• 제목/요약/키워드: U-City정보

검색결과 454건 처리시간 0.023초

갓 (Brassica juncea) 품종구분을 위한 ITS 영역 및 MITE Family 정보를 이용한 분자표지 개발 (Development of molecular markers for varietal identification of Brassica juncea on the basis of the polymorphic sequence of ITS regions and MITE families)

  • 양기웅;이고은;아리프 하산 칸 로빈;정남희;이용혁;박종인;김회택;정미영;노일섭
    • 원예과학기술지
    • /
    • 제34권2호
    • /
    • pp.305-313
    • /
    • 2016
  • 갓(Brassica juncea; 2n = 4x = 36, AABB genome, 1,068Mb)은 U's triangle의 배추와 흑겨자 사이의 복이배체 작물로 구분한다. 본 연구는 갓 15 품종의 ribosomal DNA ITS 영역과 MITE를 이용하여 갓의 유연관계 및 품종구분 분자표지를 확인하였다. Ribosomal DNA ITS 영역은 종 및 품종의 유연관계를 알아보는 연구로 많이 사용되고 있어서, 이를 이용하여 갓 15 품종의 유연관계를 알아보았다. 또한, MITE는 매우 많은 copy 수를 가지고 있고, 유전적으로 안정적이기 때문에 유전체 및 진화 연구에 매우 적합한 재료이다. MITE를 이용한 갓의 품종구분 분자표지를 확인하기 위해 MITE super-families 중 Stowaway(BraSto) 관련 70점, Tourist(BraTo) 관련 79점, hAT(BrahAT) 관련 6점, Mutator(BraMu) 관련 5점으로 품종구분 표지를 알아보았다. 총 160점의 분자표지 중 32점이 갓 15 품종에서 뚜렷한 다형성을 보였다. 특히, 흑갓은 표현형뿐만 아니라 유전자형도 매우 다르게 나타났다. 또한 8점의 MITE 분자표지를 활용하여 47점의 유전자원에서 다형성 및 품종구분 표지로의 활용 가능성을 확인하였다. 이러한 다형성 표지들은 갓의 품종구분 및 품종 보호에 매우 유용하게 사용할 수 있을 것이라 기대한다.

조선후기 유서류(類書類)에 나타난 민속종교 자료 (The Materials on Korean Folk Religions in the Encyclopedic Literatures of Late Joseon Dynasty)

  • 서영대
    • 역사민속학
    • /
    • 제33호
    • /
    • pp.31-72
    • /
    • 2010
  • 이 글은 조선후기의 대표적 유서인 이수광(李晬光)의 『지봉유설(芝峯類說)』·홍만선(洪萬選)의 『산림경제(山林經濟)』·이익(李瀷)의 『성호사설(星湖僿說)』·이규경(李圭景)의 『오주연문장전산고(五洲衍文長箋散稿)』에 수록된 민속종교 관련 자료들을 살펴본 것으로, 먼저 4종의 유서에서 민속종교 관련 항목들을 추출하여, 그 내용을 표로 제시하였다. 다음으로 이들 유서류에서 언급된 민속종교 관련 자료들의 성격과 내용을 살펴보았다. ① 이들 유서들은 전대의 것이 후대의 것에 상당한 영향을 미치면서 많은 공통점을 가지게 되었지만, 한편으로는 저술 목적에 따라 차이가 있다. 즉 『지봉유설』·『성호사설』·『오주연문장전산고』는 백과전서식 저술답게 민속종교의 다양한 측면을 전하는데 비해 『산림경제(山林經濟)』는 실생활에서 발생할 수 있는 문제와 그 해결이란 실천적 내용이 중심을 이루고 있다. ② 이들 유서는 민속종교를 부정적인 것으로 인식했다. 그것은 이들 유서가 기본적으로 유교적 관념에 기초했기 때문이다. 그러나 완전한 부정에는 이르지 못하고, 영험성의 일부를 인정하기도 했다. ③ 조선시대 민속종교의 신앙대상들, 즉 성황신·업신·질병신·금부대왕신(金傅大王神)·정득양(鄭得揚)·관왕신(關王神)·부근신(付根神) 등에 대한 유서류의 내용을 살펴보았다. ④ 이들 유서류들은 귀신에 대해서도 공통적으로 관심을 보였는데, 그들의 귀신론은 기본적으로 성리학에 기초한 것이면서도 그 영험성으로 말미암아 민속종교의 귀신론을 일부 수용하고 있다. ⑤ 이들 유서류에서는 공통적으로 점복에 대해 상당한 관심을 가지고 있다. 그렇지만 개인의 운명에 관한 점복은 부정적으로 인식했고, 농사의 풍흉점에 대해서는 긍정적으로 이해하려 했다. ⑥ 이들 유서류에는 저주와 벽사에 관한 항목들도 상당수 있어, 이를 살펴보았다. ⑦ 무격은 민속종교의 성직자로서 민속종교의 핵심에 서 있는 존재이기 때문에 이들 유서류에서 공통의 관심사가 되었다. 이들 유서에서 무격은 부정적으로 묘사되고 있지만, 그 영험성의 일부는 인정하고 있었다. 그렇다고 한다면 이들 유서류들은 비록 민속종교에 대해 부정적인 입장을 취하고 있고 잘못된 정보를 제공하기도 하지만, 조선후기 민속종교의 다양한 사실들을 전한다는 점에서 자료적 가치를 간과할 수 없다. 따라서 이들 유서류들은 향후 민속종교 연구에서 반드시 심도 있게 검토되어야 할 자료라 하겠다.

위성영상과 머신러닝 활용 도시열섬 지역 옥상녹화 효과 예측과 이산화탄소 흡수량 평가 (Predicting the Effects of Rooftop Greening and Evaluating CO2 Sequestration in Urban Heat Island Areas Using Satellite Imagery and Machine Learning)

  • 김민주;박정우;박주현;박지수;현창욱
    • 대한원격탐사학회지
    • /
    • 제39권5_1호
    • /
    • pp.481-493
    • /
    • 2023
  • 고밀도 도심지의 열섬현상이 도시 기온을 더 높이고 있으며 이로부터 대기오염 악화, 냉방 에너지 소비 증가 및 온실가스 배출 증대와 같은 부정적 영향들이 발생한다. 녹지의 추가 확보가 어려운 도시 환경에서 옥상녹화는 효율적인 온실가스 감축 전략이다. 본 연구에서는 열섬현상 현황 분석에서 더 나아가 고해상도 위성자료 및 공간정보를 활용하여 연구 지역 내 옥상녹화 가용면적 산정 후 옥상녹화가 가져오는 온도 분포 예측을 통한 열섬현상 완화도 및 이산화탄소 흡수량 평가를 수행하였다. 이를 위해 WorldView-2 위성자료를 활용하여 부산시 도시열섬 지역의 기존 토지피복을 분류하고 머신러닝 기법을 적용하여 옥상녹화 전 후 온도 분포 예측 모델을 개발하였다. 옥상녹화 면적 변화에 따른 열섬현상 완화도를 평가하기 위해 랜덤포레스트 기법을 통해 온도가 종속변수인 온도 분포 예측모델을 구축하였고, 이 과정에서 랜덤포레스트 모델의 훈련자료로 사용될 고해상도 지표 온도 도출을 위해 Google Earth Engine을 활용하여 Landsat-8과 Sentinel-2 위성자료를 융합하는 다중회귀모델을 적용하였다. 또한, 옥상녹화용 초본식생별 이산화탄소 흡수량을 기반으로 녹화 면적에 따른 이산화탄소 흡수량을 평가하였다. 연구 결과를 통해 개발된 위성자료 활용 도시 열섬현상 평가 및 랜덤포레스트 모델 기반 온도 분포 예측 기술은 도시열섬 취약 지역에 확대 적용이 가능할 것으로 기대된다.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.