• Title/Summary/Keyword: 정보접근

Search Result 11,744, Processing Time 0.039 seconds

Local Environments of Li in the Interlayer of Clay Minerals at Room and High Temperatures (상온 및 고온에서 점토광물 층간의 Li 환경)

  • Kim, Yeong-Kyoo;Lee, Ji-Eun
    • Journal of the Mineralogical Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.193-201
    • /
    • 2007
  • We used $^6Li$ and $^7Li$ MAS NMR to investigate the fate and local environments of Li in the interlayer of clay minerals such as hectorite, Woming-montmorillonite, beidellite, and lepidollite at room and high ($250^{\circ}C$) temperature. Although $^6Li$ NMR spectra show narrower peaks than those of $^7Li$ NMR, S/N ratio is low and there are no obvious differences in chemical shifts suggesting that it is difficult to apply $^6Li$ NMR to have information on the local environments of Li in the clay interlayers. $^7Li$ NMR spectra, however, show changes in the peak width and quadrupole patterns providing information on the local environments of Li in the interlayer even though changes in the chemical shift are not observed. In montmorillonite, two different local environments of Li are observed; one has a narrow peak with typical quadrupole patterns whereas another has a broad peak without those of the patterns. Changes in the peak width is also observed from broad to narrow in the $^7Li$ NMR spectra for beidellite but not for hectorite at high temperature. Our results suggest that the peak width change in the broad peak is attributed to the coordination changes in the water molecules around Li which is tightly bonded on the basal oxygen of Si tetrahedra as inner-sphere complexes. The narrow peak in montmorillnoite can be assigned to the Li bended as outer-sphere complexes.

MOTHER-CHILD RELATIONSHIP OF CHILDREN WITH REACTIVE ATTACHMENT DISORDER (반응성애착장애아의 어머니-아동 관계)

  • Shin, Yee-Jin;Lee, Kyung-Sook;Park, Sook-Kyung
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.8 no.1
    • /
    • pp.22-33
    • /
    • 1997
  • The objective of this study is to understand disordered parent-child relationships of Reactive Attachment Disorder(RAD) systematically through the mother’ internal working model of child. In this study, RAD mothers’internal representations of the child were compared with mothers’of control group and association between mothers’ representation classifications and children’ attachment classifications was examined. Also individual differences in mother-child interaction by mothers’representation classifications was observed. The subjects of this study were 40 2-5 year-old children and their mothers, 20 attachment disordered dyads and 20 normal dyads of control group. Mothers were interviewed using the Working Model of the Child(Zeanah, Benoit & Barton 1986) to classify internal representations of child. Children’ attachment patterns were assessed by the Strange Situation Procedure. For observation of motherchild interaction, Each dyad was seen in DPICS devised by Eyberg and Robinson(1983). The results of the study were as follows:1) Among RAD group, 55% of mothers were classified as disengaged and 45% classified as distorted, while all mothers of control group were classified as balanced. In rating scales, there were significant differences in all 3 representation classifications in Intensity of involvement and Coherence. In Intensity of involvement disengaged representations had the lowest score and distorted representations had the lowest score in Coherence. 2) Mothers’representation classifications were related to children’ attachment classifications. All mothers of control group whose children were classified as secure were classified as balanced. Among RAD’ mothers, by contrast, 82% of mothers classified as disengaged had children classified as anxious-avoidant, 56% of mothers classified as distorted had children classified as disorganized / disoriented and 33% of mothers classified as distorted had children classified as anxious-resistant. 3) There were individual differences in mother-child interactions by mothers’representation classifications. In the child-centered play, mothers classified as disengaged used discriptive statement, reflective statement and discriptive-reflective question less than balanced mothers. Mothers classified as distorted used direct command and indirect command more than balanced mothers. In the clean-up task, mothers classified as disengaged and distorted used direct command and indirect command more than balanced mothers. The results of this study suggest that parents’working model of the child is an important factor to understand parent-child attachment relationships and their interactions. The understanding of parents’ working model of the child is thought to enrich our understanding of disordered parent-child relationships and to provide useful informations for specific and successful treatments.

  • PDF

Limit Pricing by Noncooperative Oligopolists (과점산업(寡占産業)에서의 진입제한가격(進入制限價格))

  • Nam, Il-chong
    • KDI Journal of Economic Policy
    • /
    • v.12 no.1
    • /
    • pp.127-148
    • /
    • 1990
  • A Milgrom-Roberts style signalling model of limit pricing is developed to analyze the possibility and the scope of limit pricing in general, noncooperative oligopolies. The model contains multiple incumbent firms facing a potential entrant and assumes an information asymmetry between incombents and the potential entrant about the market demand. There are two periods in the model. In period 1, n incumbent firms simultaneously and noncooperatively choose quantities. At the end of period 1, the potential entrant observes the market price and makes an entry decision. In period 2, depending on the entry decision of the entrant, n' or (n+1) firms choose quantities again before the game terminates. Since the choice of incumbent firms in period 1 depends on their information about demand, the market price in period 1 conveys information about the market demand. Thus, there is a systematic link between the market price and the profitability of entry. Using Bayes-Nash equilibrium as the solution concept, we find that there exist some demand conditions under which incumbent firms will limit price. In symmetric equilibria, incumbent firms each produce an output that is greater than the Cournot output and induce a price that is below the Cournot price. In doing so, each incumbent firm refrains from maximizing short-run profit and supplies a public good that is entry deterrence. The reason that entry is deterred by such a reduced price is that it conveys information about the demand of the industry that is unfavorable to the entrant. This establishes the possibility of limit pricing by noncooperative oligopolists in a setting that is fully rational, and also generalizes the result of Milgrom and Roberts to general oligopolies, confirming Bain's intuition. Limit pricing by incumbents explained above can be interpreted as a form of credible collusion in which each firm voluntarily deviates from myopic optimization in order to deter entry using their superior information. This type of implicit collusion differs from Folk-theorem type collusions in many ways and suggests that a collusion can be a credible one even in finite games as long as there is information asymmetry. Another important result is that as the number of incumbent firms approaches infinity, or as the industry approaches a competitive one, the probability that limit pricing occurs converges to zero and the probability of entry converges to that under complete information. This limit result confirms the intuition that as the number of agents sharing the same private information increases, the value of the private information decreases, and the probability that the information gets revealed increases. This limit result also supports the conventional belief that there is no entry problem in a competitive market. Considering the fact that limit pricing is generally believed to occur at an early stage of an industry and the fact that many industries in Korea are oligopolies in their infant stages, the theoretical results of this paper suggest that we should pay attention to the possibility of implicit collusion by incumbent firms aimed at deterring new entry using superior information. The long-term loss to the Korean economy from limit pricing can be very large if the industry in question is a part of the world market and the domestic potential entrant whose entry is deterred could .have developed into a competitor in the world market. In this case, the long-term loss to the Korean economy should include the lost opportunity in the world market in addition to the domestic long-run welfare loss.

  • PDF

A Way for Creating Human Bioclimatic Maps using Human Thermal Sensation (Comfort) and Applying the Maps to Urban and Landscape Planning and Design (인간 열환경 지수를 이용한 생기후지도 작성 및 도시·조경계획 및 디자인에의 적용방안)

  • Park, Soo-Kuk
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.41 no.1
    • /
    • pp.21-33
    • /
    • 2013
  • The purpose of this study is to find applicabilities of human bioclimatic maps, using human thermal sensation(comfort) in summer, with microclimatic in situ data and computer simulation results at the study site of downtown Daegu. This includes the central business district(CBD) area and two urban parks, the Debt Redemption Movement Memorial Park and the 2.28 Park, for urban and landscape planning and design. Climatic data and urban setting information for the analysis of human thermal sensation were obtained from in situ measurement and the geographic information system data. As a result, the CBD had higher air temperature than the parks when the wind speed was low. Relative humidities were opposite to the air temperature. Especially, same directional streets with local wind direction had lower air temperature than streets perpendicular to the wind direction. The most important climatic variable of human thermal sensation in summer was direct beam solar radiation. Also, creating shadow areas would be the most relevant method for modifying hot thermal environments in urban areas. The most effective method of creating shadow patterns was making a tree shadow over a pergola, and the second best one was making a tree shadow on the front of north directional building walls. Moreover, how to plant trees for creating shadow patterns was important as well as what kind of trees should be planted. The results of human thermal sensation were warm to very hot at sunny areas and neutral to warm at shaded ones. At the sunny areas, wide, squared shape areas had a little bit higher thermal sensation than those of narrow streets. The albedo change of building walls 0.15 and ground surface 0.1 could change 1/6 of a sensation level at the shaded areas and 1/3 at the sunny ones. These microclimatic approaches will be useful to find appropriate methods for modifying thermal environments in urban areas.

Automatic Detection of Stage 1 Sleep Utilizing Simultaneous Analyses of EEG Spectrum and Slow Eye Movement (느린 안구 운동(SEM)과 뇌파의 스펙트럼 동시 분석을 이용한 1단계 수면탐지)

  • Shin, Hong-Beom;Han, Jong-Hee;Jeong, Do-Un;Park, Kwang-Suk
    • Sleep Medicine and Psychophysiology
    • /
    • v.10 no.1
    • /
    • pp.52-60
    • /
    • 2003
  • Objectives: Stage 1 sleep provides important information regarding interpretation of nocturnal polysomnography, particularly sleep onset. It is a short transition period from wakeful consciousness to sleep. The lack of prominent sleep events characterizing stage 1 sleep is a major obstacle in automatic sleep stage scoring. In this study, utilization of simultaneous EEG and EOG processing and analyses to detect stage 1 sleep automatically were attempted. Methods: Relative powers of the alpha waves and the theta waves were calculated from spectral estimation. A relative power of alpha waves less than 50% or relative power of theta waves more than 23% was regarded as stage 1 sleep. SEM(slow eye movement) was defined as the duration of both-eye movement ranging from 1.5 to 4 seconds, and was also regarded as stage 1 sleep. If one of these three criteria was met, the epoch was regarded as stage 1 sleep. Results were compared to the manual rating results done by two polysomnography experts. Results: A total of 169 epochs were analyzed. The agreement rate for stage 1 sleep between automatic detection and manual scoring was 79.3% and Cohen’s Kappa was 0.586 (p<0.01). A significant portion (32%) of automatically detected stage 1 sleep included SEM. Conclusion: Generally, digitally-scored sleep staging shows accuracy up to 70%. Considering potential difficulty in stage 1 sleep scoring, accuracy of 79.3% in this study seems to be strong enough. Simultaneous analysis of EOG differentiates this study from previous ones which mainly depended on EEG analysis. The issue of close relationship between SEM and stage 1 sleep raised by Kinnari remains a valid one in this study.

  • PDF

A Comparative Case Study on the Adaptation Process of Advanced Information Technology: A Grounded Theory Approach for the Appropriation Process (신기술 사용 과정에 관한 비교 사례 연구: 기술 전유 과정의 근거이론적 접근)

  • Choi, Hee-Jae;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.99-124
    • /
    • 2009
  • Many firms in Korea have adopted and used advanced information technology in an effort to boost efficiency. The process of adapting to the new technology, at the same time, can vary from one firm to another. As such, this research focuses on several relevant factors, especially the roles of social interaction as a key variable that influences the technology adaptation process and the outcomes. Thus far, how a firm goes through the adaptation process to the new technology has not been yet fully explored. Previous studies on changes undergone by a firm or an organization due to information technology have been pursued from various theoretical points of views, evolved from technological and institutional views to an integrated social technology views. The technology adaptation process has been understood to be something that evolves over time and has been regarded as cycles between misalignments and alignments, gradually approaching the stable aligned state. The adaptation process of the new technology was defined as "appropriation" process according to Poole and DeSanctis (1994). They suggested that this process is not automatically determined by the technology design itself. Rather, people actively select how technology structures should be used; accordingly, adoption practices vary. But concepts of the appropriation process in these studies are not accurate while suggested propositions are not clear enough to apply in practice. Furthermore, these studies do not substantially suggest which factors are changed during the appropriation process and what should be done to bring about effective outcomes. Therefore, research objectives of this study lie in finding causes for the difference in ways in which advanced information technology has been used and adopted among organizations. The study also aims to explore how a firm's interaction with social as well as technological factors affects differently in resulting organizational changes. Detail objectives of this study are as follows. First, this paper primarily focuses on the appropriation process of advanced information technology in the long run, and we look into reasons for the diverse types of the usage. Second, this study is to categorize each phases in the appropriation process and make clear what changes occur and how they are evolved during each phase. Third, this study is to suggest the guidelines to determine which strategies are needed in an individual, group and organizational level. For this, a substantially grounded theory that can be applied to organizational practice has been developed from a longitudinal comparative case study. For these objectives, the technology appropriation process was explored based on Structuration Theory by Giddens (1984), Orlikoski and Robey (1991) and Adaptive Structuration Theory by Poole and DeSanctis (1994), which are examples of social technology views on organizational change by technology. Data have been obtained from interviews, observations of medical treatment task, and questionnaires administered to group members who use the technology. Data coding was executed in three steps following the grounded theory approach. First of all, concepts and categories were developed from interviews and observation data in open coding. Next, in axial coding, we related categories to subcategorize along the lines of their properties and dimensions through the paradigm model. Finally, the grounded theory about the appropriation process was developed through the conditional/consequential matrix in selective coding. In this study eight hypotheses about the adaptation process have been clearly articulated. Also, we found that the appropriation process involves through three phases, namely, "direct appropriation," "cooperate with related structures," and "interpret and make judgments." The higher phases of appropriation move, the more users represent various types of instrumental use and attitude. Moreover, the previous structures like "knowledge and experience," "belief that other members know and accept the use of technology," "horizontal communication," and "embodiment of opinion collection process" are evolved to higher degrees in their dimensions of property. Furthermore, users continuously create new spirits and structures, while removing some of the previous ones at the same time. Thus, from longitudinal view, faithful and unfaithful appropriation methods appear recursively, but gradually faithful appropriation takes over the other. In other words, the concept of spirits and structures has been changed in the adaptation process over time for the purpose of alignment between the task and other structures. These findings call for a revised or extended model of structural adaptation in IS (Information Systems) literature now that the vague adaptation process in previous studies has been clarified through the in-depth qualitative study, identifying each phrase with accuracy. In addition, based on these results some guidelines can be set up to help determine which strategies are needed in an individual, group, and organizational level for the purpose of effective technology appropriation. In practice, managers can focus on the changes of spirits and elevation of the structural dimension to achieve effective technology use.

The Adoption and Diffusion of Semantic Web Technology Innovation: Qualitative Research Approach (시맨틱 웹 기술혁신의 채택과 확산: 질적연구접근법)

  • Joo, Jae-Hun
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.33-62
    • /
    • 2009
  • Internet computing is a disruptive IT innovation. Semantic Web can be considered as an IT innovation because the Semantic Web technology possesses the potential to reduce information overload and enable semantic integration, using capabilities such as semantics and machine-processability. How should organizations adopt the Semantic Web? What factors affect the adoption and diffusion of Semantic Web innovation? Most studies on adoption and diffusion of innovation use empirical analysis as a quantitative research methodology in the post-implementation stage. There is criticism that the positivist requiring theoretical rigor can sacrifice relevance to practice. Rapid advances in technology require studies relevant to practice. In particular, it is realistically impossible to conduct quantitative approach for factors affecting adoption of the Semantic Web because the Semantic Web is in its infancy. However, in an early stage of introduction of the Semantic Web, it is necessary to give a model and some guidelines and for adoption and diffusion of the technology innovation to practitioners and researchers. Thus, the purpose of this study is to present a model of adoption and diffusion of the Semantic Web and to offer propositions as guidelines for successful adoption through a qualitative research method including multiple case studies and in-depth interviews. The researcher conducted interviews with 15 people based on face-to face and 2 interviews by telephone and e-mail to collect data to saturate the categories. Nine interviews including 2 telephone interviews were from nine user organizations adopting the technology innovation and the others were from three supply organizations. Semi-structured interviews were used to collect data. The interviews were recorded on digital voice recorder memory and subsequently transcribed verbatim. 196 pages of transcripts were obtained from about 12 hours interviews. Triangulation of evidence was achieved by examining each organization website and various documents, such as brochures and white papers. The researcher read the transcripts several times and underlined core words, phrases, or sentences. Then, data analysis used the procedure of open coding, in which the researcher forms initial categories of information about the phenomenon being studied by segmenting information. QSR NVivo version 8.0 was used to categorize sentences including similar concepts. 47 categories derived from interview data were grouped into 21 categories from which six factors were named. Five factors affecting adoption of the Semantic Web were identified. The first factor is demand pull including requirements for improving search and integration services of the existing systems and for creating new services. Second, environmental conduciveness, reference models, uncertainty, technology maturity, potential business value, government sponsorship programs, promising prospects for technology demand, complexity and trialability affect the adoption of the Semantic Web from the perspective of technology push. Third, absorptive capacity is an important role of the adoption. Fourth, suppler's competence includes communication with and training for users, and absorptive capacity of supply organization. Fifth, over-expectance which results in the gap between user's expectation level and perceived benefits has a negative impact on the adoption of the Semantic Web. Finally, the factor including critical mass of ontology, budget. visible effects is identified as a determinant affecting routinization and infusion. The researcher suggested a model of adoption and diffusion of the Semantic Web, representing relationships between six factors and adoption/diffusion as dependent variables. Six propositions are derived from the adoption/diffusion model to offer some guidelines to practitioners and a research model to further studies. Proposition 1 : Demand pull has an influence on the adoption of the Semantic Web. Proposition 1-1 : The stronger the degree of requirements for improving existing services, the more successfully the Semantic Web is adopted. Proposition 1-2 : The stronger the degree of requirements for new services, the more successfully the Semantic Web is adopted. Proposition 2 : Technology push has an influence on the adoption of the Semantic Web. Proposition 2-1 : From the perceptive of user organizations, the technology push forces such as environmental conduciveness, reference models, potential business value, and government sponsorship programs have a positive impact on the adoption of the Semantic Web while uncertainty and lower technology maturity have a negative impact on its adoption. Proposition 2-2 : From the perceptive of suppliers, the technology push forces such as environmental conduciveness, reference models, potential business value, government sponsorship programs, and promising prospects for technology demand have a positive impact on the adoption of the Semantic Web while uncertainty, lower technology maturity, complexity and lower trialability have a negative impact on its adoption. Proposition 3 : The absorptive capacities such as organizational formal support systems, officer's or manager's competency analyzing technology characteristics, their passion or willingness, and top management support are positively associated with successful adoption of the Semantic Web innovation from the perceptive of user organizations. Proposition 4 : Supplier's competence has a positive impact on the absorptive capacities of user organizations and technology push forces. Proposition 5 : The greater the gap of expectation between users and suppliers, the later the Semantic Web is adopted. Proposition 6 : The post-adoption activities such as budget allocation, reaching critical mass, and sharing ontology to offer sustainable services are positively associated with successful routinization and infusion of the Semantic Web innovation from the perceptive of user organizations.

Preliminary Diagnosis of Fishing Ground Environment for Establishing the Management System in Fisheries Resources Protection Area (수산자원보호구역 관리체제 구축을 위한 어장환경 예비진단)

  • Lee, Dae-In;Park, Dal-Soo;Jeon, Kyeong-Am;Eom, Ki-Hyuk;Park, Jong-Soo;Kim, Gui-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.15 no.2
    • /
    • pp.79-89
    • /
    • 2009
  • For preliminary diagnosis on current fishing ground environment and basic information for establishment of effective and rational management policy in fisheries resources protection area, water and sediment quality and changes of total area in the 10 marine protection areas designated for fisheries resources management in Korea were assessed. Results showed that environmental quality in these areas has been degraded by pollution sources, coastal utilization and development stress, etc. The pattern and degree of contamination differed by protection areas, suggesting that it is necessary for optimum environmental management plan considering the regional characteristics. The total designated area of protection areas in 2003 changed by $-22.9{\sim}2.4%$, on average -6.4%, compared with the first year of designation; Wando-Doam Bay showd the highest increase rate (2.4%), and Hansan Bay has the highest decrease rate (-22.9%) Decrease rate of land and sea in total area showd 6.1% and 6.6%. An integrated management of environmental data in protection areas is required for systematic assessment. Therefore, the suitable environmental and information management is needed specifically considering the environment characteristics such as development and utilization conditions of land and sea area Furthermore, bemuse urbanization and industrialization threats the junctions of the protection areas, authorized ministry (MIFAFF) should develope and establish monitoring and management procedures based on the related laws.

  • PDF

Multi-dimensional Security Threats and Holistic Security - Understanding of fusion-phenomenon of national security and criminal justice in post-modern society - (다차원 안보위협과 융합 안보)

  • Yun, Min-Woo;Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.157-185
    • /
    • 2012
  • Today, the emergence of cyberspace and advancement of globalization caused not only the transformation of our productive and conventional life but also the revolutionary transition of use of destructive violence such as crime and warfare. This transition of environmental condition connects various security threats which separatedly existed in individual, local, national, and global levels in the past, and transformed the mechanical sum of all levels of security threats into the organic sum of multi-dimensional security threats. This article proposes that the sum of multi-dimensional security threats is caused by the interconnectivity of various different levels of security threats and the integrated interdisciplinary perspective is essential to properly understand the fundamental existence of today's security problem and the reality of fear that we face today. The holistic security, the concept proposed here, is to suggest the mode of networked response to multi-dimensional security threats. The holistic security is suggested to overcome the conventional divisional approach based on the principle of "division of labor" and bureaucratic principles, which means more concretely that national security and criminal justice are divided and intelligence, military, police, prosecution, fire-fighting, private security, and etc. are strictly separated into its own expertise and turf. Also, this article introduces integrated security approaches tried by international organization and major countries overseas with the respect of the holistic security. The author have spent some substantial experience of participant observation, meetings, seminar, conference, and expert interviews regarding the issues discussed in the article in various countries including the United States, Russia, Austria, Germany, Canada, Mexico, Israel, and Uzbekistan for the last ten years. Intelligence and information on various levels of security threats and security approaches introduced in this paper is obtained from such opportunities.

  • PDF

Consumers Perceptions on Monosodium L-glutamate in Social Media (소셜미디어 분석을 통한 소비자들의 L-글루타민산나트륨에 대한 인식 조사)

  • Lee, Sooyeon;Lee, Wonsung;Moon, Il-Chul;Kwon, Hoonjeong
    • Journal of Food Hygiene and Safety
    • /
    • v.31 no.3
    • /
    • pp.153-166
    • /
    • 2016
  • The purpose of this study was to investigate consumers' perceptions on monosodium L-glutamate (MSG) in social media. Data were collected from Naver blogs and Naver web communities (Korean representative portal web-site), and media reports including comment sections on a Yonhap news website (Korean largest news agency). The results from Naver blogs and Naver web communities showed that it was primarily mentioned MSG-use restaurant reviews, 'MSG-no added' products, its safety, and methods of reducing MSG in food. When TV shows on current affairs, newspaper, or TV news reported uses and side effects of MSG, search volume for MSG has increased in both PC and mobile search engines. Search volume has increased especially when TV shows on current affairs reported it. There are more periods with increased search volume for Mobile than PC. Also, it was mainly commented about safety of MSG, criticism of low-quality foods, abuse of MSG, and distrust of government below the news on the Yonhap news site. The label of MSG-no added products in market emphasized "MSG-free" even though it is allocated as an acceptable daily intake (ADI) not-specified by the Joint FAO/WHO Expert Committee on Food Additives (JECFA). When consumers search for MSG (monosodium L-glutamate) or purchase food on market, they might perceive that 'MSG-no added' products are better. Competent authorities, offices of education and local government provide guidelines based on no added MSG principle and these policies might affect consumers' perceptions. TV program or news program could be a powerful and effective consumer communication channel about MSG through Mobile rather than PC. Therefore media including TV should report item on monosodium L-glutamate with responsibility and information based on scientific background for consumers to get reliable information.