• Title/Summary/Keyword: illegitimate

Search Result 44, Processing Time 0.022 seconds

Development of Nuclear Industry Information Gathering and Analysis System and Denied Persons Information Gathering System for Preventing Illegitimate Export of Trigger List Items in Korea

  • Sangjun Lee
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.21 no.3
    • /
    • pp.315-327
    • /
    • 2023
  • In South Korea, the exporters of items related to nuclear power generation are diversified. Consequently, there is a risk of illegitimate export by companies failing to recognize the export control system because the awareness about this system for the strategic items among the subcontractors of nuclear power facilities is limited. To prevent illegitimate export of the strategic items, it is necessary to conduct outreach activities regarding the export control system for the related companies. Additionally, the exporters and export license examiners should consider whether an export target is on the Denial List, who may divert the strategic items to weapons of mass destruction. Therefore, the Korea Institute of Nuclear Nonproliferation and Control developed two systems for controlling illegitimate export of the Trigger List items. The first system, Nuclear Industry Information Collection and Analysis System, can gather information about the key nuclear industries in Korea and analyze the dealing of strategic items. The second system, Denied Persons Information Gathering System, can regularly gather information about the denied persons and provide the updated data to the exporters and regulatory examiners. These two systems can be used for outreach activities and export license examination to prevent illegitimate export of the strategic items.

ILLEGITIMATE RECOMBINATION MEDIATED BY MAMMALIAN DNA TOPOISOMERASE II

  • BAE YOUNG-SEUK;IKEDA HIDEO
    • Proceedings of the Microbiological Society of Korea Conference
    • /
    • 1991.04a
    • /
    • pp.82-96
    • /
    • 1991
  • To understand the mechanism of illegitimate recombination in mammalian cells, we have examined the recombination role of DNA topoisomerase II (Topo II ). We found that purified calf thymus Topo II mediates recombination between two phage $\lambda$ DNA molecules in an in vitro system. The enzyme mainly produced a linear monomer recombinant DNA that can be packaged in vitro. Novobiocin and anti-calf thymus Topo II antibody inhibit this ATP-dependent recombination. The recombinant molecules contain duplications or deletion, and most crossovers take place between nonhomologous sequences of $\lambda$ DNA, as judged by the sequences of recombination junctions. In order to study the effects of Topo II on illegitimate recombination in mammalian cells, we have developed a new shuttle vector, pNKl, which contains three bacterial genes, amp(APR), galK and neo($Km^R$). Using this system, we have shown that a Topo II inhibitor, VM26, stimulated deletion formation in pNK1 DNA in monkey COS1 cells. Both in vitro and in vivo results suggest that Topo II participates in illegitimate recombination in mammalian cells.

  • PDF

Reconsideration about Nomenclature of Herbs Listed in the Korean Pharmacopoeia (대한민국약전에 수재된 식물성 한약재의 학명에 대한 재고)

  • Doh, Eui-Jeong;Lee, Guem-San
    • The Korea Journal of Herbology
    • /
    • v.28 no.3
    • /
    • pp.61-68
    • /
    • 2013
  • Objectives : A precise and simple system of nomenclature was required to avoid error, ambiguity or confusion. Although medicinal plants must be produced or distributed based on a pharmacopoeia described origin including scientific name, the Korean Pharmacopoeia tenth edition (KP 10) had many names against the nomenclature. Therefore, this study aimed at searching correct scientific names for 241 plants in KP 10. Methods : Authoritative databases - The Plant List, International Plant Name Index, YList, Tropicos, eFloras, World Checklist of Selected Plant Families, The Global Compositae Checklist, The International Legume Database and Information Service, et al. - and previously performed researches, floras were cross-checked. Results : The arrangement of this list was designed for four cases, errors including illegitimate, nomenclatural synonyms, recommended names and decision reserved names. Consideration about the scientific names produced nine correct names for ten misspellings and illegitimate, and thirty-six correct names for forty-one nomenclatural synonyms. These results should be reflected in the next of KP 10. Separately, ten recommended names were also suggested for taxonomic synonyms which had been used indiscriminately due to diverse taxonomic opinions. In addition to those, decision reserved names were suggested for thirteen species which had been corridor of uncertainty. Then again, there was need to study about authorship, because KP 10 did not keep recommendations for author citations. Conclusions : Correction of scientific names for some medicinal plants which violated the International Code of Nomenclature would be useful to improve the accuracy of a Pharmacopoeia as the criterional materials.

Costulariella, a new substitute name for Costularia Ju. Petrov et I. Gussarova (Laminariales, Phaeophyceae)

  • Klochkova, Nina G.;Klochkova, Tatyana A.
    • ALGAE
    • /
    • v.25 no.4
    • /
    • pp.183-185
    • /
    • 2010
  • Costularia Ju. Petrov et I. Gussarova, published in 1970, is a preoccupied name by Clarke, 1898 for a genus of monocotyledonous flowering plants in the family Cyperaceae (Magnoliophyta) and thus illegitimate. Costulariella nom. nov. is proposed as a replacement. The distribution and morphology of this little-known species are discussed.

A Taxonomic Reappraisal of Ceramium fastigiatum Harvey (Rhodophyta, Ceramiaceae) (홍조 Ceramium fastigiatum Harvey의 분류학적 재검토)

  • 부성민
    • Journal of Plant Biology
    • /
    • v.28 no.3
    • /
    • pp.217-224
    • /
    • 1985
  • Because Ceramium fastigiatum Harvey (1834) is a later homonym of C. fastigiatum Roth (1806), a quite different plant from the former, it becomes illegitimate and must be rejected under the Article 64 of International Code of Botanical Nomenclature. For this reason, we suggest to give a new name, Ceramium fastigiramosum Boo et Lee, to the former species, keeping the original specific epithet‘fastigiatum’. The morphology of vegetative and reproductive structures is re-examined. The life history is confirmed as a Polysiphonia-type in laboratory culture.

  • PDF

Taxonomy and nomenclature of the Conjugatophyceae (= Zygnematophyceae)

  • Guiry, Michael D.
    • ALGAE
    • /
    • v.28 no.1
    • /
    • pp.1-29
    • /
    • 2013
  • The conjugating algae, an almost exclusively freshwater and extraordinarily diverse group of streptophyte green algae, are referred to a class generally known as the Conjugatophyceae in Central Europe and the Zygnematophyceae elsewhere in the world. Conjugatophyceae is widely considered to be a descriptive name and Zygnematophyceae ('Zygnemophyceae') a typified name. However, both are typified names and Conjugatophyceae Engler ('Conjugatae') is the earlier name. Additionally, Zygnemophyceae Round is currently an invalid name and is validated here as Zygnematophyceae Round ex Guiry. The names of orders, families and genera for conjugating green algae are reviewed. For many years these algae were included in the 'Conjugatae', initially used as the equivalent of an order. The earliest use of the name Zygnematales appears to be by the American phycologist Charles Edwin Bessey (1845-1915), and it was he who first formally redistributed all conjugating algae from the 'Conjugatae' to the orders Zygnematales and the Desmidiales. The family Closteriaceae Bessey, currently encompassing Closterium and Spinoclosterium, is illegitimate as it was superfluous when first proposed, and its legitimization is herein proposed by nomenclatural conservation to facilitate use of the name. The genus Debarya Wittrock, 1872 is shown to be illegitimate as it is a later homonym of Debarya Schulzer, 1866 (Ascomycota), and the substitute genus name Transeauina Guiry is proposed together with appropriate combinations for 13 species currently assigned to the genus Debarya Wittrock. The relationships between Mougeotia, Mougeotiopsis, Mougeotiella, and Transeauina require further resolution, as do many of the other genera referred to the Conjugatophyceae. Type species are designated for genera for which no types were formally selected previously. The number of currently described species of conjugating green algae in AlgaeBase is about 3,500, comprising about 10% of all algal species, with about one third of species referred to the Zygnematales and two-thirds to the Desmidiales. A corresponding 10% of all algal names at the species level and below have been applied to conjugating algae, although a large proportion of these are at the infraspecific level.

STUDIES ON THE DIMORPHISM OF THE PERSICARIA SENTICOSA NAKAI (Persicaria senticosa Nakai의 Dimorphism에 관한 연구)

  • HARN, Chang Yawl
    • Journal of Plant Biology
    • /
    • v.3 no.1
    • /
    • pp.16-25
    • /
    • 1960
  • HARN, Chang Yawl (Chonnam U. Kwangju, Korea): Siudies on the dimorpism of the Perisicaria senticosa Nakai-Kor. jour. Bot. 3(1) 16-25 During his researches regarding the morphological and physiological properties of Polygonecenae, the author has found that the species, Persicaria senticosa, aiso, besides the heterostylous plants of Polygonum family, Fagopyrum esculentum, and Persicaria japonica which was recently verified by the author as dimorphic, shows the typical floral structure of heterostylism, the description of which is not found in taxonomical works. Further research on this species have revealed that this plant, despite pressessing characteristic structural dimorphism, does not exhibit even the slight signs of heterostlylous properties physiologically. This is a deviation from the usual behavior of normal heterostylous plants. What is interesting is the fact that the physiological behavior of this species is quite contrary to that of P. japonica which is considered to be the most highly specialized dimorphic plant. Thus it is assurred that if some species of this family had taken a heterostylic form in its course of development from autogamy to allogamy, P. seoticosa would be the least differentiated type of dimorphic forms among the three heterostylous plants, including buckwheat, of this family. The results obtained in this experiment are summarized as follows: 1) P. senticosa has two forms of flower, one, long style-short stamened; the other, short style-long stamened. Not only conspicuous is this primary difference, but the secondary difference, such as pollen grain size, is noticeable between long and short styled individuals, thus expressing structurally the definite trait of a dimorphic plant. 2) Structural alteration of floral parts towards dimorphism has preceeded far less in comparison with those of the P. japonica and F. esculentum. 3) Elaborate studies on fertility reveal that this species does not show the slightest sign of the physiological characteristics of dimorphic plants. In other words, regardless of the modes of combinations, legitimate and illegitimate, fertilization and fruit setting flourish unimpaired. 4) Growth of pollen tubes apparently parallels the results in the fertility, tubes reaching ovary approximately 30 minutes after pollination both in legitimate and illegitimate combinations. Pollen tube penetration appears to be comparatively rapid. 5) A slight difference in the growth of pollen tube seems to exist between legitimate and illegitimate combinations, legitimate union giving slightly faster tube penetration. 6) In the present experiment it was clarified that P. senticosa, known to possess one form of flower in taxonomy, is in reality dimorphic plant having two of flowers. Although this species is definitely heterostylous in floral structure, physiological evidence and pollen tube behavior show that the differentiation of this plant toward the dimorphism has apparently proceeded slightly except for some parts of floral organ. In ordinary heterostylous plants it is a matter of common occurrence that when illegitimately cmbined, there is poor or no fertility, Contrary to the universal property of heterostylous plants, no difference is observed in the fertility and pollen tube growth between the legitimate and illegitimate combinations in the case of P. senticosa. Compared to the P. japonica and F. esculentum, which are supposed to have undergone high degree of dimorphic differentiation, it is an unavoidable conclusion that P. senticosa has not yet developed as a heterostyle plant except for some of its floral parts. If P. japonica is assumed to be the most differentiated type of hetenostylous plant, thenthe P. senticosa would be regarded as the primitive, retaining still the self-fertile nature so common to the Polygonum genus. In nature, however, this plant has a better chance to be pollinated legitimately owing to the two forms of flowers than to be pollinated illegitimately. The author is indebted to Dong Chul, Kim as well as other members of the Department of Plant Breeding and Genetics of Chonnam National University for their efforts out the laborious experiments during the course of the present studies.

  • PDF

A New Group Key Management Protocol for WSN

  • Gerelbayar, Tegshbayar;Lee, Sang-Min;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.143-152
    • /
    • 2008
  • Sensor networks have a wide spectrum of military and civil applications, particularly with respect to security and secure keys for encryption and authentication. This thesis presents a new centralized approach which focuses on the group key distribution with revocation capability for Wireless Sensor Networks. We propose a new personal key share distribution. When utilized, this approach proves to be secure against k-number of illegitimate colluding nodes. In contrast to related approaches, our scheme can overcome the security shortcomings while keeping the small overhead requirements per node. It will be shown that our scheme is unconditionally secure and achieves both forward secrecy and backward secrecy. The analysis is demonstrated in terms of communication and storage overheads.

  • PDF

Customer Misbehavior in Retail Settings: The Retail Employee Perspective (유통환경에서의 고객 부정행동 고찰: 유통업체 종업원 관점)

  • Park, Kyung-Ae
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.34 no.7
    • /
    • pp.1220-1231
    • /
    • 2010
  • This study examined customer misbehaviors in retail settings by identifying behavioral patterns and exploring behavioral backgrounds and consequences from the employee's perspectives. Qualitative data were collected from an individual interview method, and 222 interviews were analyzed. Customer misbehavior was categorized into unethical returns, problem behaviors in service encounters, unreasonable demands, shoplifting/fraud, ill-mannered behaviors, and selfish behaviors. Behavioral backgrounds included dissatisfaction, unreasonable expectations, actively benefiting of service failures, taking advantage of service standards, illegitimate complaints, monetary gains, transferring responsibility, and demanding special treatment. Employees experienced stress facing misbehaving customers with no other choice except to accept misbehaviors and learned misbehaviors as customers themselves. The study further discusses the implications.

An Efficient Network Attack Visualization Using Security Quad and Cube

  • Chang, Beom-Hwan;Jeong, Chi-Yoon
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.770-779
    • /
    • 2011
  • Security quad and cube (SQC) is a network attack analyzer that is capable of aggregating many different events into a single significant incident and visualizing these events in order to identify suspicious or illegitimate behavior. A network administrator recognizes network anomalies by analyzing the traffic data and alert messages generated in the security devices; however, it takes a lot of time to inspect and analyze them because the security devices generate an overwhelming amount of logs and security events. In this paper, we propose SQC, an efficient method for analyzing network security through visualization. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacks. In addition, by providing a detailed analysis of network attacks, this method can more precisely detect and distinguish them from normal events.