Adsorption equilibrium, kinetic and thermodynamic parameters of a brilliant green from aqueous solutions at various initial dye concentration (10~30 mg/L), contact time (1~24 h) and temperature (298~318 K) on zeolite were studied in a batch mode operation. The equilibrium adsorption values were analyzed by Langmuir, Freundlich and Dubinin-Radushkevich model. The results indicate that Langmuir and Freundlich model provides the best correlation of the experimental data. Base on the estimated values of Langmuir dimensionless separation factor ($R_L=0.041{\sim}0.057$) and Freundlich constant (1/n=0.30~0.47), this process could be employed as effective treatment method. calculated values of adsorption energy by Dubinin-Radushkevich model were 1.564~1.857 kJ/mol corresponding to physical adsorption. The adsorption kinetics of brilliant green were best described by the pseudo second-order rate model and followed by intraparticle diffusion model. Thermodynamic parameters such as activation energy, free energy, enthalpy and entropy were calculated to estimate nature of adsorption. negative Gibbs free energy (-10.3~-11.4 kJ/mol), positive enthalpy change (49.48 kJ/mol) and Arrehenius activation energy (27.05 kJ/mol) indicates that the adsorption is spontaneous, endothermic and physical adsorption process, respectively.
In order to protect Rescue 119 workers exposed on the spot from potential infection, this study identified their awareness and practices of infection control so that it could help preventing them from infection and also provide basic materials necessary for pre-hospital infection control. This study applied questionnaire survey to total 215 Rescue 119 workers at fire stations in Jeonbuk province, Jeonnam province and Gwangju city from July 14 to Sept. 14, 2006 for the benefit of data collection. The questionnaire about possible associations between awareness and practices of infection control consisted of total 46 times across 6 categories such as washing hands during emergency activities ; fluid therapy and injection ; respirator maintenance; individual hygienics ; disinfectant supplies and equipments maintenance ; and control of infectious wastes. And collected data were processed using SPSS statistic program to analyze frequency and percentage, mean and standard deviation, Pearson's correlation coefficient, t-test and one-way ANOVA. As a result, this study came to the following conclusions : In terms of awareness about infection control, our respondents showed highest awareness about infectious waste control, and also showed highest level of practices in washing hands during emergency activities. Throughout all domains, awareness means were higher than practice means. In particular, infectious waste control was the domain of significant differences between awareness and practices. In terms of associations between awareness and individual characteristics, it was found that female rescue worker group and hospital/general hospital career group (before joining the Rescue 119) showed significantly higher awareness on statistic level. In regard to associations between individual characteristics and practices, it was found that female rescue worker group showed higher level of practices than male group on statistic level. This study also analyzed correlations between rescue workers' awareness and practice of infection control. As a result, it was found that the higher awareness was in correlations with the higher practices across all 6 domains including washing hands. In addition, the higher awareness of a questionnaire item was in significantly positive correlations with the higher practice of other items. However, our respondents showed high awareness about anti-infection, but low practices in reality. This indicates necessity of devising possible solutions to improve the practices as much as awareness. Especially, it was noted that major reasons for insufficient practices of infection control guideline come from unhabituated practices and lack of supports for infection-preventing supplies and protective device (mask, etc). Hence, it is necessary to provide more infection-preventing supplies for local rescue workers sufficiently, in parallel with steady habituation of infection control. Furthermore, it is required to manage and study infection control policies even at pre-hospital step in efforts for effective infection control, education and activities.
Ant Colony System(ACS) Algorithm is new meta-heuristic for hard combinational optimization problem. It is a population-based approach that uses exploitation of positive feedback as well as greedy search. Recently, various methods and solutions are proposed to solve optimal solution of graph coloring problem that assign to color for adjacency node($v_i, v_j$) that they has not same color. In this paper introducing ANTCOL Algorithm that is method to solve solution by Ant Colony System algorithm that is not method that it is known well as solution of existent graph coloring problem. After introducing ACS algorithm and Assignment Type Problem, show the wav how to apply ACS to solve ATP And compare graph coloring result and execution time when use existent generating functions(ANT_Random, ANT_LF, ANT_SL, ANT_DSATUR, ANT_RLF method) with ANT_XRLF method that use XRLF that apply Randomize to RLF to solve ANTCOL. Also compare graph coloring result and execution time when use method to add re-search to ANT_XRLF(ANT_XRLF_R) with existent generating functions.
Journal of the Korean Society of Clothing and Textiles
/
v.32
no.6
/
pp.935-946
/
2008
Religion is the symbolic form and action, linking the ultimate condition of life with human beings. Religious idea grasps the world through symbols and gives birth to the action through symbols. This research put its purpose in elucidating the effect of religion on the costume and its mechanism. It's focus is centered on Buddhism, Hinduism, and Islam which are among the world high religions. Part of this research also examines the mechanism in which several composing factors are expressed with rituals and manifested with costumes, this process was diagrammatized and suggested. The composing factors of religion such as belief system, experiences, community, and rituals are closely related. Ritual especially, is the symbolic action, practice, and the way of rescue, expressing religious meaning. Religious rituals such as imitative rituals, positive or negative rituals, sacrificial ritual, and rites of passage have been expressed with religious music or figurative art such as costume, construction, and art as well as religious ritual like ancestral rites. Religion has had a great effect on the overall culture including costume as a belief system by lightening the meaning of life and suggesting the solutions to the human problems such as anxiety or conflict.
Recently the stereo vision based on conics has received much attention by many authors. Conics have many features such as their matrix expression, efficient correspondence checking, abundance of conical shapes in real world. Extensions to higher algebraic curves met with limited success. Although irreducible algebraic curves are rather rare in the real world, lines and conics are abundant whose products provide good examples of higher algebraic curves. We consider plane algebraic curves of an arbitrary degree $n{\geq}2$ with a fully calibrated stereo system. We present closed form solutions to both correspondence and reconstruction problems. Let $f_1,\;f_2,\;{\pi}$ be image curves and plane and $VC_P(g)$ the cone with generator (plane) curve g and vertex P. Then the relation $VC_{O1}(f_1)\;=\;VC_{O1}(VC_{O2}(f_2)\;∩\;{\pi})$ gives polynomial equations in the coefficient $d_1,\;d_2,\;d_3$ of the plane ${\pi}$. After some manipulations, we get an extremely simple polynomial equation in a single variable whose unique real positive root plays the key role. It is then followed by evaluating $O(n^2)$ polynomials of a single variable at the root. It is in contrast to the past works which usually involve a simultaneous system of multivariate polynomial equations. We checked our algorithm using synthetic as well as real world images.
Changes in the quality of buckwheat sprout treated with organic acid solutions such as ascorbic, citric and acetic acid were examined during storage in order to judge the feasibility of acid dipping as a pretreatment for extending shelf-life. Quality attributes of buckwheat sprout stored at $5^{\circ}C$ were measured in terms of microbial cell count, moisture content, soluble solids content, chromaticity, and sensory evaluation over different storage times. For microbial growth inhibition, combinations of 0.05% acetic acid and 0.5% citric acid or 1% ascorbic acid and 0.5% citric acid were more effective than other treatments. Slight changes were observed in moisture content among the treatments, whereas soluble solids content of each treatment was increased during storage. In chromaticity, the Hunter's a value of buckwheat sprout treated with acetic acid alone or acetic acid combinations showed the largest increase. Dipping treatment with ascorbic acid and citric acid produced only slight changes in color of the sprout. In the sensory evaluation of discoloration (head, stem and root), wilting and overall quality, ascorbic acid and citric acid treatments gave the highest scores. These results suggest that dipping treatment of buckwheat sprout with citric acid can confer more positive effects on storage stability than others.
Gunnar Myrdal has struggled throughout his academic life with the problem of the role of valuations in social sciences. His earlier viewpoint was that valuations should be completely separated from scientific analysis on facts. But he soon fundamentally changed his viewpoint. His later viewpoint was that social scientists should disclose his valuations, for valuations intervene all the processes of scientific researches. Value premises are the valuations coherently reconstructed and manifestly articulated. Myrdal argued that social scientists should disclose value premises and perform his analysis and normative judgement based on the value premises. And the value premises should be derived from the valuations held by the large or significant groups of the society under study, not from the researcher's own valuations. This paper tried to show that Myrdal's later viewpoint must meet the crux, that researcher's own viewpoint must intervene in choosing valuations of particular group among diverse groups in the society under stduy, and in deriving and reconstructing value premises from the valuations of that group. And it argued that the reason why Myrdal met the crux could be explained by that he accepted the emotivism of Axel $H{\ddot{a}}gersr{\ddot{o}}m$. And it proposed some methodological solutions for escaping the crux Myrdal met, while preserving the positive elements of Myrdals' viewpoint.
Recently, security behavior of members of organizations has been recognized as a critical part of information security at the corporate level. Leakage of customers' information brings more attention to information security behavior of organizations and the importance of a task force. Research on information breach and information security is actively conducted of personal behavior toward security threats or members of organizations who use security technology. This study aims to identify factors of influence on information security behavior of members of organizations and to empirically find out how these factors affect information security behavior through behavior toward attitude, subjective norm and perceived behavior control. On the basis of the research, this study will present effective and efficient ways to foster information security activities of members of organizations. To this end, the study presented a research model that applied significant variables based on integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM). To empirically verify this research model, the study conducted a survey of members of organizations who had security-related work experience at companies. So, it is critical for members of organizations to encourage positive word of mouth (WOM) about information security behavior. Results show that based on the integration of TPM and TPB, perceived vulnerability, perceived severity, perceived efficiency and perceived barriers of information security behavior of members of organizations had significant influences on mediating variables such as behavior toward attitude, subjective norm, perceived behavior control and intention. They also had significant influences on organization information security behavior which is a dependent variable. This study indicates companies should introduce various security solutions so that members of the organizations can prevent and respond to potential internal and external security risks. In addition, they will have to take actions to inspect vulnerability of information system and to meet security requirements such as security patches.
Journal of Family Resource Management and Policy Review
/
v.25
no.4
/
pp.1-14
/
2021
This study was conducted to examine the realistic problems of flexible work arrangements, which was a representative policy for work-family balance, based on a review of its effect and influence on double-income couples who were actual users of the system. In this study, an in-depth interview with three double-income couples, totaling 6 parents, with preschool children was conducted on the experience of their flexible work arrangements, and the purposes of the study were to figure out their experienced positive effectiveness and the problems with the difficulty of using the system and to look for their solutions. For the data analysis of the study, it was organized into three high categories and nine low ones by reviewing the entire data on the basis of the frame structured in the derived data through the interview and categorizing the subjects by area. The derived analysis results were changes in households, social and cultural perspectives, and demand for policy and social economic changes. This study is significant in the sense that the perspectives and voice of the actual users of flexible work arrangements have been reflected in the study, and in the future, we expect that it will provide justification and persuasive power for the improvement of flexible work arrangements and serve as basic data for establishing policy directions and support.
Journal of The Korean Association of Information Education
/
v.25
no.5
/
pp.791-801
/
2021
In this paper, an educational case that can be applied as artificial intelligence literacy education for preservice teachers and incumbent teachers was studied. To this end, a case of educating the operating principle of an artificial neural network that recognizes images is proposed. This training case focuses on the basic principles of artificial neural network operation and implementation, and applies the method of finding parameter optimization solutions required for artificial neural network implementation in a spreadsheet. In this paper, we focused on the artificial neural network of supervised learning method. First, as an artificial neural network principle education case, an artificial neural network education case for recognizing two types of images was proposed. Second, as an artificial neural network extension education case, an artificial neural network education case for recognizing three types of images was proposed. Finally, the results of analyzing artificial neural network training cases and training satisfaction analysis results are presented. Through the proposed training case, it is possible to learn about the operation principle of artificial neural networks, the method of writing training data, the number of parameter calculations executed according to the amount of training data, and parameter optimization. The results of the education satisfaction survey for preservice teachers and incumbent teachers showed a positive response result of over 70% for each survey item, indicating high class application suitability.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.