• Title/Summary/Keyword: science-related activity

Search Result 2,963, Processing Time 0.043 seconds

Distribution Characteristics of $^{210}Po$ and $^{210}Pb$ in the Seawater from the Korean East Sea in Spring (봄철 동해에서 해수중 $^{210}Po$$^{210}Pb$의 농도분포특성)

  • YANG Han-Soeb;KIM Soung-Soo;LEE Jae-Chul
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.29 no.2
    • /
    • pp.238-245
    • /
    • 1996
  • Vertical profiles of $^{210}Po\;and\;^{210}Pb$ were measured for the upper 100 m of water column at six stations in the middle region of the Korean East Sea during March 1993. The distribution patterns of these radionuclides with the water mass and controlling factors on their distributions were also discussed. $^{210}Pb$ activities were generally high at surface water and gradually decrease with depth. Vertical profiles of $^{210}Po$ were relatively homogeneous except for at station E3, where chlorophyll-a concentration was the highest and $^{210}Po$ activity in the upper 30 m was lower than below 50 m. The $^{210}Po$ activities relative to its parent $^{210}Pb$ at all stations were deficient at the upper 30 m, but were excess or nearly equilibrated values below 50 m. The magnitude of $^{210}Po$ deficiency was relatively high at station E3 and E6, where strong thermocline occured. However, $^{210}Pb$ activities showed strong excess in the upper 100 m of all stations, compared with its parent $^{226}Ra$. The residence time of $^{210}Po$ ranged from 1.0 to 7.8 years, and was relatively short at station E3 and E6. The data obtained at the upper 50 m water column during $1992\~1994$, also showed that removal rate constant of $^{210}Po$ and inventories of chlorophyll-a was negatively related. This indicates that the primary production plays an important role in controlling the distributions of $^{210}Po$ at the upper water column of the Korean last Sea in spring. While, inventories of excess $^{210}Pb$ was generally decreasing with increasing density difference between 50 m and 100 m, suggesting that $^{210}Pb$ concentrations in the upper water column were controlled by stability of water column.

  • PDF

A Study on Development of Achievement Standards and Assessment Standards of Vocational Inquiry Section for 2005 College Scholastic Ability Test - Focus on Food and Nutrition Subject in the Field of Home Economics Order - (2005 수능 직업탐구영역의 과목별 성취기준과 평가기준 개발 - 식품과 영양 과목을 중심으로 -)

  • Na Hyeon-Ju;Min Kyung-Hee;Lee Hwa-young;Pyo Jum-sun;Ha Mi-ok;Jang Myung-Hee
    • Journal of Korean Home Economics Education Association
    • /
    • v.17 no.2
    • /
    • pp.197-219
    • /
    • 2005
  • This study attempted, in accordance with the National Educational Curriculum, to develop achievement assessment standards for a course within the field of home economics which has been widely adopted by Korean vocational high schools, namely, the food and nutrition subject. Focus was also placed on strengthening the management of the curriculum for this food and nutrition course, as well as on establishing proper assessment standards by developing model assessment tools which can be used to assess the subject. The results of this study can be summarized as follows : First, based on an analysis of the related literature and materials. the desired notion of the achievement and assessment standards was established, and their significance ascertained the achievement and assessment standards for the food and nutrition course were set and the type of model assessment tool which should be developed, as well as the method in which it should be applied. was established Second. by analyzing the curriculums and the contents of the textbooks used in the food and nutrition subject, the researcher was able to compile the 70 factors which could to be used to develop the achievement and assessments standards, and then classify these into 6 main categories and 32 sub-categories. Based on the characteristics of these factors and learners' academic performance levels the number of factors was expanded to 89 in order to establish the achievement standards. In turn, these achievement standards were used, in accordance with the learners' achievement and teaming activity levels, to develop three different levels of assessment standards. namely, upper, middle, and lower ones. Third. a model assessment tool was developed which could be used by individual school units as a reference in terms of achievement and assessment standards, and that could be modified to meet each school's circumstances. In order to create the model assessment tool a 100-question questionnaire was formulated that contained various types of questions, such as essay, report, theoretical and practical, portfolio, as well as multiple choice-type questions. Lastly, the researcher introduced measures to effectively use the achievement and assessment standards developed for the food and nutrition course, as well as the model assessment tool in school units.

  • PDF

P300 speller using a new stimulus presentation paradigm (새로운 자극제시방법을 사용한 P300 문자입력기)

  • Eom, Jin-Sup;Yang, Hye-Ryeon;Park, Mi-Sook;Sohn, Jin-Hun
    • Science of Emotion and Sensibility
    • /
    • v.16 no.1
    • /
    • pp.107-116
    • /
    • 2013
  • In the implementation of a P300 speller, rows and columns paradigm (RCP) is most commonly used. However, the RCP remains subject to adjacency-distraction error and double-flash problems. This study suggests a novel P300 speller stimuli presentation-the sub-block paradigm (SBP) that is likely to solve the problems effectively. Fifteen subjects participated in this experiment where both SBP and RCP were used to implement the P300 speller. Electroencephalography (EEG) activity was recorded from Fz, Cz, Pz, Oz, P3, P4, PO7, and PO8. Each paradigm consisted of a training phase to train a classifier and a testing phase to evaluate the speller. Eighteen characters were used for the target stimuli in the training phase. Additionally, 5 subjects were required to spell 50 characters and the rest of the subjects were to spell 25 characters in the testing phase. Classification accuracy results show that average accuracy was significantly higher in SBP as of 83.73% than that of RCP as of 66.40%. Grand mean event-related potentials (ERPs) at Pz show that positive peak amplitude for the target stimuli was greater in SBP compared to that of RCP. It was found that subjects tended to attend more to the characters in SBP. According to the participants' ratings on how comfortable they were with using each type of paradigm on 7-point Likert scale, most subjects responded 'very difficult' in RCP while responding 'medium' and 'easy' in SBP. The result showed that SBP was felt more comfortable than RCP by the subjects. In sum, the SBP was more correct in P300 speller performance as well as more convenient for users than the RCP. The actual limitations in the study were discussed in the last part of this paper.

  • PDF

The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement) (해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 -)

  • Choi, Yoon-Soo
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF

The Association between Family Support, Activities of Daily Living and Depression among Hospitalized Older Patients with Chronic Diseases (만성질환 입원노인의 가족지지 및 일상생활 수행능력과 우울과의 관련성)

  • Kim, Jeong Yi;Ryu, So Yeon;Han, Mi Ah;Choi, Seong Woo
    • Journal of agricultural medicine and community health
    • /
    • v.41 no.1
    • /
    • pp.13-26
    • /
    • 2016
  • Purpose: This study was performed to identify the association between family support, activities of daily living (ADL) and depression among hospitalized older patients with chronic diseases. Methods: This study subjects were 100 elderly patients with chronic diseases including chronic respiratory diseases, diabetes mellitus and et al. in a general hospital. The collected data were patient characteristics, family support, ADL, and depression by structured questionnaire and medical chart review. The used statistical analyses were t-test, analysis of variance, Pearson's correlational analysis and multiple regression analysis. Results: The mean scores of family support, ADL and depression were $49.95{\pm}8.68$, $8.65{\pm}2.65$, $6.66{\pm}3.78$, respectively. The prevalence rate of depression was 64.0%. In simple analysis, the statistically significant associated factors with depression were age, spouse, economic status, social activity, subjective health status, and number of pain. Depression had statistically a significant positive correlation with ADL and a negative correlation with family support. The final result of hierarchial multiple regression analysis (Model 3), the factors related to depression were family support (b=-.135, p<.001), subjective health status (b=2.510, p=.001). Conclusions: It is necessary to develop and apply the program for controlling the depression of elderly patients with health education, reinforcement of supportive systems in hospital. And, further multidisciplinary studies should be done.

Alcohol Fermentation at High Temperature and the Strain-specific Characteristics Required to Endow the Thermotolerance of Sacchromyces cerevisiae KNU5377

  • Paik, Sang-Kyoo;Park, In-Su;Kim, Il-Sup;Kang, Kyung-Hee;Yu, Choon-Bal;Rhee, In-Koo;Jin, In-Gnyol
    • Proceedings of the Korean Society for Applied Microbiology Conference
    • /
    • 2005.06a
    • /
    • pp.154-164
    • /
    • 2005
  • Saccharomyces cerevisiae KNU5377 is a thermotolerant strain, which can ferment ethanol from wasted papers and starch at 40$^{\circ}C$ with the almost same rate as at 30$^{\circ}C$. This strain showed alcohol fermentation ability to convert wasted papers 200 g (w/v) to ethanol 8.4% (v/v) at 40$^{\circ}C$, meaning that 8.4% ethanol is acceptable enough to ferment in the industrial economy. As well, all kinds of starch that are using in the industry were converted into ethanol at 40$^{\circ}C$ with the almost same rate as at 30$^{\circ}C$. Hyperthermic cell killing kinetics and differential scanning calorimetry (DSC) revealed that exponentially growing cells of this yeast strain KNU5377 were more thermotolerant than those of S. cerevisiae ATCC24858 used as a control. This intrinsic thermotolernace did not result from the stability of entire cellular components but possibly from that of a particular target. Heat shock induced similar results in whole cell DSC profiles of both strains and the accumulation of trehalose in the cells of both strains, but the trehalose contents in the strain KNU5377 were 2.6 fold higher than that in the control strain. On the contrary to the trehalose level, the neutral trehalase activity in the KNU5377 cells was not changed after the heat shock. This result made a conclusion that though the trehalose may stabilize cellular components, the surplus of trehalose in KNU5377 strain was not essential for stabilization of whole cellular components. A constitutively thermotolerant yeast, S. cerevisiae KNU5377, was compared with a relatively thermosensitive control, S. cerevisiae ATCC24858, by assaying the fluidity and proton ATPase on the plasma membrane. Anisotropic values (r) of both strains were slightly increased by elevating the incubation temperatures from 25$^{\circ}C$ to 37$^{\circ}C$ when they were aerobically cultured for 12 hours in the YPD media, implying the membrane fluidity was decreased. While the temperature was elevated up to 40$^{\circ}C$, the fluidity was not changed in the KNU5377 cell, but rather increased in the control. This result implies that the plasma membrane of the KNU5377 cell can be characterized into the more stabilized state than control. Besides, heat shock decreased the fluidity in the control strain, but not in the KNU5377 strain. This means also there's a stabilization of the plasma membrane in the KNU5377 cell. Furthermore, the proton ATPase assay indicated the KNU5377 cell kept a relatively more stabilized glucose metabolism at high temperature than the control cell. Therefore, the results were concluded that the stabilization of plasma membrane and growth at high temperature for the KNU5377 cell. Genome wide transcription analysis showed that the heat shock responses were very complex and combinatory in the KNU5377 cell. Induced by the heat shock, a number of genes were related with the ubiquitin mediated proteolysis, metallothionein (prevent ROS production from copper), hsp27 (88-fold induced remarkably, preventing the protein aggregation and denaturation), oxidative stress response (to remove the hydrogen peroxide), and etc.

  • PDF

A Study on Responses of the Korean kidnapping Terror in overseas (한국인 해외인질납치테러 대응방안)

  • Jeong, Joon-Sik;Kim, Won-Ki
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.339-363
    • /
    • 2009
  • The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. No countries in the world have evaded being a target for terrorists today. As well as South Korea, the whole world must share attentions and responsibilities for fighting against the terrorism. Since the international terrorist groups have expanded their targets from Western countries to Koreans, civilian hostages are no longer other's affair; it became a serious threat to public. Increased Korean investment, trade, missionary, and travel overseas also expanded activity regions worldwide. It also result increased terrorist threats and possible abduction. The number of kidnapping crisis has increased since the terrorists use it as an effective method of sending a message. Piracy refers to a broad range of violent acts at sea, and has traditionally been regarded as common enemies. Piracy constitutes a great threat to the security of navigation as well as to the safety of vessels and crews. Lessons from hostage issues such as Korean hostage crisis in Somalia and Afghanistan show that it can cause criticism on moral issues if armed rescue missions fail or hostages are killed, so the governments and related corporations try to solve it by paying ransom. Terrorists and use these advantages in order to put a huge pressure on the governments. In this study we will look at essential characteristics and types of hostage abductions and recognition of national safety, lessons and solutions to previous Korean hostage cases in overseas. At the same time, it provides a guidelines of the direction in the fighting against terrorist groups and Piracy.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Autoradiographic Studies on the Inhibitory Effect of Dibutyryl Cyclic AMP on Mouse Oocyte Maturation in Vitro (Dibutyryl Cyclic AMP가 생쥐여포난자의 성숙에 미치는 억제효과에 관한 자기방사법적 연구)

  • Choi, Choon-Keun
    • Applied Microscopy
    • /
    • v.7 no.1
    • /
    • pp.21-43
    • /
    • 1977
  • This experiment was undertaken in order to localize the labeled dbcAMP (dibutyryl cyclic AMP) in oocytes whose development has been suppressed by cold dbcAMP for 6 or 19 hours in vitro. Mouse oocytes were obtained from the ovaries of 3-4 week old A strain female mice, by puncturing the Graafian follicles in the modified Krebs-Ringer bicarbonate salt solution under the dissecting microscope. Those oocytes which have intact germinal vesicle were cultured in the basic culture medium supplemented with 0.4% bovine serum albumin (BSA). Cultivation of the oocytes was carried out in a microtube developed by Cho (1974). The cultures were then incubated in a humidified 5% $CO_2$ incubator maintained at $37^{\circ}C$ for 6 or 19 hours (Donahue, 1968). DbcAMP was added to culture medium for a final concentration of 100ug/ml, and $^3H-dbc$ AMP (specific activity 13 Ci/mM) for a final concentration of $40{\mu}Ci/ml$ was also added to the medium. For electron microscopic autoradiography, those oocytes recovered from the culture were washed with phosphate buffer (pH 7.4), and immediately prefixed in a 2.5% glutaraldehyde overnight and postfixed for 2 hours at $4 ^{\circ}C$ in 1% osmium tetroxide in phosphate buffer with pH 7.4 (Palade, 1952). After fixation, the materials were dehydrated in graded alcohol series and embedded in Epon 812 mixture based on the standard procedures (Luft, 1961). The thin sections $600-700{\AA}$ thick were mounted on the grids of 200 meshes. The grids containing sections were coated with a nuclear emulsion Kodak NTB-3 and stored in a cold dark box (at $4^{\circ}C$) for 3 weeks. After exposure, the samples were developed with Kodak D-19 and stained with uranyl acetate and lead citrate. Routine observation was made with Hitachi HU-11E electron microsocope. The results of the observation were as followings: 1. It was found that the labeled dbcAMP penetrated the egg plasma membrane and dispersed at random in the cytoplasm. 2. It was also observed that most of the labeled dbcAMP was attached to microfibrillar lattices portion of the oocyte cytoplasm. There fore, it is presumed that the receptor of the dbcAMP is localized in the microfibrillar lattices of the oocyte. 3. It also seems that some other cell organells such as mitochondria, Golgi complex, cortical granules are not directly related to the action of the dbcAMP. 4. The labeled dbcAMP was neither observed in the membrane nor in the nucleus. Therefore, it seems that there is no relationship between the concentration of dbcAMP and the nuclear membranous permeability. 5. There was no difference in number of dbcAMP particles when oocytes were cultured for 6 hours and 19 hours. 6. However, it was observed that, in same of the oocytes suppressed in germinal vesicle by dbcAMP for 19 hours, cell organells were moved and concentrated to a small portion of the cytoplasm, and that the morphology of the organells greatly changed to an abnormal. form. Therefore, it is supposed that those oocytes were in the process of degeneration. From the above results, it is expected that dbcAMP penetrated the egg membrane and was bound to the receptor which seems to be located in the microfibrillar lattiees portion, and that this dbcAMP-receptor complex inhibited some enzyme system of the oocytes which are essential for the germinal vesicle breakdown.

  • PDF

Establishment of a Murine Model for Radiation-induced Bone Loss in Growing C3H/HeN Mice (성장기 마우스에서 방사선 유도 골소실 동물모델 확립)

  • Jang, Jong-Sik;Moon, Changjong;Kim, Jong-Choon;Bae, Chun-Sik;Kang, Seong-Soo;Jung, Uhee;Jo, Sung-Kee;Kim, Sung-Ho
    • Journal of Radiation Protection and Research
    • /
    • v.40 no.1
    • /
    • pp.10-16
    • /
    • 2015
  • Bone changes are common sequela of irradiation in growing animal. The purpose of this study was to establish an experimental model of radiation-induced bone loss in growing mice using micro-computed tomography (${\mu}CT$). The extent of changes following 2 Gy gamma irradiation ($2Gy{\cdot}min^{-1}$) was studied at 4, 8 or 12 weeks after exposure. Mice that received 0.5, 1.0, 2.0 or 4.0 Gy of gamma-rays were examined 8 weeks after irradiation. Tibiae were analyzed using ${\mu}CT$. Serum alkaline phosphatase (ALP) and biomechanical properties were measured and the osteoclast surface was examined. A significant loss of trabecular bone in tibiae was evident 8 weeks after exposure. Measurements performed after irradiation showed a dose-related decrease in trabecular bone volume fraction (BV/TV) and bone mineral density (BMD), respectively. The best-fitting dose-response curves were linear-quadratic. Taking the controls into accounts, the lines of best fit were as follows: BV/TV (%) = $0.9584D^2-6.0168D+20.377$ ($r^2$ = 0.946, D = dose in Gy) and BMD ($mg{\cdot}cm^{-3}$) = $8.8115D^2-56.197D+194.41$ ($r^2$ = 0.999, D = dose in Gy). Body weight did not differ among the groups. No dose-dependent differences were apparent among the groups with regard to mechanical and anatomical properties of tibia, serum ALP and osteoclast activity. The findings provide the basis required for better understanding of the results that will be obtained in any further studies of radiation-induced bone responses.