• 제목/요약/키워드: Order Disruption

검색결과 140건 처리시간 0.022초

과수해충 페로몬 연구의 현황과 향후 방향 (Current Status and Future Directions of Pheromone Research on Orchard Pests in Korea)

  • 양창열
    • 한국응용곤충학회지
    • /
    • 제61권1호
    • /
    • pp.51-62
    • /
    • 2022
  • 많은 해충이 과수의 다양한 조직을 가해하여 국내 과수산업을 위협하고 있다. 경제적으로 중요한 과수 해충의 방제는 일반적으로 화학 살충제에 의존하고 있다. 환경과 인류 건강에 미치는 살충제의 영향에 대한 우려가 증가함에 따라 환경 친화적인 해충방제 전략이 시급하게 필요한 실정이다. 과수 해충의 페로몬은 교미교란이나 대량포획과 같이 환경적으로 안전한 방제 체계를 끌어낼 수 있다. 본 종설은 과수 해충 51종에서 알려진 페로몬의 유형과 성분을 요약한다. 장님노린재과, 진딧물과, 깍지벌레과, 가루깍지벌레과, 풍뎅이과, 혹파리과 및 씨살이좀벌과에 속하는 14종과 나비목의 26종은 암컷이 성페로몬을 생산하여 수컷을 유인한다. 반대로 호리허리노린재과, 노린재과, 총채벌레과 및 하늘소과에 속하는 11종은 수컷이 집합페로몬을 생산하여 암컷과 수컷 모두를 유인한다. 향후 과수 해충 관리에서 페로몬과 다른 신호화학물질의 사용을 확대하기 위해서는 새로운 해충의 페로몬, 주요 해충의 카이로몬, 장기간 페로몬 방출용 교미교란제 및 대량포획을 위한 트랩 디자인과 트랩 설치에 관한 연구가 필요할 것으로 보인다.

무형문화재 보유단체 분열에 대한 인식(認識)의 재고(再考)를 요(要)함 -양주별산대놀이 사례 중심- (Necessary to reconsider the recognize of the disuniting of organizations holding intangible cultural assets. - From the viewpoint of Yangjubyeolsandae-nori -)

  • 정필섭
    • 공연문화연구
    • /
    • 제43호
    • /
    • pp.405-440
    • /
    • 2021
  • 국가중요무형문화재 양주별산대놀이는 2010년 보유단체 구성원이 두 개로 쪼개진다. 이전시기부터 진행된 단체의 내분이 폭발한 것이다. 연구주제는 그 분열을 다룬 것이다. 연구목적은 첫째, 양주별산대놀이 분쟁의 원인·전개·일단락에 대한 기록이다. 둘째, 중재에 나선 문화재청이 취한 행정조치의 적절성에 대한 검토이다. 셋째, 본 연구가 문화재청이 단체분쟁에 대처할 원칙수립에 기여함이다. 넷째, 본 연구가 여타 보유단체 분쟁해결의 참고 사례로 기능하길 바란다. 연구결론은 전승을 활성화하기 위해서는 보유단체분쟁을 해결해야 함을 행정당국이 인식하고 원칙을 세우고 대응해 가야한다는 주장이다. 그 내용은 해제에 대한 제도구성이다. 분쟁을 다루는 것도 학문의 영역이라 여긴다. 저자의 문제를 정면으로 다룬 본 연구가 학문에 기여하고 사회에 기여하길 바라며 상정한다.

KSTAR 초전도자석 지지각 시작품재작 및 구조시험 (KSTAR Superconducting Magnet Supporting Post Prototype Manufacturing and Structural Load Test)

  • 허남일;이영신
    • 한국초전도ㆍ저온공학회논문지
    • /
    • 제3권1호
    • /
    • pp.45-49
    • /
    • 2001
  • A magnet supporting post installed between the lower TF coil tooled by 4.5 K supercritical helium and the cryostat base is one of the most important components of the superconducting magnet supporting structure for KSTAR Tokamak. This structure should be flexible to absorb thermal shrink of the magnet and also should be rigid to support the magnet weight and the Plasma disruptions load. The Post was designed with stainless steel 316LN and CFRP that have low thermal conductivity and high structural strength at low temperature. In order to verify the possibility of fabrication and the structural safety. a whole scale prototype of the KSTAR magnet supporting post was manufactured and tested. Static and compressive cyclic load tests under the maximum Plasma vertical disruption load and the magnet dead weight were performed. The teat results showed that the magnet supporting post of KSTAR Tokamak was possible to manufacture and structurally rigid.

  • PDF

인지 무선 환경에서 TCP 성능 향상 (Improving TCP Performance Over Cognitive Radio Networks)

  • 변상선
    • 대한임베디드공학회논문지
    • /
    • 제9권6호
    • /
    • pp.353-360
    • /
    • 2014
  • In cognitive radio networks (CRNs), SU (secondary user)'s transmissions are frequently disrupted by PU (primary user)'s transmission. Therefore SU expereiences consecutive retransmission timeout and its exponential backoff, and subsequently, the TCP of SU does not proceed with the transmission even after the disruption is over or the SU succeeds to hold an idle channel. In order to solve this problem, we propose a cross-layer approach called TCP-Freeze-CR. Moreover we consider a practical scenario where either secondary transmitter (ST) or secondary receiver (SR) detects PU's transmission, which results in the need of spectrum synchronization mechanism. All of our proposals are implemented and verified with a real CRN testbed consisting of 6 software radios called USRP. The experimental results illustrate that standard TCP suffers from significant performance degradation and show that TCP-Freeze-CR greatly mitigates the degradation.

Effect of gcl, glcB, and aceA Disruption on Glyoxylate Conversion by Pseudomonas putida JM37

  • Li, Xuan Zhong;Klebensberger, Janosch;Rosche, Bettina
    • Journal of Microbiology and Biotechnology
    • /
    • 제20권6호
    • /
    • pp.1006-1010
    • /
    • 2010
  • Pseudomonas putida JM37 metabolized glyoxylate at a specific rate of 55 g/g dry biomass/day. In order to investigate their role, three genes encoding enzymes that are potentially involved in the conversion of glyoxylate were disrupted; namely, tartronate semialdehyde synthase (gcl), malate synthase (glcB), and isocitrate lyase (aceA). Strains with transposon insertion in either of these genes were isolated from a 50,000 clone library employing a PCR-guided enrichment strategy. In addition, all three double mutants were constructed via targeted insertion of a knock-out plasmid. Neither mutation of gcl, glcB, and aceA nor any of the respective double mutations influenced glyoxylic acid conversion, indicating that P. putida JM37 may possess other enzymes and pathways for glyoxylate metabolism.

Incoterms(R) 2010상 수출입 당사자의 보안관련 의무에 관한 연구 (A Study on the Security related Obligations of Contracting Party under the Incoterms(R) 2010 Rules)

  • 양정호
    • 무역상무연구
    • /
    • 제54권
    • /
    • pp.45-80
    • /
    • 2012
  • Since the 9.11 terror attack, the event which caused supply chain disruption, supply chain security has become more important than ever before. With this as a momentum, a customs supply chain security paradigm emerged intended to guarantee secure flow of cargo across boarder. Under this circumstances Incoterms(R) 2010 rules have allocated obligations between the buyer and seller to obtain or to render assistances in obtaining security clearances. Thus, security related obligations such as providing advance manifest information is the mandatory requirements for any export and import. The impact on the seller and buyer of security related obligations under the Incoterms(R) 2010 rules environment is obvious. Assistance to provide the security information in advance has become indispensable obligations to the seller and buyer. As such assistances is at the cost and risk of the party responsible for the clearances of the goods, the choice of recognised partner and compliance with the relevant security program, in order to enjoy the relevant benefits, becomes paramount.

  • PDF

A Comparative analysis of the Pre- and Post-Construction Image Analysis of the Nakdong Estuary as Coastal Tourism Resource

  • Yhang Wii-Joo;Cho Yoon-Shik
    • 한국환경과학회지
    • /
    • 제14권10호
    • /
    • pp.905-910
    • /
    • 2005
  • The purpose of this study is the comparative analysis of Susan citizens' images of Eulsook-do as a coastal tourism destination before and after the construction of a road bridge across the Nakdong estuary in order to analyze local people's changes in leisure patterns. Analysis of the images of a pre-construction Eulsook-do that people aged both 40 and less and 50 and more had on five dimensions showed values higher than zero(0) that suggests neutral image, while their images of a post-construction Eulsook-do showed the shrinking size of pentagon on all five dimensions: ET(Entertainment), CA(Culture & Art), EE(Environment & Ecology), RC(Recreation) and LP(Leports) dimensions. Its pre- and post- construction image analysis conducted 20 years after it came to be built finds that the road bridge construction has led to the ecological, environmental disruption of the coast and the lower Nakdong river, having negative influence on the images of Eulsook-so.

Reproductive Disrupting Effect of Organotin Compound in the Ark Shell, Scapharca broughtonii (Bivalvia: Arcidae)

  • Lee, Jung-Sick;Cho, Hyeon-Seo;Jin, Young-Guk;Park, Jung-Jun;Shin, Yun-Kyung
    • Animal cells and systems
    • /
    • 제13권2호
    • /
    • pp.223-227
    • /
    • 2009
  • This study was carried out on the ark shell Scapharca broughtonii in order to examine if organotin compounds, which are known to induce reproductive abnormalities in gastropods, have the same affect on bivalves. The research was conducted during seven weeks in spring season through a field transplantation experiment in one reference area (Ra) and two organotin-polluted areas (Opa) near a shipyard complex. Sex ratio in the Ra was 1:1.6 (female:male). Sex ratio in Opa I and Opa II were 1:0.49 and 1:1.03, respectively, illustrating slightly higher proportion of females. Gonad activity exhibited a sequence of Opa II>Ra>Opa I. Intersex individuals of 3.33% (n=4/120) were confirmed in Opa. Intersex gonads were observed only in females. The results show that organotin compounds caused reproductive disruption in Scapharca broughtonii.

A RSVP Integration Method with Hierarchical Mobile IPv6 Networks

  • Nie, Fang;Cha, Woo-Suk;Cho, Gi-Hwan
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2004년도 가을 학술발표논문집 Vol.31 No.2 (3)
    • /
    • pp.577-579
    • /
    • 2004
  • Because the Resource reservation Protocol (RSVP) was originally designed fur stationary networks, it is insufficient to accommodate Mobile Nodes (MNs) which frequently change their points of attachment.7his paper deals with how to integrate the RSVP and Hierarchical MHv6 (HMIPv6), in order to quickly establish the QoS guaranteed path and minimize the service disruption when the MN moves around. That can be achieved with the utilization of the common path between the new and old path. Therefore a new method is proposed in detail to find out an anchor node and re-establish a new reservation path.

  • PDF

USN에서의 이동성을 위한 핸드오버 인증 프로토콜 (Handover Protocol for Mobility Support in Ubiquitous Sensor Network)

  • 니반제 브루스;김태용;이훈재
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2012년도 제46차 하계학술발표논문집 20권2호
    • /
    • pp.203-206
    • /
    • 2012
  • The System of communication with wireless devices is experiencing a huge growth. While traditional communication paradigms deal with fixed networks, mobility raises a new set of questions, techniques, and solutions. In order to realize service mobility, there is a need of protocol that can support mobility while nodes are communicating without any disruption of their connection status. This paper proposes a handover authentication protocol for mobility support. Careful considerations must be taken in priority to security issues since many unreliable public and private resources; both networks and devices are involved. The protocol is based on public key cryptography with Diffie-Hellman algorithm which provides security against both leakage-resilience of private keys on untrustworthy devices and forward secrecy.

  • PDF