• Title/Summary/Keyword: 3 stage

Search Result 17,689, Processing Time 0.055 seconds

A Study on the Effect of the Introduction Characteristics of Cloud Computing Services on the Performance Expectancy and the Intention to Use: From the Perspective of the Innovation Diffusion Theory (클라우드 컴퓨팅 서비스의 도입특성이 조직의 성과기대 및 사용의도에 미치는 영향에 관한 연구: 혁신확산 이론 관점)

  • Lim, Jae Su;Oh, Jay In
    • Asia pacific journal of information systems
    • /
    • v.22 no.3
    • /
    • pp.99-124
    • /
    • 2012
  • Our society has long been talking about necessity for innovation. Since companies in particular need to carry out business innovation in their overall processes, they have attempted to apply many innovation factors on sites and become to pay more attention to their innovation. In order to achieve this goal, companies has applied various information technologies (IT) on sites as a means of innovation, and consequently IT have been greatly developed. It is natural for the field of IT to have faced another revolution which is called cloud computing, which is expected to result in innovative changes in software application via the Internet, data storing, the use of devices, and their operations. As a vehicle of innovation, cloud computing is expected to lead the changes and advancement of our society and the business world. Although many scholars have researched on a variety of topics regarding the innovation via IT, few studies have dealt with the issue of could computing as IT. Thus, the purpose of this paper is to set the variables of innovation attributes based on the previous articles as the characteristic variables and clarify how these variables affect "Performance Expectancy" of companies and the intention of using cloud computing. The result from the analysis of data collected in this study is as follows. The study utilized a research model developed on the innovation diffusion theory to identify influences on the adaptation and spreading IT for cloud computing services. Second, this study summarized the characteristics of cloud computing services as a new concept that introduces innovation at its early stage of adaptation for companies. Third, a theoretical model is provided that relates to the future innovation by suggesting variables for innovation characteristics to adopt cloud computing services. Finally, this study identified the factors affecting expectation and the intention to use the cloud computing service for the companies that consider adopting the cloud computing service. As the parameter and dependent variable respectively, the study deploys the independent variables that are aligned with the characteristics of the cloud computing services based on the innovation diffusion model, and utilizes the expectation for performance and Intention to Use based on the UTAUT theory. Independent variables for the research model include Relative Advantage, Complexity, Compatibility, Cost Saving, Trialability, and Observability. In addition, 'Acceptance for Adaptation' is applied as an adjustment variable to verify the influences on the expected performances from the cloud computing service. The validity of the research model was secured by performing factor analysis and reliability analysis. After confirmatory factor analysis is conducted using AMOS 7.0, the 20 hypotheses are verified through the analysis of the structural equation model, accepting 12 hypotheses among 20. For example, Relative Advantage turned out to have the positive effect both on Individual Performance and on Strategic Performance from the verification of hypothesis, while it showed meaningful correlation to affect Intention to Use directly. This indicates that many articles on the diffusion related Relative Advantage as the most important factor to predict the rate to accept innovation. From the viewpoint of the influence on Performance Expectancy among Compatibility and Cost Saving, Compatibility has the positive effect on both Individual Performance and on Strategic Performance, while it showed meaningful correlation with Intention to Use. However, the topic of the cloud computing service has become a strategic issue for adoption in companies, Cost Saving turns out to affect Individual Performance without a significant influence on Intention to Use. This indicates that companies expect practical performances such as time and cost saving and financial improvements through the adoption of the cloud computing service in the environment of the budget squeezing from the global economic crisis from 2008. Likewise, this positively affects the strategic performance in companies. In terms of effects, Trialability is proved to give no effects on Performance Expectancy. This indicates that the participants of the survey are willing to afford the risk from the high uncertainty caused by innovation, because they positively pursue information about new ideas as innovators and early adopter. In addition, they believe it is unnecessary to test the cloud computing service before the adoption, because there are various types of the cloud computing service. However, Observability positively affected both Individual Performance and Strategic Performance. It also showed meaningful correlation with Intention to Use. From the analysis of the direct effects on Intention to Use by innovative characteristics for the cloud computing service except the parameters, the innovative characteristics for the cloud computing service showed the positive influence on Relative Advantage, Compatibility and Observability while Complexity, Cost saving and the likelihood for the attempt did not affect Intention to Use. While the practical verification that was believed to be the most important factor on Performance Expectancy by characteristics for cloud computing service, Relative Advantage, Compatibility and Observability showed significant correlation with the various causes and effect analysis. Cost Saving showed a significant relation with Strategic Performance in companies, which indicates that the cost to build and operate IT is the burden of the management. Thus, the cloud computing service reflected the expectation as an alternative to reduce the investment and operational cost for IT infrastructure due to the recent economic crisis. The cloud computing service is not pervasive in the business world, but it is rapidly spreading all over the world, because of its inherited merits and benefits. Moreover, results of this research regarding the diffusion innovation are more or less different from those of the existing articles. This seems to be caused by the fact that the cloud computing service has a strong innovative factor that results in a new paradigm shift while most IT that are based on the theory of innovation diffusion are limited to companies and organizations. In addition, the participants in this study are believed to play an important role as innovators and early adapters to introduce the cloud computing service and to have competency to afford higher uncertainty for innovation. In conclusion, the introduction of the cloud computing service is a critical issue in the business world.

  • PDF

Effect of Temperature During Grain Filling Stage on Grain Quality and Taste of Cooked Rice in Mid-late Maturing Rice Varieties (등숙기 온도변이가 중만생종 벼의 쌀 품질과 식미치에 미치는 영향)

  • Choi, Kyung-Jin;Park, Tae-Shik;Lee, Choon-Ki;Kim, Jung-Tae;Kim, Jun-Hwan;Ha, Ki-Yong;Yang, Woon-Ho;Lee, Chung-Keun;Kwak, Kang-Su;Park, Hong-Kyu;Nam, Jeong-Kwon;Kim, Jeong-Il;Han, Gwi-Jung;Cho, Yong-Sik;Park, Young-Hee;Han, Sang-Wook;Kim, Jae-Rok;Lee, Sang-Young;Choi, Hyun-Gu;Cho, Seung-Hyun;Park, Heung-Gyu;Ahn, Duok-Jong;Joung, Wan-Kyu;Han, Sang-Ik;Kim, Sang-Yeol;Jang, Ki-Chang;Oh, Seong-Hwan;Seo, Woo-Duck;Ra, Ji-Eun;Kim, Jun-Young;Kang, Hang-Won
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.56 no.4
    • /
    • pp.404-412
    • /
    • 2011
  • This experiment was conducted to clarify the effect of the temperature for grain filling duration on quality and taste of cooked rice cultivated in different region in Korea. In 2006 and 2007, 4 mid-late maturing group of rice varieties (Nampyeongbyeo, Ilpumbyeo, Junambyeo and Dongjin 1) were cultivated in 28 experimental plots of 27 different regions located in 8 provinces. The taste of cooked rice were positively correlated with 1,000 grain weight but negatively correlated with protein content of brown rice. Mean temperature for 30 days from heading was more closely correlated with grain filling and tastes of cooked rice than those for 40 days. Though, the optimum mean temperature for the best taste of cooked rice for 30 days after heading was 22.1 to $23.1^{\circ}C$ depending on varieties, in general, 1,000 grain weight and cooked rice taste were the highest in the mean temperature of $22.2^{\circ}C$ for 30 days from heading. But grains were poorly ripened in case of the mean temperature lower than $21.0^{\circ}C$ for 30 days after heading. Therefore, for the better taste of cooked rice in Korea, the developing new rice varieties and cultivation method should be focused to adjust the mean temperature within $22-23^{\circ}C$ during the period of 30 days after heading.

Comparison of Establishment Vigor, Uniformity, Rooting Potential and Turf Qualtiy of Sods of Kentucky Bluegrass, Perennial Ryegrass, Tall Fescue and Cool-Season Grass Mixtures Grown in Sand Soil (모래 토양에서 켄터키블루그라스, 퍼레니얼라이그라스, 톨훼스큐 및 한지형 혼합구 뗏장의 피복도, 균일도, 근계 형성력 및 잔디품질 비교)

  • 김경남;박원규;남상용
    • Asian Journal of Turfgrass Science
    • /
    • v.17 no.4
    • /
    • pp.129-146
    • /
    • 2003
  • Research was initiated to compare establishment vigor, uniformity, rooting potential and turf quality in sods of cool-season grasses (CSG). Several turfgrasses grown under pure sand soil were tested. Establishment vigor, uniformity, rooting potential and turf quality were evaluated in the study. Turfgrass entries were comprised of three blends from Kentucky bluegrass (KB, Poa pratensis L.), perennial ryegrass (PR, Lolium perenne L.), and tall fescue (TF, Festuca arundinacea Schreb.), respectively and three mixtures among them. Differences by treatments were significantly observed in establishment vigor, uniformity, rooting potential and turf quality. Early establishment vigor was mainly influenced by germination speed, being fastest with PR, intermediate with TF and slowest with KB. In a late stage of growth, however, it was affected more by growth habit, resulting in highest with KB and slowest with TF. There were considerable variations in sod uniformity among turfgrasses. Best uniformity among monostand sods was associated with KB, while poorest one with TF. PR sod produced intermediate uniformity between KB and TF. The uniformity of polystand sods of CSG mixtures was inferior to that of monostands of KB, PR and TF, due to characteristics of mixtures comprised of a variety of color, density, texture and growth habit. The greatest potential of sod rooting was found with PR and the poorest with KB. Intermediate potential between PR and KB was associated with TF. In CSG mixtures, it was variable, depending on turfgrass mixing rates. Generally, the higher the PR in mixtures, the greater the sod rooting potential. At the time of sod harvest, however, turfgrass quality of KB was superior to that of PR. because of its characteristics of uniform surface, high density and good mowing quality. These results suggest that a careful expertise based on turf quality as well as sod characteristics like establishment vigor, uniformity and rooting potential be strongly required for the success of golf course or athletic field in establishment.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Customer Behavior Prediction of Binary Classification Model Using Unstructured Information and Convolution Neural Network: The Case of Online Storefront (비정형 정보와 CNN 기법을 활용한 이진 분류 모델의 고객 행태 예측: 전자상거래 사례를 중심으로)

  • Kim, Seungsoo;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.221-241
    • /
    • 2018
  • Deep learning is getting attention recently. The deep learning technique which had been applied in competitions of the International Conference on Image Recognition Technology(ILSVR) and AlphaGo is Convolution Neural Network(CNN). CNN is characterized in that the input image is divided into small sections to recognize the partial features and combine them to recognize as a whole. Deep learning technologies are expected to bring a lot of changes in our lives, but until now, its applications have been limited to image recognition and natural language processing. The use of deep learning techniques for business problems is still an early research stage. If their performance is proved, they can be applied to traditional business problems such as future marketing response prediction, fraud transaction detection, bankruptcy prediction, and so on. So, it is a very meaningful experiment to diagnose the possibility of solving business problems using deep learning technologies based on the case of online shopping companies which have big data, are relatively easy to identify customer behavior and has high utilization values. Especially, in online shopping companies, the competition environment is rapidly changing and becoming more intense. Therefore, analysis of customer behavior for maximizing profit is becoming more and more important for online shopping companies. In this study, we propose 'CNN model of Heterogeneous Information Integration' using CNN as a way to improve the predictive power of customer behavior in online shopping enterprises. In order to propose a model that optimizes the performance, which is a model that learns from the convolution neural network of the multi-layer perceptron structure by combining structured and unstructured information, this model uses 'heterogeneous information integration', 'unstructured information vector conversion', 'multi-layer perceptron design', and evaluate the performance of each architecture, and confirm the proposed model based on the results. In addition, the target variables for predicting customer behavior are defined as six binary classification problems: re-purchaser, churn, frequent shopper, frequent refund shopper, high amount shopper, high discount shopper. In order to verify the usefulness of the proposed model, we conducted experiments using actual data of domestic specific online shopping company. This experiment uses actual transactions, customers, and VOC data of specific online shopping company in Korea. Data extraction criteria are defined for 47,947 customers who registered at least one VOC in January 2011 (1 month). The customer profiles of these customers, as well as a total of 19 months of trading data from September 2010 to March 2012, and VOCs posted for a month are used. The experiment of this study is divided into two stages. In the first step, we evaluate three architectures that affect the performance of the proposed model and select optimal parameters. We evaluate the performance with the proposed model. Experimental results show that the proposed model, which combines both structured and unstructured information, is superior compared to NBC(Naïve Bayes classification), SVM(Support vector machine), and ANN(Artificial neural network). Therefore, it is significant that the use of unstructured information contributes to predict customer behavior, and that CNN can be applied to solve business problems as well as image recognition and natural language processing problems. It can be confirmed through experiments that CNN is more effective in understanding and interpreting the meaning of context in text VOC data. And it is significant that the empirical research based on the actual data of the e-commerce company can extract very meaningful information from the VOC data written in the text format directly by the customer in the prediction of the customer behavior. Finally, through various experiments, it is possible to say that the proposed model provides useful information for the future research related to the parameter selection and its performance.

A Study on Appropriate Military Strength of Unified Korea (Focused on relative balance strategy and conflict scenario) (통일 한국의 적정 군사력에 관한 연구 - 분쟁 시나리오와 상대적 균형전략을 중심으로 -)

  • Hong, Bong-Gi
    • Journal of National Security and Military Science
    • /
    • s.13
    • /
    • pp.687-738
    • /
    • 2016
  • To prepare for the complicated international relationship regarding Korean Peninsula after reunification, this thesis started off with the awareness that Unified Korea should build its international posture and national security at an early stage by determining its appropriate military strength for independent defense and military strategies that Unified Korea should aim. The main theme of this thesis is 'The research on appropriate military strength of the Unified Korean military'. To derive appropriate military strength of Unified Korea, this research focuses on conflict scenario and relative balance strategy based on potential threats posed by neighboring countries, and this is the part that differentiates this research from other researches. First of all, the main objective of the research is to decide appropriate military strength for Unified Korea to secure defense sufficiency. For this, this research will decide efficient military strategy that Unified Korea should aim. Than by presuming the most possible military conflict scenario, this research will judge the most appropriate military strength for Unified Korea to overcome the dispute. Second, after deciding appropriate military strength, this research will suggest how to operate presumed military strength in each armed force. The result of this thesis is as in the following. First, Unified Korea should aim 'relative balance strategy'. 'Relative balance strategy' is a military strategy which Unified Korea can independently secure defense sufficiency by maintaining relative balance when conflicts occur between neighboring countries. This strategy deters conflicts in advance by relative balance of power in certain time and place. Even if conflict occurs inevitably, this strategy secures initiative. Second, when analyzing neighboring countries interest and strategic environment after unification, the possibility of all-out war will be low in the Korean Peninsula because no other nation wants the Korean Peninsula to be subordinated to one single country. Therefore appropriate military strength of the Unified Korean military would be enough when Unified Korea can achieve relative balance in regional war or limited war. Third, Northeast Asia is a region where economic power and military strength is concentrated. Despite increasing mutual cooperation in the region, conflicts and competition to expand each countries influence is inherent. Japan is constantly enhancing their military strength as they aim for normal statehood. China is modernizing their military strength as they aspire to become global central nation. Russia is also enhancing their military strength in order to hold on to their past glory of Soviet Union as a world power. As a result, both in quality and quantity, the gap between military strength of Unified Korea and each neighboring countries is enlarged at an alarming rate. Especially in the field of air-sea power, arms race is occurring between each nation. Therefore Unified Korea should be equipped with appropriate military strength in order to achieve relative balance with each threats posed by neighboring countries. Fourth, the most possible conflicts between Unified Korea and neighboring countries could be summarized into four, which are Dokdo territorial dispute with Japan, Leodo jurisdictional dispute with China, territorial dispute concerning northern part of the Korea Peninsula with China and disputes regarding marine resources and sea routes with Russia. Based on those conflict scenarios, appropriate military strength for Unified Korea is as in the following. When conflict occurs with Japan regarding Dokdo, Japan is expected to put JMSDF Escort Flotilla 3, one out of four of its Japan Maritime Self-Defense Force Escort Fleet, which is based in Maizuru and JMSDF Maizuru District. To counterbalance this military strength, Unified Korea needs one task fleet, comprised with three task flotilla. In case of jurisdictional conflict with China concerning Leodo, China is expected to dispatch its North Sea fleet, one out of three of its naval fleet, which is in charge of the Yellow Sea. To response to this military action, Unified Korea needs one task fleet, comprised with three task flotilla. In case of territorial dispute concerning northern part of the Korean Peninsula with China, it is estimated that out of seven Military Region troops, China will dispatch two Military Region troops, including three Army Groups from Shenyang Military Region, where it faces boarder with the Korean Peninsula. To handle with this military strength, Unified Korea needs six corps size ground force strength, including three corps of ground forces, two operational reserve corps(maneuver corps), and one strategic reserve corps(maneuver corps). When conflict occurs with Russia regarding marine resources and sea routes, Russia is expected to send a warfare group of a size that includes two destroyers, which is part of the Pacific Fleet. In order to balance this strength, Unified Korea naval power requires one warfare group including two destroyers. Fifth, management direction for the Unified Korean military is as in the following. Regarding the ground force management, it would be most efficient to deploy troops in the border area with china for regional and counter-amphibious defense. For the defense except the border line with china, the most efficient form of force management would be maintaining strategic reserve corps. The naval force should achieve relative balance with neighboring countries when there is maritime dispute and build 'task fleet' which can independently handle long-range maritime mission. Of the three 'task fleet', one task fleet should be deployed at Jeju base to prepare for Dokdo territorial dispute and Leodo jurisdictional dispute. Also in case of regional conflict with china, one task fleet should be positioned at Yellow Sea and for regional conflict with Japan and Russia, one task fleet should be deployed at East Sea. Realistically, Unified Korea cannot possess an air force equal to neither Japan nor China in quantity. Therefore, although Unified Korea's air force might be inferior in quantity, they should possess the systematic level which Japan or China has. For this Unified Korea should build air base in island areas like Jeju Island or Ullenong Island to increase combat radius. Also to block off infiltration of enemy attack plane, air force needs to build and manage air bases near coastal areas. For landing operation forces, Marine Corps should be managed in the size of two divisions. For island defense force, which is in charge of Jeju Island, Ulleung Island, Dokdo Island and five northwestern boarder island defenses, it should be in the size of one brigade. Also for standing international peace keeping operation, it requires one brigade. Therefore Marine Corps should be organized into three divisions. The result of the research yields a few policy implications when building appropriate military strength for Unified Korea. First, Unified Korea requires lower number of ground troops compared to that of current ROK(Republic of Korea) force. Second, air-sea forces should be drastically reinforced. Third, appropriate military strength of the Unified Korean military should be based on current ROK military system. Forth, building appropriate military strength for Unified Korea should start from today, not after reunification. Because of this, South Korea should build a military power that can simultaneously prepare for current North Korea's provocations and future threats from neighboring countries after reunification. The core of this research is to decide appropriate military strength for Unified Korea to realize relative balance that will ensure defense sufficiency from neighboring countries threats. In other words, this research should precisely be aware of threats posed by neighboring countries and decide minimum level of military strength that could realize relative balance in conflict situation. Moreover this research will show the path for building appropriate military strength in each armed force.

  • PDF

The Late Quaternary Environmental Change in Youngyang Basin, South Eastern Part of Korea Penninsula (第四紀 後期 英陽盆地의 自然環境變化)

  • Yoon, Soon-Ock;Jo, Wha-Ryong
    • Journal of the Korean Geographical Society
    • /
    • v.31 no.3
    • /
    • pp.447-468
    • /
    • 1996
  • The peat layer was deposited on the abandoned channel of incised meander of River Banbyuncheon with 7 meter thickness on Youngyang basin. The late Quaternary environmental change on the study area was discussed based on pollen anaalysis and radiocarbon-dating from this peat. The swamp which was caused to sediment the peat, was produced by which the fan debris from the adjacent slope damed the waterflow on the abandoned channel. The peat layer contains continuous vegetational history from 60,000y.B.P. to Recent. The peat deposit was divided into two layers by the organic thin sand horizon, which was sedimented at one time and made unconformity between the lower decomposed compact peat layers and the upper fresh fiberous peat layer. As the result of the pollen analysis, both peat layers from the two boring sites, Profile YY1 and Profile YY2 were divided into five Pollenzones(Pollenzone I, II, III, IV and V) and 12 Subzones which were mainly corresponded by the AP (Arboreal Pollen)-Dominance. The two profiles have some differences on the sedimentary facies and on the pollen composition as well. Therefore these were in common with the Pollenone III, however the Pollenzone I and II existed only on the Profile YY1 and the Pollenzone IV and V existed only on the Profile YY2. The lower layer containing the Pollenzone I, II and III revealed vegetational records of Pleistocene, which was characterized as tundra-like landscape and thin forested landscapes. It represented the NAP (Non-Arboreal Pollen)-period with a plenty of Artemisia sp., Sanguisorba sp., Umbelliferae, Gramineae and Cyperaceae. However a relatively high proportion of the boreal trees with Picea sp., Pinus sp. and Betula sp. as AP was observed in the lower layer. The upper layer contained the Pollenzone IVb and V and vegetational history in Holocene which was characterized by thick forested landscape with rich tree pollen. It represented AP-period with plenty of Pinus sp. and Quercus sp. as temperate trees. The temperature fluctuation supposed from the vegetational records is as follows; the Pollenzone I(Betula-Dominance, about 57,000y.B.P.) represents relatively cold period. The Pollenzone II(EMW-Domi-nance, 57,000-43,000y.B.P.)represents relatively warm period. This period is supposed to be Interstadial, the transi-tional stage from Alt- to Mittel Wurm. The Pollenzone III(Butula-, Pinus- and Picea-Dominace in turns, 43,000-15,000y.B.P.) reproesents cold period which had been built from Mittel-to Jung Wurm. Especially the Subzone IIId represents the coldest period throughout the Pollenzone III. It is corresponds to Wurm Glacial Maximu. It is supposed that the mean temperature in July of this period was coller about 10${^\circ}$C than present. The Pollenzone IV and V represent the vegetational history of Holocene. Tilia, Quercus and Pinus were dominant in turns during this period. Subzone IVb and Pollenzone I and II at east coastal plain of Korean penninsula reported by JO(1979).

  • PDF

A Comparative Study of the Standard Uptake Values of the PET Reconstruction Methods; Using Contrast Enhanced CT and Non Contrast Enhanced CT (PET/CT 영상에서 조영제를 사용하지 않은 CT와 조영제를 사용한 CT를 이용한 감쇠보정에 따른 표준화섭취계수의 비교)

  • Lee, Seung-Jae;Park, Hoon-Hee;Ahn, Sha-Ron;Oh, Shin-Hyun;NamKoong, Heuk;Lim, Han-Sang;Kim, Jae-Sam;Lee, Chang-Ho
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.12 no.3
    • /
    • pp.235-240
    • /
    • 2008
  • Purpose: At the beginning of PET/CT, Computed Tomography was mainly used only for Attenuation Correction (AC), but as the performance of the CT have been increase, it could give improved diagnostic information with Contrast Media. But it was controversial that Contrast Media could affect AC on PET/CT scan. Some submitted thesis' show that Contrast Media could overestimate when it is for AC data processing. On the contrary, the opinion that Contrast Media could be possible to affect the alteration of SUV because of the overestimated AC. But it does not have a definite effect on the diagnosis. Thus, the affection of Contrast Media on AC was investigated in this study. Materials and Methods: Patient inclusion criteria required a history of a malignancy and performance of an integrated PET/CT scan and contrast- enhanced CT scan within a 1-day period. Thirty oncologic patients who had PET/CT scan from December 2007 to June 2008 underwent staging evaluation and met these criteria. All patients fasted for at least 6 hr before the IV injection of approximately 5.6 MBq/kg (0.15 mCi/kg) of $^{18}F$-FDG and were scanned about 60 min after injection. All patients had a whole body PET/CT performed without IV contrast media followed by a contrast-enhanced CT on the Discovery STe PET/CT scanner. CT data were used for AC and PET images came out after AC. The ROIs drew and measured SUV. A paired t-test of these results was performed to assess the significance of the difference between the SUV obtained from the two attenuation corrected PET images. Results: The mean and maximum Standardized Uptake Values (SUV) for different regions averaged over all Patients. Comparing before using Contrast Media and after using, Most of ROIs have the increased SUV when it did Contrast Enhanced CT compare to Non-Contrast enhanced CT. All regions have increased SUV and also their p value was under 0.05 except the mean SUV of the Heart region. Conclusion: In this regard, the effect on SUV measurements that occurs when a contrast-enhanced CT is used for attenuation correction could have significant clinical ramifications. But some submitted thesis insisted that the percentage change in SUV that can determine or modify clinical management of oncology patients is small. Because there was not much difference that could be discovered by interpreter. But obviously the numerical change was occurred and on the stage finding primary region, small change would be base line, such as the region of liver which has greater change than the other regions needs more attention.

  • PDF

Retail Product Development and Brand Management Collaboration between Industry and University Student Teams (산업여대학학생단대지간적령수산품개발화품패관리협작(产业与大学学生团队之间的零售产品开发和品牌管理协作))

  • Carroll, Katherine Emma
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.3
    • /
    • pp.239-248
    • /
    • 2010
  • This paper describes a collaborative project between academia and industry which focused on improving the marketing and product development strategies for two private label apparel brands of a large regional department store chain in the southeastern United States. The goal of the project was to revitalize product lines of the two brands by incorporating student ideas for new solutions, thereby giving the students practical experience with a real-life industry situation. There were a number of key players involved in the project. A privately-owned department store chain based in the southeastern United States which was seeking an academic partner had recognized a need to update two existing private label brands. They targeted middle-aged consumers looking for casual, moderately priced merchandise. The company was seeking to change direction with both packaging and presentation, and possibly product design. The branding and product development divisions of the company contacted professors in an academic department of a large southeastern state university. Two of the professors agreed that the task would be a good fit for their classes - one was a junior-level Intermediate Brand Management class; the other was a senior-level Fashion Product Development class. The professors felt that by working collaboratively on the project, students would be exposed to a real world scenario, within the security of an academic learning environment. Collaboration within an interdisciplinary team has the advantage of providing experiences and resources beyond the capabilities of a single student and adds "brainpower" to problem-solving processes (Lowman 2000). This goal of improving the capabilities of students directed the instructors in each class to form interdisciplinary teams between the Branding and Product Development classes. In addition, many universities are employing industry partnerships in research and teaching, where collaboration within temporal (semester) and physical (classroom/lab) constraints help to increase students' knowledge and experience of a real-world situation. At the University of Tennessee, the Center of Industrial Services and UT-Knoxville's College of Engineering worked with a company to develop design improvements in its U.S. operations. In this study, Because should be lower case b with a private label retail brand, Wickett, Gaskill and Damhorst's (1999) revised Retail Apparel Product Development Model was used by the product development and brand management teams. This framework was chosen because it addresses apparel product development from the concept to the retail stage. Two classes were involved in this project: a junior level Brand Management class and a senior level Fashion Product Development class. Seven teams were formed which included four students from Brand Management and two students from Product Development. The classes were taught the same semester, but not at the same time. At the beginning of the semester, each class was introduced to the industry partner and given the problem. Half the teams were assigned to the men's brand and half to the women's brand. The teams were responsible for devising approaches to the problem, formulating a timeline for their work, staying in touch with industry representatives and making sure that each member of the team contributed in a positive way. The objective for the teams was to plan, develop, and present a product line using merchandising processes (following the Wickett, Gaskill and Damhorst model) and develop new branding strategies for the proposed lines. The teams performed trend, color, fabrication and target market research; developed sketches for a line; edited the sketches and presented their line plans; wrote specifications; fitted prototypes on fit models, and developed final production samples for presentation to industry. The branding students developed a SWOT analysis, a Brand Measurement report, a mind-map for the brands and a fully integrated Marketing Report which was presented alongside the ideas for the new lines. In future if the opportunity arises to work in this collaborative way with an existing company who wishes to look both at branding and product development strategies, classes will be scheduled at the same time so that students have more time to meet and discuss timelines and assigned tasks. As it was, student groups had to meet outside of each class time and this proved to be a challenging though not uncommon part of teamwork (Pfaff and Huddleston, 2003). Although the logistics of this exercise were time-consuming to set up and administer, professors felt that the benefits to students were multiple. The most important benefit, according to student feedback from both classes, was the opportunity to work with industry professionals, follow their process, and see the results of their work evaluated by the people who made the decisions at the company level. Faculty members were grateful to have a "real-world" case to work with in the classroom to provide focus. Creative ideas and strategies were traded as plans were made, extending and strengthening the departmental links be tween the branding and product development areas. By working not only with students coming from a different knowledge base, but also having to keep in contact with the industry partner and follow the framework and timeline of industry practice, student teams were challenged to produce excellent and innovative work under new circumstances. Working on the product development and branding for "real-life" brands that are struggling gave students an opportunity to see how closely their coursework ties in with the real-world and how creativity, collaboration and flexibility are necessary components of both the design and business aspects of company operations. Industry personnel were impressed by (a) the level and depth of knowledge and execution in the student projects, and (b) the creativity of new ideas for the brands.

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.