• Title/Summary/Keyword: 지적 특성

Search Result 1,108, Processing Time 0.026 seconds

Partial Purification and Characterization of Minor Form of Phosphofructokinase from the Host Fraction of Chickpea(Cicer arietinum L. cv. Amethyst) Nodules (병아리콩(Cicer arietinum L. cv. Amethyst) 근류내의 플라스티드 포스포프룩토오스 키나아제의 분리 및 특성)

  • Lee, Hoi-Seon
    • Applied Biological Chemistry
    • /
    • v.41 no.5
    • /
    • pp.355-362
    • /
    • 1998
  • The minor form of phosphofructokinase (EC 2.7.1.11; PFK), which was suggested to be of plastid origin from the host fraction of chickpea nodules, was isolated as a small protein with apparent molecular mass near 220 kDa and purified to a high degree. SDS-PAGE and western blot indicated that the enzyme was made up of a homotetrameric structure (55 kDa). The enzyme had sharp pH profiles with maximal activities at pH 8 and displayed Michaelis-Menten kinetics with respect to Fru-6-P and nucleoside triphosphate substrate at the pH optimum (pH 8) and at pH 7. MgATP was the most effective phosphoryl donor. Phosphoenolpyruvate was a potent inhibitor of minor PFK activity, and the enzyme was also strongly inhibited by 3-phosphoglycerate, 2-phosphoglycerate, and to a lesser extent, PPi. Minor PFK was weakly activated by KCl, NaCl and Pi, and was inhibitory at high concentration of KCl and Pi.

  • PDF

Maintaining the Authenticity of Electronic Records in the Electronic Records Management Systems (전자기록의 진본성 유지를 위한 전략)

  • Suh, Hye-Ran;Seo, Eun-Gyoung;Lee, So-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.2
    • /
    • pp.241-261
    • /
    • 2003
  • The electronic records management systems must create and maintain reliable and authentic records because such records can be easily duplicated, manipulated, altered, and revised. The goal of this study is to propose the strategies for maintainning authenticity of electronic records and to produce some baselines for developing the strategies for maintaining authenticity of electronic records and to produce some baselines for developing the trusted record management sytems. Therefore, the study is to identify and define the concept of an electronic record and the nature of authenticity; to estabilish the principles for ensuring the long-term preservation of authentic electronic records; to suggest the methods for describing electronic records in order to maintain audit trail; to suggest the methods for describing electronic records in order to maintain audit ; to propose the mechanisms for maintaining reliable and authentic electronic records; to analyse the Korean standards related to electronic document management systems; and to discuss future challenges for maintaining the authenticity.

A Review of Declarations on Appropriate Research Evaluation for Exploring Their Applications to Research Evaluation System of Korea (연구성과평가 지침 리뷰 및 국내 적용 제안을 위한 고찰)

  • Yu, So-Young;Lee, Jae Yun;Chung, EunKyung;Lee, Boram
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.4
    • /
    • pp.249-272
    • /
    • 2015
  • Inappropriate applications of bibliometric approach and misinterpretation on the analysis in research evaluation have been found and recognized nationally and internationally as the use of the approach has been rapidly adopted in various sectors in research evaluation systems and research funding agencies. The flood of misuse led to several numbers of declarations and statements on appropriate research evaluation, including Leiden Manifesto, DORA, IEEE Statement, etc. The similar recommendations from five different declarations, Leiden Manifest, IEEE Statement, DORA, Institut de France, and Thomson Reuters White paper were reviewed and meta-analyzed in this study and it is revealed that most of them emphasize evaluation on quality in various aspects with multiple indicators. Research evaluation with assessing multiple aspects of individual research based on the understandings of its purpose and pertinent subject area was revealed as being mostly advised in the declarations, and this recommendation can be regarded as being mostly requested in national research evaluation system. For future study, interviews with relevant stakeholders of national research evaluation system in order to explore its application are needed to confirm the findings of this review.

Analysis on the Relation Between Programming Achievement and Problem Solving According to Gender (성별에 따른 프로그래밍 성취도와 문제해결과정의 관계 분석)

  • Yu, ByeongGeon;Kim, JaMee;Lee, WonGyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.6
    • /
    • pp.1-10
    • /
    • 2012
  • It is reported that programming education contributes to improving problem solving skills by developing higher thinking skills. As many researches mention the need of programming education, they point to the fundamental difference by gender. This study aims to find out the cause of low interest and achievement levels in programming education in female students. To achieve our goals, we chose 133 specialized high school students in which programming class is being carried out as subjects of our study. The results of this study showed that female students had the tendency to prefer individual projects to a more systematic method of problem solving. Moreover, according to correlation analysis, higher programming skills in female students showed various problem solving processes. This study shows significance in proposing different study methods according to gender to obtain effective programming study.

  • PDF

Indoor 3D Modeling Approach based on Terrestrial LiDAR (지상라이다기반 실내 3차원 모델 구축 방안)

  • Hong, Sungchul;Park, Il-Suk;Heo, Joon;Choi, Hyunsang
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.5D
    • /
    • pp.527-532
    • /
    • 2012
  • Terrestrial LiDAR emerges as a main mapping technology for indoor 3D cadastre, cultural heritage conservation and, building management in that it provides fast, accurate, and reliable 3D data. In this paper, a new 3D modeling method consisting of segmentation stage and outline extraction stage is proposed to develop indoor 3D model from the terrestrial LiDAR. In the segmentation process, RANSAC and a refinement grid is used to identify points that belong to identical planar planes. In the outline tracing process, a tracing grid and a data conversion method are used to extract outlines of indoor 3D models. However, despite of an improvement of productivity, the proposed approach requires an optimization process to adjust parameters such as a threshold of the RANSAC and sizes of the refinement and outline extraction grids. Furthermore, it is required to model curvilinear and rounded shape of the indoor structures.

A Study on the performance pattern in the elite decathlon (엘리트 10종경기 선수들의 경기력 패턴에 관한 연구)

  • Lee, Jang-Taek
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.6
    • /
    • pp.1071-1079
    • /
    • 2010
  • The decathlon is an athletic event consisting of ten track and field events. Events are held over two consecutive days and the winners are determined by the combined performance in all. We considered the best 200 decathletes who competed in the recent Olympics games and World Championship decathlon. We have used correspondence analysis to identify the relationship between ordered individual performance and the overall performance. Canonical correlation analysis of first day events versus second day events could shed light on the change of the level of performance between the two days. Correlation analysis was used to verify relation between cumulative event rank and final decathlon rank. Therefore, we conclude that the decathlon favors those atheletes who do well at the track events to become the best players. The best players in the decathlon performed relatively poorly in the 1,500 metres, but did well in the long jump, the 400 metres and the 110-metre hurdles. Decathletes in this study have a positive correlation between overall performance and maximal excellence in a particular discipline. Thus, to compete successfully at this level, a uniform, relatively high performance in all individual disciplines is required.

The Trends and Causes of Income Inequality Among Gender (성별 집단 내 소득불평등(inequality among gender)의 변화 추이 및 원인)

  • Kim, Hye-Yeon;Hong, Baeg-Eui
    • Korean Journal of Social Welfare
    • /
    • v.61 no.2
    • /
    • pp.391-415
    • /
    • 2009
  • The purpose of this study is to examine the trends of income inequality by gender since 1997 economic crisis and to investigate what is the most influential factor on these changes for males and females. Data used for this study are nine waves of Korean Labor and Income Panel Study(KLIPS). Income inequality is measured by the Gini coefficient and the mean logarithmic deviation(MLD) and the MLDs are decomposed into three components to quantify within- and between-group inequalities. The results show that the extent of income inequality is greater for women during the whole period and is fluctuated more widely. Women's income inequality is mainly affected by the family-related variables, such as age and marital status, while men's inequality is primarily determined by the labor market factors, such as employment status, industrial types and occupation status. These results imply that gender-sensetive welfare policies need to be implemented and that it is necessary to assist the poor women and men through the benefits from the income assistance programs and labor market programs.

  • PDF

Biometric and Identity Reference Protection (개인식별정보와 바이오인식정보의 보호기법)

  • Shin, Yang-Nyuo;Kwan, Man-Jun;Lee, Yong-Jun;Park, Jin-Il;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2009
  • This paper describes how to protect the personal information of a biometric reference provider wherein biometric reference and personally identifiable information are bounded in a biometric system. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person is usually adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular individual when combining with the other information. As a result, secure protection methods are required for generating, storing, and transmitting biometric information. Considering these issues, this paper proposes a method for ensuring confidentiality and integrity in storing and transferring personally identifiable information that is used in conjunction with biometric information, by extending the related X9.84 standard. This paper also outlines the usefulness of the proposition by defining a standard format represented by ASN.1, and implementing it.

Secure Binding of Identity Reference and Biometric Reference (개인식별정보와 바이오인식정보의 안전한 결합방법)

  • You, Mi-Kyeong;Kwon, Man-Jun;Lee, Sang-Ho;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.610-616
    • /
    • 2010
  • This paper describes how to securely bind the identity reference and biometric reference for satisfying security requirements. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person has been adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular it vidual when combining with other identity information. As a result, a son, anb it canmethod is required for manipulat canthese information. Consider canthese issues, this paper proposes a biit canmethod uiter son, anand uisecure channels for generating the common identifier and ensuring security of identity reference and biometric reference that are stored in the separated DBs.

A Study on the Self-Weight Consolidation Procedure of Very Soft Ground Reclaimed by Dredging Clayey Soil (연약한 준설 매립 점성토지반의 자중압밀 과정에 관한 연구)

  • 김형주;오근엽
    • Journal of the Korean Geotechnical Society
    • /
    • v.15 no.2
    • /
    • pp.129-138
    • /
    • 1999
  • This study is performed for the development of a field monitoring and test technique both of self-weight and hydraulic consolidation by which the soil parameters of dredge-reclaimed clay can be obtained effectively. The field monitoring development and tests mentioned above make it possible to reproduce the process of the self-weight consolidation from settling to reclaimed soft ground. The experimental research is mainly focussed on the characteristics of self-weight consolidation of dredged clayey soil. And theoretical study has pointed out the limits in the application of Terzaghi's one dimensional consolidation theory in interpreting reclaimed clayey ground. Furthermore, a finite difference analysis has been made on the basis of Mikasa s self-weight consolidation theory which takes the problems of Terzaghi's theory into consideration. The relationships between specific volume, effective stress, and the coefficient of permeability of Kunsan reclaimed clayey soil have been obtained by laboratory tests. On the other hand, through the field monitoring, pore pressure, total pressure, and water levels have been measured after pouring. The results of these experiments have been analyzed, and compared with those from Terzaghi's method and the finite difference analysis of Mikasa's self-weight consolidation theory. In conclusion, the measured settlements is comparatively consistent with Mikasa's self-weight consolidation theory rather than Terzaghi's consolidation theory.

  • PDF