• 제목/요약/키워드: Location Potential

검색결과 816건 처리시간 0.029초

Smart Store in Smart City: 소비자 감성기반 상권분석 시스템 개발 (Smart Store in Smart City: The Development of Smart Trade Area Analysis System Based on Consumer Sentiments)

  • 유인진;서봉군;박도형
    • 지능정보연구
    • /
    • 제24권1호
    • /
    • pp.25-52
    • /
    • 2018
  • 본 연구는 소비자들이 상권에 대하여 수행하는 웹 탐색 활동과 감성평가를 반영하는 데이터인 지역구 연관감성어휘를 기반으로 서울시 내 대형 상업 공간으로 정의할 수 있는 각 지역구 간의 연관 감성 네트워크에 대하여 소셜 네트워크 분석을 수행하였다. 나아가 도출한 소셜 네트워크 지표를 지역구 공공 데이터와 결합하여 보다 다각적 측면을 고려한 지역구 상권의 매출액에 영향을 미치는 요인들을 검증하였고 그 영향력의 변화 또한 확인해 보았다. 정적 데이터로 표현되는 공공 데이터만을 통해 구성된 모형으로도 높은 설명력을 가지는 것을 확인할 수 있었으나, 소셜 네트워크 분석 결과로 도출된 네트워크 지표와 결합된 모형에서는 그 설명력이 더욱 향상된 것이 확인되었다. 공공 데이터에 대한 회귀 분석 결과, 투입된 22개의 요인들 중 '골목 상권 수,' '1인당 거주면적,' '주거환경만족도,' '거래증감률,' '3년 이상 생존율'의 5개의 요인이 지역구 상권 매출액에 유의한 영향을 미치는 것이 확인되었다. 이후 공공 데이터와 네트워크 지표 결합 모형에서 투입된 지표들은 '에고 네트워크의 밀도,' '연결 중심성,' '근접 중심성,' '매개 중심성,' '아이겐벡터 중심성'이며, 이 중 '연결 중심성'과 '아이겐벡터 중심성'이 매출액에 유의한 영향을 미치며 모형 내에서 가장 높은 영향력을 보유한 것이 확인되었다. 본 연구는 각 상권이 소비자가 원하는 감성을 고려한 도시 전략 계획 수립과 이행의 실증적 근거로 활용될 수 있을 것이며, 상권에 진입하거나 재창업하는 자영업자나 잠재 창업자를 바탕으로 지역구 상권이 보유한 감성과 그 관계 구조를 고려한 상권 진입 방향성을 제공할 수 있을 것이다.

하저 지반특성 규명을 위한 전기비저항 탐사 (DC Resistivity method to image the underground structure beneath river or lake bottom)

  • 김정호;이명종;송윤호;조성준;이성곤;손정술
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 한국지구물리탐사학회 2002년도 정기총회 및 제4회 특별심포지움
    • /
    • pp.139-162
    • /
    • 2002
  • 수로는 약선대를 따라 형성되는 경우가 많으며, 특히 강을 따라 단층이 발달하는 경우가 많다. 교량과 같은 수상 구조물의 건설을 위하여 탐사의 필요성이 많았음에도 불구하고 육상과는 달리 수상 전기비저항 탐사가 활발하게 적용되지 못한 것은 현장탐사와 해석의 어려움 때문이었다고 볼 수 있다. 그러나 무엇보다도 중요한 것은 양질의 자료 획득이며, 양질의 자료 획득이 육상탐사보다 어려운 것은 영상화하고자 하는 지하구조가 물로 덮여 있다는 점에서 연유한다. 이 연구에서는 이와 같은 점에 중점을 두고 수치 모델링과 현장탐사 사례 분석을 통하여 수상 전기비저항 탐사 자료의 특성, 현장 탐사와 해석 방법에 대하여 논하였다. 수상 전기비저항 탐사는 전극이 물 표면에 혹은 물 바닥에 설치되어 있는가에 따라 탐사자료의 획득방법, 고려사항, 해석 방법이 달라지므로, 전극을 물 표면에 띄운 경우와 바닥에 설치한 경우로 나누어 논의를 전개하였다. 이를 통하여 하상 전기비저항 탐사는 수 층 하부 지반을 정확하게 영상화할 수 있음을 보였다. 또한 수상 전기비저항 탐사에서 전극을 물 바닥에 설치하는 것이 물 표면에 설치하는 것보다 훨씬 더 분해능이 높은 영상을 획득할 수 있으나, 육상탐사에 비하여 지하구조에 대한 민감도는 훨씬 낮고, 유동전위 등에 의하여 전기잡음이 높을 가능성이 높기 때문에 육상탐사보다 훨씬 높은 S/N 비를 갖는 현장 탐사자료의 획득이 필수적이며 가능한 한 높은 분해능을 갖는 전극배열을 선택하여야 하는 것으로 나타났다 전극을 물 바닥에 설치하는 방법은 고분해능 영상을 제공할 수 있기 때문에 지하의 정밀 영상을 획득하기 위한 정밀탐사에 적합하다. 이에 반해 물 표면에 전극을 띄워서 자료를 획득하는 방법은, 특히 이동하면 연속적으로 탐사하는 스트리머 전기비저항 탐사는 매우 빠른 시간에 넓은 지역을 탐사할 수 있기 때문에 개략탐사에 많은 활용이 기대된다.향상을 위해 좀더 적극적인 치료가 필요하다.과 TIMP-2의 발현의 정도는 차이가 있었으며, 각 장기의 특정한 세포에서만 발현이 되었다. TIMP-1의 경우 간과 신장에서는 방사선에 의해 발현이 증가되었으나 폐에서는 발현이 증가되지 않았다. TIMP-2의 경우 폐에서는 방사선에 의해 발현이 증가하였으나 간과 폐에서는 방사선에 의한 발현의 변화는 불규칙적이었다. 방사선 조사 후 경과 시간과 방사선량에 따른 발현의 변화도 일정하지 않았다.EX> 발현의 감소가 관찰되어, Captopril이 조기 폐손상을 억제하는 방사선보호제로서 기전의 일부에 $TNF\alpha$$TGF\beta1$이 관여함을 확인할 수 있었다.주의 정책으로 우리 민족의 정서와 문화를 보존하는 일에 등한시하여 왔다. 이 때문에 우리 민족 고유의 뿌리를 점차 잃어가고 있다. 이러한 시점에서 도시노점상을 정리하기 위한 목적으로 정부에서 도시 5일장을 개장한 것은 역사의 아이러니라 아니할 수 없다. 이렇게 정부주도로 개장된 5일장이 운영되어 온 지 2년이 되어가고 있다. 개장 초기에는 시에서의 지원도 적극적이고 소비자들의 호응도 좋았으나, 최근에 들어 활성화의 속도가 둔화되면서 도시 5일장의 개념을 재정립할 필요성이 제기되고 있다. 정부의 주도로 시작된 5일장이므로 정부의 적극적인 추진하에 풍물시장 번영회와 활성화 방안을 모색해야 한다. 쌍다리 풍물시장의 5일장을 활성화하기 위하여 도시 5일장의 개념을 ${\ulcorner}$국민들의 생활수준이 향상되고 여가를 즐길 수 있는 여건이 형성되고 있으므로 전통문화(향토문화)를 유지하고 시민들의 정서함양에 기여할 수 있는 여가공간 조성${\lrcorner}$으로 규정해야 한다. 이러한 개념 하에 5일장의 주체를 명확히 하기 위해 시청 지역경제과를 중심으로 지자제의 실시에

  • PDF

공공 서비스 수출 플랫폼을 위한 온톨로지 모형 (An Ontology Model for Public Service Export Platform)

  • 이광원;박세권;류승완;신동천
    • 지능정보연구
    • /
    • 제20권1호
    • /
    • pp.149-161
    • /
    • 2014
  • 공공 서비스의 수출의 경우 수출 절차와 대상 선정에 따른 다양한 문제가 발생하며, 공공 서비스 수출 플랫폼은 이러한 문제점들을 해결하기 위하여 사용자 중심의 유연하고, 개방형 구조의 디지털 생태계를 조성할 수 있도록 구현되어야 한다. 또한 공공서비스의 수출은 다수의 이해당사자가 참여하고 여러 단계의 과정을 거쳐야 하므로 사용자의 이해 종류와 탐색 컨설팅 협상 계약 등 수출 프로세스 단계별로 맞춤형 플랫폼 서비스 제공이 필수적이다. 이를 위해서 플랫폼 구조는 도메인과 정보의 정의 및 공유는 물론 지식화를 지원할 수 있어야 한다. 본 논문에서는 공공서비스 수출을 지원하는 플랫폼을 위한 온톨로지 모형을 제안한다. 서비스 플랫폼의 핵심 엔진은 시뮬레이터 모듈이며 시뮬레이터 모듈에서는 온톨로지를 사용하여 수출 비즈니스의 여러 컨텍스트들을 파악하고 정의하여 다른 모듈들과 공유하게 된다. 온톨로지는 공유 어휘를 통하여 개념들과 그들 간의 관계를 표현할 수 있으므로 특정 영역에서 구조적인 틀을 개발하기 위한 메타 정보를 구성하는 효과적인 도구로 잘 알려져 있다. 공공서비스 수출 플랫폼을 위한 온톨로지는 서비스, 요구사항, 환경, 기업, 국가 등 5가지 카테고리로 구성되며 각각의 온톨로지는 요구분석과 사례 분석을 통하여 용어를 추출하고 온톨로지의 식별과 개념적 특성을 반영하는 구조로 설계한다. 서비스 온톨로지는 목적효과, 요구조건, 활동, 서비스 분류 등으로 구성되며, 요구사항 온톨로지는 비즈니스, 기술, 제약으로 구성 된다. 환경 온톨로지는 사용자, 요구조건, 활동으로, 기업 온톨로지는 활동, 조직, 전략, 마케팅, 시간으로 구성되며, 국가 온톨로지는 경제, 사회기반시설, 법, 제도, 관습, 인프라, 인구, 위치, 국가전략 등으로 구성된다. 수출 대상 서비스와 국가의 우선순위 리스트가 생성되면 갭(gap) 분석과 매칭 알고리즘 등의 시뮬레이터를 통하여 수출기업과 수출지원 프로그램과의 시스템적 연계가 이루어진다. 제안하는 온톨로지 모형 기반의 공공서비스 수출지원 플랫폼이 구현되면 이해당사자 모두에게 도움이 되며 특히 정보 인프라와 수출경험이 부족한 중소기업에게 상대적으로 더 큰 도움이 될 것이다. 또한 개방형 디지털 생태계를 통하여 이해당사자들이 정보교환, 협업, 신사업 기획 등의 기회를 만들 수 있을 것으로 기대한다.

한국전쟁의 교훈과 대비 -병력수(兵力數) 및 부대수(部隊數)를 중심으로- (The lesson From Korean War)

  • 윤일영
    • 안보군사학연구
    • /
    • 통권8호
    • /
    • pp.49-168
    • /
    • 2010
  • Just before the Korean War, the total number of the North Korean troops was 198,380, while that of the ROK(Republic of Korea) army troops 105,752. That is, the total number of the ROK army troops at that time was 53.3% of the total number of the North Korean army. As of December 2008, the total number of the North Korean troops is estimated to be 1,190,000, while that of the ROK troops is 655,000, so the ROK army maintains 55.04% of the total number of the North Korean troops. If the ROK army continues to reduce its troops according to [Military Reform Plan 2020], the total number of its troops will be 517,000 m 2020. If North Korea maintains the current status(l,190,000 troops), the number of the ROK troops will be 43.4% of the North Korean army. In terms of units, just before the Korean War, the number of the ROK army divisions and regiments was 80% and 44.8% of North Korean army. As of December 2008, North Korea maintains 86 divisions and 69 regiments. Compared to the North Korean army, the ROK army maintains 46 Divisions (53.4% of North Korean army) and 15 regiments (21.3% of North Korean army). If the ROK army continue to reduce the military units according to [Military Reform Plan 2020], the number of ROK army divisions will be 28(13 Active Division, 4 Mobilization Divisions and 11 Local Reserve Divisions), while that of the North Korean army will be 86 in 2020. In that case, the number of divisions of the ROK army will be 32.5% of North Korean army. During the Korean war, North Korea suddenly invaded the Republic of Korea and occupied its capital 3 days after the war began. At that time, the ROK army maintained 80% of army divisions, compared to the North Korean army. The lesson to be learned from this is that, if the ROK army is forced to disperse its divisions because of the simultaneous invasion of North Korea and attack of guerrillas in home front areas, the Republic of Korea can be in a serious military danger, even though it maintains 80% of military divisions of North Korea. If the ROK army promotes the plans in [Military Reform Plan 2020], the number of military units of the ROK army will be 32.5% of that of the North Korean army. This ratio is 2.4 times lower than that of the time when the Korean war began, and in this case, 90% of total military power should be placed in the DMZ area. If 90% of military power is placed in the DMZ area, few troops will be left for the defense of home front. In addition, if the ROK army continues to reduce the troops, it can allow North Korea to have asymmetrical superiority in military force and it will eventually exert negative influence on the stability and peace of the Korean peninsular. On the other hand, it should be reminded that, during the Korean War, the Republic of Korea was attacked by North Korea, though it kept 53.3% of troops, compared to North Korea. It should also be reminded that, as of 2008, the ROK army is defending its territory with the troops 55.04% of North Korea. Moreover, the national defense is assisted by 25,120 troops of the US Forces in Korea. In case the total number of the ROK troops falls below 43.4% of the North Korean army, it may cause social unrest about the national security and may lead North Korea's misjudgement. Besides, according to Lanchester strategy, the party with weaker military power (60% compared to the party with stronger military power) has the 4.1% of winning possibility. Therefore, if we consider the fact that the total number of the ROK army troops is 55.04% of that of the North Korean army, the winning possibility of the ROK army is not higher than 4.1%. If the total number of ROK troops is reduced to 43.4% of that of North Korea, the winning possibility will be lower and the military operations will be in critically difficult situation. [Military Reform Plan 2020] rums at the reduction of troops and units of the ground forces under the policy of 'select few'. However, the problem is that the financial support to achieve this goal is not secured. Therefore, the promotion of [Military Reform Plan 2020] may cause the weakening of military defence power in 2020. Some advanced countries such as Japan, UK, Germany, and France have promoted the policy of 'select few'. However, what is to be noted is that the national security situation of those countries is much different from that of Korea. With the collapse of the Soviet Unions and European communist countries, the military threat of those European advanced countries has almost disappeared. In addition, the threats those advanced countries are facing are not wars in national level, but terrorism in international level. To cope with the threats like terrorism, large scaled army trops would not be necessary. So those advanced European countries can promote the policy of 'select few'. In line with this, those European countries put their focuses on the development of military sections that deal with non-military operations and protection from unspecified enemies. That is, those countries are promoting the policy of 'select few', because they found that the policy is suitable for their national security environment. Moreover, since they are pursuing common interest under the European Union(EU) and they can form an allied force under NATO, it is natural that they are pursing the 'select few' policy. At present, NATO maintains the larger number of troops(2,446,000) than Russia(l,027,000) to prepare for the potential threat of Russia. The situation of japan is also much different from that of Korea. As a country composed of islands, its prime military focus is put on the maritime defense. Accordingly, the development of ground force is given secondary focus. The japanese government promotes the policy to develop technology-concentrated small size navy and air-forces, instead of maintaining large-scaled ground force. In addition, because of the 'Peace Constitution' that was enacted just after the end of World War II, japan cannot maintain troops more than 240,000. With the limited number of troops (240,000), japan has no choice but to promote the policy of 'select few'. However, the situation of Korea is much different from the situations of those countries. The Republic of Korea is facing the threat of the North Korean Army that aims at keeping a large-scale military force. In addition, the countries surrounding Korea are also super powers containing strong military forces. Therefore, to cope with the actual threat of present and unspecified threat of future, the importance of maintaining a carefully calculated large-scale military force cannot be denied. Furthermore, when considering the fact that Korea is in a peninsular, the Republic of Korea must take it into consideration the tradition of continental countries' to maintain large-scale military powers. Since the Korean War, the ROK army has developed the technology-force combined military system, maintaining proper number of troops and units and pursuing 'select few' policy at the same time. This has been promoted with the consideration of military situation in the Koran peninsular and the cooperation of ROK-US combined forces. This kind of unique military system that cannot be found in other countries can be said to be an insightful one for the preparation for the actual threat of North Korea and the conflicts between continental countries and maritime countries. In addition, this kind of technology-force combined military system has enabled us to keep peace in Korea. Therefore, it would be desirable to maintain this technology-force combined military system until the reunification of the Korean peninsular. Furthermore, it is to be pointed out that blindly following the 'select few' policy of advanced countries is not a good option, because it is ignoring the military strategic situation of the Korean peninsular. If the Republic of Korea pursues the reduction of troops and units radically without consideration of the threat of North Korea and surrounding countries, it could be a significant strategic mistake. In addition, the ROK army should keep an eye on the fact the European advanced countries and Japan that are not facing direct military threats are spending more defense expenditures than Korea. If the ROK army reduces military power without proper alternatives, it would exert a negative effect on the stable economic development of Korea and peaceful reunification of the Korean peninsular. Therefore, the desirable option would be to focus on the development of quality of forces, maintaining proper size and number of troops and units under the technology-force combined military system. The tableau above shows that the advanced countries like the UK, Germany, Italy, and Austria spend more defense expenditure per person than the Republic of Korea, although they do not face actual military threats, and that they keep achieving better economic progress than the countries that spend less defense expenditure. Therefore, it would be necessary to adopt the merits of the defense systems of those advanced countries. As we have examined, it would be desirable to maintain the current size and number of troops and units, to promote 'select few' policy with increased defense expenditure, and to strengthen the technology-force combined military system. On the basis of firm national security, the Republic of Korea can develop efficient policies for reunification and prosperity, and jump into the status of advanced countries. Therefore, the plans to reduce troops and units in [Military Reform Plan 2020] should be reexamined. If it is difficult for the ROK army to maintain its size of 655,000 troops because of low birth rate, the plans to establish the prompt mobilization force or to adopt drafting system should be considered for the maintenance of proper number of troops and units. From now on, the Republic of Korean government should develop plans to keep peace as well as to prepare unexpected changes in the Korean peninsular. For the achievement of these missions, some options can be considered. The first one is to maintain the same size of military troops and units as North Korea. The second one is to maintain the same level of military power as North Korea in terms of military force index. The third one is to maintain the same level of military power as North Korea, with the combination of the prompt mobilization force and the troops in active service under the system of technology-force combined military system. At present, it would be not possible for the ROK army to maintain such a large-size military force as North Korea (1,190,000 troops and 86 units). So it would be rational to maintain almost the same level of military force as North Korea with the combination of the troops on the active list and the prompt mobilization forces. In other words, with the combination of the troops in active service (60%) and the prompt mobilization force (40%), the ROK army should develop the strategies to harmonize technology and forces. The Korean government should also be prepared for the strategic flexibility of USFK, the possibility of American policy change about the location of foreign army, radical unexpected changes in North Korea, the emergence of potential threat, surrounding countries' demand for Korean force for the maintenance of regional stability, and demand for international cooperation against terrorism. For this, it is necessary to develop new approaches toward the proper number and size of troops and units. For instance, to prepare for radical unexpected political or military changes in North Korea, the Republic of Korea should have plans to protect a large number of refugees, to control arms and people, to maintain social security, and to keep orders in North Korea. From the experiences of other countries, it is estimated that 115,000 to 230,000 troops, plus ten thousands of police are required to stabilize the North Korean society, in the case radical unexpected military or political change happens in North Korea. In addition, if the Republic of Korea should perform the release of hostages, control of mass destruction weapons, and suppress the internal wars in North Korea, it should send 460,000 troops to North Korea. Moreover, if the Republic of Korea wants to stop the attack of North Korea and flow of refugees in DMZ area, at least 600,000 troops would be required. In sum, even if the ROK army maintains 600,000 troops, it may need additional 460,000 troops to prepare for unexpected radical changes in North Korea. For this, it is necessary to establish the prompt mobilization force whose size and number are almost the same as the troops in active service. In case the ROK army keeps 650,000 troops, the proper number of the prompt mobilization force would be 460,000 to 500,000.

  • PDF

벼 이삭목도열병(病)의 감염(感染)에 관(關)한 연구(硏究) (Studies on Neck Blast Infection of Rice Plant)

  • 김홍기;박종성
    • 농업과학연구
    • /
    • 제12권2호
    • /
    • pp.206-241
    • /
    • 1985
  • 이 연구(硏究)는 목도열병(病)의 감염시기(感染時期)와 조직내(組織內) 감염속도(感染速度) 및 감염(感染)에 영향(影響)을 미치는 전염원(傳染源)의 소재(所在), 엽초내외의 제조건(諸條件) 등(等)을 구명(究明)하여 합리적(合理的)인 방제체계(防除體系)를 확립(確立)하는 자료(資料)를 얻고자 실시(實施)하였다. 1. 벼 이삭목도열병(病)의 감염(感染) 최성기(最盛期)는 수잉기(穗孕期)였으며 그 다음이 출수기(出穗期)로 이 시기(時期)에 대부분의 이삭목이 감염(感梁)되고 있었다. 그러나 통일계(統一系) 품종(品種)은 출수후(出穗後)에도 환경(環境)에 따라 높은 감염(感染) 가능성(可能性)을 갖고 있었다. 2. 벼 이 삭목도열병(病)의 잠복기간(潛伏期間)은 자연조건하(自然條件下)에서 10~22일(日)로 그 변동복(變動福)이 넓었다. 인공접종시(人工接種時) 이삭이 어릴수록 잠복기간(潛伏期間)은 짧았고 감염속도(感染速度)가 심(甚)했으나 지엽절(止葉節) 밖으로 추출(抽出)한 이삭목은 잠복기간(潛伏期間)도 길고 발병률(發病率)도 낮았으며 조직내(組織內) 감염속도(感染速度)가 늦었다. 3. 이삭목도열병(病)의 약제방제(藥劑防除) 적기(適期)는 도열병균(稻熱病菌)의 감염(感染) 최성기(最盛期)와 잠복기간(潛伏期間)을 고려(考慮)할 때 속효성(速效性) 약제(藥齊)는 출수(出穗)5~10일전(日前), 지효성(遲效性) 약제(藥齊)는 10~15일전(日前)으로 추정(推定)된다. 4. 도열병균(病菌) 포자(胞子)의 엽초내 침투(浸透)는 주(主)로 지엽(止葉)을 포함(包含)한 상위(上位) 3개엽(個葉)에서 이루어졌고 강우(降雨)나 이슬, 일액(溢液) 등(等)과 함께 엽초 봉합부(縫合部)에서 침윤현상(浸潤現象)에 의해 이루어졌으며 침투율(浸透量)은 수도(水稻)의 생육기간중(生育期間中) 수잉기(穗孕期)가 가장 많았다. 포자(胞子)의 엽초내 침투(浸透)는 엽설(葉舌)이 크게 저지(沮止)하고 있었다. 5. 엽초내에 침투(浸透)한 포자(胞子)의 이삭에의 부착량(附着量)은 형태적(形態的)으로 복잡(複雜)한 수수절(穗首節)과 수축절(穗軸節)이 가장 많았고 이에는 모용(毛茸)와 퇴화지경(退化枝梗)이 크게 영향(影響)을 미치고 있어 이들이 목도열병(病) 감염(感染)을 조장(助長)하고 있었다. 6. 벼 이삭목도열병(病) 감염(感染) 가능(可能) 포자농도(服子濃度)는 계통간(系統間) 차이(差異)가 있어 통일계(統一系) 품종(品種)은 일반계(一般系)보다 낮은 100개(個) 이하(以下)의 포자농도(胞子濃度)에서도 쉽게 감염(感染)이 되었으며 발병지수(發病指數)도 매우 높아 그 피해(被害)가 더욱 심(甚)했다. 7. 벼 이삭목도열병(病)과 상관(相關)이 높은 이삭목의 질소함량(窒素含量)과 규소함량(硅數含量)은 벼 생육기간(生育時期)에 따라 큰 차이(差異)가 있어 질소함량(窒素含量)은 수잉기(穗孕期)에서 출수기(出穗期)로 갈수록 증가(增加)를 보였고 그 후 다소(多少) 감소(減少)하고 있었다. 규소함량(硅數含量)은 수잉기(穗孕期)로부터 점차 증가(增加)하고 있어 이들 체내성분(體內成分)의 변화(變化)가 목도열병(病)의 발병(發病)을 조장(助長)하고 있었다. 8. 도열병균(稻熱病菌) 포자(胞子)의 비산(飛散)은 대다수 수직(垂直) 방향(方向)으로 상승(上昇)또는 하강(下降)하여 도체(稻體)에 부간(附看)하였으며 수평(水平)으로 이동(移動)하는 포자(胞子)는 극(極)히 적어 출수후(出穗後)의 이삭목에 부간(附看)하는 포자수(胞子數)가 적으므로 출수후(出穗後) 목도열병(病) 감염율(感染率)은 매우 낮을 것으로 추정(推定)되었다. 도체(稻體) 상하위간(上下位間)의 온도차(溫度差)에 의(依)한 공기(空氣)의 이동(移動)은 포자비산(胞子飛散)에 대(對)한 하나의 원인(原因)이었다. 9. 출온기(出穩期)를 전후(前後)한 포자비산(胞子飛散)이 가장 목도열병발병(病發病)과 상관(相關)이 높았으며 지엽(止葉)을 포함(包含)한 상위(上位) 3개엽(個葉)에 형성(形成)된 병반(病斑)이 출수(出穗)를 전후(前後)한 시기(時期)에 포자형성량(胞子形成量)이 많아 직접(直接) 목도열병(病) 전염원(傳染源)으로서 크게 작용(作用)하고 있었다. 10. 엽초내 환경조건(環境條件)은 목도열병(病) 감염(感染)에 극(極)히 호적(好適)하여 엽초내에서 도열병균(病菌)의 침해(侵害)를 받는 경우 품종(品種)의 내병성(耐病性), 시복수준(施服水準)의 차이(差異)에 관계(關係)없이 이삭목이나 지경(枝梗), 인, 마디, 마디사이 등(等) 도체(稻體)의 어느 부위(部位)라도 감염(感染)이 이루어졌다. 11. 엽초내에 침투(浸透)한 우고균(優古菌) 중에서 벼 갈색엽고병균(病菌)인 Gerlachia oryzae 만이 발병(發病)을 다소(多少) 조장(助長)할 뿐 기타(其他)의 균(菌)들은 영향(影響)이 적었으며 품종(品種)의 출수소요일수(出穗所要日數)의 장단(長短)이 목도열병(病) 감염(感染)과 관련(關連)이 있는 것으로 추정(推定)되었다.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.