• Title/Summary/Keyword: Open school

Search Result 4,268, Processing Time 0.028 seconds

Characterization of a New ${\beta}$-Lactamase Gene from Isolates of Vibrio spp. in Korea

  • Jun, Lyu-Jin;Kim, Jae-Hoon;Jin, Ji-Woong;Jeong, Hyun-Do
    • Journal of Microbiology and Biotechnology
    • /
    • v.22 no.4
    • /
    • pp.555-562
    • /
    • 2012
  • PCR was performed to analyze the ${\beta}$-lactamase genes carried by ampicillin-resistant Vibrio spp. strains isolated from marine environments in Korea between 2006 and 2009. All 36 strains tested showed negative results in PCR with the primers designed from the nucleotide sequences of various known ${\beta}$-lactamase genes. This prompted us to screen new ${\beta}$-lactamase genes. A novel ${\beta}$-lactamase gene was cloned from Vibrio alginolyticus KV3 isolated from the aquaculture water of Geoje Island of Korea. The determined nucleotide sequence (VAK-3 ${\beta}$-lactamase) revealed an open reading frame (ORF) of 852 bp, encoding a protein of 283 amino acids (aa), which displayed low homology to any other ${\beta}$-lactamase genes reported in public databases. The deduced 283 aa sequence of VAK-3, consisting of a 19 aa signal peptide and a 264 aa mature protein, contained highly conserved peptide segments specific to class A ${\beta}$-lactamases including the specific amino acid residues STFK (62-65), SDN (122-124), E (158), and RTG (226-228). Results from PCR performed with primers specific to the VAK-3 ${\beta}$-lactamase gene identified 3 of the 36 isolated strains as V. alginolyticus, Vibrio cholerae, and Photobacterium damselae subsp. damselae, indicating the utilization of various ${\beta}$-lactamase genes including unidentified ones in ampicillin-resistant Vibrio spp. strains from the marine environment. In a mating experiment, none of the isolates transfered the VAK-3 ${\beta}$-lactamase gene to the Escherichia coli recipient. This lack of mobility, and the presence of a chromosomal acyl-CoA flanking sequence upstream of the VAK-3 ${\beta}$-lactamase gene, led to the assumption that the location of this new ${\beta}$-lactamase gene was in the chromosome, rather than the mobile plasmid. Antibiotic susceptibility of VAK-3 ${\beta}$-lactamase was indicated by elevated levels of resistance to penicillins, but not to cephalosporins in the wild type and E. coli harboring recombinant plasmid pKV-3, compared with those of the host strain alone. Phylogenetic analysis showed that VAK-3 ${\beta}$-lactamase is a new and separate member of class A ${\beta}$-lactamases.

From Broken Visions to Expanded Abstractions (망가진 시선으로부터 확장된 추상까지)

  • Hattler, Max
    • Cartoon and Animation Studies
    • /
    • s.49
    • /
    • pp.697-712
    • /
    • 2017
  • In recent years, film and animation for cinematic release have embraced stereoscopic vision and the three-dimensional depth it creates for the viewer. The maturation of consumer-level virtual reality (VR) technology simultaneously spurred a wave of media productions set within 3D space, ranging from computer games to pornographic videos, to Academy Award-nominated animated VR short film Pearl. All of these works rely on stereoscopic fusion through stereopsis, that is, the perception of depth produced by the brain from left and right images with the amount of binocular parallax that corresponds to our eyes. They aim to emulate normal human vision. Within more experimental practices however, a fully rendered 3D space might not always be desirable. In my own abstract animation work, I tend to favour 2D flatness and the relative obfuscation of spatial relations it affords, as this underlines the visual abstraction I am pursuing. Not being able to immediately understand what is in front and what is behind can strengthen the desired effects. In 2015, Jeffrey Shaw challenged me to create a stereoscopic work for Animamix Biennale 2015-16, which he co-curated. This prompted me to question how stereoscopy, rather than hyper-defining space within three dimensions, might itself be used to achieve a confusion of spatial perception. And in turn, how abstract and experimental moving image practices can benefit from stereoscopy to open up new visual and narrative opportunities, if used in ways that break with, or go beyond stereoscopic fusion. Noteworthy works which exemplify a range of non-traditional, expanded approaches to binocular vision will be discussed below, followed by a brief introduction of the stereoscopic animation loop III=III which I created for Animamix Biennale. The techniques employed in these works might serve as a toolkit for artists interested in exploring a more experimental, expanded engagement with stereoscopy.

The Volar Plating of Fracture of the Coronoid Process - Report of Two Cases - (구상돌기 골절에서 내측 접근법을 통한 전방 금속판 고정술 - 2예 보고 -)

  • Jung, Gu-Hee;Cho, Chul-Hyun;Jang, Jae-Ho;Kim, Jae-Do
    • Clinics in Shoulder and Elbow
    • /
    • v.13 no.2
    • /
    • pp.260-265
    • /
    • 2010
  • Purpose: To report the clinical results of two cases of coronoid process fractures that were treated with volar plating through a medial approach. Materials and Methods: Two fractures of the coronoid process that needed to be fixed were managed with open reduction and internal fixation through a medial approach using 2.4 mm locking compression plates (Compact Hand set$^{(R)}$, Synthes, Switzerland). The patients were followed up for 14 months and 17 months and were evaluated using the Mayo Elbow Performance Score (MEPS). Results: The MEPS was 95 for Case 1 and 100 for Case 2. Active elbow joint motions were $5^{\circ}-120^{\circ}$ (Case 1) and $0^{\circ}-130^{\circ}$ (Case 2). Supination and pronation fully recovered. Conclusion: Satisfactory results can be obtained in cases of coronoid process fractures because volar plating through a medial approach allows sound fixation and early mobilization of the elbow joint.

Successful Transplantation of 3 Cases of Oligomeganephronia (신장이식 수술로 치험한 Oligomeganephronia 3례)

  • Bae Hyun-Chul;Kim Ji-Hong;Kim Pyung-Kil;Kim Yoo-Seon;Park Ki-Il;Jeong Hyun-Ju;Choi In-Jun
    • Childhood Kidney Diseases
    • /
    • v.1 no.2
    • /
    • pp.189-194
    • /
    • 1997
  • Oligomeganephronia is a rare congenital form of bilateral renal hypoplasia histologically characterized by reduction in number and hypertrophy of nephrons. Clinically, this condition is presented in early infancy with vomiting, polyuria, polydipsia and dehydration. The problems are readily corrected, but slowly progressive renal failure follows accompanied by failure to thrive, short stature, and renal osteodystrophy. We experienced three cases of oligomeganephronia. Case 1. : A 3 2/12 years old female child was incidentally diagnosed as renal failure at age of 2 months when she was hospitalized due to pneumonia. She had open renal biopsy and was diagnosed as bilateral dysplastic kidney. On OPD follow-up, she progressed to end-stage renal failure (BUN/Cr 114/4.6 mg/dl) and had renal transplantation. The specimen was shrunk remarkably and light microscopy showed oligomeganephronia. Case 2. : A 14 8/12 years old female child with proteinuria was detected in an annual urine screening program for school children, she was diagnosed as renal failure (BUN/Cr 33.9/4.1 mg/dl), and had $5{\times}4{\times}3\;cm$ sized mass on abdominal CT scan. She had renal biopsy, and the specimen showed oligomeganephronia. She had hemodialysis for six months, and renal transplantation along with bilateral nephrectomy was performed. Case 3. : A 14 8/12 years old male child was diagnosed having chronic nephritis and chronic renal failure at 3 years old, progressed to end-stage renal failure (BUN/Cr 87/9.6 mg/dl) on OPD follow-up, and had a rephrectomy and renal transplantation. The biopsy specimen showed oligomeganephronic hypoplasia, secondary focal segmental glomerolosclerosis, and chronic interstitial nephritis. We report 3 cases of oligomeganephronia that progressed to end-stage renal failure and had successful renal transplantation with a brief review of related literatures.

  • PDF

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Library Management in Information Society (정보사회의 도서관 경영)

  • Chun Myung-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.25
    • /
    • pp.151-183
    • /
    • 1993
  • As many Korean libraries has begun to be automated and become a part of the worldwide, open library system, they need a new management. Therefore, the purpose of this paper is to explore the library management in automated libraries and to establish a theory of the library management in information society, The automated libraries could be well explained by the systems theory and the environment of the libraries could be well explained by the contingency theory, The following hypothesis were set to direct this research. 1. As the libraries are automated and become a part of one big, worldwide library system, the libraries interact closely with the environment so that the library and the environment become one. 2. As the libraries are automated and become a part of one big, worldwide library system, the librarians need to work in the environment for the library networks, standardization of cataloging, or government information policy making. 3. As the libraries are automated and become a part of one big, worldwide library system, the librarians only manage the library, The various other library staffs take over the traditional library services directly related to books. The data were gathered from the research done previously, Also the date were collected from the American and Japanese libraries. The findings were as follows: The environment of the library integrated all types of the library services such as school library, university library, etc. And it also integrated all the services of the media centers and the press centers, etc. to library services. And the new library services began in the environment. Librarians worked for these new services. In the library, the librarians distingushed the library system from the environment by planning : mission, goal, objectives, policy, procedures and rules. Library organization became temporary such as forming task forces or matrix or free form. The environment controlled the library. Staffs were controlled by plans or computers. And the professional librarians were controlled by their ability to solve problems raised outside the libraries. Library leaders brought in the technology to the library from its environment. The librarians led the formal and informal organizations so that the staffs cooperated well in their work. And librarians tought the library procedures to the partime workers or the temporary staffs. Participative management and management by objectives were the means of motivating staffs. Budget was based on the ever changing environment. The zero based budget method was applied. Therfore, in the information society, the professional librarians become the able managers in the library and global librarians in the environment.

  • PDF

An Analysis of Interaction Patterns by Teacher's Role in Mathematics Classrooms (수학교실에서 교사의 역할에 따른 상호작용 패턴 분석)

  • Cho, Woo-Gi;Oh, Young-Youl
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.14 no.1
    • /
    • pp.1-22
    • /
    • 2010
  • The purpose of this study was to examine the relationship between teacher's role and interaction patterns in mathematics classrooms. Teacher's role was divided into usual practices with students, usual practices with content and usual practices with students and contents, and interaction patterns were classified into report, inquiry and discussion. The subjects in this study were teachers and students in three fourth- grade classes in T elementary school located in Seoul. After the classes of every math teacher were observed, three teachers who played distinctively unique roles were selected in accordance with the results of the first-semester autonomous supervision, of open class for parents and of the instructional observation. Thus, there was a close relationship between the teacher roles and interaction patterns. And it's concluded that students are able to have a more discussion on each other's ideas in the student-centered classroom, and that teachers should perform active roles in that process. Given the findings of the study, there are some suggestions: First, the teachers appeared to fulfill consistent roles when their videotaped classes, study aids and performance assessment materials were analyzed, and they should play more active roles in mathematics class. Second, they should try to create the kinds of climate that encourages students to come up with ideas in an active manner. Third, earlier studies had focused on student-teacher interaction patterns, but this study found that the roles of the teachers depended on interaction with not only students but study aids and performance assessment materials, and that the interaction patterns hinged on their roles as well. Therefore more profound research efforts should be directed into this issue.

  • PDF

2008 Dietary Goals and Dietary Guidelines for Korean Adults (2008 한국 성인을 위한 식생활목표와 식생활지침)

  • Paik, Hee-Young;Kim, Cho-Il;Moon, Hyun-Kyung;Yoon, Jin-Sook;Joung, Hyo-Jee;Shim, Jae-Eun;Jung, Hyun-Ju
    • Journal of Nutrition and Health
    • /
    • v.41 no.8
    • /
    • pp.887-899
    • /
    • 2008
  • Recently the Ministry of Health and Welfare, Republic of Korea, announced the “Dietary Guidelines for Korean Adults (DGKA)”, which includes ten Dietary Goals, six Dietary Guidelines, and twenty-three Action Guidelines. DGKA are developed as the revision of the 2003 Dietary Guidelines for Koreans, targeting adult population. Dietary Guidelines are developed for general purpose as well as for different age groups. They are revised periodically to accommodate changes in diet and health problems of the population. The process of developing new DGKA can be summarized as 1) selection of focus areas, 2) analysis and review of available data for each area selected, and 3) derivation of guidelines based on the analyzed data, and 4) finalizing the guidelines after open discussions among the experts and general public. Five focus areas were selected by examining the Nutrition Goals of the Health Plan 2010 of Korea, soliciting proposals from the experts in the related fields, and reviewing existing and international guidelines. Five areas selected were 1) adequate intake of nutrients and foods, 2) balance of energy intake and physical activities, 3) alcohol intake, 4) food security and nutrition service, and 5) food safety. Adequacy of nutrient and food intakes of the Korean adult population was assessed using 2005 Korea National Health and Nutrition Examination Survey (KNHANES) data. Newly developed Dietary Reference Intakes for Koreans were used as reference values to assess the prevalence of inadequacies and excesses in nutrient intakes. Energy balance was examined with energy intake of 2005 KNHANES survey and results of physical activity questionnaire in the survey. Alcohol intake was also examined using 2005 KNHANES results of dietary intakes as well as the results of questionnaire survey on alcohol intakes. Food security, nutrition services, and food safety were analyzed using various government data and published results on the issues. Ten Dietary Goals and six Dietary Guidelines were developed after data analysis and were subjected to reviews of experts and general public. The final DGKA are: 1) Eat a variety of foods from each food group, 2) Increase physical activity and maintain healthy weight, 3) Eat proper amount of clean foods, 4) Avoid salty foods and try to eat foods with bland taste, 5) Avoid foods with high fat contents and deep-fried foods, and 6) When you drink alcohol, limit the amount. Twenty-three action guidelines are developed in order to achieve these guidelines in actual diet and life among the population. The government is disseminating the guidelines with “337” slogan and emblem. “337” indicates everyone should practice “3” guidelines of promoting good eating practice, “3” guidelines to limit or decrease in your diet, and you should practice them for “7” days a week. The guidelines will be useful in promoting healthy food habits and good nutritional status which will result in decrease nutrition related health problems in Korea.

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.

Flexural Behavior of RC Beam Repaired with Polymer Mortar (폴리머 모르타르로 보수된 철근콘크리트 보의 휨 거동)

  • Cho, Yong-In;Han, Sang-Hoon;Park, Jea-Kyu;Yeon, Yeong-Mo;Hong, Ki-Nam
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.21 no.1
    • /
    • pp.91-99
    • /
    • 2017
  • The purpose of this paper is to evaluate the flexural performance of reinforced concrete (RC) beams repaired with polymer mortar. The repaired and non-repaired 13th beams which was fabricated by considering repair position, repair depth, and curing age of polymer mortar as test variables were tested under three point loading. All specimens repaired in compressive and tensile zone did not fail due to interfacial failure between polymer mortar and concrete but failed when the strain of repaired mortar exceeded the ultimate tensile strain of polymer mortar. Maximum load of specimens repaired in compressive zone was similar to that of non-repaired specimen, reference specimen. Additionally, their ductility index was higher than that of reference specimen. On the other hand, specimens repaired in tensile zone failed very brittlely and have a lower ductility index than reference specimen. Nonlinear analysis by using OpenSees was performed to predict the behavior of RC beam repaired with polymer mortar. Two dimension frame element was used to simplify an analysis model and fiber model was applied to consider the material non-linearity. It was confirmed from the analysis results that nonlinear analysis properly predicts the behavior of specimens repaired in compressive zone and overestimates the behavior of specimens repaired in tensile zone.