• Title/Summary/Keyword: Link-Break

Search Result 27, Processing Time 0.022 seconds

Formation of DNA-protein Cross-links Mediated by C1'-oxidized Abasic Lesion in Mouse Embryonic Fibroblast Cell-free Extracts

  • Sung, Jung-Suk;Park, In-Kook
    • Animal cells and systems
    • /
    • v.9 no.2
    • /
    • pp.79-85
    • /
    • 2005
  • Oxidized abasic residues arise as a major class of DNA damage by a variety of agents involving free radical attack and oxidation of deoxyribose sugar components. 2-deoxyribonolactone (dL) is a C1'-oxidized abasic lesion implicated in DNA strand scission, mutagenesis, and covalent DNA-protein cross-link (DPC). We show here that mammalian cell-free extract give rise to stable DPC formation that is specifically mediated by dL residue. When a duplex DNA containing dL at the site-specific position was incubated with cell-free extracts of Po ${\beta}-proficient$ and -deficient mouse embryonic fibroblast cells, the formation of major dL-mediated DPC was dependent on the presence of DNA polymerase (Pol) ${\beta}$. Formation of dL-specific DPC was also observed with histones and FEN1 nuclease, although the reactivity in forming dL-mediated DPC was significantly higher with Pol ${\beta}$ than with histones or FEN1. DNA repair assay with a defined DPC revealed that the dL lesion once cross-linked with Pol ${\beta}$ was resistant to nucleotide excision repair activity of cell-free extract. Analysis of nucleotide excision repair utilizing a model DNA substrate containing a (6-4) photoproduct suggested that excision process for DPC was inhibited because of DNA single-strand incision at 5' of the lesion. Consequently DPC mediated by dL lesion may not be readily repaired by DNA excision repair pathway but instead function as unusual DNA damage causing a prolonged DNA strand break and trapping of the major base excision repair enzyme.

A Node-disjoint Multipath Discovery Method by Local Route Discovery based on AODV (AODV기반의 지역경로탐색을 이용한 노드 비중첩 다중 경로 검색 기법)

  • Jin, Dong-Xue;Kim, Young-Rag;Kim, Chong-Gun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.87-94
    • /
    • 2007
  • In mobile ad hoc networks the most popular on demand routing protocols are the Dynamic Source Routing (DSR) protocol and the Ad hoc On demand Distance Vector (AODV) routing protocol. These and other representative standard routing protocols are designed to find and maintain only a single path. Whenever there is a link break on the active route, source node has to invoke a route discovery process from the beginning and it causes a lot of overhead. Multipath routing protocols, which can alleviate these problems by establishing multiple alternative paths between a source and a destination, are widely studied. In this paper we propose a node disjoint multipath discovery technique based on AODV local route discovery. This technique can find and build completely separated node disjoint multi paths from a source to a destination as many as possible. It will make routing more robust and stable.

A Study on the Performance of VPN based on MPLS Networks (MPLS 망을 기반으로 하는 VPN의 성능에 관한 연구)

  • Shin, Tae-Sam;Kim, Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.51-57
    • /
    • 2007
  • In this paper we introduce the concept of MPLS-based VPN and propose a scheme for providing VPN services in MPLS networks. Furthermore, we design the control components and the operational procedures and evaluated the performance of traditional VPN implementation methods and MPLS-based VPN. In this scheme it is possible to solve several problems that IP-based VPN pertains via the allocation of VPN ID and virtual space without tunneling, thereby providing effective VPN services. In other words, the MPLS-based VPN scheme uses MPLS networking technology together with the PSTN which can achieve a perfect segregation of user traffic on per-customer basis in a physical link and can guarantee high reliability and security levels. Specially, in the perspective of customers, it can save networking facilities installation and maintenance costs considerably. On the contrary, it possesses some shortcomings in that its deployment tends to be restricted within an ISP's network boundary and it is vulnerable to external security break-ins when going through public networks such as the Internet due to its lack of data encryption capability.

  • PDF

Moderating Effects of 3 years over Startup QFD Training Participants' Characteristics on Transfer Intension (창업기업 QFD 교육 훈련 학습자 특성이 학습 전이의도에 미치는 조절 효과에 관한 연구)

  • Hwang, Bo-Yun;Yang, Young-Seok;Kim, Myung-Seuk
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.4
    • /
    • pp.35-48
    • /
    • 2018
  • This study aims to assess the training effect of QFD(Quality Functional Deployment) program for 3 years over startups, adopted from the conventional QFD widely used in the large companies to break up to a sluggish sales and growth, for employees working in startup whether the participants in startup and venture company taking this lessons into their real tasks or not. In particular, the focus of this study falls on figuring out whether individual characteristics of the participants play a role in moderating effect over transfer intension factors and its link path structure. The research results drive out two significant findings. First, in terms of relationship between the influence of transfer intension by self-efficacy and the validity of training content with the learner's readiness, the moderating effect of demographic features of the participants is effective partially by the sex and fully by their working position, but not statistically significant by age, education, and the prior startup career. This research deliver the following significant implication that the active participation of CEO level, decision-maker guarantee the higher performance of the training program like QFD program, more stresses falling on practical implementation in real business rather than just ending up with career training. This study gives significant policy implication to quasi-government organization running all public startup training projects.

Research on rapid source term estimation in nuclear accident emergency decision for pressurized water reactor based on Bayesian network

  • Wu, Guohua;Tong, Jiejuan;Zhang, Liguo;Yuan, Diping;Xiao, Yiqing
    • Nuclear Engineering and Technology
    • /
    • v.53 no.8
    • /
    • pp.2534-2546
    • /
    • 2021
  • Nuclear emergency preparedness and response is an essential part to ensure the safety of nuclear power plant (NPP). Key support technologies of nuclear emergency decision-making usually consist of accident diagnosis, source term estimation, accident consequence assessment, and protective action recommendation. Source term estimation is almost the most difficult part among them. For example, bad communication, incomplete information, as well as complicated accident scenario make it hard to determine the reactor status and estimate the source term timely in the Fukushima accident. Subsequently, it leads to the hard decision on how to take appropriate emergency response actions. Hence, this paper aims to develop a method for rapid source term estimation to support nuclear emergency decision making in pressurized water reactor NPP. The method aims to make our knowledge on NPP provide better support nuclear emergency. Firstly, this paper studies how to build a Bayesian network model for the NPP based on professional knowledge and engineering knowledge. This paper presents a method transforming the PRA model (event trees and fault trees) into a corresponding Bayesian network model. To solve the problem that some physical phenomena which are modeled as pivotal events in level 2 PRA, cannot find sensors associated directly with their occurrence, a weighted assignment approach based on expert assessment is proposed in this paper. Secondly, the monitoring data of NPP are provided to the Bayesian network model, the real-time status of pivotal events and initiating events can be determined based on the junction tree algorithm. Thirdly, since PRA knowledge can link the accident sequences to the possible release categories, the proposed method is capable to find the most likely release category for the candidate accidents scenarios, namely the source term. The probabilities of possible accident sequences and the source term are calculated. Finally, the prototype software is checked against several sets of accident scenario data which are generated by the simulator of AP1000-NPP, including large loss of coolant accident, loss of main feedwater, main steam line break, and steam generator tube rupture. The results show that the proposed method for rapid source term estimation under nuclear emergency decision making is promising.

Factors influencing success and safety of AED retrieval in out of hospital cardiac arrests in Singapore

  • NG, Jonathan Shen You;HO, Reuben Jia Shun;YU, Jae Yong;NG, Yih Yng
    • The Korean Journal of Emergency Medical Services
    • /
    • v.26 no.2
    • /
    • pp.97-111
    • /
    • 2022
  • Purpose: Automated External Defibrillator (AED) usage in out-of-hospital cardiac arrests (OHCAs) improves the survival of patients. In Singapore, public AEDs are protected by locked boxes with a 'break glass' mechanism to deter theft. Community responders have sustained injuries while breaking glass to retrieve AEDs. This unprecedented study aimed to elucidate the factors influencing successful retrieval of an AED and to document the prevalence of injuries. Methods: A survey was created and distributed. Participants were required to have responded to an OHCA in the past 12 months. Comparison tests were performed with the Fischer-Freeman-Halton Exact test or Pearson chi square test at 5% significance levels, and with multiple logistic regression with a logit link function. Results: Eighty-eight participants were eligible. The success of retrieving an AED was found not to be impacted by occupation, age, gender or time. Participants who responded to an OHCA because of activation by the myResponder App were more likely to retrieve an AED successfully. (AOR 11.111, 95% CI: 2.141-58.824) Conclusion: Use of the myResponder mobile application is associated with the greater success of retrieving an AED. Successful retrieval of an AED is not impacted by time, gender, age, or the occupation of the responder. Community responders in Singapore remain motivated to respond to Cardiac Arrests despite risk of injury.

A study of the destructive styles from Contemporary Paintings - Focused on distinguishing enmity-destruction and self-destruction - (현대회화에서 드러난 해체의 형식론에 관한 연구 -타의적 해체와 자의적 해체의 성격규정을 중심으로-)

  • Park Ki-Woong
    • Journal of Science of Art and Design
    • /
    • v.7
    • /
    • pp.5-63
    • /
    • 2005
  • Generally, the meanings of destruction are related in the meaning of demolition, breakdown, into fragments ... and so on, and the similar meanings are twist, crush, demolish, split, cut, into pieces , break up ... etc. Further, it has related in the cruelty and destructive heart which are linked with orgy, Sadism, Necrophilia and so on. The meanings are also expressed by the initial , which are deprivation, deface, defame, deform, degrade, delegitimize, denounce , deride, destroy, devalue, as well as debase, debunk, declaim, declassify, decry, delete, denigrate, deprecate, despise or detract ...and so on. Dario Gamboni has discussed the meaning in his book as two categories Iconoclasm and Vandalism. And the similar meanings could be found in the words which has the initial of , like abase, abate, abhor, abjure, abolish, abridge, abuse ...and so on. Even though the distinct meanings of Iconoclasm and Vandalism, it is not easy to distinguish clearly between the differences when the results are accomplished in contemporary paintings because of the similarity of the results. In korean vocabulary there are no similar words to distinguish between the meanings of destruction and deconstruction, and the deconstruction is not recorded in the general dictionaries. However the meaning of is diminishing, separation, contrast and so on. So the unification of the word as do-construction is not construct, minus construction, reverse construction. And Vincent Ditch explained that there are the meaning of destroy the text. From Jacques Derrida, the deconstruction strategy is to criticise the world of traditional metaphysics and logocentrism, and not to reconstruire the philosophical meaning of texts but $d\'{e}construire$ them. And Saussure emphasized that the signifers could have more meaning that there can be more signified in traditional texts in the art. as a result, deconstruction is explained that there are many signified meanings in a signifer. In this thesis , from using the meanings of destruction and deconstruction, to distinguish the expressive skills in contemporary art works are arising. Therefore, special methods which are linked in the destruction styles are selected. As a result, the two different purposes of destruction is arising, one is enmity destruction and the other is self destruction another word, auto destruction or destruction to create The enmity destruction can be distinguished by the two category Iconoclasm and Vandalism. They come from the moment of different historical aspect is arising and want to attack the Icon or masterpiece this concept is from the study of John Philips and especially iconoclasm is linked with religious and artistic heart, but Vandalism is come from the political attack. Sometime, this distinguish is not clearly arising, because the two aspects are co-related in the attack. As a result, firstly, the Iconoclastic controversy had arisen in the methods of Dadaism which has developed by Man Ray, Francis Picabia and Marcel Duchamp. They want to attack the pre-established master-pieces and painting spaces, and they had 'non-artistic attitude' not to be art. Since 1980, the German artist Anselm Kiefer adapted the methods and made them his special skills so he had tried to paint tough brush strokes and draw with hugh pallette image line and fire and water images , they can be the image attack as the Iconoclasm. secondly, the model of vandalism is to be done by hammer, drill, canon and so on. the method is to attack the content of painting. Further, the object of destruction is bound by cords and iron lings to demolish or to declare the authority of pre-statues; it symbolize the pre-authority is gone already. Self-destruction based paintings are clearly different in the purpose of approaching the art work. First of all, they can be auto-destruction, creative destruction and metamorphosis destruction, which is linked with the skill the material aspect and basic stature, and sign destruction or signifier destruction, which is link with the inner meaning destruction that is considered as the Semiotical destruction in post-modern paintings. Since 1960, the auto destruction is based on the method of firing, melting, grinding and similar skills, which is linked with Neo-Dada and reverse-assemblage. Metamorphosis destruction is strongly linked with the basic inner heart price and quality, so it can be resulted in the changedness of expectation and recognition. Tony Cragg has developed the skills to metamorphose the wood as stone or iron as cloth and stone as sponge and rubber and so on. The researcher has developed the same style in the series of since 2003. The other self-destructive methods are found in the skill of sign destruction. In the methods the meaning of the art is not fixed as one or two, but is developed multi-meaning and differ from original starting situation, so Jacques Derrida called the difference meaning in deconstruction. It is the destruction of textes. These methods are accomplished by David Salle, Francesco Clemente, and recently Tracy Emin, who has developed the attacking heart in the spectators' emotion. Sometime in the method of self-destruction, it is based on horror and shock, the method is explored by Demian Hirst and Jakes and Dinos Chapman. Their destructive styles stimulate ambivalent heart and destroy original sign of girl and animals.

  • PDF