• Title/Summary/Keyword: UBIQUITOUS

Search Result 5,261, Processing Time 0.032 seconds

Origin of Layering and Its Relation to Magma Convection in the Skaergaard Intrusion (Skaergaard 암체에서 layering의 기원과 그의 마그마 대류와의 관계)

  • Yun D. Jang
    • Economic and Environmental Geology
    • /
    • v.34 no.6
    • /
    • pp.627-648
    • /
    • 2001
  • At least two distinct types of layering are present in the middle zone of the Skaergaard intrusion; alternating plagioclase-rich and pyroxene-rich, macro-rhythmic layers, and smaller scale, modally-graded, rhythmic layers. The macro-rhythmic layers are ubiquitous in the middle zone of the Layered Series, but are not observed in the lower and upper zone of the Layered Series or in the wall or roof tories of the intrusion. They range from 0.3 to 17.3 m in thickness, have sharp upper and lower boundaries, and can be traced laterally for over 2 ]fm in outcrop. Although individual macrorhythmic layers are not internally graded, many contain smaller-scale, modally-graded layers. Modally-graded. rhythmic layers are a common feature of the Layered Series but are not abundant in either the Upper Border Series or the Marginal Border Series. They range in thickness from 1 to 50 cm and can be traced laterally in outcrop for up to 100 m. Their lateral termination ranges from abrupt to gradational, and they are often associated with cut and fill structures and crossbedding suggestive of current activity. They are characterized by sharp lower and gradational upper contacts, and by strong intra-layer modal grading with olivine, ilmenite, and magnetite concentrated at the base, pyroxene concentrated above the base, and plagioclase concentrated at the top. The layers are also grain-size graded with the maximum size for each phase occurring at the horizon in the layer where the phase is most abundant. Modally-graded, rhythmic layers in the middle zone of the Layered Series occur within both plagioclase-rich and pyroxene-rich macro-rhythmic layers.

  • PDF

Geological History and Landscapes of the Juwangsan National Park, Cheongsong (국립공원 주왕산의 지질과정과 지형경관)

  • Hwang, Sang Koo;Son, Young Woo;Choi, Jang Oh
    • The Journal of the Petrological Society of Korea
    • /
    • v.26 no.3
    • /
    • pp.235-254
    • /
    • 2017
  • We investigate the geological history that formed geology and landscapes of the Juwangsan National Park and its surrounding areas. The Juwangsan area is composed of Precambrian gneisses, Paleozoic metasedimentary rocks, Permian to Triassic plutonic rocks, Early Mesozoic sedimentary rocks, Late Mesozoic plutonic and volcanic rocks, Cenozoic Tertiary rhyolites and Quaternary taluses. The Precambrian gneisses and Paleozoic metasedimentary rocks of the Ryeongnam massif occurs as xenolithes and roof-pendents in the Permian to Triassic Yeongdeok and Cheongsong plutonic rocks, which were formed as the Songrim orogeny by magmatic intrusions occurring in a subduction environment under the northeastern and western parts of the area before a continental collision between Sino-Korean and South China lands. The Cheongsong plutonic rocks were intruded by the Late Triassic granodiorite, which include to be metamorphosed as an orthogneiss. The granodiorite includes geosites of orbicular structure and mineral spring. During the Cretaceous, the Gyeongsang Basin and Gyeongsang arc were formed by a subduction of the Izanagi plate below East Asia continent in the southeastern Korean Peninsula. The Gyeongsang Basin was developed to separate into Yeongyang and Cheongsong subbasins, in which deposited Dongwach/Hupyeongdong Formation, Gasongdong/Jeomgok Formation, and Dogyedong/Sagok Formation in turn. There was intercalated by the Daejeonsa Basalt in the upper part of Dogyedong Formation in Juwangsan entrance. During the Late Cretaceous 75~77 Ma, the Bunam granitoid stock, which consists of various lithofacies in southwestern part, was made by a plutonism that was mixing to have an injection of mafic magma into felsic magma. During the latest Cretaceous, the volcanic rocks were made by several volcanisms from ubiquitous andesitic and rhyolitic magmas, and stratigraphically consist of Ipbong Andesite derived from Dalsan, Jipum Volcanics from Jipum, Naeyeonsan Tuff from Cheongha, Juwangsan Tuff from Dalsan, Neogudong Formation and Muposan Tuff. Especially the Juwangsan Tuff includes many beautiful cliffs, cayon, caves and falls because of vertical columnar joints by cooling in the dense welding zone. During the Cenozoic Tertiary, rhyolite intrusions formed lacolith, stocks and dykes in many sites. Especially many rhyolite dykes make a radial Cheongsong dyke swarm, of which spherulitic rhyolite dykes have various floral patterns. During the Quaternary, some taluses have been developed down the cliffs of Jungtaesan lacolith and Muposan Tuff.

An Exploratory Study on Measuring Brand Image from a Network Perspective (네트워크 관점에서 바라본 브랜드 이미지 측정에 대한 탐색적 연구)

  • Jung, Sangyoon;Chang, Jung Ah;Rho, Sangkyu
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.33-60
    • /
    • 2020
  • Along with the rapid advance in internet technologies, ubiquitous mobile device usage has enabled consumers to access real-time information and increased interaction with others through various social media. Consumers can now get information more easily when making purchase decisions, and these changes are affecting the brand landscape. In a digitally connected world, brand image is not communicated to the consumers one-sidedly. Rather, with consumers' growing influence, it is a result of co-creation where consumers have an active role in building brand image. This explains a reality where people no longer purchase products just because they know the brand or because it is a famous brand. However, there has been little discussion on the matter, and many practitioners still rely on the traditional measures of brand indicators. The goal of this research is to present the limitations of traditional definition and measurement of brand and brand image, and propose a more direct and adequate measure that reflects the nature of a connected world. Inspired by the proverb, "A man is known by the company he keeps," the proposed measurement offers insight to the position of brand (or brand image) through co-purchased product networks. This paper suggests a framework of network analysis that clusters brands of cosmetics by the frequency of other products purchased together. This is done by analyzing product networks of a brand extracted from actual purchase data on Amazon.com. This is a more direct approach, compared to past measures where consumers' intention or cognitive aspects are examined through survey. The practical implication is that our research attempts to close the gap between brand indicators and actual purchase behavior. From a theoretical standpoint, this paper extends the traditional conceptualization of brand image to a network perspective that reflects the nature of a digitally connected society.

JSAP1 Interacts with Kinesin Light Chain 1 through Conserved Binding Segments (JSAP1과 Kinesin Light Chain 1의 결합 및 결합부위 규명)

  • Kim, Sang-Jin;Lee, Chul-Hee;Park, Hye-Young;Yea, Sung-Su;Jang, Won-Hee;Lee, Sang-Kyeong;Park, Yeong-Hong;Cha, Ok-Soo;Moon, Il-Soo;Seog, Dae-Hyun
    • Journal of Life Science
    • /
    • v.17 no.7 s.87
    • /
    • pp.889-895
    • /
    • 2007
  • A conventional kinesin, KIF5/kinesin-I, is composed of two kinesin heavy chains (KHCs) and two kinesin light chains (KLCs) and binds directly to microtubules. KIF5 motor mediates the transport of various membranous organelles, but the mechanism how they recognize and bind to a specific cargo has not yet been completely elucidated. Here, we used the yeast two-hybrid system to identify the neuronal protein(s) that interacts with the tetratricopeptide repeats (TRP) of KLCI and found a specific interaction with JNK/stress-activated protein kinase-associated protein 1 (JSAP1/JIPP3). The yeast two-hybrid assay demonstrated that the TRP 1,2 domain-containing region of KLCI mediated binding to the leucine zipper domain of JSAP1. JSAP1 also bound to the TRP region of lac2 but not to neuronal KIF5A, KIF5C and ubiquitous KIF5B in the yeast two-hybrid assay. In addition, these proteins showed specific interactions in the GST pull-down assay and by co-immunoprecipitation. KLCI and KIF5B interacted with GST-ISAP1 fusion proteins, but not with GST alone. An antibody to JSAPI specifically co-immunoprecipitated KIF5s associated with JSAP1 from mouse brain extracts. These results suggest that JSAP1, as KLC1 receptor, is involved in the KIF5 mediated transport.

Clinical Characteristics of Pulmonary Aspergillosis (폐 국균증의 임상적 특성)

  • Park, Ik-Soo;Yoon, Ho-Joo;Shin, Dong-Ho;Park, Sung-Soo;Lee, Jung-Hee
    • Tuberculosis and Respiratory Diseases
    • /
    • v.41 no.6
    • /
    • pp.624-631
    • /
    • 1994
  • Background: Genus of Aspergilli are ubiquitous saprophytic molds in nature, but its change from a saprophytic fungus to a pathogenic organism has occurred since the use of various antibiotics. The fungus affects the chronically ill and debilitated population. Recently frequency of the fungal infection is increasing in Korea with abuse of antibiotics and glucocorticoids. Method: We analyzed medical records of 52 patients with pulmonary aspergillosis seen at Hanyang University Hospital from 1980 to 1994. The results were as follows; Results: 1) Ages ranged between second to eighth decades with majority(50%) in the fourth to fifth decades. The male to female ratio was 1.1:1. 2) Hemoptysis and productive cough, the leading symptoms, occurred in 42.3% and 25% respectively. 3) On chest X-ray fingings, the characteristic "fungus ball" pattern were observed in 53.8% of the 52cases. 4) Sputum culture for aspergilli were positive in 21.6% of the cases. We performed fine needle aspiration in 22 patients and the diagnostic yield was 100%. 5) Thirty-six patients had history of treatment with antituberculous drugs under diagnosis of pulmonary tuberculosis for an average of 27.3 months. But sputum analysis for acid-fast bacilli were positive in 5.6%(2cases of 36cases), and postoperative pathologic findings showed that 38.9%(12 cases of 28cases) were combined with tuberculosis. 6) Right upper and left upper lobes were predominantly involved(34.6% and 19.2% respectively) and lobectomies were performed in 21 cases. 7) Underlying diseases were present in 47 cases and 48.9% of them were pulmonary tuberculosis. Conclusion: These results showed that pulmonary aspergillosis usually develops in patients with open cavitary pulmonary tuberculosis. And we must consider the possibility of pulmonary aspergillosis in a patient with hemoptysis and cavitary lung lesion.

  • PDF

Protective Effect of Saengshik Supplementation on Lead Induced Toxicity in Rats (생식의 섭취가 납중독 흰쥐의 피해 경감에 미치는 영향에 관한 연구)

  • Oh, Young-Joo;Kim, Jae-Min;Song, Si-Wan;Ha, Hyo-Cheol;Kim, Hyun-Su
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.34 no.7
    • /
    • pp.959-967
    • /
    • 2005
  • Lead is a ubiquitous environmental and industrial pollutant that causes a major health concerns. It is known to induce a broad range of physiological, biochemical, and behavioral dysfunctions in laboratory and humans, including hematopoietic system, kidneys, liver, and reproductive system. This study was conducted to investigate the effect of Saengshik supplementation on the lead-induced toxicity in rats. Five week old male Sprague­Dawley rats were randomly assigned to five groups for six weeks as followings: control group (CT), lead acetate treated group (PT), and lead acetate groups administered with three different dosages of Saengshik $(SI2.5-12.5\%,\;S25-25\%,\;and\;S50-50\%).$ Lead acetate (12 mg/rat) was intragastrically administered daily for 6 weeks. The results were summarized as follows; Weight gain and food efficiency ratio were significantly lower (p<0.05) in lead administered group compared with those of the control group. Also, significant lead-induced alteration in blood hemoglobin (HGB), hematocrit (HCT), mean corpuscular volume (MCV), mean corpuscular hemoglobin (MCH), and reticulocyte distribution width (RDW) were observed. In the liver of lead-exposed animals, there was an increase in the lipid peroxidation (MDA) and the level of glutathione (GSH), but superoxiede dismutase (SOD) activity did not change. Lead-exposed animals with $25\%\;and\;50\%$ Saengshik supplementation showed marked improvements in the values of MCH, MCV, and RDW. Also, the level of HCT was significantly increased by $50\%$ Saengshik supplementation. The levels of liver MDA in $12.5\%\;and\;50\%$ Saengshik administered groups and GSH level in $50\%$ Saengshik administered group were significantly decreased compared to the lead administered group. Also, hepatic SOD activity tended to increase in the presence of Saengshik supplementation. Furthermore, the accumulation of lead in liver and kidney was reduced by presence of Saneghshik supplementation. Liver lead concentration was significantly reduced by both $25\%\;and\;50\%$ Saengshik supplementations and kidney lead concentration was significantly reduced by the $25\%$ Saengshik supplementation. These results show that Saengshik may have a protective effect against lead intoxication but the mechanism of their effects remains unclear.

Design and Analysis of Online Advertising Expenditure Model based on Coupon Download (쿠폰 다운로드를 기준으로 하는 온라인 광고비 모델의 설계 및 분석)

  • Jun, Jung-Ho;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.1-19
    • /
    • 2010
  • In offline environment, unlike traditional advertising model through TV, newspaper, and radio, online advertising model draws instantaneous responses from potential consumers and it is convenient to assess. This kind of characteristics of Internet advertising model has driven the growth of advertising model among various Internet business models. There are, conventionally classified, CPM (Cost Per Mile), CPC (Cost Per Click), and CPS (Cost Per Sales) models as Internet advertising expenditure model. These can be examined in manners regarding risks that stakeholders should stand and degree of responsibility. CPM model that is based on number of advertisement exposure is mechanically exposed to users but not actually recognized by users resulting in risk of wasted expenditure by advertisers without any advertising effect. While on aspect of media, CPS model that is based on conversion action is the most risky model because of the conversion action such as product purchase is determined by capability of advertisers not that of media. In this regard, while there are issue of CPM and CPS models disadvantageously affecting only one side of Internet advertising business model value network, CPC model has been evaluated as reasonable both to advertisers and media, and occupied the largest segment of Internet advertising market. However, CPC model also can cause fraudulent behavior such as click fraud because of the competition or dishonest amount of advertising expenditure. On the user aspect, unintentionally accessed advertisements can lead to more inappropriate expenditure from advertisers. In this paper, we suggest "CPCD"(Cost Per Coupon Download) model. This goes beyond simple clicking of advertisements and advertising expenditure is exerted when users download a coupon from advertisers, which is a concept in between CPC and CPS models. To achieve the purpose, we describe the scenario of advertiser perspective, processes, participants and their benefits of CPCD model. Especially, we suggest the new value in online coupon; "possibility of storage" and "complement for delivery to the target group". We also analyze the working condition for advertiser by a comparison of CPC and CPCD models through advertising expenditure simulation. The result of simulation implies that the CPCD model suits more properly to advertisers with medium-low price products rather than that of high priced goods. This denotes that since most of advertisers in CPC model are dealing with medium-low priced products, the result is very interesting. At last, we contemplate applicability of CPCD model in ubiquitous environment.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

A Smoothing Data Cleaning based on Adaptive Window Sliding for Intelligent RFID Middleware Systems (지능적인 RFID 미들웨어 시스템을 위한 적응형 윈도우 슬라이딩 기반의 유연한 데이터 정제)

  • Shin, DongCheon;Oh, Dongok;Ryu, SeungWan;Park, Seikwon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.1-18
    • /
    • 2014
  • Over the past years RFID/SN has been an elementary technology in a diversity of applications for the ubiquitous environments, especially for Internet of Things. However, one of obstacles for widespread deployment of RFID technology is the inherent unreliability of the RFID data streams by tag readers. In particular, the problem of false readings such as lost readings and mistaken readings needs to be treated by RFID middleware systems because false readings ultimately degrade the quality of application services due to the dirty data delivered by middleware systems. As a result, for the higher quality of services, an RFID middleware system is responsible for intelligently dealing with false readings for the delivery of clean data to the applications in accordance with the tag reading environment. One of popular techniques used to compensate false readings is a sliding window filter. In a sliding window scheme, it is evident that determining optimal window size intelligently is a nontrivial important task in RFID middleware systems in order to reduce false readings, especially in mobile environments. In this paper, for the purpose of reducing false readings by intelligent window adaption, we propose a new adaptive RFID data cleaning scheme based on window sliding for a single tag. Unlike previous works based on a binomial sampling model, we introduce the weight averaging. Our insight starts from the need to differentiate the past readings and the current readings, since the more recent readings may indicate the more accurate tag transitions. Owing to weight averaging, our scheme is expected to dynamically adapt the window size in an efficient manner even for non-homogeneous reading patterns in mobile environments. In addition, we analyze reading patterns in the window and effects of decreased window so that a more accurate and efficient decision on window adaption can be made. With our scheme, we can expect to obtain the ultimate goal that RFID middleware systems can provide applications with more clean data so that they can ensure high quality of intended services.

The Effect of the Context Awareness Value on the Smartphone Adopter' Advertising Attitude (스마트폰광고 이용자의 광고태도에 영향을 미치는 상황인지가치에 관한 연구)

  • Yang, Chang-Gyu;Lee, Eui-Bang;Huang, Yunchu
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.73-91
    • /
    • 2013
  • Advertising market has been facing new challenges due to dramatic change in advertising channels and the advent of innovative media such as mobile devices. Recent research related to mobile devices is mainly focused on the fact that mobile devices could identify users'physical location in real-time, and this sheds light on how location-based technology is utilized to achieve competitive advantage in advertising market. With the introduction of smartphone, the functionality of smartphone has become much more diverse and context awareness is one of the areas that require further study. This work analyses the influence of context awareness value resulted from the transformation of advertising channel in mobile communication market, and our research result reflects recent trend in advertising market environment which is not considered in previous studies. Many constructs has intensively been studied in the context of advertising channel in traditional marketing environment, and entertainment, irritation and information are considered to be the most widely accepted variables that has positive relationship with advertising value. Also, in smartphone advertisement, four main dimensions of context awareness value are recognized: identification, activity, timing and location. In this study, we assume that these four constructs has positive relationship with context awareness value. Finally, we propose that advertising value and context awareness value positively influence smartphone advertising attitude. Partial Least Squares (PLS) structural model is used in our theoretical research model to test proposed hypotheses. A well designed survey is conducted for college students in Korea, and reliability, convergent validity and discriminant validity of constructs and measurement indicators are carefully evaluated and the results show that reliability and validity are confirmed according to predefined statistical criteria. Goodness-of-fit of our research model is also supported. In summary, the results collectively suggest good measurement properties for the proposed research model. The research outcomes are as follows. First, information has positive impact on advertising value while entertainment and irritation have no significant impact. Information, entertainment and irritation together account for 38.8% of advertising value. Second, along with the change in advertising market due to the advent of smartphone, activity, timing and location have positive impact on context awareness value while identification has no significant impact. In addition, identification, activity, location and time together account for 46.3% of context awareness value. Third, advertising value and context awareness value both positively influence smartphone advertising attitude, and these two constructs explain 31.7% of the variability of smartphone advertising attitude. The theoretical implication of our research is as follows. First, the influence of entertainment and irritation is reduced which are known to be crucial factors according to previous studies related to advertising value, while the influence of information is increased. It indicates that smartphone users are not likely interested in entertaining effect of smartphone advertisement, and are insensitive to the inconvenience due to smartphone advertisement. Second, in today' ubiquitous computing environment, it is effective to provide differentiated advertising service by utilizing smartphone users'context awareness values such as identification, activity, timing and location in order to achieve competitive business advantage in advertising market. For practical implications, enterprises should provide valuable and useful information that might attract smartphone users by adopting differentiation strategy as smartphone users are sensitive to the information provided via smartphone. Also enterprises not only provide useful information but also recognize and utilize smarphone users' unique characteristics and behaviors by increasing context awareness values. In summary, our result implies that smartphone advertisement should be optimized by considering the needed information of smartphone users in order to maximize advertisement effect.