• Title/Summary/Keyword: William J

Search Result 75, Processing Time 0.019 seconds

Geophysical Investigations of the Grenville Front in Ohio, USA (미국 오하이오주에 위치하는 그랜빌 프런트의 지구물리학적 연구)

  • Don Sunwoo;Hinze William J.;Kim Jeong Woo
    • Economic and Environmental Geology
    • /
    • v.38 no.3 s.172
    • /
    • pp.285-297
    • /
    • 2005
  • Seismic reflection profile analysis, potential field analysis, and potential field modeling using deep seismic reflection, gravity, magnetic, and geological data were performed to better understand the location and nature of the Grenville Front in Ohio, USA. The seismic reflection profile reveals a broad zone of east dipping basement reflectors associated with the Grenville Front in western Ohio and a broad region of west dipping reflectors cutting through the entire crust in eastern Ohio. Potential field analysis indicates that the Grenville Front is characterized by a gravity low, an associated gravity positive and a magnetic high. The results of the gravity and magnetic modeling using seismic data suggest that the lower crust is thickened at the interpreted position of the Grenville Front and high grade metamorphic rocks make up the Grenville Front Tectonic Zone (GFTZ). The gravity low at the Grenville Front is due to the thickened crust, while the magnetic high is due to high grade metamorphic rocks. The gravity high immediately east of the GFTZ in central Ohio is caused by thrusting of high density lower and middle crustal rocks into the upper crust. There is no compelling evidence that this gravity high is related to a Precambrian rift zone as has been suggested in previous studies.

Bacterial Logic Devices Reveal Unexpected Behavior of Frameshift Suppressor tRNAs

  • Sawyer, Eric M.;Barta, Cody;Clemente, Romina;Conn, Michel;Davis, Clif;Doyle, Catherine;Gearing, Mary;Ho-Shing, Olivia;Mooney, Alyndria;Morton, Jerrad;Punjabi, Shamita;Schnoor, Ashley;Sun, Siya;Suresh, Shashank;Szczepanik, Bryce;Taylor, D. Leland;Temmink, Annie;Vernon, William;Campbell, A. Malcolm;Heyer, Laurie J.;Poet, Jeffrey L.;Eckdahl, Todd T.
    • Interdisciplinary Bio Central
    • /
    • v.4 no.3
    • /
    • pp.10.1-10.12
    • /
    • 2012
  • Introduction: We investigated frameshift suppressor tRNAs previously reported to use five-base anticodon-codon interactions in order to provide a collection of frameshift suppressor tRNAs to the synthetic biology community and to develop modular frameshift suppressor logic devices for use in synthetic biology applications. Results and Discussion: We adapted eleven previously described frameshift suppressor tRNAs to the BioBrick cloning format, and built three genetic logic circuits to detect frameshift suppression. The three circuits employed three different mechanisms: direct frameshift suppression of reporter gene mutations, frameshift suppression leading to positive feedback via quorum sensing, and enzymatic amplification of frameshift suppression signals. In the course of testing frameshift suppressor logic, we uncovered unexpected behavior in the frameshift suppressor tRNAs. The results led us to posit a four-base binding hypothesis for the frameshift suppressor tRNA interactions with mRNA as an alternative to the published five-base binding model. Conclusion and Prospects: The published five-base anticodon/codon rule explained only 17 of the 58 frameshift suppression experiments we conducted. Our deduced four-base binding rule successfully explained 56 out of our 58 frameshift suppression results. In the process of applying biological knowledge about frameshift suppressor tRNAs to the engineering application of frameshift suppressor logic, we discovered new biological knowledge. This knowledge leads to a redesign of the original engineering application and encourages new ones. Our study reinforces the concept that synthetic biology is often a winding path from science to engineering and back again; scientific investigations spark engineering applications, the implementation of which suggests new scientific investigations.

Proteomic Analysis to Identify Tightly-Bound Cell Wall Protein in Rice Calli

  • Cho, Won Kyong;Hyun, Tae Kyung;Kumar, Dhinesh;Rim, Yeonggil;Chen, Xiong Yan;Jo, Yeonhwa;Kim, Suwha;Lee, Keun Woo;Park, Zee-Yong;Lucas, William J.;Kim, Jae-Yean
    • Molecules and Cells
    • /
    • v.38 no.8
    • /
    • pp.685-696
    • /
    • 2015
  • Rice is a model plant widely used for basic and applied research programs. Plant cell wall proteins play key roles in a broad range of biological processes. However, presently, knowledge on the rice cell wall proteome is rudimentary in nature. In the present study, the tightly-bound cell wall proteome of rice callus cultured cells using sequential extraction protocols was developed using mass spectrometry and bioinformatics methods, leading to the identification of 1568 candidate proteins. Based on bioinformatics analyses, 389 classical rice cell wall proteins, possessing a signal peptide, and 334 putative non-classical cell wall proteins, lacking a signal peptide, were identified. By combining previously established rice cell wall protein databases with current data for the classical rice cell wall proteins, a comprehensive rice cell wall proteome, comprised of 496 proteins, was constructed. A comparative analysis of the rice and Arabidopsis cell wall proteomes revealed a high level of homology, suggesting a predominant conservation between monocot and eudicot cell wall proteins. This study importantly increased information on cell wall proteins, which serves for future functional analyses of these identified rice cell wall proteins.

A Theory on the Scope of Financial Activity (금융(金融)의 전업(專業) 및 겸업화(兼業化) 이론(理論): 금융산업조직론(金融産業組織論)의 모색(摸索))

  • Jwa, Sung-hee
    • KDI Journal of Economic Policy
    • /
    • v.13 no.1
    • /
    • pp.167-197
    • /
    • 1991
  • This paper is intended as an introductory essay to explain endogenous changes in the scope of firm activities in the competitive structure of a deregulated, multi-product financial industry. Recently, the global financial industry has been experiencing a widespread reshuffling in its activities, reflecting both consolidation and specialization. The spread of the universal banking system, which involves the integration of various kinds of financial activities, has resulted in the so-called financial supermarket. At the same time, the traditional set of banking activities has been unbundled into so-called financial boutiques. A relevant question is where the current reshuffling process of integration and disintegration in financial activities might lead the financial industry. However, presently popular theories of the financial industry are not really appropriate for the analysis of this issue. This paper attempts to integrate the theory of specialization [George J. Stigler, "The Division of Labor is Limited by the Extent of the Market," Journal of Political Economy, Vol. LIX, No.3, June 1951] and the theory of the multi-product firm [William J. Baumol, John C. Panzar, and Robert D. Willig, Contestable Markets and the Theory of Industry Structure, Harcourt Brace Jovanovich, Inc., New York, 1982] and to apply the resulting hybrid theory, a theory on the scope of financial activity, to the financial industry. The implications of this theory for the issues raised above are formalized under five hypotheses on the reshuffling of financial activities as listed below: Hypothesis I: The differences in the organization of financial industries among countries are determined by differences in the size of the financial markets, other things being equal. Hypothesis II: A financial firm will separate those financial activities simultaneously having relatively strong economies of scale and relatively weak economies of scope (alternatively, diseconomies of scope) from other activities. Conversely, the firm will integrate those activities simultaneously having relatively weak economies of scale (alternatively, diseconomies of scale) and relatively strong economies of scope with incumbent activities. Hypothesis III: A competitive equilibrium in the deregulated financial industry will consist of both specialized and multi-product financial firms, resulting in a mixed form of specialized and universal banking systems. Hypothesis IV: As world financial markets fully integrate and all countries consequently face this single, common world market, the financial structures of individual countries will become increasingly similar. Hypothesis V: A more universal banking system will dominate the deregulated financial industry in countries with relatively small financial markets, while a more specialized banking system will dominate in countries with relatively large financial markets. However, equilibrium will ultimately be mixed, with specialized and universal banks coexisting, as stated in Hypothesis III. Based on these hypotheses, this paper interprets the historical development of specialized vs. universal banking systems in major industrial countries as a process driven by the evolution of the financial market in each country - i.e. the change in the size of the financial market over time. In addition, this paper anticipates that the final equilibrium of the world financial industry, which is currently under the pressure of financial innovations and deregulation, will be a mixed equilibrium with both specialized boutiques and universal supermarket-type financial firms, instead of an exclusively specialized or universal banking system. Future research should seek continued theoretical elaboration and empirical verification of this paper's hypotheses.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF