• Title/Summary/Keyword: abnormal expansion

Search Result 78, Processing Time 0.026 seconds

MOLECULAR BIOLOGIC ANALYSIS OF FMR-1 GENE TRINUCLEOTIDE REPEATS IN AUTISTIC PATIENTS (자폐장애 환자에서 FMR-1 유전 삼염기 반복의 분자생물학적 분석)

  • Kwak, Ho-Soon;Chun, Hyo-Jin;Chang, Eun-Jin;Kim, Hee-Cheol;Kim, Jung-Bun;Park, Young-Nam;Jung, Chul-Ho
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.11 no.1
    • /
    • pp.3-15
    • /
    • 2000
  • Objectives:There has been a rapid expansion of studies aimed at elucidating the genetic basis of autistic disorder, especially it’ relationship to fragile-X syndrome. The detection of fragile X chromosome(Xq27.3) by cytogenetic analysis has revealed many difficulties in testing. Therefore, to explore the relationship between autistic disorder and fragile X syndrome, this study administered molecular biologic methods which examined an unstable CGG repeat within the fragile X mental retardation-1(FMR-1) gene. Methods:Ninety nine autistic children and eight normal control children were tested. The number of CGG repeats within FMR-1 gene was measured after amplification by PCR, and cytogenetic analysis was also carried out to detect fragile site Xq27.3. Southern blot hybridization, using StB12.3 and/or Pfxa3 probe, was done for the patients showing expansion of more than 50 CGG repeats (premutation). Results:All but two autistic patients had no expansion in CGG repeats by PCR and there was no significant statistical difference in number of CGG repeat in comparison with normal control. Two autistic patients, considered as premutation by PCR analysis, had no full mutation or premutation by Southern blot hybridization. All autistic children tested did not have any abnormal karyotype or fragile site Xq27.3. Conclusions:These results suggest that autistic patients may not have abnormality in FMR-1 gene or abnormal expansion in CGG repeat. In conclusion, fragile X syndrome may not be antecedent of autistic disorder.

  • PDF

Chronic osteitic rhinosinusitis as a manifestation of cystic fibrosis: A case report

  • Jadhav, Aniket B.;Lurie, Alan G.;Tadinada, Aditya
    • Imaging Science in Dentistry
    • /
    • v.44 no.3
    • /
    • pp.243-247
    • /
    • 2014
  • A 28-year-old male patient with a history of cystic fibrosis (CF) was referred to the University of Connecticut School of Dental Medicine for an evaluation of a cystic lesion in the right maxilla using cone-beam computed tomography (CBCT). CF is an autosomal recessive disease characterized by an abnormal production of viscous mucus, affecting the mucociliary clearance. The CBCT scan revealed a large cystic lesion in the right maxilla extending from the right maxillary second molar to the midline in the region of the right central incisor with a significant buccal expansion. Further evaluation revealed complete opacification of the paranasal sinuses with medial bulging of the lateral maxillary sinus walls. The maxillary and sphenoid sinuses also appeared hypoplastic. The peculiar finding seen in this case was the presence of marked sclerosis and an increase in the thickness of the adjacent bony framework. This report aimed to describe the common sinonasal findings associated with CF and its underlying pathophysiology.

NUMERICAL ANALYSIS OF THREE-DIMENSIONAL SUBSONIC TURBULENT CAVITY FLOWS (3차원 아음속 난류 공동 유동에 대한 수치적 연구)

  • Choi, Hong-Il;Kim, Jae-Soo
    • Journal of computational fluids engineering
    • /
    • v.13 no.1
    • /
    • pp.35-40
    • /
    • 2008
  • Generally flight vehicles have many cavities such as wheel wells, bomb bays and windows on their external surfaces and the flow around these cavities makes separation, vortex, shock and expansion waves, reattachment and other complex flow phenomenon. The flow around the cavity makes abnormal and three-dimensional noise and vibration even thought the aspect ratio (L/D) is small. The cavity giving large effects to the flow might make large noise, cause structural damage or breakage, harm the aerodynamic performance and stability, or damage the sensitive devices. In this study, numerical analysis was performed for cavity flows by the unsteady compressible three dimensional Reynolds-Averaged Navier-Stokes (RANS) equations with Wilcox's $\kappa-\omega$ turbulence model. The MPI(Message Passing Interface) parallelized code was used for calculations by PC-cluster. The cavity has the aspect ratios of 2.5, 3.5 and 4.5 with the W/D ratio of 2 for three-dimensional cavities. The Sound Pressure Level (SPL) analysis was done with FFT to check the dominant frequency of the cavity flow. The dominant frequencies were analyzed and compared with the results of Rossiter's formula and Ahuja& Mendoza's experimental datum.

Development of an Integrated Knowledge-base and its Management Tool for Computerized Alarm Processing System

  • Gyunyoung Heo;Park, Seong-Soo;Kim, Han-Gon;Chang, Soon-Heung
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1997.05a
    • /
    • pp.133-138
    • /
    • 1997
  • For a long time, a number of alarm processing techniques have been researched to reduce the number of actuated alarms for operators to deal with effectively during the abnormal as well as the normal conditions. However, the strategy that the only systems with a few clear technologies should be used as a part of an alarm annunciation system has been adopted considering the effectiveness and the reliability in actual alarm processing systems. Therefore, alarm processing systems have difficult knowledge-base maintenance problems and limited expansion or enhancement defects. To solve these shortcomings, the integrated knowledge-base which can express the general information related to all the alarm processing techniques is proposed and its management tool, Knowledge Input Tool for Alarm (KIT-A) which can handle the data of the knowledge-base efficiently is developed. Since the integrated knowledge-base with KIT-A can manipulate all the alarm information without the modification of alarm processing system itself, it is expected to considerably advance the overall capability of maintenance and enhancement of the alarm processing systems.

  • PDF

TREATMENT OF FUNCTIONAL POSTERIOR CROSSBITES IN THE PRIMARY AND EARLY MIXED DENTITIONS : CASE REPORT (유치열 및 초기 혼합치열기에서 기능성 구치부 반대교합의 치료증례)

  • Lee, In-Jeong;Kim, Hyun-Jung;Nam, Soon-Hyeun
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.21 no.2
    • /
    • pp.547-554
    • /
    • 1994
  • Posterior crossbites are abnormal buccal, or lingual relationship of a tooth or teeth of the maxilla, the mandible, or both when the teeth of the two arches are in occlusion and involve the molars and premolars. Posterior crossbites are classified as dental, muscular(functional), or skeletal. In an effort to avoid occlusal interferences caused by the inadequate arch width, the patient deviates the mandible laterally upon closure to achieve maximum intercuspation. This is described as functional posterior crossbite. Correction of functional posterior crossbites in the primary & early mixed dentition as early as possible after diagnosis has been recommended, because crossbites do not automatically improve with the eruption of the permanent teeth. Functional posterior crossbites, if left untreated, may have deleterious effects on the development and function of the TMJ. The diagnosis and management of three cases is presented. Each patient with functional posterior crossbites is treated using the bilateral maxillary expansion appliance.

  • PDF

A Fault Diagnosis Using System Matrix In Expert System (System matrix를 사용한 고장진단 전문가 시스템)

  • Sim, K.J.;Kim, K.J.;Ha, W.K.;Chu, J.B.;Oh, S.H.
    • Proceedings of the KIEE Conference
    • /
    • 1989.07a
    • /
    • pp.233-236
    • /
    • 1989
  • This paper deals with the expert system using network configuration and input information composed of protective relays and tripped circuit breakers. This system has knowlegebase independent on network dimension because network representation consists of the type of the matrix. Therefore, the knowlege of network representation is simplified, the space of knowlege is reduced, the addition of facts to the knowlege is easy and the expansion of facts is possible. In this paper, the network representation is defined to system matrix. This expert system based on the system matrix diagnoses normal, abnormal operations of protective devices as well as possible fault sections. The brach and bound search technique is used: breadth first technique mixed with depth first technique of primitive PROLOG search technique. This system will be used for real time operations. This expert system obtaines the solution using the pattern matching in working memory without no listing approach for rule control. This paper is written in PROLOG, the A.I. language.

  • PDF

Dilation and Erosion Technique using a Inspection of the Catenary System Design (침식, 팽창기법을 이용한 전차선 검측 시스템의 설계)

  • Kim, Woo-Sang;Jung, Min-Yong;Kim, Ji-Yoon
    • Journal of the Korean Society for Railway
    • /
    • v.9 no.6 s.37
    • /
    • pp.701-704
    • /
    • 2006
  • The catenaries must guarantee the constant electricity to the trains, so that the safety and the estimate of fatigue degree and the inspection of abrasion degree should be done rapidly. This thesis proposes the system that can manage the performance/failure of the catenaries using the image process as the solution for the weak points of the existing inspection such as the decrease of immediateness and the lack of constancy in the human resources. This study simulates the ALD using VHSV (Virture HSV) which is the unreal HSV images, not getting the real HSV in ages to the image processing technique that repeats the erosion and the expansion of the images as the methods that can monitor the slight/critical defects of the catenaries as dealing with the result of the catenaries inspection images. The final ALD (Abnormal Line Detection) system is designed based on this simulation. I have demonstrated it with the VHSV (Virture HSV) virtual images as the materials of the test and inspected it through testing the defects of the catenaries for the thesis.

Estimation of Probability Density Functions of Damage Parameter for Valve Leakage Detection in Reciprocating Pump Used in Nuclear Power Plants

  • Lee, Jong Kyeom;Kim, Tae Yun;Kim, Hyun Su;Chai, Jang-Bom;Lee, Jin Woo
    • Nuclear Engineering and Technology
    • /
    • v.48 no.5
    • /
    • pp.1280-1290
    • /
    • 2016
  • This paper presents an advanced estimation method for obtaining the probability density functions of a damage parameter for valve leakage detection in a reciprocating pump. The estimation method is based on a comparison of model data which are simulated by using a mathematical model, and experimental data which are measured on the inside and outside of the reciprocating pump in operation. The mathematical model, which is simplified and extended on the basis of previous models, describes not only the normal state of the pump, but also its abnormal state caused by valve leakage. The pressure in the cylinder is expressed as a function of the crankshaft angle, and an additional volume flow rate due to the valve leakage is quantified by a damage parameter in the mathematical model. The change in the cylinder pressure profiles due to the suction valve leakage is noticeable in the compression and expansion modes of the pump. The damage parameter value over 300 cycles is calculated in two ways, considering advance or delay in the opening and closing angles of the discharge valves. The probability density functions of the damage parameter are compared for diagnosis and prognosis on the basis of the probabilistic features of valve leakage.

VOID DEFECTS IN COBALT-DISILICIDE FOR LOGIC DEVICES

  • Song, Ohsung;Ahn, Youngsook
    • Journal of the Korean institute of surface engineering
    • /
    • v.32 no.3
    • /
    • pp.389-392
    • /
    • 1999
  • We employed cobalt-disilicide for high-speed logic devices. We prepared stable and low resistant $CoSi_2$ through typical fabrication process including wet cleaning and rapid thermal process (RTP). We sputtered 15nm thick cobalt on the wafer and performed RTP annealing 2 times to obtain 60nm thick $CoSi_2$. We observed spherical shape voids with diameter of 40nm in the surface and inside $CoSi_2$ layers. The voids resulted in taking over abnormal junction leakage current and contact resistance values. We report that the voids in $CoSi_2$ layers are resulted from surface pits during the ion implantation previous to deposit cobalt layer. Silicide reaction rate around pits was enhanced due to Gibbs-Thompson effects and the volume expansion of the silicidation of the flat active regime trapped dimples. We confirmed that keeping the buffer oxide layer during ion implantation and annealing the silicon surface after ion implantation were required to prevent void defects in CoSi$_2$ layers.

  • PDF

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.