• Title/Summary/Keyword: Network search

Search Result 1,595, Processing Time 0.034 seconds

A Comparative Study on the Recognition of Urban Agriculture between Urban Farmers and Public Officials (도시농업인과 공무원의 도시농업 인식 비교·평가)

  • Park, Won-Zei;Koo, Bon-Hak;Park, Mi-Ok;Kwon, Hyo-Jin
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.40 no.4
    • /
    • pp.90-103
    • /
    • 2012
  • The aim of this study is to be able to understand the problems within the urban agriculture policy promoted by the Government and local autonomous entity base on the comparison of the consciousness of the urban agriculture between urban farmers and public officials and to inquire into the further revitalization scheme in the end. For this purpose, this study drew implications through studying latest trend and the legislation of domestic and foreign urban agriculture and then conducted a questionnaire survey of urban farmers and public officials. Because of this research, the revitalization schemes of urban agriculture are as follows: First, it's necessary to secure the usable arable land, such as the green roof, community garden, as well as urban agriculture park, etc. Second, it is necessary to establish the urban agriculture relations act suited for the actual circumstances of our country and to back up the legislation at an institutional, technological level in terms of a nation in order to secure the durability of urban agriculture. Third, it is advisable to make a proposal about the problems in time of activities for cultivation by forming a network between urban farmers and public officials and to prepare the plan for the active exchange of farming technologies. Fourth, it's necessary to activate the community gardens by supplying the education through cultivation method & its management method, and a variety of urban-agriculture-participation programs. Fifth, it is necessary to set up the specialized and practical education through an institute for landscape architecture. Sixth, it is necessary to induce the spontaneous participation in urban agriculture from urban farmers accompanied by the activities for promotion that are worth arousing urban farmers' interest. Lastly, it is also necessary to establish a legal basis of urban agricultural parks and facilities as well as to promote a search for multilateral policies and their practice so that the further urban agriculture can be stably continued within city boundaries.

Study on Integrating Women's Policies in Unified Korea : Social Welfare Policy (통일한국의 여성정책 통합방안에 관한 연구 : 사회복지정책 부문)

  • Kim, Young-Lan
    • Korean Journal of Social Welfare
    • /
    • v.36
    • /
    • pp.39-69
    • /
    • 1998
  • The study is to grope for the unified device of the women's welfare policy in the United Korea by considering and comparing with the women's welfare in South Korea and North Korea centering on the women's welfare law and system among the social security laws and systems in the present both countries. The both Koreas have enforced the different women's welfare policies according to the different ideologies and constitutions. But in the welfare policy women are in the secondary stage by means of the ideology of sexual devision. It, therefore, is clear that the position of the North Korean woman goes in advance of the South Korean woman in the law and system. However, they are similar to the North Korean women in the aspects of the application of law and system. That is, both of them are discriminated not only in home and labor participation, but also in social welfare. There are the patriarchal family system and sexual devision of labor under the discrimination against woman. As though the both sexes are equal in law, the welfare law and system are applicated unequally to woman because of the ideology of sexual devision and familism which family should take the primary responsibility of welfare. From this perspective the women's welfare policy of the United Korea is not just to unify both laws and systems related women's welfare, but to search for the convergence on the higher level of quality and to make the real gender-equal society. The study suggests as the women's welfare the spread of the application of social welfare system, and social security network constructed through the mother protection policy, women's poverty and social security on basis of the primary principles such as the gender equal right as civil right, benefits of social welfare as social right, escape from the patriarchal familism, strengthening of resposibility of state and the principle of women participation in process of social welfare management. The device of women's welfare means building the social welfare system based on the real gender equality, so the unification will be the important turning point for the gender-equal society to the South-North Korean women.

  • PDF

The Differentially Expressed Genes by Radiotherapy in the Patients with Uterine Cervix Cancer (자궁경부암 환자에서 방사선치료 시 발현되는 유전자의 규명)

  • Seo Eun Young;Cho Moon-June;Lee Jeung Hoon;Lee Young-Sook;Na Myung-Hoon;Lee Woong-Hee;Kim Jun-Sang;Kim Jae-Sung
    • Radiation Oncology Journal
    • /
    • v.19 no.4
    • /
    • pp.389-396
    • /
    • 2001
  • Purpose : To detect differentially expressed genes in the patients with uterine cervical cancer during the radiation therapy. Materials and Methods : In patients with biopsy proven uterine cervical cancer, we took tumor tissue just before radiation therapy and at 40 minutes after external irradiation of 1.8 Gy. Total RNAs isolated from non-irradiated and irradiated tumor tissue samples were analyzed using the differential-display reverse transcription-polymerase chain reaction (DDRT-PCR). Complementary DNA (cDNA) fragments corresponding to differentially expressed messenger RNAs(mRNAs) were eluted, and cloned. The differential expression of the corresponding mRNAs was confirmed by reverse northern blot. Differentially expressed cDNA bands were sequenced. Nucleotide sequence data were analyzed in the Gene Bank and EMBL databases via the BLAST network sewer to identify homologies to known genes or cDNA fragments. Expression pattern of down-regulated clone was examined using RT-PCR in S patients undergoing radiotherapy. Results : We identified 18 differentially expressed bands by DDRT-PCR, which were eluted and cloned. There were 10 up-regulated clones and 1 down-regulated clone in reverse northern blot. One cDNA fragment had homology to chemokine receptor CXCR4, four were identified as Human ESTs in the EMBL database in EST clones. Down-regulated CxCa-11 was also down regulated in all patients. Conclusion : Using the DDRT-PCR, we have identified 10 up-regulated and 1 down-regulated clone(s) in the patients with uterine cervical cancer during the radiation therapy. The clinical relevance and the functions of these genes will be further investigated.

  • PDF

A Study for Factors Influencing the Usage Increase and Decrease of Mobile Data Service: Based on The Two Factor Theory (모바일 데이터 서비스 사용량 증감에 영향을 미치는 요인들에 관한 연구: 이요인 이론(Two Factor Theory)을 바탕으로)

  • Lee, Sang-Hoon;Kim, Il-Kyung;Lee, Ho-Geun;Park, Hyun-Jee
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.97-122
    • /
    • 2007
  • Conventional networking and telecommunications infrastructure characterized by wires, fixed location, and inflexibility is giving way to mobile technologies. Numerous research reports point to the ultimate domination of wireless communication. With the increasing prevalence of advanced cell-phones, various mobile data services (hereafter MDS) are gaining popularity. Although cellular networks were originally introduced for voice communications, statistics indicate that data services are replacing the matured voice service as the growth engine for telecom service providers. For example, SK Telecom, the Korea's largest mobile service provider, reported that 25.6% of revenue and 28.5% of profit came from MDS in 2006 and the share is growing. Statistics also indicate that, in 2006, the average revenue per user (ARPU) for voice didn't change but MDS grew seven percents from the previous year, further highlighting its growth potential. MDS is defined "as an assortment of digital data services that can be accessed using a mobile device over a wide geographic area." A variety of MDS have been deployed, with a few reaching the status of killer applications. Many of them need to access the Internet through the cellular-phone infrastructure. In the past, when the cellular network didn't have acceptable bandwidth for data services, SMS (short messaging service) dominated MDS. Now, Internet-ready, next-generation cell-phones are driving rich digital data services into the fabric of everyday life, These include news on various topics, Internet search, mapping and location-based information, mobile banking and gaming, downloading (i.e., screen savers), multimedia streaming, and various communication services (i.e., email, short messaging, messenger, and chaffing). The huge economic stake MDS has on its stakeholders warrants focused research to understand associated dynamics behind its adoption. Lyytinen and Yoo(2002) pointed out the limitation of traditional adoption models in explaining the rapid diffusion of innovations such as P2P or mobile services. Also, despite the increasing popularity of MDS, unexpected drop in its usage is observed among some people. Intrigued by these observations, an exploratory study was conducted to examine decision factors of MDS usage. Data analysis revealed that the increase and decrease of MDS use was influenced by different forces. The findings of the exploratory study triggered our confirmatory research effort to validate the uni-directionality of studied factors in affecting MDS usage. This differs from extant studies of IS/IT adoption that are largely grounded on the assumption of bi-directionality of explanatory variables in determining the level of dependent variables (i.e., user satisfaction, service usage). The research goal is, therefore, to examine if increase and decrease in the usage of MDS are explained by two separate groups of variables pertaining to information quality and system quality. For this, we investigate following research questions: (1) Does the information quality of MDS increase service usage?; (2) Does the system quality of MDS decrease service usage?; and (3) Does user motivation for subscribing MDS moderate the effect information and system quality have on service usage? The research questions and subsequent analysis are grounded on the two factor theory pioneered by Hertzberg et al(1959). To answer the research questions, in the first, an exploratory study based on 378 survey responses was conducted to learn about important decision factors of MDS usage. It revealed discrepancy between the influencing forces of usage increase and those of usage decrease. Based on the findings from the exploratory study and the two-factor theory, we postulated information quality as the motivator and system quality as the de-motivator (or hygiene) of MDS. Then, a confirmative study was undertaken on their respective role in encouraging and discouraging the usage of mobile data service.

Media Work as Creative Labor?: Toward Critical Inquiry of Media Work with Critical Cultural Economy (창의적 일로서의 미디어 노동?: 미디어 노동의 문화경제 분석을 위한 시론)

  • Seo, Dong-Jin
    • Korean journal of communication and information
    • /
    • v.57
    • /
    • pp.33-48
    • /
    • 2012
  • Over the last decades, the issue of work or labor has played a critical role in prevailing discourses to represent the changed economic reality. Aesthetic labor, cultural work, network labor, team-work and alike, have played a dazzling role to represent the emerging economic order, employing the word of labor. Certainly, it is not less than a part of a wide range of shifts in order to make capital work with more effect by making up a workable and governable subject. In this article, I try to examine shifts around the media work which has contributed to expand the new discourse of 'labor.' I will say that it is quite crucial for accounting for the reality of media work to shed light on moves to represent media work, and, among others, one to transform the subjectivity involved in it among others. Furthermore, it would be necessary to take a close look at the subjectivity of media work and its modification to deal with and eliminate the precariousness of media work. Saying about media work without paying any attention to heterogenous and various practices to compose a media work, one is forced to regard media work as the matter of economic and legal interests. In addition, it would bring about that the cultural political concerns of media work will be detached from critical sight of the media cultural studies. Referring to major studies around media work in critical media studies, cultural studies and political economy of communication, this article will briefly look into the arrangement of contentions around subjectivity of media work in South Korea. And it will try to suggest what cultural-political strategy we need to investigate, fighting against the hegemonic power to generate and regulate media work and its workers in precarious conditions. It does not intend to search the media work and its complicated realities in detail in South Korea. I wish that it would make a preliminary step to propose and elaborate the critical analysis of media work and its form of subjectivities.

  • PDF

Analysis of User′s Satisfaction to the Small Urban Spaces by Environmental Design Pattern Language (환경디자인 패턴언어를 통해 본 도심소공간의 이용만족도 분석에 관한 연구)

  • 김광래;노재현;장동주
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.16 no.3
    • /
    • pp.21-37
    • /
    • 1989
  • Environmental design pattern of the nine Small Urban Spaces at C.B.D. in City of Seoul are surveyed and analyzed for user's satisfaction and behavior under the environmental design evaluation by using Christopher Alexander's Pattern Language. Small Urban Spaces as a part of streetscape are formed by physical factors as well as visual environment and interacting user's behavior. Therefore, user's satisfaction and behavior at the nine Urban Small Spaces were investigated under the further search for some possibilities of application of those Pattern Languages. A pattern language has a structure of a network. It is used in sequence, going through the patterns, moving always from large patterns to smaller, always from the ones which create comes simply from the observation that most of the wonderful places of the city were not blade by architects but by the people. It defines the limited number of arrangements of spaces that make sense in any given culture. And it actually gives us the power to generate these coherent arrangement of space. As a results, 'Plaza', 'Seats'and 'Aecessibility' related design Patterns are highly evaluated by Pattern Frequency, Pattern Interaction and their Composition ranks, thus reconfirm Whyte's Praise of urban Small Spaces in our inner city design environments. According to the multiple regression analysis of user's evaluation, the environmental functions related to the satisfaction were 'Plaza', 'Accessibility' and 'Paving'. According to the free response, user's prefer such visually pleasing environmental design object as 'Waterscape' and 'Setting'. In addition to, the basic needs in Urban Small Spaces are amenity facilities as bench, drinking water and shade for rest.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Selective Word Embedding for Sentence Classification by Considering Information Gain and Word Similarity (문장 분류를 위한 정보 이득 및 유사도에 따른 단어 제거와 선택적 단어 임베딩 방안)

  • Lee, Min Seok;Yang, Seok Woo;Lee, Hong Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.105-122
    • /
    • 2019
  • Dimensionality reduction is one of the methods to handle big data in text mining. For dimensionality reduction, we should consider the density of data, which has a significant influence on the performance of sentence classification. It requires lots of computations for data of higher dimensions. Eventually, it can cause lots of computational cost and overfitting in the model. Thus, the dimension reduction process is necessary to improve the performance of the model. Diverse methods have been proposed from only lessening the noise of data like misspelling or informal text to including semantic and syntactic information. On top of it, the expression and selection of the text features have impacts on the performance of the classifier for sentence classification, which is one of the fields of Natural Language Processing. The common goal of dimension reduction is to find latent space that is representative of raw data from observation space. Existing methods utilize various algorithms for dimensionality reduction, such as feature extraction and feature selection. In addition to these algorithms, word embeddings, learning low-dimensional vector space representations of words, that can capture semantic and syntactic information from data are also utilized. For improving performance, recent studies have suggested methods that the word dictionary is modified according to the positive and negative score of pre-defined words. The basic idea of this study is that similar words have similar vector representations. Once the feature selection algorithm selects the words that are not important, we thought the words that are similar to the selected words also have no impacts on sentence classification. This study proposes two ways to achieve more accurate classification that conduct selective word elimination under specific regulations and construct word embedding based on Word2Vec embedding. To select words having low importance from the text, we use information gain algorithm to measure the importance and cosine similarity to search for similar words. First, we eliminate words that have comparatively low information gain values from the raw text and form word embedding. Second, we select words additionally that are similar to the words that have a low level of information gain values and make word embedding. In the end, these filtered text and word embedding apply to the deep learning models; Convolutional Neural Network and Attention-Based Bidirectional LSTM. This study uses customer reviews on Kindle in Amazon.com, IMDB, and Yelp as datasets, and classify each data using the deep learning models. The reviews got more than five helpful votes, and the ratio of helpful votes was over 70% classified as helpful reviews. Also, Yelp only shows the number of helpful votes. We extracted 100,000 reviews which got more than five helpful votes using a random sampling method among 750,000 reviews. The minimal preprocessing was executed to each dataset, such as removing numbers and special characters from text data. To evaluate the proposed methods, we compared the performances of Word2Vec and GloVe word embeddings, which used all the words. We showed that one of the proposed methods is better than the embeddings with all the words. By removing unimportant words, we can get better performance. However, if we removed too many words, it showed that the performance was lowered. For future research, it is required to consider diverse ways of preprocessing and the in-depth analysis for the co-occurrence of words to measure similarity values among words. Also, we only applied the proposed method with Word2Vec. Other embedding methods such as GloVe, fastText, ELMo can be applied with the proposed methods, and it is possible to identify the possible combinations between word embedding methods and elimination methods.

Aquatic exercise for the treatment of knee osteoarthritis: a systematic review & meta analysis (무릎 골관절염 환자를 대상으로 한 수중 운동과 지상운동 비교: 체계적 문헌고찰 및 메타분석)

  • Kim, Young-il;Choi, Hyo-Shin;Han, Jung-haw;Kim, Juyoung;Kim, Gaeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6099-6111
    • /
    • 2015
  • This study was a systematic review and meta-analysis comparing the effects of aquatic exercise and land-based exercise in the treatment of knee osteoarthritis. 7 studies (n=449) met selection and exclusion criteria out of 287 potential studies obtained from the literature search via Ovid-Medline, Cochrane Library CENTRAL, CINAHL, RISS and KISS. The overall risk of bias of selected studies using SIGN (Scottish Intercollegiate Guidelines Network) checklist for randomized controlled trials (RCT) was regarded as low. As a result of meta analysis, Standardized Mean Difference (SMD) for pain was -0.26(95% CI -0.49, -0.03, p=0.03, $I^2=14%$), which implies that aquatic exercise groups had significant less pain than land-based exercise groups. On the other hand, there was no significant difference between aquatic exercise groups and land based exercise groups for flexion Range of Motion (ROM) (-0.12, 95% CI -0.51, 0.27, p=0.53, $I^2=0%$), extension ROM (-0.04, 95% CI -0.55, 0.48, p=0.89, $I^2=43%$), physical function (-0.12, 95% CI -0.44, 0.19, p=0.44, $I^2=0%$), Quality of Life (QOL) (-0.15, 95% CI -0.54, 0.24, p=0.46, $I^2=0%$). This study has some limitations due to few RCTs comparing aquatic exercise groups and land-based exercise groups in the treatment of knee osteoarthritis. Therefore, further RCTs should be conducted along with long-term outcomes.

Bioinformatic Analysis of the Canine Genes Related to Phenotypes for the Working Dogs (특수 목적견으로서의 품성 및 능력 관련 유전자들에 관한 생물정보학적 분석)

  • Kwon, Yun-Jeong;Eo, Jungwoo;Choi, Bong-Hwan;Choi, Yuri;Gim, Jeong-An;Kim, Dahee;Kim, Tae-Hun;Seong, Hwan-Hoo;Kim, Heui-Soo
    • Journal of Life Science
    • /
    • v.23 no.11
    • /
    • pp.1325-1335
    • /
    • 2013
  • Working dogs, such as rescue dogs, military watch dogs, guide dogs, and search dogs, are selected by in-training examination of desired traits, including concentration, possessiveness, and boldness. In recent years, genetic information has been considered to be an important factor for the outstanding abilities of working dogs. To characterize the molecular features of the canine genes related to phenotypes for working dogs, we investigated the 24 previously reported genes (AR, BDNF, DAT, DBH, DGCR2, DRD4, MAOA, MAOB, SLC6A4, TH, TPH2, IFT88, KCNA3, TBR2, TRKB, ACE, GNB1, MSTN, PLCL1, SLC25A22, WFIKKN2, APOE, GRIN2B, and PIK3CG) that were categorized to personality, olfactory sense, and athletic/learning ability. We analyzed the chromosomal location, gene-gene interactions, Gene Ontology, and expression patterns of these genes using bioinformatic tools. In addition, variable numbers of tandem repeat (VNTR) or microsatellite (MS) polymorphism in the AR, MAOA, MAOB, TH, DAT, DBH, and DRD4 genes were reviewed. Taken together, we suggest that the genetic background of the canine genes associated with various working dog behaviors and skill performance attributes could be used for proper selection of superior working dogs.