• Title/Summary/Keyword: bank protection

Search Result 135, Processing Time 0.034 seconds

Molecular Identification of Trichogramma (Hymenoptera: Trichogrammatidae) Egg Parasitoids of the Asian Corn Borer Ostrinia furnacalis, Based on ITS2 rDNA Sequence Analysis (ITS2 rDNA 염기서열 분석을 통한 Trichogramma 속(벌목: 알벌과)의 조명나방 알기생벌에 대한 종 추정)

  • Seo, Bo Yoon;Jung, Jin Kyo;Park, Ki Jin;Cho, Jum Rae;Lee, Gwan-Seok;Jung, Chung Ryul
    • Korean journal of applied entomology
    • /
    • v.53 no.3
    • /
    • pp.247-260
    • /
    • 2014
  • To identify the species of Trichogramma occurring in the corn fields of Korea as egg parasitoids of Ostrinia furnacalis, we sequenced the full-length of ITS2 nuclear rDNA from 112 parasitoids collected during this study. As a reference to distinguish species, we also retrieved full-length ITS2 sequences of 60 Trichogramma species from the NCBI GenBank database. On the basis of the size and 3'terminal sequence pattern of the ITS2 sequences, the Trichogramma samples collected in this study were divided into three groups (K-1, -2, and -3). Evolutionary distances (d) within and between groups based on ITS2 sequences were estimated to be ${\leq}0.005$ and ${\geq}0.080$, respectively. In the net average distance between groups or species, the d value between K-1 and T. ostriniae, K-2 and T. dendrolimi, and K-3 and T. confusum was the lowest, with values of 0.016, 0.001, and 0.002, respectively. In the phylogenetic tree, K-1 and K-2 were clustered with T. ostriniae and T. dendrolimi, respectively. However, K-3 was clustered with three different species, namely, T. confusum, T. chilonis, and T. bilingensis. NCBI BLAST results revealed that parasitoids belonging to K-1 and K-2 showed 99% identity with T. ostriniae and T. dendrolimi, respectively. Parasitoids in K-3 collected from Hongcheon showed 99-100% identity with T. confusum and T. chilonis, and one parasitoid in K-3 collected from Gochang had 98% identity with T. bilingensis, T. confusum, and T. chilonis. On the basis of these results, we infer that the species of Trichogramma collected in this study are closely related to T. ostriniae (K-1) and T. dendrolimi (K-2). However, it was not possible to distinguish species of K-3 using the ITS2 sequence alone.

Mechanical and fracture behavior of rock mass with parallel concentrated joints with different dip angle and number based on PFC simulation

  • Zhao, Weihua;Huang, Runqiu;Yan, Ming
    • Geomechanics and Engineering
    • /
    • v.8 no.6
    • /
    • pp.757-767
    • /
    • 2015
  • Rock mass is an important engineering material. In hydropower engineering, rock mass of bank slope controlled the stability of an arch dam. However, mechanical characteristics of the rock mass are not only affected by lithology, but also joints. On the basis of field geological survey, this paper built rock mass material containing parallel concentrated joints with different dip angle, different number under different stress conditions by PFC (Particle Flow Code) numerical simulation. Next, we analyzed mechanical property and fracture features of this rock mass. The following achievements have been obtained through this research. (1) When dip angle of joints is $15^{\circ}$ and $30^{\circ}$, with the increase of joints number, peak strength of rock mass has not changed much. But when dip angle increase to $45^{\circ}$, especially increase to $60^{\circ}$ and $75^{\circ}$, peak strength of rock mass decreased obviously with the increase of joints number. (2) With the increase of confining stress, peak strengths of all rock mass have different degree of improvement, especially the rock mass with dip angle of $75^{\circ}$. (3) Under the condition of no confining stress, dip angle of joints is low and joint number is small, existence of joints has little influence on fracture mode of rock mass, but when joints number increase to 5, tensile deformation firstly happened at joints zone and further resulted in tension fracture of the whole rock mass. When dip angle of joints increases to $45^{\circ}$, fracture presented as shear along joints, and with increase of joints number, strength of rock mass is weakened caused by shear-tension fracture zone along joints. When dip angle of joints increases to $60^{\circ}$ and $75^{\circ}$, deformation and fracture model presented as tension fracture zone along concentrated joints. (4) Influence of increase of confining stress on fracture modes is to weaken joints' control function and to reduce the width of fracture zone. Furthermore, increase of confining stress translated deformation mode from tension to shear.

Consideration of preservation methods for plant genetic resources in natural monument - Focusing on preparation for becoming effective of Nagoya Protocol - (천연기념물 식물유전자원의 보존방안 고찰 - 나고야의정서 발효 대비 중심으로 -)

  • Kim, Jung A;Kim, Hyo Jeong;Shin, Jin Ho;Kim, Dae Yeol;Jo, Woon Yeon
    • Korean Journal of Agricultural Science
    • /
    • v.41 no.3
    • /
    • pp.193-203
    • /
    • 2014
  • Natural Monument is a designated cultural property as part of the country. According to Article 2 of the Cultural Properties Protection Act, a national, ethnic and global heritage artificially or naturally formed, with a great historical, artistic, scientific and landscape significance is defined as a cultural heritage. Animals, plants, topography, geology, minerals, caves, biological products and special natural phenomena, having a great of historic, scenic and scientific value, are defined as the monument. According to Article 3 of Cultural Properties Protection Act, the conservation, management and utilization of National Heritage should be kept intact in its original form. So, Natural monuments are managing as retained its original form under the Basic Principles of current law. The highest population of coniferous tree in natural monument plant is ginkgo tree including 22 objects, followed by pines, junipers that order. And in case of broadleaf tree, there are zelkova trees, retusa fringe trees, pagoda trees, cork oaks, silver magnolias and etc. There are many of reported efficacy in available natural monument plants. The efficacy of plant species on pharmaceutical like anti-cancer, anti-diabetic, anti-obesity, antioxidant activity, neuroprotective, improves cholesterol, anti-inflammatory, liver protection and anti-bacterial efficacy, on cosmetics and beauty like the inhibiting formation of skin wrinkles, whitening effect, variety of materials and the efficacy of the proposed utilization of its various papers and etc have been widely reported. Before the Nagoya Protocol enters into force, the future role of the National Research Institute for Cultural Properties Administration of Cultural Heritage should be obtain a legal right to manage the social, cultural and national natural monument with emotional value to the plant genetic resource as a natural monument efficient ways to study and preserve traditional knowledge biological resources by securing a claim to the sovereignty of the material will be ready.

Characteristics of Rooting and Community Maintenance of Some Gramineae planted on Urban Stream Bank Slope (도시하천 제방사면에 식재한 몇몇 벼과식물의 활착 및 군락유지 특성)

  • Yang, Hong-Mo
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.45 no.5
    • /
    • pp.42-59
    • /
    • 2017
  • To investigate rooting and community forming ability, sod strips of Gramineae such as Miscanthus sacchariflorus (Maxim.) Benth., Miscanthus sinensis var. purpurascens(Andersson) Rendle, Imperata cylindrica var. koenigii(Retz.) Pilg., and Arundinella hirta(Thunb.) Tanaka were planted horizontally at a width of 10~15cm in October 2010 on the bank slope of Kwangju Stream in Korea. Seeds of each species were sown in April 2010 in plastic seedbeds(60cm length ${\times}$ 30cm width ${\times}$ 5cm depth) filled with 4cm of garden soil and grew until October 2010 to form rectangular sod, which then was cut into multiple strips(20cm length ${\times}$ 6cm width ${\times}$ 4cm root depth). Weeds growing on the experiment sites were removed twice a year until those four species had formed a community by 2013. Weeds were not eradicated during 2014 and 2015 to observe whether the community formation can be maintained without weed removal. t-tests on stem numbers and heights in May, July, and September were conducted between 2013 and 2014, and between 2014 and 2015. Stem numbers and heights of the four species in 2014 were significantly decreased(p<0.001) compared with those in 2013 due to weed damage to their growth in 2014. Stem numbers and heights of Miscanthus sacchariflorus(Maxim.) Benth., Miscanthus sinensis var. purpurascens(Andersson) Rendle, Imperata cylindrica var. koenigii(Retz.) Pilg. in 2015 were similar to those in 2014(p>0.05). Stem numbers and heights of Arundinella hirta(Thunb.) Tanaka in 2015, however, were significantly reduced compared with those in 2014(p<0.001) due to weed impact on its growth. After three years of weed removal, a community of each species was formed. Miscanthus sacchariflorus(Maxim.) Benth., Miscanthus sinensis var. purpurascens(Andersson) Rendle, Imperata cylindrica var. koenigii(Retz.) Pilg. were able to establish communities without any further weed removal. Arundinella hirta(Thunb.) Tanaka, however, was not able to maintain its community due to considerable damage to its growth caused by weeds even after three years of weed removal. Miscanthus sacchariflorus(Maxim.) Benth., Miscanthus sinensis var. purpurascens(Andersson) Rendle, Imperata cylindrica var. koenigii(Retz.) Pilg. are more suitable to sod strip plantings on stream bank slopes in terms of the maintenance of community formation without weed eradication. t-test on stem numbers and heights each September during the five year experiment period between sod strip planting and potted plants of the four species were conducted. Stem numbers of strip sod plantings were significantly higher(p<0.001) than those of potted one. Heights of strip sod plantings, however, were significantly lower(p<0.05) than those of the potted samples. Therefore, strip sod planting is more advantageous regarding bank slope erosion protection due to the higher number of stems.

The Study of a Development Plan of the Industrial Security Expert System (산업보안관리사 자격제도 발전 방안에 대한 고찰)

  • Cho, Yong-Sun
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.175-207
    • /
    • 2014
  • This paper focuses on the study of a development direction of the industrial security Expert system. First of all, in order to manage Industrial security system, we need to have law, criminology, business and engineering professionals as well as IT experts, which are the multi-dimensional convergence professionals. Secondly, industrial organizations need to have workforce who can perform security strategy; security plan; security training; security services; or security system management and operations. Industrial security certification system can contribute to cultivate above mentioned professional workforce. Currently Industrial Security Expert(ISE) is a private qualification. However, the author argued that it have to be changed to national qualification. In addition, it is necessary that the system should be given credibility with verifying the personnel whether they are proper or not in the their field. In terms of quality innovation, it is also necessary that distinguish the levels of utilization of rating system of the industrial security coordinator through a long-term examination. With respect to grading criteria, we could consider the requirements as following: whether they must hold the degree of the industrial security-related areas of undergraduate or postgraduate (or to be); what or how many industrial security-related courses they should complete through a credit bank system. If the plan of completing certain industrial security-related credits simply through the credit bank system, without establishing a new industrial security-related department, has established, then industrial security study would be spreaded and advanced. For private certification holders, the problem of the qualification succeeding process is important matter. Additionally, it is necessary to introduce the certifying system of ISMS(Industrial Security Management System) which is a specialized system for protecting industrial technology. To sum up, when the industrial security management system links the industrial security management certification, industrial security would realize in the companies and research institutions dealing with national key technology. Then, a group synergy effect would occurs.

  • PDF

How to Reflect Sustainable Development in Overseas Investment including Equator Principles (해외투자(海外投資)와 지속가능발전 원칙 - 적도원칙(赤道原則)(Equator Principles)을 중심으로 -)

  • Park, Whon-Il
    • 한국무역상무학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.45-72
    • /
    • 2006
  • The Equator Principles are a set of voluntary environmental and social guidelines for ethical project finance. These principles commit banks and other signatories to not finance projects that fail to meet these guidelines. The principles were conceived in 2002 on an initiative of the International Finance Corporation and launched in 2003. Since then, dozens of major banks have adopted the Principles, and with these banks among them accounting for more than three quarters of all project loan market volume the Principles have become the de facto standard for all banks and investors on how to deal with potential social and environmental effects of projects to be financed. While regarding the Principles an important initiative, NGOs have criticised the Principles for not producing real changes in financing activities and for allowing projects to go through that should have been screened out by the Principles, such as the Sakhalin-II oil and gas project in Russia. In early 2006, a process of revision of the principles was begun. The Equator Principles state that endorsing banks will only provide loans directly to projects under the following circumstances: - The risk of the project is categorized in accordance with internal guidelines based upon the environmental and social screening criteria of the International Finance Corporation (IFC). - For all medium or high risk projects (Category A and B projects), sponsors complete an Environmental Assessment, the preparation of which must meet certain requirements and satisfactorily address key environmental and social issues. - The Environmental Assessment report addresses baseline environmental and social conditions, requirements under host country laws and regulations, applicable international treaties and agreements, sustainable development and use of renewable natural resources, protection of human health, cultural properties, and biodiversity, including endangered species and sensitive ecosystems, use of dangerous substances, major hazards, occupational health and safety, fire prevention and life safety, socio-economic impacts, land acquisition and land use, involuntary resettlement, impacts on indigenous peoples and communities, cumulative impacts of existing projects, the proposed project, and anticipated future projects, participation of affected parties in the design, review and implementation of the project, consideration of feasible environmentally and socially preferable alternatives, efficient production, delivery and use of energy, pollution prevention and waste minimization, pollution controls (liquid effluents and air emissions) and solid and chemical waste management. - Based on the Environmental Assessment, Equator banks then make agreements with their clients on how they mitigate, monitor and manage those risks through an 'Environmental Management Plan'. Compliance with the plan is required in the covenant. If the borrower doesn't comply with the agreed terms, the bank will take corrective action, which if unsuccessful, could ultimately result in the bank canceling the loan and demanding immediate repayment. - For risky projects, the borrower consults with stakeholders (NGO's and project affected groups) and provides them with information on the risks of the project. - If necessary, an expert is consulted. The Principles only apply to projects over 50 million US dollars, which, according to the Equator Principles website, represent 97% of the total market. In early 2006, the financial institutions behind the Principles launched stakeholder consultations and negotiations aimed at revising the principles. The draft revised principles were met with criticism from NGO stakeholders, who in a joint position paper argued that the draft fails by ignoring the most serious critiques of the principles: a lack of consistent and rigorous implementation.

  • PDF

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

Proteomic Analysis of Global Changes in Protein Expression During Exposure of Gamma Radiation in Bacillus sp. HKG 112 Isolated from Saline Soil

  • Gupta, Anil Kumar;Pathak, Rajiv;Singh, Bharat;Gautam, Hemlata;Kumar, Ram;Kumar, Raj;Arora, Rajesh;Gautam, Hemant K.
    • Journal of Microbiology and Biotechnology
    • /
    • v.21 no.6
    • /
    • pp.574-581
    • /
    • 2011
  • A Gram-positive bacterium was isolated from the saline soils of Jangpura (U.P.), India, and showed high-level of radiation-resistant property and survived upto 12.5 kGy dose of gamma radiation. The 16S rDNA sequence of this strain was examined, identified as Bacillus sp. strain HKG 112, and was submitted to the NCBI GenBank (Accession No. GQ925432). The mechanism of radiation resistance and gene level expression were examined by proteomic analysis of whole-cell extract. Two proteins, 38 kDa and 86.5 kDa excised from SDS-PAGE, which showed more significant changes after radiation exposure, were identified by MALDI-TOF as being flagellin and S-layer protein, respectively. Twenty selected 2-DE protein spots from the crude extracts of Bacillus sp. HKG 112, excised from 2- DE, were identified by liquid chromatography mass spectrometry (LC-MS) out of which 16 spots showed significant changes after radiation exposure and might be responsible for the radiation resistance property. Our results suggest that the different responses of some genes under radiation for the expression of radiation-dependent proteins could contribute to a physiological advantage and would be a significant initial step towards a fullsystem understanding of the radiation stress protection mechanisms of bacteria in different environments.

A Cost-Benefit Analysis of Groundwater: Pumping Wells in Korea (지하수의 경제성 평가 연구: 지하수 관정을 중심으로)

  • Kim, Sun Geun
    • Economic and Environmental Geology
    • /
    • v.47 no.3
    • /
    • pp.219-225
    • /
    • 2014
  • In Korea, there are 1,474 thousand pumping wells nationwide which account for about 12% of total water use in 2012. As much as 39 hundred million tons of groundwater were used while 333 hundred million tons of total water were supplied in 2012. Because the water management authority projects that water demand will exceed supply by 2021, the authority is planning to extensively expand groundwater use in accordance with economic feasibility. Using the basic frameworks of cost-benefit analyses of the World Bank and the US Environmental Protection Agency (US EPA), the objective of this study is to examine the costs and benefits of the expansion of Korea's groundwater extraction through pumping wells. We conclude that the BC ratio of the groundwater pumping wells is 2.98. This signifies that the benefits are 2.98 times higher than the costs. The benefits include use and non-use values of pumping wells while the costs include the installation and maintenance of new wells, in addition to the restoration and pollution costs of abandoned wells, as well as fees for water quality tests, etc.

A Cost-Benefit Analysis of Groundwater Supply through Pumping Well Technology

  • Kim, Sun G.
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2015.11a
    • /
    • pp.479-487
    • /
    • 2015
  • In Korea, there are 1,474 thousand pumping wells nationwide which account for about 12% of total water use in 2012. As much as 39 hundred million tons of groundwater were used while 333 hundred million tons of total water were supplied in 2012. Because the water management authority projects that water demand will exceed supply by 2021, the authority is planning to extensively expand groundwater use in accordance with economic feasibility. Using the basic frameworks of cost-benefit analyses of the World Bank and the US Environmental Protection Agency (US EPA), the objective of this study is to examine the costs and benefits of the expansion of Korea's groundwater extraction through pumping wells. We conclude that the BC ratio of the groundwater pumping wells is 2.98. This signifies that the benefits are 2.98 times higher than the costs. The benefits include use and non-use values of pumping wells while the costs include the installation and maintenance of new wells, in addition to the restoration and pollution costs of abandoned wells, as well as fees for water quality tests, etc.

  • PDF