• Title/Summary/Keyword: intentional

Search Result 636, Processing Time 0.029 seconds

Anatomical analysis of the resected roots of mandibular first molars after failed non-surgical retreatment

  • Yoon, Jiyoung;Cho, Byeong-Hoon;Bae, Jihyun;Choi, Yonghoon
    • Restorative Dentistry and Endodontics
    • /
    • v.43 no.2
    • /
    • pp.16.1-16.9
    • /
    • 2018
  • Objectives: Understanding the reason for an unsuccessful non-surgical endodontic treatment outcome, as well as the complex anatomy of the root canal system, is very important. This study examined the cross-sectional root canal structure of mandibular first molars confirmed to have failed non-surgical root canal treatment using digital images obtained during intentional replantation surgery, as well as the causative factors of the failed conventional endodontic treatments. Materials and Methods: This study evaluated 115 mandibular first molars. Digital photographic images of the resected surface were taken at the apical 3 mm level and examined. The discolored dentin area around the root canal was investigated by measuring the total surface area, the treated areas as determined by the endodontic filling material, and the discolored dentin area. Results: Forty 2-rooted teeth showed discolored root dentin in both the mesial and distal roots. Compared to the original filled area, significant expansion of root dentin discoloration was observed. Moreover, the mesial roots were significantly more discolored than the distal roots. Of the 115 molars, 92 had 2 roots. Among the mesial roots of the 2-rooted teeth, 95.7% of the roots had 2 canals and 79.4% had partial/complete isthmuses and/or accessory canals. Conclusions: Dentin discoloration that was not visible on periapical radiographs and cone-beam computed tomography was frequently found in mandibular first molars that failed endodontic treatment. The complex anatomy of the mesial roots of the mandibular first molars is another reason for the failure of conventional endodontic treatment.

Faster Than Nyquist Transmission with Multiple Channel Codes (다중 채널 부호를 이용한 FTN 전송 시스템)

  • Kang, Donghoon;Kim, Haeun;Yun, Joungil;Lim, Hyoungsoo;Oh, Wangrok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.2
    • /
    • pp.157-162
    • /
    • 2016
  • The performance of turbo-like codes highly depends on their frame size and thus, the bit error rate performance of turbo-like codes can be improved by increasing the frame size. Unfortunately, increasing the frame size of channel codes induces some drawbacks such as the increase of not only encoding and decoding complexity but also transmission and decoding latencies. On the other hand, a faster than Nyquist (FTN) transmission causes intentional inter-symbol interference (ISI) and thus, induces some correlation among the transmission symbols. In this paper, we propose an FTN transmission with multiple channel codes. By exploiting the correlation among the modulated symbols, multiple code frames can be regarded as a code frame with a lager frame size. Due to the inherent parallel encoding scheme of proposed scheme, parallel decoding can be easily implemented.

Differential Stringent Responses of Streptomyces coelicolor M600 to Starvation of Specific Nutrients

  • Ryu, Yong-Gu;Kim, Eun-Sook;Kim, Dae-Wi;Kim, Sung-Keun;Lee, Kye-Joon
    • Journal of Microbiology and Biotechnology
    • /
    • v.17 no.2
    • /
    • pp.305-312
    • /
    • 2007
  • This study focused on the involvement of the unusual nucleotide (p)ppGpp, a stringent factor, during the morphological and physiological differentiation of Streptomyces coelicolor. Two genes, relA and rshA, were disrupted to demonstrate the roles of the stringent factor in the differentiation. The intracellular concentration of (p)ppGpp in the wild-type (M600) and disrupted mutants was measured in relation to the intentional starvation of a specific nutrient, such as carbon, nitrogen, and phosphate or the in situ depletion of nutrients in a batch culture. As a result, it was found that the morphological characteristic of the ${\Delta}relA$ mutant was a bld phenotype forming condensed mycelia, whereas the ${\Delta}rshA$ mutant grew fast-forming spores and straightforward mycelia. In both mutants, the production of actinorhodin (Act) was completely abolished, yet the undecylprodigiosin (Red) production was increased. Intracellular (p)ppGpp was detected in the ${\Delta}relA$ mutant in the case of limited phosphate, yet not with limited carbon or nitrogen sources. In contrast, (p)ppGpp was produced in the ${\Delta}rshA$ mutant under limited carbon and nitrogen conditions. Therefore, (p)ppGpp in S. coelicolor was found to be selectively regulated by either the RelA or RshA protein, which was differentially expressed in response to the specific nutrient limitation. These results were also supported by the in situ ppGpp production during a batch culture. Furthermore, it is suggested that RelA and RshA are bifunctional proteins that possess the ability to both synthesize and hydrolyze (p)ppGpp.

A Study on the need of the Implementation for Criminal Penalty of Stalking (스토킹 처벌규정 도입의 필요성에 대한 고찰)

  • Jang, Jeongbeom;Lee, Sangcheol
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.220-228
    • /
    • 2014
  • A stalking is becoming more diverse and the methods are developing over time as the society has changed over time due to the advancement of information technology but an initial countermeasure seems to be difficult as there is no sufficient legislations against such crimes as stalking. Our country passed laws regulating such stalking at 1999 and four more additional bills were proposed until the 18th National Assembly but they failed to become legalized. Two more additional bills were proposed during 19th National Assembly which are still pending. Crimes such as stalking violates and invades physical and psychological freedom of the victims and the crimes are severely inveterate and intentional. Advanced countries such as the United States, the Great Britain, Germany, and Japan enacted legislations that strictly regulates stalking and also appropriate responses. As these exemplary cases show, it is essential that our country also requires an effective legislations against crime of stalking and protecting a victim of the crime.

A Study on the Recognition of Men and Women highschool student's sexual abuse (남녀고등학생의 성폭력 인식에 관한 연구)

  • Kim, Sung-Mi;Park, Meera
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.2
    • /
    • pp.970-978
    • /
    • 2014
  • Purpose of the study is to understand Men and Women highschool student's recognition of, attitude toward, and reaction to sexual violence in terms of men and women difference. The study data was collected from July 1st to 30th in 2013 from 563 highschool students in D city. SPSS 19.0 with percentage, real number and $x^2$_test is used to analyze the data. The result of the study is, the first, there is a significant difference in respondents' experience in sexual violence or harrassment. Secondly, different perspectives about including looking at the body insidiously, forcing lascivious writing or picture, sexual jokes, vulgar expression about appearance, or intentional body contacts in public transportation vehicles to the concept of sexual violence are found between boys and girls. Lastly, different recognitions, attitudes and reactions were produced according to the place and time of the sexual violence, victim-attacker relationship, the cause of the sexual violence, and attitude toward the victim when rescue.

Analysis Scheme on Backup Files of Samsung Smartphone available in Forensic (포렌식에서 활용 가능한 삼성 스마트폰 백업 파일 분석 기법)

  • Lee, Gyuwon;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.349-356
    • /
    • 2013
  • As various features of the smartphone have been used, a lot of information have been stored in the smartphone, including the user's personal information. However, a frequent update of the operating system and applications may cause a loss of data and a risk of missing important personal data. Thus, the importance of data backup is significantly increasing. Many users employ the backup feature to store their data securely. However, in the point of forensic view these backup files are considered as important objects for investigation when issued hiding of smartphone or intentional deletion on data of smartphone. Therefore, in this paper we propose a scheme that analyze structure and restore data for Kies backup files of Samsung smartphone which has the highest share of the smartphone in the world. As the experimental results, the suggested scheme shows that the various types of files are analyzed and extracted from those backup files compared to other tools.

Mutual Authentication Protocol for Safe Data Transmission of Multi-distributed Web Cluster Model (다중 분산 웹 클러스터모델의 안전한 데이터 전송을 위한 상호 인증 프로토콜)

  • Lee, Kee-Jun;Kim, Chang-Won;Jeong, Chae-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.731-740
    • /
    • 2001
  • Multi-distributed web cluster model expanding conventional cluster system is the cluster system which processes large-scaled work demanded from users with parallel computing method by building a number of system nodes on open network into a single imaginary network. Multi-distributed web cluster model on the structured characteristics exposes internal system nodes by an illegal third party and has a potential that normal job performance is impossible by the intentional prevention and attack in cooperative work among system nodes. This paper presents the mutual authentication protocol of system nodes through key division method for the authentication of system nodes concerned in the registration, requirement and cooperation of service code block of system nodes and collecting the results and then designs SNKDC which controls and divides symmetrical keys of the whole system nodes safely and effectively. SNKDC divides symmetrical keys required for performing the work of system nodes and the system nodes transmit encoded packet based on the key provided. Encryption packet given and taken between system nodes is decoded by a third party or can prevent the outflow of information through false message.

  • PDF

The study of plasma source ion implantation process for ultra shallow junctions (Ulra shallow Junctions을 위한 플라즈마 이온주입 공정 연구)

  • Lee, S.W.;Jeong, J.Y.;Park, C.S.;Hwang, I.W.;Kim, J.H.;Ji, J.Y.;Choi, J.Y.;Lee, Y.J.;Han, S.H.;Kim, K.M.;Lee, W.J.;Rha, S.K.
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2007.06a
    • /
    • pp.111-111
    • /
    • 2007
  • Further scaling the semiconductor devices down to low dozens of nanometer needs the extremely shallow depth in junction and the intentional counter-doping in the silicon gate. Conventional ion beam ion implantation has some disadvantages and limitations for the future applications. In order to solve them, therefore, plasma source ion implantation technique has been considered as a promising new method for the high throughputs at low energy and the fabrication of the ultra-shallow junctions. In this paper, we study about the effects of DC bias and base pressure as a process parameter. The diluted mixture gas (5% $PH_3/H_2$) was used as a precursor source and chamber is used for vacuum pressure conditions. After ion doping into the Si wafer(100), the samples were annealed via rapid thermal annealing, of which annealed temperature ranges above the $950^{\circ}C$. The junction depth, calculated at dose level of $1{\times}10^{18}/cm^3$, was measured by secondary ion mass spectroscopy(SIMS) and sheet resistance by contact and non-contact mode. Surface morphology of samples was analyzed by scanning electron microscopy. As a result, we could accomplish the process conditions better than in advance.

  • PDF

An Active Interference Cancellation Technique for Removing Jamming Signals in Array Antenna GPS Receivers (GPS 수신기에서 간섭신호에 대응하기 위한 배열 안테나기반 능동 간섭 제거 방안)

  • Jeong, Eui-Rim;Won, Hyun-Hee;Cho, Sung-Woo;Ahn, Byoung-Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1539-1545
    • /
    • 2015
  • GPS (global positioning system) is a popular system that provides location information by measuring arrival time difference at the receiver between several GPS satellite signals. GPS is widely used in commercial area as well as military systems. Reliable GPS signal reception is more important in the military systems. However, since the carrier frequencies of the GPS signals are well known, the GPS receivers are vulnerable to intentional jamming attacks. To remove jammers but maintain GPS signals at the received signals, a popular technique is an adaptive beam steering method based on array antenna. Among adaptive beam steering techniques, this paper considers MVDR (minimum variance distortionless response) algorithm, and proposes a new adaptive technique that preserves the received signals at desired direction, but removes the jamming signals adaptively. The performance of the proposed method is verified through computer simulation.

A Study on Malfunction Mode of CMOS IC Under Narrow-Band High-Power Electromagnetic Wave (협대역 고출력 전자기파로 인한 CMOS IC에서의 오동작 특성 연구)

  • Park, Jin-Wook;Huh, Chang-Su;Seo, Chang-Su;Lee, Sung-Woo
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.29 no.9
    • /
    • pp.559-564
    • /
    • 2016
  • This study examined the malfunction mode of the HCMOS IC under narrow-band high-power electromagnetic wave. Magnetron is used to a narrow-band electromagnetic source. MFR (malfunction failure rate) was measured to investigate the HCMOS IC. In addition, we measured the resistance between specific pins of ICs, which are exposed and not exposed to the electromagnetic wave, respectively. As a test result of measurement, malfunction mode is shown in three steps. Flicker mode causing a flicker in LED connected to output pin of IC is dominant in more than 7.96 kV/m electric field. Self-reset mode causing a voltage drop to the input and output of IC during electromagnetic wave radiation is dominant in more than 9.1 kV/m electric field. Power-reset mode making a IC remained malfunction after electromagnetic radiation is dominant in more than 20.89 kV/m. As a measurement result of pin-to-pin resistance of IC, the differences between IC exposed to electromagnetic wave and normal IC were minor. However, the five in two hundred IC show a relatively low resistance. This is considered to be the result of the breakdown of pn junction when latch-up in CMOS occurred. Based on the results, the susceptibility of HCMOS IC can be applied to a basic database to IC protection and impact analysis of narrow-band high-power electromagnetic waves.