mokpo Coastal Areas (영산강 하구역 및 목포 연안 해역 식물플랑크톤 1차생산력의 시.공간적 변화)

  • Lee, Yeon-Jung;Min, Jun-Oh;Shin, Yong-Sik;Kim, Sung-Hwan;Shin, Kyung-Hoon
    • Korean Journal of Ecology and Environment
    • /
    • v.44 no.4
    • /
    • pp.327-336
    • /
    • 2011
  • Temporal and spatial variations of primary productivity were investigated in the estuary of Youngsan River and Mokpo coastal areas in 2009. After heavy rain, concentrations of ammonium, phosphate, and silicate increased at six stations in August. The torrential rainfall may cause an increase in nutrient concentrations during summer. There is no limitation of nutrients (except for February at the mid-Youngsan estuarine region YS2) but a potential phosphate limitation was apparent at all stations. Silicate depletion was observed at YS2 in February due to a massive diatom bloom. The trophic status of the Youngsan estuary and Mokpo coastal areas were inferred from an assessment of the primary productivity. In February and May, YS1 (upper Youngsan estuary site) and YS2, YS3 (near the Youngsan river estuary barrage), MP1 (upper Mokpo coastal region site) were appropriately assigned to the mesotrophic category. MP2 (mid-Mokpo coastal region site) and MP3 (outer site of Mokpo coastal region) were assigned to the oligotrophic category. All stations were classified to the oligotrophic status in November. In August, after heavy rain, Youngsan estuary stations maintained mesotrophic status. On the other hand, MP1 and MP2 were classified in the eutrophic category and MP3 to mesotrophic status. In particular, primary productivities of MP1 and MP2 were 9 and 7 times higher respectively than the standard of eutrophic status ($1,000-mgC\;m^{-2}d^{-1}$). These results suggest that a massive freshwater discharge from the Youngsan River estuary should be considered a main factor in the occurrence of phytoplankton bloom in Mokpo coastal areas during summer. Seasonal variations of primary productivity are closely related with depth-integrated Chl. a.

Effect of Resveratrol on the Induction of Cdk Inhibitor p21 and Pro-apoptotic Bax Expression by amyloid-β in Astroglioma C6 Cells (신경교 세포에서 resveratrol이 amyloid-β에 의해 유도되는 Cdk inhibitor p21 및 Bax 발현의 감소 효과)

  • Kim Young Ae;Lim Sun-Young;Ko Woo Shin;Choi Byung Tae;Lee Yong Tae;Rhee Sook-Hee;Park Kun-Young;Lee Won-Ho;Choi Yung Hyun
    • Journal of Life Science
    • /
    • v.15 no.2 s.69
    • /
    • pp.169-175
    • /
    • 2005
  • Resveratrol (3,4',5-trihydroxy-trans-stilbene), a phytoalexin found in grape skins, peanuts, and red wine, has been reported to have a wide range of biological and pharmacological properties. $Amyloid-\beta$ deposition and senile plaque-associated astrocytes are common neuropathological features of Alzheimer's disease. In this study, we have explored the effects of resveratrol on $amyloid-\beta-peptide-mediated$ cytotoxicity in vitro and modulation of cell growth-regulatory gene products in astroglioma C6 cells to elucidate its possible mechanism for anti-cytotoxicity. Exposure of C6 cells to $Amyloid-\beta$ resulted in dose-dependent growth inhibition and morphological changes of C6 cells, which were recovered by pre-treatment with resveratrol. The anti-proliferative effect of $amyloid-\beta$ was associated with the induction of tumor suppressor p53 and cyclin-dependent kinase (Cdk) inhibitor p21 (WAF1/CIP1) expression assessed by RT-PCR and Western blot analysis in time-dependent manner in C6 cells. In addition, the pro-apoptotic Bax expression was also up-regulated in $amyloid-\beta-treated$ C6 cells without alteration of anti-apoptotic Bcl-2 and $Bcl-X_L$ expression. However, pre-treatment of resveratrol significantly inhibited $amyloid-\beta-induced$ p53, p21 and Bax levels, suggesting that the modulation of p53, p21 and Bax levels could be one of the possible pathways by which resveratrol functions as anti-cytotoxic agent. Our results demonstrate that resveratrol may enhance the protection against $amyloid-\beta-induced$ cytotoxicity by promoting the survival of glial cells.

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.

The Research on scheme for revitalization of Conversion into World Geodetic Reference System (세계측지계 전환 활성화를 위한 방안 연구)

  • Sohn, Duk-Jae;Lee, Hyun-Jik;Yu, Young-Geol
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.3
    • /
    • pp.311-321
    • /
    • 2009
  • The Nation Geodetic Reference System which presents a consistent location standard used in creating a map or developing national land is defined and managed by the law in a nation. Each nation had used its own geodetic system created by astronomical surveying until recently, when Geodetic Reference System(World Geodetic Reference System) has been developed and used to progress in space and satellite geodetic technologies. Korea also amended its geodetic law in December 2001, converting its national geodetic system whose reference an oval figure is Bessel ellipsoid into the World Geodetic Reference System which uses GRS80 ellipsoid as reference ellipsoid. Accordingly, the National Geography Information Institute improved law and systems related to the change for the effective conversion from its national geodetic system into the World Geodetic Reference System. In addition National geographic information institute of the results of various studies is drawn to the World Geodetic Reference System for switching technology-met some of the institutional foundation Despite of accordance with formalities, National geographic information institute, Ministry of Land, Transport and Maritime Affairs and some local government of the World Geodetic Reference System, and local government has or has not spread in public institutions. Therefore, in order to promote the switch to the World Geodetic Reference System, it is required to analyze current technical and institutional problems and obstacles of the switch to the World Geodetic Reference System and to present the resolutions and to establish policy to achieve them. Accordingly, for the promotion of the switch to the World Geodetic Reference System, this study analyzed the results of previous studies, the current state of the switch to the World Geodetic Reference System and the problems of the switch, and then offered technological and institutional supplements. Furthermore, it standardized the subject and type of the conversion, defined the scope of the tasks of the National Geographic Information Institute and its related organizations, and presented the policy direction for the overall use of the World Geodetic Reference System by 2010.

Identification of Antagonistic Bacteria, Pseudomonas aurantiaca YC4963 to Colletotri­chum orbiculare Causing Anthracnose of Cucumber and Production of the Antibiotic Phenazine-l-carboxylic acid (Colletotrichum orbiculare에 대한 길항세균 Pseudomonas aurantiaca YC4963의 분리 동정 및 항균물질 Phenazine-1-carboxylic acid의 생산)

  • Chae Hee-Jung;Kim Rumi;Moon Surk-Sik;Ahn Jong-Woong;Chung Young-Ryun
    • Korean Journal of Microbiology
    • /
    • v.40 no.4
    • /
    • pp.342-347
    • /
    • 2004
  • A bacterial strain YC4963 with antifungal activity against Colletotrichum orbiculare, a causal organism of cucumber anthracnose was isolated from the rhizosphere soil of Siegesbeckia pubescens Makino in Korea. Based on physiological and biochemical characteristics and 16S ribosomal DNA sequence analysis, the bac­terial strain was identified as Pseudomonas aurantiaca. The bacteria also inhibited mycelial growth of several plant fungal pathogens such as Botrytis cinerea, Fusarium oxysporum and Rhizoctonia solani on PDA and 0.1 TSA media. The antifungal activity was found from the culture filtrate of this isolate and the active compound was quantitatively bound to XAD adsorption resin. The antibiotic compound was purified and identified as phenazine-l-carboxylic acid on the basis of combined spectral and chemical analyses data. This is the first report on the production of phenazine-l-carboxylic acid by Pseudomonas aurantiaca.