A Basic Plan for the Promotion of Space Development (hereinafter referred to as "basic plan"), which prescribes mid- and long-term policy objectives and basic direction-setting on space development every five years, is one of the matters to be deliberated by the National Space Committee. Confirmed February 2018 by the Committee, the 3rd Basic Plan has a unique matter, compared to the 2nd Basic Plan. It is to construct "Korean Positioning System(KPS)". Almost every country in the world including Korea has been relying on GPS. On the occasion of the shooting down of a Korean Air flight 007 by Soviet Russia, GPS Standard Positioning Service has been open to the world. Due to technical errors of GPS or conflict of interests between countries in international relations, however, the above Service can be interrupted at any time. Such cessation might bring extensive damage to the social, economic and security domains of every country. This is why some countries has been constructing an independent global or regional satellite navigation system: EU(Galileo), Russia(Glonass), India(NaVic), Japan(QZSS), and China(Beidou). So does South Korea. Once KPS is built, it is expected to make use of the system in various areas such as transportation, aviation, disaster, construction, defense, ocean, distribution, telecommunication, etc. For this, a pan-governmental governance is needed to be established. And this governance must be based on the law. Korea is richly experienced in developing and operating individually satellite itself, but it has little experience in the simultaneous development and operation of the satellites, ground, and users systems, such as KPS. Therefore we need to review overseas cases, in order to minimize trial and error. U.S. GPS is a classic example.
Purpose: The number of laparoscopy assisted distal gastrectomies (LADG) is gradually increasing for the treatment of early gastric cancer (EGC) patients as a surgical modality for improving quality of life. However, there are few reports on laparoscopy-assisted total gastrectomy (LATG), mainly because this procedure is performed relatively infrequently, and the procedure is more complicated than LADG. This study was performed to evaluate the technical feasibility, safety, and surgical results of LATG with lymphadenectomy through a review of our experience. Materials and Methods: From July 2003 to June 2007, 77 LATG with Roux-en-Y esophagojejunostomy were performed for patients with a preoperative diagnosis of EGC. The clinicopathological features and surgical outcomes were analyzed. Results: There were 49 males and 28 females in the study with a mean age of 61 years (range $30{\sim}85$ years). The mean operation time was 210 minutes (range $100{\sim}400$ minutes) and the operation time was gradually decreased as the case numbers increased. There were 13 operative morbidities (16.9%) and no operative mortalities. The restoration of bowel motility was noted at 3.2 postoperative days; a soft diet was started at 4.4 postoperative days and the duration of hospital stay was 10 days. There were 20 mucosal lesions, 32 submucosal lesions, 15 proper muscle lesions, 7 subserosal lesions and 3 serosal lesions. A total of 20 patients were treated by D2 lymph node dissection, 55 patients were treated by D1+$\beta$ lymph node dissection, and two patients were treated by D1+$\alpha$ lymph node dissection. The mean number of retrieved lymph nodes was 42 (range $11{\sim}86$). Lymph node metastases were noted in 12 patients. Conclusion: This study indicated LATG could be applied safely and effectively for patients with EGC. However, a prospective study comparing laparoscopy-assisted versus open gastrectomy for short-term and long-term surgical outcome is needed.
Doctor has the duty of an inter-hospital transfer, known as inter-facility or secondary transfer, when the diagnostic and therapeutic facilities required for a patient are not available at the given hospital. Also, the decision to transfer the patient to an another facility is rely on whether ill patient is the benefits of care, including clinical and non-clinical reasons, available at the another facility against the potential risks. Crucial point to note is that issues about 'inter-hospital transfer' is limited to questions occurred in the course of transfer between emergency medicals (facilities). 'emergency medical (facility)' is specified by Medical Law, article 3 and the duty of an inter-hospital transfer includes any possible adverse events, medical or technical, during the transfer. Because each medical facility has an different ability to care for a patient in an emergency condition, coordination between the referring and receiving hospitals' emergency medicals would be important to ensure prompt transfer to the definitive destination avoiding delay at an emergency. Simultaneously, transfer of documents about the transfer process, medical record and investigation reports are important materials for maintaining continuity of medical care. Although the duty of an inter-hospital transfer is recognized as one of duty of doctor and more often than not it occurs, there is constant legal conflict between a doctor and a patient related to the duty of the inter-hospital transfer. Therefore, we need clear and specific legal standard about the inter-hospital transfer. This paper attempts to review the Supreme Court's cases associated to the inter-hospital transfer and to compare opinion of the cases with guideline for an inter-hospital transfer already given. Furthermore, this article is intended to broaden our horizons of understanding the duty of an inter-hospital transfer and I wish this article helps to resolve the settlement and case dealt with the duty of inter-hospital transfer.
The purpose of this study is to analyze the key factors affecting satisfaction of the visually impaired SNS users so that they may use SNS more effectively in the future. This study has used three factors such as the information factor, the relationship factor and the speed factor and the usability as independent variables. The social presence factor was used as a parameter and the SNS user satisfaction as a dependent variable. For the research, 195 visually impaired SNS users have participated in this survey. The major findings of this study are that the relationship factor has strong effects on the self-identification factor, the social presence factor and the SNS usage satisfaction among the factors affecting the visually impaired users to be satisfied with SNS. On the other hand, the information factor and usage factor have no effects on the self-identification factor and the social presence factor. However, they have effects on the SNS usage satisfaction. Additionally, the self-identification factor has no effect on the SNS usage satisfaction, but the social presence factor has effect. Based on the above study results, this paper proposed for the government to enhance the educational program on the use of SNS for the visually impaired and to increase its financial and political support on this subject. Additionally, technical supports on SNS service accessibility and usage by the government are vital for the visually impaired. Academically, this study provides a concrete groundwork for the research on the use of SNS by the visually impaired by providing a solid research direction for further study on this subject. Socially, this study helps the visually impaired use SNS more effectively by increasing the general public awareness of the importance of SNS usages by the visually impaired so that the information gap of the society may be diminished in the future.
The purpose of this study is to analyze the performance of Virtual Desktop Infrastructure(VDI) adoption. VDI performance was measured by IS manager (system quality, security, and managerial operation) and business user (usability, access, and user satisfaction). The survey questionnaires were developed for measuring VDI performance. 84 data samples were collected from the companies that had adopted cloud-based VDI. This research model was verified by Smart-PLS and SPSS. The research findings were as follows: First, the companies using VDI experienced actual performance, but they did not attain their expectation. Second, as results of comparing between IS managers and business users, IS administrators had considerably higher performance than business users, which indicates that there were big differences in performance perception among users. Compared with prior research such as technical trend, system construction, and performance improvement, this study has the following implications. First, by comparing the expected performance with the actual performance of the companies that have implemented and operating VDI, it was suggested how a company that wants to adopt VDI can manage the expectation level of VDI and achieve higher actual performance. Second, because the perception of VDI performance differs between business users and system managers, it is meaningful that a fair evaluation of VDI performance requires a balanced consideration of business users and system managers.
A mass production of chestnut necessiates the development of economic long-term storage method. The main objective of this study was to confirm the technical aspect of the chestnut storage method which was developed by two year project and to review the method of commercial application. The chestnut used for the experiments were separated in brine $(5.5{\sim}6.0^{\circ}\:B{\acute{a}}ume)$ into matured and unmatured lots and fumigated with $CS_2$ at a 5 $lb/27\;m^3$ level for $25{\sim}30\;hrs.$ The chestnuts were packed in wooden boxes with sawdust (50% moisture) in the ratio of 1 : 1 by volume. The boxes were stored in the cold room $(1{\pm}1^{\circ}C,\;85{\sim}95%\;RH)$ and the cellar ($0{\sim}10^{\circ}C$, controlled only by circulating night cool air). The results obtained were as follows: 1. Fully matured chestnut could be successfully preserved $8{\sim}9\;months$ at a l0% decay level in the cold room and $4{\sim}5\;months$ months in cellar. 2. Immatured chestnuts wire inferior to the matured in storage stability. At the maximum storage period, its storage life was two months shorter. 3. The heat transfer equation of piled chestnuts with sawdust can be suggested as $T_{\infty}-T_0=(T_{\infty}-T_0){\cdot}10^{-t/320}$ and j and $f_h$ values were 1 and 320 min, respectively. 4. The chestnuts in the package of storage unit had longer shelf life than naked chestnut during the retail distribution at ambient temperature.
It is the time of the Korean Wave booming throughout the world, placing Korean culture in the center of the world and its added value is unaccountable. At this prosperity, the preserving of the archetype of Korean dancing and digital contents making is becoming a task not only for the government but also for the private sector because culture industry has enormous added values. To achieve such goals, contents development is an urgent matter but establishing the value of the archetype of Korean traditional dancing must have priority. The public has to take an active role in rediscovering the values of traditional culture, and as the representative of Korean identity traditional dancing must be the object of a systematic art policy. This study will review the current status of 'digital contents program of the archetype of culture' for traditional dancing and will reconsider the modern value of preserving the archetype of culture to make a suggestion to the direction of culture art policies in the near future. The study acknowledged the lack of technical personnel majoring in the archetype of traditional dancing and the need of reviewing the credibility of historical research procedures. Even with the studies by industry-university collaboration and positioning of specialists, effective policies that will form the foundation for private firms to train personnels is in urgent need. In other words, training personnels, allocation of resource, securing funds, policies promoting collaboration between private and individual businesses, and the commercial recognition at private firms are still far from establishing. This is due to the fact that archetype of culture is not a business that creates revenue immediately, therefore the recognition of traditional dancing as an investable item by business-oriented firms or movements are difficult to find. To overcome such situation, software oriented policies that establish open communication and sharing with the public should be done at first rather than the quantity oriented hardware policies of contents development. Through this process the public can change the attitude on traditional dancing and traditional dancing could be newly recognized as a creative repository of culture and as public businesses giving birth to economic value.
The longing for submarine manufacture and the fear of her power had exited for a long time, but submarine that could submerge and attack was built from 20th century by science technology development. The question, 'Submarine can exercise her power in naval warfare?' had exited before World War I, but the effective value of submarine was shown in the procedure of a chain of naval warfare during World War I and World War II. Germany and the United States made the best use of submarines at that time. The submarines of these nations mounted fierce attack on the enemy's battleships and merchant ships and blocked the sea lanes for war material. These fierce attack on ships became impossible After World War II, and the major powers reduced and coordinated the defence budget, so they considered the role of submarine. However, submarine is still powerful weapon system because she can secretly navigate under the water, and one of the most important force in the navy. The aim of this thesis is analyzing submarine roles in each naval warfare and integrating maritime strategy and weapon system technology into her roles. First, the research about represent submarine roles like anti-surfaceship warfare, anti-submarine warfare, intelligence gathering, land attack, supporting special operation and mine landing warfare will be presented, then the major naval warfare where submarine participated(during ex-World War I, World War I, World War II, The Cold War Era and post Cold War) and the analyzing of submarine roles by time will be presented. Submarine was developed for anti-surfaceship warfare during ex-World War I but could not make remarkable military gain in naval warfare because her performance and weapon was inadequate. However, the effective value of submarine in the procedure of a chain of naval warfare was shown during World War I and World War II. The major powers put battleships into naval warfare undiscriminatingly to command the sea power and submarines did massive damage to enemy navy power, so put a restraint the maritime power of enemy, and blocked the sea lanes for war material. After World War II, the battlefield situation changed rapidly and the concept of preemption became difficult to apply in naval warfare. Therefore, the submarine was unable to concentrate on anti-surfaceship mission. Especially during the Cold War era, nuclear submarine came to appear and her weapon system developed rapidly. These development gave submarines special missions: anti-submarine warfare and intelligence gathering. At that time, United States and Soviet submarines tracked other nation's submarines loaded with nuclear weapons and departing from naval their base. The submarines also collected information on the volume of ships and a coastal missile launching site in company with this mission. After Cold War, the major powers despatched forces to major troubled regions to maintain world peace, their submarines approached the shores of these regions and attacked key enemy installations with cruise missiles. At that time, the United States eased the concept of preemption and made the concept of Bush doctrine because of possible 911 terrorism. The missiles fired from submarines and surface battleships accurately attacked key enemy installations. Many nations be strategically successful depending on what kind of mission a submarine is assigned. The patterns of future naval warfare that my country will provide against will be military power projection and coalition/joint operations. These suggest much more about what future missions we should assign to submarines.
After its experiment involving the exploding of a satellite in space in 2007, China proudly aired news on TV and ran articles in newspapers. However, the event was internationally criticized and drew widespread attention. Many countries denounced the explosion by pointing out that it could be part of the nation's plan to expand its military power to space or that it could pose a danger to the peaceful use of space. However, there is no talk of whether the experiment that produced a huge amount of space debris could have violated an international law, namely the Outer Space Treaty. Although space garbage has been said to be a serious problem, the amount is still on the increase. If we continue to launch new space launch vehicles into orbit at this rate, we will not be able to use it anytime soon like we do today. As the commercial use of space is likely to increase, the situation will certainly get worse. The international community is fully aware of the seriousness of the problem and working together to reduce the amount of space garbage. However, despite the fact that the United States and Soviet Union's ASAT(Anti-Satellite) programs have been implemented for a long time, there have been no complaints about them in terms of military expansion or breach of the Outer Space Treaty. Also, the recent Chinese test is largely viewed to be in accordance with international law. A lot of research has been undertaken with regard to the problem of space garbage. Now people's awareness of dangers being posed has been fully raised. Under the circumstances, the dismissing of China's satellite smashing, leaving a big mess in its wake, as nothing more than an experiment, is a red flag to, if not many, at least some people. By means of this thesis, I would like to review whether the Chinese test has violated an international space law. This thesis presents an overview of the issues surrounding the event and examines the possibility of violating the Outer Space Treaty, formally the Treaty on Principle Governing the Activities of States in the Exploration and Use of Outer Space, Including the Moon and Other Celestial Bodies. After the China test, the UN Scientific and Technical Subcommittee first adopted space debris mitigation guidelines, I'll introduce the content of the guidelines and discuss the characteristics of the guidelines and what can be done to address the issue.
In the meantime, research on corporate informatization focuses on the completeness of information technology itself and its financial effects, so there is insufficient research on whether information technology can support business strategy. It is necessary to verify whether the management strategy implementation of the company can be led through the informatization of the enterprise and the relation between the main mechanism factors and the informatization performance. In this study, what a mechanism factor is applied in the process of result creation of informatization from three mechanism perspectives such as selecting mechanism, learning mechanism and coordinating mechanism with cases of representative domestic IT company and what an importance mechanism factors have been ascertained. This study results in 8 propositions. For a main agent of companies, securement of information capability of organizations has been selected to realize informatization results and investment of informatization has been selected to solve organizational decentralization problems as the most important factor. Additionally, as competition in the industry gets fierce, investment on informatization has been changed to a utility way of implementation of strategies and decision on investment has been made through the official process and information technology. Differentiated company capability has been made based on acquisition of technical knowledge and company information has been expanded to its whole employees through the information system. Also, informatization change management and outside subcontractor management have been acknowledged as an important adjustment factor of company. The first implication of this study is that since case studies on mechanism factors that preceding studies on informatization results did not empirically cover have directly been dealt with based on experiences of executives in charge of business and in charge of informatization, this study can provide practical views about factors that should be mainly managed for informatization results of IT companies. Secondly, since ser-M framework has been applied for IT companies for the first time, this study can academically contribute to companies in other fields about main mechanism factors for result creation of informatization based on deeper understanding and empirical cases.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.