• 제목/요약/키워드: TIME model

검색결과 30,135건 처리시간 0.069초

Isoalantolactone Inhibits the Formation of Multicellular Tumor Spheroids Derived From Human Hepatocellular Carcinoma Hep3B Cells Through the Induction of ROS-dependent Apoptosis (ROS 의존적 세포사멸 유도를 통한 isoalantolactone의 인간 간세포암종 Hep3B 세포 유래 다세포 종양 spheroid 형성의 억제)

  • Min Yeong Kim;Byunwoo Son;Sang-Hyup Lee;Sang Eun Park;Su Hyun Hong;Sang Hoon Hong;Eunjeong Kim;Yung Hyun Choi;Hyun Hwangbo
    • Journal of Life Science
    • /
    • 제34권7호
    • /
    • pp.476-484
    • /
    • 2024
  • Although two-dimensional (2D) monolayer cell culture models are still widely used as the optimal models for anticancer activity research, three-dimensional (3D) multicellular tumor spheroid (3D MTS) models that can better approximate the tumor environment can offer an alternative to bridge the gap between in vitro and animal model studies. Isoalantolactone is among the sesquiterpene lactones found in medicinal plants, including the roots of Elecampane (Inula helenium L.), and is known to have various pharmacological activities, including anticancer activity. In this study, we investigated whether the anticancer activity of isoalantolactone observed in 2D models could be reproduced in a 3D MTS model derived from human hepatocellular carcinoma (HCC) Hep3B cells. According to our results, isoalantolactone inhibited the formation of MTSs in a manner dependent on the treatment concentration, which was accompanied by an increase in reactive oxygen species (ROS) generation. In particular, as isoalantolactone treatment and the culture time increased, the area of proliferating cells was replaced by cells in which apoptosis was induced. Additionally, in MTSs, isoalantolactone increased the expression of death-receptor-related proteins and the activity of caspase-3, and it decreased the expression of the Bax/Bcl-2 expression ratio and total poly(ADP-ribose) polymerase. However, when the production of ROS was artificially blocked, all these changes caused by isoalantolactone were attenuated and the cell survival rate of MTS cells was restored. Therefore, the results of this study suggest that the induction of apoptosis in Hep3B cell-derived MTSs by isoalantolactone is achieved through the activation of extrinsic and intrinsic pathways and is ROS-dependent.

Design and Implementation of MongoDB-based Unstructured Log Processing System over Cloud Computing Environment (클라우드 환경에서 MongoDB 기반의 비정형 로그 처리 시스템 설계 및 구현)

  • Kim, Myoungjin;Han, Seungho;Cui, Yun;Lee, Hanku
    • Journal of Internet Computing and Services
    • /
    • 제14권6호
    • /
    • pp.71-84
    • /
    • 2013
  • Log data, which record the multitude of information created when operating computer systems, are utilized in many processes, from carrying out computer system inspection and process optimization to providing customized user optimization. In this paper, we propose a MongoDB-based unstructured log processing system in a cloud environment for processing the massive amount of log data of banks. Most of the log data generated during banking operations come from handling a client's business. Therefore, in order to gather, store, categorize, and analyze the log data generated while processing the client's business, a separate log data processing system needs to be established. However, the realization of flexible storage expansion functions for processing a massive amount of unstructured log data and executing a considerable number of functions to categorize and analyze the stored unstructured log data is difficult in existing computer environments. Thus, in this study, we use cloud computing technology to realize a cloud-based log data processing system for processing unstructured log data that are difficult to process using the existing computing infrastructure's analysis tools and management system. The proposed system uses the IaaS (Infrastructure as a Service) cloud environment to provide a flexible expansion of computing resources and includes the ability to flexibly expand resources such as storage space and memory under conditions such as extended storage or rapid increase in log data. Moreover, to overcome the processing limits of the existing analysis tool when a real-time analysis of the aggregated unstructured log data is required, the proposed system includes a Hadoop-based analysis module for quick and reliable parallel-distributed processing of the massive amount of log data. Furthermore, because the HDFS (Hadoop Distributed File System) stores data by generating copies of the block units of the aggregated log data, the proposed system offers automatic restore functions for the system to continually operate after it recovers from a malfunction. Finally, by establishing a distributed database using the NoSQL-based Mongo DB, the proposed system provides methods of effectively processing unstructured log data. Relational databases such as the MySQL databases have complex schemas that are inappropriate for processing unstructured log data. Further, strict schemas like those of relational databases cannot expand nodes in the case wherein the stored data are distributed to various nodes when the amount of data rapidly increases. NoSQL does not provide the complex computations that relational databases may provide but can easily expand the database through node dispersion when the amount of data increases rapidly; it is a non-relational database with an appropriate structure for processing unstructured data. The data models of the NoSQL are usually classified as Key-Value, column-oriented, and document-oriented types. Of these, the representative document-oriented data model, MongoDB, which has a free schema structure, is used in the proposed system. MongoDB is introduced to the proposed system because it makes it easy to process unstructured log data through a flexible schema structure, facilitates flexible node expansion when the amount of data is rapidly increasing, and provides an Auto-Sharding function that automatically expands storage. The proposed system is composed of a log collector module, a log graph generator module, a MongoDB module, a Hadoop-based analysis module, and a MySQL module. When the log data generated over the entire client business process of each bank are sent to the cloud server, the log collector module collects and classifies data according to the type of log data and distributes it to the MongoDB module and the MySQL module. The log graph generator module generates the results of the log analysis of the MongoDB module, Hadoop-based analysis module, and the MySQL module per analysis time and type of the aggregated log data, and provides them to the user through a web interface. Log data that require a real-time log data analysis are stored in the MySQL module and provided real-time by the log graph generator module. The aggregated log data per unit time are stored in the MongoDB module and plotted in a graph according to the user's various analysis conditions. The aggregated log data in the MongoDB module are parallel-distributed and processed by the Hadoop-based analysis module. A comparative evaluation is carried out against a log data processing system that uses only MySQL for inserting log data and estimating query performance; this evaluation proves the proposed system's superiority. Moreover, an optimal chunk size is confirmed through the log data insert performance evaluation of MongoDB for various chunk sizes.

Perceptional Change of a New Product, DMB Phone

  • Kim, Ju-Young;Ko, Deok-Im
    • Journal of Global Scholars of Marketing Science
    • /
    • 제18권3호
    • /
    • pp.59-88
    • /
    • 2008
  • Digital Convergence means integration between industry, technology, and contents, and in marketing, it usually comes with creation of new types of product and service under the base of digital technology as digitalization progress in electro-communication industries including telecommunication, home appliance, and computer industries. One can see digital convergence not only in instruments such as PC, AV appliances, cellular phone, but also in contents, network, service that are required in production, modification, distribution, re-production of information. Convergence in contents started around 1990. Convergence in network and service begins as broadcasting and telecommunication integrates and DMB(digital multimedia broadcasting), born in May, 2005 is the symbolic icon in this trend. There are some positive and negative expectations about DMB. The reason why two opposite expectations exist is that DMB does not come out from customer's need but from technology development. Therefore, customers might have hard time to interpret the real meaning of DMB. Time is quite critical to a high tech product, like DMB because another product with same function from different technology can replace the existing product within short period of time. If DMB does not positioning well to customer's mind quickly, another products like Wibro, IPTV, or HSPDA could replace it before it even spreads out. Therefore, positioning strategy is critical for success of DMB product. To make correct positioning strategy, one needs to understand how consumer interprets DMB and how consumer's interpretation can be changed via communication strategy. In this study, we try to investigate how consumer perceives a new product, like DMB and how AD strategy change consumer's perception. More specifically, the paper segment consumers into sub-groups based on their DMB perceptions and compare their characteristics in order to understand how they perceive DMB. And, expose them different printed ADs that have messages guiding consumer think DMB in specific ways, either cellular phone or personal TV. Research Question 1: Segment consumers according to perceptions about DMB and compare characteristics of segmentations. Research Question 2: Compare perceptions about DMB after AD that induces categorization of DMB in direction for each segment. If one understand and predict a direction in which consumer perceive a new product, firm can select target customers easily. We segment consumers according to their perception and analyze characteristics in order to find some variables that can influence perceptions, like prior experience, usage, or habit. And then, marketing people can use this variables to identify target customers and predict their perceptions. If one knows how customer's perception is changed via AD message, communication strategy could be constructed properly. Specially, information from segmented customers helps to develop efficient AD strategy for segment who has prior perception. Research framework consists of two measurements and one treatment, O1 X O2. First observation is for collecting information about consumer's perception and their characteristics. Based on first observation, the paper segment consumers into two groups, one group perceives DMB similar to Cellular phone and the other group perceives DMB similar to TV. And compare characteristics of two segments in order to find reason why they perceive DMB differently. Next, we expose two kinds of AD to subjects. One AD describes DMB as Cellular phone and the other Ad describes DMB as personal TV. When two ADs are exposed to subjects, consumers don't know their prior perception of DMB, in other words, which subject belongs 'similar-to-Cellular phone' segment or 'similar-to-TV' segment? However, we analyze the AD's effect differently for each segment. In research design, final observation is for investigating AD effect. Perception before AD is compared with perception after AD. Comparisons are made for each segment and for each AD. For the segment who perceives DMB similar to TV, AD that describes DMB as cellular phone could change the prior perception. And AD that describes DMB as personal TV, could enforce the prior perception. For data collection, subjects are selected from undergraduate students because they have basic knowledge about most digital equipments and have open attitude about a new product and media. Total number of subjects is 240. In order to measure perception about DMB, we use indirect measurement, comparison with other similar digital products. To select similar digital products, we pre-survey students and then finally select PDA, Car-TV, Cellular Phone, MP3 player, TV, and PSP. Quasi experiment is done at several classes under instructor's allowance. After brief introduction, prior knowledge, awareness, and usage about DMB as well as other digital instruments is asked and their similarities and perceived characteristics are measured. And then, two kinds of manipulated color-printed AD are distributed and similarities and perceived characteristics for DMB are re-measured. Finally purchase intension, AD attitude, manipulation check, and demographic variables are asked. Subjects are given small gift for participation. Stimuli are color-printed advertising. Their actual size is A4 and made after several pre-test from AD professionals and students. As results, consumers are segmented into two subgroups based on their perceptions of DMB. Similarity measure between DMB and cellular phone and similarity measure between DMB and TV are used to classify consumers. If subject whose first measure is less than the second measure, she is classified into segment A and segment A is characterized as they perceive DMB like TV. Otherwise, they are classified as segment B, who perceives DMB like cellular phone. Discriminant analysis on these groups with their characteristics of usage and attitude shows that Segment A knows much about DMB and uses a lot of digital instrument. Segment B, who thinks DMB as cellular phone doesn't know well about DMB and not familiar with other digital instruments. So, consumers with higher knowledge perceive DMB similar to TV because launching DMB advertising lead consumer think DMB as TV. Consumers with less interest on digital products don't know well about DMB AD and then think DMB as cellular phone. In order to investigate perceptions of DMB as well as other digital instruments, we apply Proxscal analysis, Multidimensional Scaling technique at SPSS statistical package. At first step, subjects are presented 21 pairs of 7 digital instruments and evaluate similarity judgments on 7 point scale. And for each segment, their similarity judgments are averaged and similarity matrix is made. Secondly, Proxscal analysis of segment A and B are done. At third stage, get similarity judgment between DMB and other digital instruments after AD exposure. Lastly, similarity judgments of group A-1, A-2, B-1, and B-2 are named as 'after DMB' and put them into matrix made at the first stage. Then apply Proxscal analysis on these matrixes and check the positional difference of DMB and after DMB. The results show that map of segment A, who perceives DMB similar as TV, shows that DMB position closer to TV than to Cellular phone as expected. Map of segment B, who perceive DMB similar as cellular phone shows that DMB position closer to Cellular phone than to TV as expected. Stress value and R-square is acceptable. And, change results after stimuli, manipulated Advertising show that AD makes DMB perception bent toward Cellular phone when Cellular phone-like AD is exposed, and that DMB positioning move towards Car-TV which is more personalized one when TV-like AD is exposed. It is true for both segment, A and B, consistently. Furthermore, the paper apply correspondence analysis to the same data and find almost the same results. The paper answers two main research questions. The first one is that perception about a new product is made mainly from prior experience. And the second one is that AD is effective in changing and enforcing perception. In addition to above, we extend perception change to purchase intention. Purchase intention is high when AD enforces original perception. AD that shows DMB like TV makes worst intention. This paper has limitations and issues to be pursed in near future. Methodologically, current methodology can't provide statistical test on the perceptual change, since classical MDS models, like Proxscal and correspondence analysis are not probability models. So, a new probability MDS model for testing hypothesis about configuration needs to be developed. Next, advertising message needs to be developed more rigorously from theoretical and managerial perspective. Also experimental procedure could be improved for more realistic data collection. For example, web-based experiment and real product stimuli and multimedia presentation could be employed. Or, one can display products together in simulated shop. In addition, demand and social desirability threats of internal validity could influence on the results. In order to handle the threats, results of the model-intended advertising and other "pseudo" advertising could be compared. Furthermore, one can try various level of innovativeness in order to check whether it make any different results (cf. Moon 2006). In addition, if one can create hypothetical product that is really innovative and new for research, it helps to make a vacant impression status and then to study how to form impression in more rigorous way.

  • PDF

A Study on the Meaning and Strategy of Keyword Advertising Marketing

  • Park, Nam Goo
    • Journal of Distribution Science
    • /
    • 제8권3호
    • /
    • pp.49-56
    • /
    • 2010
  • At the initial stage of Internet advertising, banner advertising came into fashion. As the Internet developed into a central part of daily lives and the competition in the on-line advertising market was getting fierce, there was not enough space for banner advertising, which rushed to portal sites only. All these factors was responsible for an upsurge in advertising prices. Consequently, the high-cost and low-efficiency problems with banner advertising were raised, which led to an emergence of keyword advertising as a new type of Internet advertising to replace its predecessor. In the beginning of 2000s, when Internet advertising came to be activated, display advertisement including banner advertising dominated the Net. However, display advertising showed signs of gradual decline, and registered minus growth in the year 2009, whereas keyword advertising showed rapid growth and started to outdo display advertising as of the year 2005. Keyword advertising refers to the advertising technique that exposes relevant advertisements on the top of research sites when one searches for a keyword. Instead of exposing advertisements to unspecified individuals like banner advertising, keyword advertising, or targeted advertising technique, shows advertisements only when customers search for a desired keyword so that only highly prospective customers are given a chance to see them. In this context, it is also referred to as search advertising. It is regarded as more aggressive advertising with a high hit rate than previous advertising in that, instead of the seller discovering customers and running an advertisement for them like TV, radios or banner advertising, it exposes advertisements to visiting customers. Keyword advertising makes it possible for a company to seek publicity on line simply by making use of a single word and to achieve a maximum of efficiency at a minimum cost. The strong point of keyword advertising is that customers are allowed to directly contact the products in question through its more efficient advertising when compared to the advertisements of mass media such as TV and radio, etc. The weak point of keyword advertising is that a company should have its advertisement registered on each and every portal site and finds it hard to exercise substantial supervision over its advertisement, there being a possibility of its advertising expenses exceeding its profits. Keyword advertising severs as the most appropriate methods of advertising for the sales and publicity of small and medium enterprises which are in need of a maximum of advertising effect at a low advertising cost. At present, keyword advertising is divided into CPC advertising and CPM advertising. The former is known as the most efficient technique, which is also referred to as advertising based on the meter rate system; A company is supposed to pay for the number of clicks on a searched keyword which users have searched. This is representatively adopted by Overture, Google's Adwords, Naver's Clickchoice, and Daum's Clicks, etc. CPM advertising is dependent upon the flat rate payment system, making a company pay for its advertisement on the basis of the number of exposure, not on the basis of the number of clicks. This method fixes a price for advertisement on the basis of 1,000-time exposure, and is mainly adopted by Naver's Timechoice, Daum's Speciallink, and Nate's Speedup, etc, At present, the CPC method is most frequently adopted. The weak point of the CPC method is that advertising cost can rise through constant clicks from the same IP. If a company makes good use of strategies for maximizing the strong points of keyword advertising and complementing its weak points, it is highly likely to turn its visitors into prospective customers. Accordingly, an advertiser should make an analysis of customers' behavior and approach them in a variety of ways, trying hard to find out what they want. With this in mind, her or she has to put multiple keywords into use when running for ads. When he or she first runs an ad, he or she should first give priority to which keyword to select. The advertiser should consider how many individuals using a search engine will click the keyword in question and how much money he or she has to pay for the advertisement. As the popular keywords that the users of search engines are frequently using are expensive in terms of a unit cost per click, the advertisers without much money for advertising at the initial phrase should pay attention to detailed keywords suitable to their budget. Detailed keywords are also referred to as peripheral keywords or extension keywords, which can be called a combination of major keywords. Most keywords are in the form of texts. The biggest strong point of text-based advertising is that it looks like search results, causing little antipathy to it. But it fails to attract much attention because of the fact that most keyword advertising is in the form of texts. Image-embedded advertising is easy to notice due to images, but it is exposed on the lower part of a web page and regarded as an advertisement, which leads to a low click through rate. However, its strong point is that its prices are lower than those of text-based advertising. If a company owns a logo or a product that is easy enough for people to recognize, the company is well advised to make good use of image-embedded advertising so as to attract Internet users' attention. Advertisers should make an analysis of their logos and examine customers' responses based on the events of sites in question and the composition of products as a vehicle for monitoring their behavior in detail. Besides, keyword advertising allows them to analyze the advertising effects of exposed keywords through the analysis of logos. The logo analysis refers to a close analysis of the current situation of a site by making an analysis of information about visitors on the basis of the analysis of the number of visitors and page view, and that of cookie values. It is in the log files generated through each Web server that a user's IP, used pages, the time when he or she uses it, and cookie values are stored. The log files contain a huge amount of data. As it is almost impossible to make a direct analysis of these log files, one is supposed to make an analysis of them by using solutions for a log analysis. The generic information that can be extracted from tools for each logo analysis includes the number of viewing the total pages, the number of average page view per day, the number of basic page view, the number of page view per visit, the total number of hits, the number of average hits per day, the number of hits per visit, the number of visits, the number of average visits per day, the net number of visitors, average visitors per day, one-time visitors, visitors who have come more than twice, and average using hours, etc. These sites are deemed to be useful for utilizing data for the analysis of the situation and current status of rival companies as well as benchmarking. As keyword advertising exposes advertisements exclusively on search-result pages, competition among advertisers attempting to preoccupy popular keywords is very fierce. Some portal sites keep on giving priority to the existing advertisers, whereas others provide chances to purchase keywords in question to all the advertisers after the advertising contract is over. If an advertiser tries to rely on keywords sensitive to seasons and timeliness in case of sites providing priority to the established advertisers, he or she may as well make a purchase of a vacant place for advertising lest he or she should miss appropriate timing for advertising. However, Naver doesn't provide priority to the existing advertisers as far as all the keyword advertisements are concerned. In this case, one can preoccupy keywords if he or she enters into a contract after confirming the contract period for advertising. This study is designed to take a look at marketing for keyword advertising and to present effective strategies for keyword advertising marketing. At present, the Korean CPC advertising market is virtually monopolized by Overture. Its strong points are that Overture is based on the CPC charging model and that advertisements are registered on the top of the most representative portal sites in Korea. These advantages serve as the most appropriate medium for small and medium enterprises to use. However, the CPC method of Overture has its weak points, too. That is, the CPC method is not the only perfect advertising model among the search advertisements in the on-line market. So it is absolutely necessary that small and medium enterprises including independent shopping malls should complement the weaknesses of the CPC method and make good use of strategies for maximizing its strengths so as to increase their sales and to create a point of contact with customers.

  • PDF

A Study on Movement of the Free Face During Bench Blasting (전방 자유면의 암반 이동에 관한 연구)

  • Lee, Ki-Keun;Kim, Gab-Soo;Yang, Kuk-Jung;Kang, Dae-Woo;Hur, Won-Ho
    • Explosives and Blasting
    • /
    • 제30권2호
    • /
    • pp.29-42
    • /
    • 2012
  • Variables influencing the free face movement due to rock blasting include the physical and mechanical properties, in particular the discontinuity characteristics, explosive type, charge weight, burden, blast-hole spacing, delay time between blast-holes or rows, stemming conditions. These variables also affects the blast vibration, air blast and size of fragmentation. For the design of surface blasting, the priority is given to the safety of nearby buildings. Therefore, blast vibration has to be controlled by analyzing the free face movement at the surface blasting sites and also blasting operation needs to be optimized to improve the fragmentation size. High-speed digital image analysis enables the analyses of the initial movement of free face of rock, stemming optimality, fragment trajectory, face movement direction and velocity as well as the optimal detonator initiation system. Even though The high-speed image analysis technique has been widely used in foreign countries, its applications can hardly be found in Korea. This thesis aims at carrying out a fundamental study for optimizing the blast design and evaluation using the high-speed digital image analysis. A series of experimentation were performed at two large surface blasting sites with the rock type of shale and granite, respectively. Emulsion and ANFO were the explosives used for the study. Based on the digital images analysis, displacement and velocity of the free face were scrutinized along with the analysis fragment size distribution. In addition, AUTODYN, 2-D FEM model, was applied to simulate detonation pressure, detonation velocity, response time for the initiation of the free face movement and face movement shape. The result show that regardless of the rock type, due to the displacement and the movement velocity have the maximum near the center of charged section the free face becomes curved like a bow. Compared with ANFO, the cases with Emulsion result in larger detonation pressure and velocity and faster reaction for the displacement initiation.

A preliminary study for development of an automatic incident detection system on CCTV in tunnels based on a machine learning algorithm (기계학습(machine learning) 기반 터널 영상유고 자동 감지 시스템 개발을 위한 사전검토 연구)

  • Shin, Hyu-Soung;Kim, Dong-Gyou;Yim, Min-Jin;Lee, Kyu-Beom;Oh, Young-Sup
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • 제19권1호
    • /
    • pp.95-107
    • /
    • 2017
  • In this study, a preliminary study was undertaken for development of a tunnel incident automatic detection system based on a machine learning algorithm which is to detect a number of incidents taking place in tunnel in real time and also to be able to identify the type of incident. Two road sites where CCTVs are operating have been selected and a part of CCTV images are treated to produce sets of training data. The data sets are composed of position and time information of moving objects on CCTV screen which are extracted by initially detecting and tracking of incoming objects into CCTV screen by using a conventional image processing technique available in this study. And the data sets are matched with 6 categories of events such as lane change, stoping, etc which are also involved in the training data sets. The training data are learnt by a resilience neural network where two hidden layers are applied and 9 architectural models are set up for parametric studies, from which the architectural model, 300(first hidden layer)-150(second hidden layer) is found to be optimum in highest accuracy with respect to training data as well as testing data not used for training. From this study, it was shown that the highly variable and complex traffic and incident features could be well identified without any definition of feature regulation by using a concept of machine learning. In addition, detection capability and accuracy of the machine learning based system will be automatically enhanced as much as big data of CCTV images in tunnel becomes rich.

Investigation of Furfural Yields of Liquid Hydrolyzate during Dilute Acid Pretreatment Process on Quercus Mongolica using Response Surface Methodology (신갈나무 약산 전처리 공정 중 반응표면분석법을 이용한 액상 가수분해물의 furfural 수율 탐색)

  • Ryu, Ga-Hee;Jeong, Han-Seob;Jang, Soo-Kyeong;Hong, Chang-Young;Choi, Joon Weon;Choi, In-Gyu
    • Journal of the Korean Wood Science and Technology
    • /
    • 제44권1호
    • /
    • pp.85-95
    • /
    • 2016
  • In this study, furfural, which is one of the value-added chemicals, was produced from the hydrolyzate of Quercus mongolica using dilute acid pretreatment, and the optimal pretreatment condition was determined by Response Surface Methodology (RSM) to obtain high yield of furfural. Based on Central Composite Design, the pretreatment experiment was designed with parameters such as reaction temperature ($X_1$), acid concentration ($X_2$), and reaction time ($X_3$) as independent variables, while dependent variable was furfural concentration (Y), and furfural yield (Z) was shown as percentage of Y per a dry weight basis. According to results of RSM, it was confirmed that reaction temperature ($X_1$) was the most influence factor and reaction temperature ($X_1$)-acid concentration ($X_2$) was the most significant interaction factor on furfural yield. Also, the optimal condition for the highest furfural yield was predicted at reaction temperature of $184^{\circ}C$, acid concentration of 1.17%, and reaction time of 5 min by RSM, and expected maximum yield of furfural was 6.37%. Experimentally, the maximum yield of furfural produced at above optimal condition was 6.21%, and it was considerably similar with the predicted value, and therefore the model for furfural production from the hydrolyzate of Quercus mongolica during dilute acid pretreatment could be built using RSM.

INFRARED THERMOGRAPHIC ANALYSIS OF TEMPERATURE RISE ON THE SURFACE OF BUCHANAN PLUGGER (적외선열화상장치를 이용한 Buchanan plugger 표면의 온도상승 분석)

  • Choi, Sung-A;Kim, Sun-Ho;Hwang, Yun-Chan;Youn, Chang;Oh, Byung-Ju;Choi, Bo-Young;Juhng, Woo-Nam;Jeong, Sun-Wa;Hwang, In-Nam;Oh, Won-Mann
    • Restorative Dentistry and Endodontics
    • /
    • 제27권4호
    • /
    • pp.370-381
    • /
    • 2002
  • This study was performed to evaluate the temperature rise on various position of the Buchanan plugger, the peak temperature of plugger's type and the temperature change by its touching time of heat control spling. The heat carrier system 'System B' (Model 1005, Analytic Technologies, USA) and the Buchanan's plug-gers of F, FM, M and ML sizes are used for this study. The temperature was set to 20$0^{\circ}C$ which Dr. Buchanan's "continuous wave of condensation" technique recommended on digital display and the power level on it was set to 10. In order to apply heat on the Buchanan's pluggers, the heat control spring was touched for 1, 2, 3, 4 and 5 seconds respectively. The temperature rise on the surface of the pluggers were measured at 0.5 mm intervals from tip to 20 mm length of shank using the infrared thermography (Radiation Thermometer-IR Temper, NEC San-ei Instruments, Ltd, Japan) and TH31-702 Data capture software program (NEC San-ei Instruments, Ltd, Japan). Data were analyzed using a one way ANOVA followed by Duncan's multiple range test and linear regression test. The results as follows. 1. The position at which temperature peaked was approximately at 0.5 mm to 1.5 mm far from the tip of Buchanan's pluggers (p<0.001). The temperature was constantly decreased toward the shank from the tip of it (p<0.001). 2. When the pluggerss were heated over 5 seconds, the peak temperature by time of measurement revealed from 253.3$\pm$10.5$^{\circ}C$ to 192.1$\pm$3.3$^{\circ}C$ in a touch for 1 sec, from 218.6$\pm$5.$0^{\circ}C$ to 179.5$\pm$4.2$^{\circ}C$ in a touch for 2 sec, from 197.5$\pm$3.$0^{\circ}C$ to 167.5$\pm$3.7$^{\circ}C$ in a touch for 3 sec, from 183.7$\pm$2.5$^{\circ}C$ to 159.8$\pm$3.6$^{\circ}C$ in a touch for 4 sec and from 164.9$\pm$2.$0^{\circ}C$ to 158.4$\pm$1.8$^{\circ}C$ in a touch for 5 sec. A touch for 1 sec showed the highest peak temperature, followed by, in descending order, 2 sec, 3 sec, 4 sec. A touch for 5 sec showed the lowest peak temperature (p<0.001). 3. A each type of pluggers showed different peak temperatures. The peak temperature was the highest in F type and followed by, in descending order, M type, ML type. FM type revealed the lowest peak temperature (p<0.001). The results of this study indicated that pluggers are designed to concentrate heat at around its tip, its actual temperature does not correlate well with the temperature which Buchanan's "continuous wave of condensation" technique recommend, and finally a quick touch of heat control spring for 1sec reveals the highest temperature rise.

A Study on Systems Analysis Applied to Library Management (도서관경영(圖書館經營)에 있어서의 시스팀 분석기법응용(分析技法應用)에 관한 연구(硏究))

  • Gweon, Gyi-Won
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • 제2권1호
    • /
    • pp.178-210
    • /
    • 1974
  • It needs to put into practice the systems analysis in the analysis of some operations and status of library for the purpose of systematizing the work of reforming in the new easier form to process, to storage, to retrieve and to make use of the increasing informations and data of library. In this study, some of systems which are generally using in every library was caught in the case study of K university library. Having analyzed them with the two methods of the flowcharting and mathematical analysis, we found the obstructive factors in operation. As the result of this research, it was gained the new system as the alternative one. A. Alternative System B. Advantages of alternative systems 1. In the reference room When it converts the present system into the new system, it can profit 6.771 won/user (13.815won-7.044won=6.771 won). Therefore, a half the average required cost of the present system can be saved. If this saving would be alloted for the cost 33,000won required to make the cataloging cards, it would be taken for 94 days (33,000 won ${\div}$ 6,771 won/user=4,874users. 4,874users ${\div}$ 52users/day=94days) to get it. The saving cost/year by the new system will be 95,417 won, and in the first year the initial cost (33,000won) reduces the saving cost to 62,417won. 2. In the periodical room The average required time for using the materials of the present system is 17 minutes/user and the average required cost/user is 23.775won, while the average required time of the new system is 4 minutes and the average required cost/user is 5.33won. Therefore, the new system has profit 4 times of the present system. Accordingly, it occurs when the dispersed periodical materials get together. 3. In the classification and cataloging When one processes - the oriental books - by the Linear Programming Technique, the maximum of the process can be increased from 11.6 volumes per librarian of the present system to 12 volumes per librarian of the new system increased 0.4 volume in a day, and cataloging by the manual printer can be shorten from 3 minutes per card of the present system to 1.5 minutes per card of the new system. Consequently, we can complete the other operations (books equipment, updating of cataloging cards, etc.) with 141 minutes which are saved in the course of the afore-mentioned works. 4. In the status of collections The average growth rate of 4 years from 1968 to 1971 is 9.825 %, and that of the purchased materials is 6.2% similar to the advanced nations, but it has the different position from 215,000 volumes by the Standard Degree for Establishment of College and University, and the difference between the total collections 151,671 volumes and Dunns' growth model ($N_t=N_oe^{-at}$) claimed by Leimkuhler 155,297 volumes in 1971 is 3,626 volumes, and for the purpose of compensation the difference, we found the fact that it needs to have the increased budget of 24~30% per year, Thus, if the budget of 24~30 % per year. Thus, if the budget would be increased per year as the rate of the afore-mentioned figure, it would be reached at the Standard Degree for Establishment of College and University in 1975, and thereafter, it can be decreased to the lebel which is able to maintain the growth rate of 5~6% per year.

  • PDF

Study of Value Estimation of Environmental Education of Gyeongnam Forest Museum using CVM (CVM을 이용한 경상남도산림박물관의 환경교육 가치추정 연구)

  • Kang, Kee-Rae;Ha, Sung-Gyone;Kim, Hee-Chae;Lim, Yeon-Jin;Kim, Dong-Pil;Park, Chang-Kun
    • Journal of Korean Society of Forest Science
    • /
    • 제105권1호
    • /
    • pp.149-156
    • /
    • 2016
  • Forest museums can be defined as facilities for the collection, exhibition, and education of the forest or forest related artifacts or data. This study was performed to measure the educational value of Gyeongnam state forest museum's forest and its environment. The tool used was the Contingent Valuation Methods (CVM) which is well known as a value estimation tool of environmental goods. The study for the value estimation is performed from April, 2014 to October of the same year through selection of the subject, decision of proposed price, and orientation of the survey staffs and total of 386 surveys were used in analysis. The value estimation tool used the DBDC logit model and the input parameters were number of visit (time), degree of environmental education (contri), the environment conservation effort of the respondent (execu), the education level of the respondent (edu), and income of the respondent (inc) and trimmed mean (WTPtruncated) was used. The estimated value of flora and environment education per each person per visit is 23,338 won. When applied to the average annual visitors deducted from 2010 to 2014, which is 430,000 per year, the environmental value that Gyeongnam state forest museum is providing to visitors each year is about 10 billion won. The result of this study is significant to propose the value of forest education and environment that the forest museum is offering to the visitors in the current currency. This is an evidence to directly determine the value of the forest museum and therefore proposing an opportunity change the recognition toward the forest and environment education.