• 제목/요약/키워드: Abnormal expansion

검색결과 78건 처리시간 0.026초

자폐장애 환자에서 FMR-1 유전 삼염기 반복의 분자생물학적 분석 (MOLECULAR BIOLOGIC ANALYSIS OF FMR-1 GENE TRINUCLEOTIDE REPEATS IN AUTISTIC PATIENTS)

  • 곽호순;전효진;장은진;김희철;김정범;박영남;정철호
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • 제11권1호
    • /
    • pp.3-15
    • /
    • 2000
  • 연구목적:자폐장애의 원인을 유전학적으로 규명하려는 연구가 시도되고 있으며, 그 중 fragile X 증후군과의 연관성에 대한 연구가 활발히 진행되고 있다. Fragile X 염색체(Xq27.3)는 세포유전학적 방법으로 증명할 수 있으나 검사에 많은 제약과 단점이 있으므로, 본 연구에서는 보다 신뢰성이 높은 분자생물학적 방법으로 FMR-1 유전자내 CGG 삼염기 반복부위를 분석하여 자폐장애와 fragile X 증후군의 연관성을 규명하고자 하였다. 방 법:자폐장애 환아(99명)와 정상대조군(8명)을 대상으로 FMR-1 유전자의 CGG 반복배열 부위를 sense와 antisense primer를 이용하여 PCR법으로 분석하였으며, 동시에 세포유전학적 검사도 시행하였다. PCR 분석에서 CGG 반복수가 50 이상인 경우에 대해서는 StB12.3 혹은 Pfxa3 probe를 이용한 Southern blot hybridization으로 확인하였다. 결 과:FMR-1 유전자의 CGG 반복배열에 대한 PCR 분석 결과 CGG 삼염기의 반복배열의 수는 자폐장애 환자군과 정상대조군 사이에 통계적으로 유의한 차이가 없었다(p=0.207). 자폐장애 환자에서 CGG반복수가 50회 이상인 조기변이(premutation) 환자가 2명 있었으나 Southern blot hybridization 결과 완전변이(full mutation)로 판정할 수 있는 경우는 없었다. 세포유전학적 검사에서 환자군 모두에서 정상 핵형을 나타내었으며 fragile X 염색체는 확인되지 않았다. 결 론:이상의 결과에서 자폐장애 환자가 FMR-1 유전자의 CGG 삼염기 반복부위 이상, 즉 fragile X 염색체 이상을 동반하지 않았음을 증명할 수 있었다. 이는 fragile X 증후군을 자폐장애의 직접적인 원인이라고 보기에는 어려움이 있음을 시사한다.

  • PDF

Chronic osteitic rhinosinusitis as a manifestation of cystic fibrosis: A case report

  • Jadhav, Aniket B.;Lurie, Alan G.;Tadinada, Aditya
    • Imaging Science in Dentistry
    • /
    • 제44권3호
    • /
    • pp.243-247
    • /
    • 2014
  • A 28-year-old male patient with a history of cystic fibrosis (CF) was referred to the University of Connecticut School of Dental Medicine for an evaluation of a cystic lesion in the right maxilla using cone-beam computed tomography (CBCT). CF is an autosomal recessive disease characterized by an abnormal production of viscous mucus, affecting the mucociliary clearance. The CBCT scan revealed a large cystic lesion in the right maxilla extending from the right maxillary second molar to the midline in the region of the right central incisor with a significant buccal expansion. Further evaluation revealed complete opacification of the paranasal sinuses with medial bulging of the lateral maxillary sinus walls. The maxillary and sphenoid sinuses also appeared hypoplastic. The peculiar finding seen in this case was the presence of marked sclerosis and an increase in the thickness of the adjacent bony framework. This report aimed to describe the common sinonasal findings associated with CF and its underlying pathophysiology.

3차원 아음속 난류 공동 유동에 대한 수치적 연구 (NUMERICAL ANALYSIS OF THREE-DIMENSIONAL SUBSONIC TURBULENT CAVITY FLOWS)

  • 최홍일;김재수
    • 한국전산유체공학회지
    • /
    • 제13권1호
    • /
    • pp.35-40
    • /
    • 2008
  • Generally flight vehicles have many cavities such as wheel wells, bomb bays and windows on their external surfaces and the flow around these cavities makes separation, vortex, shock and expansion waves, reattachment and other complex flow phenomenon. The flow around the cavity makes abnormal and three-dimensional noise and vibration even thought the aspect ratio (L/D) is small. The cavity giving large effects to the flow might make large noise, cause structural damage or breakage, harm the aerodynamic performance and stability, or damage the sensitive devices. In this study, numerical analysis was performed for cavity flows by the unsteady compressible three dimensional Reynolds-Averaged Navier-Stokes (RANS) equations with Wilcox's $\kappa-\omega$ turbulence model. The MPI(Message Passing Interface) parallelized code was used for calculations by PC-cluster. The cavity has the aspect ratios of 2.5, 3.5 and 4.5 with the W/D ratio of 2 for three-dimensional cavities. The Sound Pressure Level (SPL) analysis was done with FFT to check the dominant frequency of the cavity flow. The dominant frequencies were analyzed and compared with the results of Rossiter's formula and Ahuja& Mendoza's experimental datum.

Development of an Integrated Knowledge-base and its Management Tool for Computerized Alarm Processing System

  • Gyunyoung Heo;Park, Seong-Soo;Kim, Han-Gon;Chang, Soon-Heung
    • 한국원자력학회:학술대회논문집
    • /
    • 한국원자력학회 1997년도 춘계학술발표회논문집(1)
    • /
    • pp.133-138
    • /
    • 1997
  • For a long time, a number of alarm processing techniques have been researched to reduce the number of actuated alarms for operators to deal with effectively during the abnormal as well as the normal conditions. However, the strategy that the only systems with a few clear technologies should be used as a part of an alarm annunciation system has been adopted considering the effectiveness and the reliability in actual alarm processing systems. Therefore, alarm processing systems have difficult knowledge-base maintenance problems and limited expansion or enhancement defects. To solve these shortcomings, the integrated knowledge-base which can express the general information related to all the alarm processing techniques is proposed and its management tool, Knowledge Input Tool for Alarm (KIT-A) which can handle the data of the knowledge-base efficiently is developed. Since the integrated knowledge-base with KIT-A can manipulate all the alarm information without the modification of alarm processing system itself, it is expected to considerably advance the overall capability of maintenance and enhancement of the alarm processing systems.

  • PDF

유치열 및 초기 혼합치열기에서 기능성 구치부 반대교합의 치료증례 (TREATMENT OF FUNCTIONAL POSTERIOR CROSSBITES IN THE PRIMARY AND EARLY MIXED DENTITIONS : CASE REPORT)

  • 이인정;김현정;남순현
    • 대한소아치과학회지
    • /
    • 제21권2호
    • /
    • pp.547-554
    • /
    • 1994
  • Posterior crossbites are abnormal buccal, or lingual relationship of a tooth or teeth of the maxilla, the mandible, or both when the teeth of the two arches are in occlusion and involve the molars and premolars. Posterior crossbites are classified as dental, muscular(functional), or skeletal. In an effort to avoid occlusal interferences caused by the inadequate arch width, the patient deviates the mandible laterally upon closure to achieve maximum intercuspation. This is described as functional posterior crossbite. Correction of functional posterior crossbites in the primary & early mixed dentition as early as possible after diagnosis has been recommended, because crossbites do not automatically improve with the eruption of the permanent teeth. Functional posterior crossbites, if left untreated, may have deleterious effects on the development and function of the TMJ. The diagnosis and management of three cases is presented. Each patient with functional posterior crossbites is treated using the bilateral maxillary expansion appliance.

  • PDF

System matrix를 사용한 고장진단 전문가 시스템 (A Fault Diagnosis Using System Matrix In Expert System)

  • 심국진;김건중;함완균;추진부;오성헌
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1989년도 하계종합학술대회 논문집
    • /
    • pp.233-236
    • /
    • 1989
  • This paper deals with the expert system using network configuration and input information composed of protective relays and tripped circuit breakers. This system has knowlegebase independent on network dimension because network representation consists of the type of the matrix. Therefore, the knowlege of network representation is simplified, the space of knowlege is reduced, the addition of facts to the knowlege is easy and the expansion of facts is possible. In this paper, the network representation is defined to system matrix. This expert system based on the system matrix diagnoses normal, abnormal operations of protective devices as well as possible fault sections. The brach and bound search technique is used: breadth first technique mixed with depth first technique of primitive PROLOG search technique. This system will be used for real time operations. This expert system obtaines the solution using the pattern matching in working memory without no listing approach for rule control. This paper is written in PROLOG, the A.I. language.

  • PDF

침식, 팽창기법을 이용한 전차선 검측 시스템의 설계 (Dilation and Erosion Technique using a Inspection of the Catenary System Design)

  • 김우생;정민영;김지윤
    • 한국철도학회논문집
    • /
    • 제9권6호
    • /
    • pp.701-704
    • /
    • 2006
  • The catenaries must guarantee the constant electricity to the trains, so that the safety and the estimate of fatigue degree and the inspection of abrasion degree should be done rapidly. This thesis proposes the system that can manage the performance/failure of the catenaries using the image process as the solution for the weak points of the existing inspection such as the decrease of immediateness and the lack of constancy in the human resources. This study simulates the ALD using VHSV (Virture HSV) which is the unreal HSV images, not getting the real HSV in ages to the image processing technique that repeats the erosion and the expansion of the images as the methods that can monitor the slight/critical defects of the catenaries as dealing with the result of the catenaries inspection images. The final ALD (Abnormal Line Detection) system is designed based on this simulation. I have demonstrated it with the VHSV (Virture HSV) virtual images as the materials of the test and inspected it through testing the defects of the catenaries for the thesis.

Estimation of Probability Density Functions of Damage Parameter for Valve Leakage Detection in Reciprocating Pump Used in Nuclear Power Plants

  • Lee, Jong Kyeom;Kim, Tae Yun;Kim, Hyun Su;Chai, Jang-Bom;Lee, Jin Woo
    • Nuclear Engineering and Technology
    • /
    • 제48권5호
    • /
    • pp.1280-1290
    • /
    • 2016
  • This paper presents an advanced estimation method for obtaining the probability density functions of a damage parameter for valve leakage detection in a reciprocating pump. The estimation method is based on a comparison of model data which are simulated by using a mathematical model, and experimental data which are measured on the inside and outside of the reciprocating pump in operation. The mathematical model, which is simplified and extended on the basis of previous models, describes not only the normal state of the pump, but also its abnormal state caused by valve leakage. The pressure in the cylinder is expressed as a function of the crankshaft angle, and an additional volume flow rate due to the valve leakage is quantified by a damage parameter in the mathematical model. The change in the cylinder pressure profiles due to the suction valve leakage is noticeable in the compression and expansion modes of the pump. The damage parameter value over 300 cycles is calculated in two ways, considering advance or delay in the opening and closing angles of the discharge valves. The probability density functions of the damage parameter are compared for diagnosis and prognosis on the basis of the probabilistic features of valve leakage.

VOID DEFECTS IN COBALT-DISILICIDE FOR LOGIC DEVICES

  • Song, Ohsung;Ahn, Youngsook
    • 한국표면공학회지
    • /
    • 제32권3호
    • /
    • pp.389-392
    • /
    • 1999
  • We employed cobalt-disilicide for high-speed logic devices. We prepared stable and low resistant $CoSi_2$ through typical fabrication process including wet cleaning and rapid thermal process (RTP). We sputtered 15nm thick cobalt on the wafer and performed RTP annealing 2 times to obtain 60nm thick $CoSi_2$. We observed spherical shape voids with diameter of 40nm in the surface and inside $CoSi_2$ layers. The voids resulted in taking over abnormal junction leakage current and contact resistance values. We report that the voids in $CoSi_2$ layers are resulted from surface pits during the ion implantation previous to deposit cobalt layer. Silicide reaction rate around pits was enhanced due to Gibbs-Thompson effects and the volume expansion of the silicidation of the flat active regime trapped dimples. We confirmed that keeping the buffer oxide layer during ion implantation and annealing the silicon surface after ion implantation were required to prevent void defects in CoSi$_2$ layers.

  • PDF

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • 제11권4호
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.