Purpose - A lot of preceeding studies have focused on the pains that might be felt in spending money, that is an important role in getting psychological safety. Money and social resources can be all for consumers, and they are likely to form a substituting relationship with one another. Being motivated by the idea that spending money for others can come with joy if one's objective is accomplished by social support, this paper aimed to explore the mediating role of the perceived money importance and gratitude in the relationship between social support and pleasure in spending for other-gift. Research Design, Data, and Methodology - In this empirical study, the experimental group is expected to receive social support while the control group is composed of those who are usually indulged in reminiscences of their sweethearts. From the college students, 160 experiment participants were selected and 80 participants of them were assigned to control group as well as to experimental group respectively at random. Empirical study for each of the two groups was performed respectively by means of questionnaire survey. Experimental group data and control group data were combined together to be used for testing hypotheses. Linear structural equation model in Amos was used to verify the hypotheses, and Bootstrap was also used to examine whether there were the mediating roles of the perceived money importance and gratitude or not. Results - From the empirical study, following conclusions could be drawn: First, social support of others makes one perceive the importance of money less; Second, social support of others makes one perceive gratitude to others; Third, less perceived importance of money and gratitude to others can make one feel pleasure in spending for other-gift; and Fourth, less perceived importance of money and gratitude to others can partially mediate the effect of social support from others on the pleasure in spending for other-gift. Conclusions - The outcomes of this study might offer theoretic and managerial implications as follow: Even though many hitherto studies have asserted that spending money usually comes with pains, this study discovered that social support might reduce perceived the importance of money but make others feel gratitude and, thus, one would feel joy in spending money to buy gift for others, and made a contribution to the progress of the theory of pleasure in spending for other-gift. This paper also made contributions toward the development of emotion marketing theory by showing that the effect of social support on the pleasure in spending for other-gift could be partially mediated by the perceived the importance of money and gratitude to others. Based on the above conclusions, it may be affirmed that marketers should help consumers perceive the importance of money less, and help feel gratitude to others by pointing up the support of others to consumers in an attempt to accelerate spending for other-gift.
KIPS Transactions on Computer and Communication Systems
/
v.5
no.4
/
pp.79-86
/
2016
About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.15
no.2
/
pp.36-49
/
2016
A subway system is one of the major transportation modes at a metropolitan area. When it meets the other lines, the metro station, so-called transferring station, is usually threatened by severe pedestrian congestion and safety issue of transit users including the transportation vulnerable. Although transportation planners forecast travel demand at the beginning, it is not easy to predict pedestrian flows precisely for a long term if land use plans have dramatically changed. Due to expensive costs, structural extension of metro stations is limited. Therefore, it requires efficient and technical improvements as meeting the demand of pedestrian and physical characteristics. In this study, the core mechanism of pedestrian movement-based simulation model was introduced and evacuation scenarios were analyzed with the developed model. As a result, the multiple optimal routes for unexpected events at the solid space of the multiple stories are easily searched through the simulator and in the case of Sadang Station, travel time can be reduced by 60% when the evacuation information and intuitive design are provided.
Park, Joonam;Jin, Dahee;Kim, Dohwan;Bae, Kyung Taek;Lee, Kang Taek;Lee, Yong Min
Journal of the Korean Electrochemical Society
/
v.22
no.4
/
pp.139-147
/
2019
Lithium-ion battery (LiB) with high energy density and efficiency has been utilized for the electric vehicle (EV) and energy storage system (ESS) as well as portable devices. However, as explosion accidents have frequently happened till lately, all-solid-state lithium secondary battery (ALSB) began to get in a spotlight because it can secure a very high safety and energy density by substituting flammable organic liquid electrolyte to nonflammable inorganic solid electrolyte. In spite of ALSB's certain merits, it has shown much poorer performance of cells than one of LiB due to some challenges, which have been small or never dealt with in the LiB system. Hence, although plenty of studies made progress to solve them, an approach about design of all-solid-state electrode (ASSE) has been limited on account of difficulty of ALSB's experiments. That is why the virtual 3D structure of an all-solid-state electrode has to be built and used for the prediction of cell performance. In this study, we elucidate how to form the 3D ASSE structure and what to be needed for the simulation of characteristics on ALSB. Furthermore, the ultimate orientation of 3D modeling and simulation for the study of ALSB are briefly suggested.
International Journal of Naval Architecture and Ocean Engineering
/
v.10
no.2
/
pp.129-140
/
2018
A residual stress generated in the steel structure is broadly categorized into initial residual stress during manufacturing steel material, welding residual stress caused by welding, and heat treatment residual stress by heat treatment. Initial residual stresses induced during the manufacturing process is combined with welding residual stress or heat treatment residual stress, and remained as a final residual stress. Because such final residual stress affects the safety and strength of the structure, it is of utmost importance to measure or predict the magnitude of residual stress, and to apply this point on the design of the structure. In this study, the initial residual stress of steel structures having thicknesses of 25 mm and 70 mm during manufacturing was measured in order to investigate initial residual stress (hereinafter, referred to as initial stress). In addition, thermal elastic plastic FEM analysis was performed with this initial condition, and the effect of initial stress on the welding residual stress was investigated. Further, the reliability of the FE analysis result, considering the initial stress and welding residual stress for the steel structures having two thicknesses, was validated by comparing it with the measured results. In the vicinity of the weld joint, the initial stress is released and finally controlled by the weld residual stress. On the other hand, the farther away from the weld joint, the greater the influence of the initial stress. The range in which the initial stress affects the weld residual stress was not changed by the initial stress. However, in the region where the initial stress occurs in the compressive stress, the magnitude of the weld residual compressive stress varies with the compression or tension of the initial stress. The effect of initial stress on the maximum compression residual stress was far larger when initial stress was considered in case of a thickness of 25 mm with a value of 180 MPa, while in case of thickness at 70 mm, it was 200 MPa. The increase in compressive residual stress is almost the same as the initial stress. However, if initial stress was tensile, there was no significant change in the maximum compression residual stress.
What is particularly noteworthy from Korean and foreign railway tunnel disaster prevention standards is that for the sake of rapid evacuation, more stringent standards for provision of evacuation passages, which require high cost, are being applied. Korean standards stipulate that passage installation should be determined in accordance with the level of risk through a QRA analysis of each tunnel with 1km or longer length. As, however, detailed application criteria as fire occurrence probability, fire occurrence scenario, size of fires and evaluation criteria for level of social risk are not available, additional costs may be incurred due to excessive design. Thus, standards of an appropriate level need to be established. With this backdrop, this study selects detailed application conditions of a reasonable and appropriate level through a study and analysis of relevant documents and analyzes the maximum length of tunnels to which the application of evacuation passages, or the application major evacuation promotion facilities, can be relaxed, together with a QRA analysis of model tunnels (for high speed rail) with different tunnel lengths. In addition, the QRA results on tunnels, including those on the Honam high-speed rail, and analysis results for the model tunnels, are compiled, ; the ultimate results are compared with Korean and other countries' standards related to evacuation promotion facilities, As a result, The appropriateness of application standards are reviewed. These results are expected to be utilized as basic material for establishing a reasonable disaster prevention plan that will consider safety and economies.
The alcohol fermentation of apple juice was optimized as a preliminary study for the production of natural apple cider vinegar. To gain an optimal fermentation yield, a central composite design was used to investigate the effects of the independent variables [initial Brix (12/14/16/18/20, $X_1$), fermentation time(48/54/60/66/72h, $X_2$), and fermentation temperature(24/26/28/30/$32^{\circ}C$, $X_3$)] on the dependent variables (alcohol content, reducing sugar, Brix, acidity). The alcohol content was 3.4-6.4%, the reducing sugar was 1.93-6.24%, and the Brix was $6.1-13.8^{\circ}$. The alcohol content was mainly affected by the fermentation temperature and increased along with the fermentation time and temperature. The amount of the reducing sugar was significantly affected by the initial Brix and fermentation temperature. The optimal conditions for the alcohol content were found to be 15.22 initial Brix, 64.97 h fermentation time, and $31.56^{\circ}C$ temperature.
Journal of Korean Tunnelling and Underground Space Association
/
v.24
no.6
/
pp.525-538
/
2022
In Korea, safety accidents are continuously occurring due to the aging of underground facilities and lack of systematic management. Moreover, although the underground space is continuously being developed, the current status information is not clearly recorded and managed, so there is a limit to the systematic management of underground facilities. Therefore, this study developed an augmented reality-based system that can effectively maintain and manage underground facilities that are difficult to manage because they are located underground. In order to develop an augmented reality-based underground facility management system, three essential requirements, 'precise localization', 'use of BIM information', and 'ensure usability' were derived and reflected in the system. By utilizing Broadcast-RTK, the positional precision was secured to cm level, and the configuration and attribute information of the BIM was converted into the IFC format to construct a system that could be implemented in augmented reality. It developed an application that can optimize usability. Finally, through simulation, the configuration and attribute information of structures and mechanical systems constituting underground facilities were implemented in augmented reality. In addition, it was confirmed that the accurate and highly consistent augmented reality system works even in harsh environment (near high-rise building).
Flow blockage of the fuel assembly in the lead-based fast reactor (LFR) may produce critical local spots, which will result in cladding failure and threaten reactor safety. In this study, the flow blockage characteristics were analyzed with the sub-channel analysis method, and the circumferentially-varied method was employed for considering the non-uniform distribution of circumferential temperature. The developed sub-channel analysis code SACOS-PB was validated by a heat transfer experiment in a blocked 19-rod bundle cooled by lead-bismuth eutectic. The deviations between the predicted coolant temperature and experimental values are within ±5%, including small and large flow blockage scenarios. And the temperature distributions of the fuel rod could be better simulated by the circumferentially-varied method for the small blockage scenario. Based on the validated code, the analysis of blockage characteristics was conducted. It could be seen from the temperature and flow distributions that a large blockage accident is more destructive compared with a small one. The sensitivity analysis shows that the closer the blockage location is to the exit, the more dangerous the accident is. Similarly, a larger blockage length will lead to a more serious case. And a higher exit temperature will be generated resulting from a higher peak coolant temperature of the blocked region. This work could provide a reference for the future design and development of the LFR.
Due to rapidly increased urbanization, impervious area has been extended and concerns about urban flooding has been increased as well. A lot of effort has been made to restore the urban water circulation. Low Impact Development (LID) technology that consist of retention, infiltration, and evapotranspiration has begun to attract attention to simulate the hydrologic phenomenon before and after development. Many researches on the technique is being actively conducted. In this study, the effect on reducing runoff in urban catchment was analyzed and evaluated by applying LID techniques using SWMM and six scenarios. A SWMM-LID model was built for the Gasan 1 rainwater pumping station basin, and Green Roof and Permeable Pavement were selected as LID techniques to be applied. As a result, the reduction effect of the permeable pavement was larger than green roof. In the future, the results could be used to design a LID facility using the characteristics of the watershed, and other urban water resource factors such as river and groundwater levels that affect each other should be considered, so that the entire system can be considered.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.