Objectives: This paper is intended to illustrate and to discuss the organization and functioning of community resident groups (CRGs) in a community-based participatory health promotion program for healthy aging. Methods: CRGs were convened in 12 government-subsidized apartment communities for low-income seniors in Pennsylvania, U.S.A., to promote healthy aging. Researchers facilitated CRG meetings following a 6-step process of community empowerment and utilizing a social ecological model for assessment and planning. Almost 200 project-related documents were qualitatively analyzed using matrix analysis principles such as cross-classification of multiple dimensions to identify patterns in the data and matrix building for displaying such patterns. Results: CRGs were venues at which apartment building residents could interact, discuss health priorities, and become change agents in their building. CRG members' community health priorities were about their daily living, including building conditions, poor access to fresh food, and unhealthy resident relations. Specific patterns arose in analysis indicating that leadership withing the CRGs, consistency of meetings and participants' attendance, and ability to link health concerns to daily experience impacted the CRGs' capability to identify and accomplish their goals. Conclusion: Community health issues and solutions to those issues identified by CRGs were unique to community contexts and interests. Consistent participation by community members, a consistent pattern of group activities such as monthly meetings, and having established leadership to manage CRG activities were prominent characteristics of community group functioning.
Park, Seung-Hye;Jeong, Young-Su;Kim, Won-Ho;Kim, Geun-Joong;Hur, Byung-Ki
KSBB Journal
/
v.21
no.2
/
pp.144-150
/
2006
The exploitation of metagenome, the access to the natural extant of enormous potential resources, is the way for elucidating the functions of organism in environmental communities, for genomic analyses of uncultured microorganism, and also for the recovery of entirely novel natural products from microbial communities. The major breakthrough in metagenomics is opened by the construction of libraries with total DNAs directly isolated from environmental samples and screening of these libraries by activity and sequence-based approaches. Screening with activity-based approach is presumed as a plausible route for finding new catabolic genes under designed conditions without any prior sequence information. The main limitation of these approaches, however, is the very low positive hits in a single round of screening because transcription, translation and appropriate folding are not always possible in E. coli, a typical surrogate host. Thus, to obtain information about these obstacles, we studied the genetic organization of individual URF's(unidentified open reading frame from metagenome sequenced and deposited in GenBank), especially on the expression factors such as codon usage, promoter region and ribosome binding site(rbs), based on DNA sequence analyses using bioinformatics tools. And then we also investigated the above-mentioned properties for 4100 ORFs(Open Reading Frames) of E. coli K-12 generally used as a host cell for the screening of noble genes from metagenome. Finally, we analyzed the differences between the properties of URFs of metagenome and ORFs of E. coli. Information derived from these comparative metagenomic analyses can provide some specific features or environmental blueprint available to screen a novel biocatalyst efficiently.
Nagoya Protocol designed to establish criteria about material trade of biological genetic resources(ABS) was adopted in the 10th conference of the Parties to the Convention on Biological Diversity. In the course of the negotiation for adoption of the protocol, there was conflict between developed and developing countries, resource-rich and poor countries, and multinational corporations and environmentalists. This study investigates conflict process, subjects, issues and major factors in the negotiation case, and analyzes the negotiation by using the Conflict Management Process. To develope conflict management strategies for various conflict cases, we examine previous studies and analyze the intersectional conflict factors of this case and general cases, such as Fundamental side, Resource-allocation side, and Communication/Information-sharing side. These analyses of conflict prevention/resolution of the ABS negotiation show the importance of building mutual trust among stakeholders, enhancing mediator training, and constructing appropriate legislative/policy systems for successful conflict management.
Journal of the Korean Society of Marine Environment & Safety
/
v.25
no.7
/
pp.898-905
/
2019
As the positive feedback between the absorption of chromophoric dissolved organic matter (CDOM) and acceleration of ice melt can impact the aquatic biota and dynamic heat budget, long-term monitoring of the CDOM variation in the polar ocean is necessary. However, the monitoring of CDOM is not easy because of harsh weather and difficult access, especially in the Antarctic Ocean. Therefore, the purpose of this study was to find a suitable long-term monitoring site for CDOM variation; we selected Maxwell Bay and Marian Cove at Sejong Base and horizontal and vertical distributions of CDOM were measured. After a 72 hr time-series measurement test of the CDOM variation at Sejong Dock and Sejong Cape in Maxwell Bay, Sejong Dock was selected, as it does not haveland discharge effects. The seasonal variation of CDOM was evident and the average CDOM concentration of Maxwell Bay was comparable with the adjacent sea. The CDOM at Sejong Dock from February to November 2010 was the highest in the fall and winter and the lowest during spring and summer. Thus, based on our one-year CDOM data, we suggest that Sejong Dock in Maxwell Bay is suitable for long-term monitoring of CDOM as an indicator of photochemical and biological environmental change and an important factor in determining the heating budget in the Antarctic Ocean.
Inter-Korean exchanges using civil aviation has been continuing since the temporary direct air route from Pyongyang to Seoul was opened on June 15th, 2000 for the summit meeting with North Korea. In this paper, I analyze the North Korea Aviation law by focusing on the differences with South Korean Aviation law. While South Korean Aviation law is modeled on the Pandect system, North Korean Aviation law can only be understood by looking at North Korea's socialist ideology. Therefore, North Korean Aviation law has some expressions which can hardly be understood. With respect to the source of aviation law, both South and North Korea are in compliance with the Convention on International Civil Aviation (Signed at Chicago, on 7 December, 1944). Thus, they established the aviation law based on the standards and recommendations provided by ICAO. For this reason, they have similar legal systems and composition. From this analysis, a few differences are also derived regarding aircraft ownership, airports, airline liability, aircraft accident investigation organization and aviation insurance. It is important to note that this paper has a particular limitation. Not only is the information about North Korean law very limited, but North Korea also does not provide easy access to its national legal codes. This paper describes the legal comparison of South and North Korea by focusing on the formation and framework of North Korean aviation law.
Journal of the Korea Institute of Information Security & Cryptology
/
v.24
no.5
/
pp.911-918
/
2014
Over the past few years, security breaches have been consistently reported around the world. Especially, people's personal information are at risk of being breached as the firms gather and utilize the information for their marketing purposes. As an effort to revamp their data infrastructures, companies have rebuilt their system that almost every data, including the personal information, are stored within the digital database. However, this migration provides easier access to the database but it has also increased the system vulnerability. As the data can be easily exposed to the unauthorized personnel both intentionally and unintentionally, it is necessary for companies to establish a set of security protocol and operate the personal information protection system. There are two major certified security system in South Korea; PIMS from KISA and PIPL from NIA. This paper analyzes the preferences of SMEs and small business using conjoint attributes of PIMS and PIPL. The study shows that the business owners take post certification rewards as the most important factor. It also shows that the attributes that have the highest utility rates are the following; 1) KISA certification, 2) 79 points of protection counter measurements, 3) 28 items of life cycle, 3) 50 percent discount on certification fee, and 4) Reduced amount of fine for personal information leakage incident.
A mobile ad hoc network (MANET) is a collection of mobile nodes without any fixed infrastructure or my form of centralized administration such as access points and base stations. The ad hoc on-demand distance vector routing (AODV) protocol is an on-demand routing protocol for MANETs, which is one of the Internet-Drafts submitted to the Internet engineering task force (IETF) MANET working group. This paper proposes a new multipath routing protocol called maximally disjoint multipath AODV (MDAODV), which exploits maximally node- and link-disjoint paths and outperforms the conventional multipath protocol based on AODV as well as the basic AODV protocol. The key idea is to extend only route request (RREQ) message by adding source routing information and to make the destination node select two paths from multiple RREQs received for a predetermined time period. Compared to the conventional multipath routing protocol, the proposed MDAODV provides more reliable and robust routing paths and higher performance. It also makes the destination node determine the maximally node- and link-disjoint paths, reducing the overhead incurred at intermediate nodes. Our extensive simulation study shows that the proposed MDAODV outperforms the conventional multipath routing protocol based on AODV in terms of packet delivery ratio and average end-to-end delay, and reduces routing overhead.
The Journal of Korean Institute of Communications and Information Sciences
/
v.30
no.2B
/
pp.1-10
/
2005
TCP/IP protocols have been implemented in software program running on CPU in end systems. As the increased demand of fast protocol processing, it is required to implement the protocols in hardware, and Host Interface is responsible for communication between external CPU and the hardware blocks of TCP/IP implementation. The Host Interface follows AMBA AHB specification for the communication with external world. For control flow, the Host Interface behaves as a slave of AMBA AHB. Using internal Command/status Registers, the Host Interface receives commands from CPU and transfers hardware status and header information to CPU. On the other hand, the Host Interface behaves as a master for data flow. Data flow has two directions, Receive Flow and Transmit Flow. In Receive Flow, using internal RxFIFO, the Host Interface reads data from UDP FIFO or TCP buffer and transfers data to external RAM for CPU to read. For Transmit Flow, the Host Interface reads data from external RAM and transfers data to UDP buffer or TCP buffer through internal TxFIFO. TCP/IP hardware blocks generate packets using the data and transmit. Buffer Descriptor is one of the Command/Status Registers, and the information stored in Buffer Descriptor is used for external RAM access. Several testcases are designed to verify TCP/IP functions. The Host Interface is synthesized using the 0.18 micron technology, and it results in 173 K gates including the Command/status Registers and internal FIFOs.
Journal of the Korean association of regional geographers
/
v.6
no.2
/
pp.41-55
/
2000
This study attempts to explore the relationships of Korean Immigrants with New Zealand agricultural environment, their choice of agricultural occupations and adjustments. New Zealand, based on agricultural products in its economy, was one of the richest countries during the 1950s and 1960s because of its dependency in market to United Kingdom Since 1971 when U.K joined the European Community, its economy was no more strong enough to support the living conditions in the 1950's and 1960's. Therefore, New Zealand Government initiated some programme to assist its farmers. Such supports resulted in severe financial problems of the country. Thus, reforms removing almost all support programmes has been proceeded after 1984. Though horticulture is still lower in New Zealand's exports of agricultural products, its growth has been remarkable. This was results due to the contribution of smallholdings, along with migration from city to urban fringe occurred during the 1970's and 1980's. In the 1900's it has been known that horticulture in the smallholding takes a hard works for old ages, who required further partitions their lands. Meanwhile, the rapid growth of Korean immigrants to New Zealand in the 1900's has been occurred, and this study shows one or two years periods in the search of job in case of Korean farmers. The most attractiveness in agriculture for them was that it provides simultaneously both jobs and housing. Korean farmers' land use succeeds previous owner's land use, and concentrates on green house agriculture cultivating mainly tomato and cucumber. The size of land is quite small and not comparable to New Zealand's average size, but a satisfactory levels are rather high and successful in evaluating themselves concerning current occupations, even though they have rarely experienced about agriculture before. Korean farmers attributes a high satisfaction to agricultural techniques learned from previous owners and a related support authority. The results of this study showed that Korean farmers has been absorbed into New Zealand economy rather than Korean economy. Finally, it has been pointed that the growth of Korean farmers and agriculture in New Zealand is the results of complex factors such as occupations, children's educational opportunity, and the access to the city.
The most important issue the online shopping mall for clothes is facing in the rapid growth of the online shopping mali is the high rate of the return of the goods alter purchase. The high rate of the return leads to the dissatisfaction md lack of trust from the consumers in the online shopping mall for clothes, which in turn leads to the bleak prospect for the online shopping mall for clothes as a result of the consumers' dissatisfaction. Although a type of online shopping mall using the cyber-fitting technology has emerged recently, it has succeeded only in provoking a visual interest, for it is also not satisfying the demand of the consumers by falling short in providing information. Thus, this research seeks for the resolutions of the problems related to the user-oriented online shopping. First of the resolutions is the development of a new prototype which the consumers can easily access; second is the visualization of the information using the 3D virtual-reality of he prototype through interface, which will help the consumers to make more accurate judgments. In other words, this study seeks to provide a type of prototype of an online shopping mall that meets the demand of the consumers using the 3D avatars, unlike the unilateral and conventional malls out there.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.