• Title/Summary/Keyword: high fashion

Search Result 2,467, Processing Time 0.033 seconds

How Enduring Product Involvement and Perceived Risk Affect Consumers' Online Merchant Selection Process: The 'Required Trust Level' Perspective (지속적 관여도 및 인지된 위험이 소비자의 온라인 상인선택 프로세스에 미치는 영향에 관한 연구: 요구신뢰 수준 개념을 중심으로)

  • Hong, Il-Yoo B.;Lee, Jung-Min;Cho, Hwi-Hyung
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.29-52
    • /
    • 2012
  • Consumers differ in the way they make a purchase. An audio mania would willingly make a bold, yet serious, decision to buy a top-of-the-line home theater system, while he is not interested in replacing his two-decade-old shabby car. On the contrary, an automobile enthusiast wouldn't mind spending forty thousand dollars to buy a new Jaguar convertible, yet cares little about his junky component system. It is product involvement that helps us explain such differences among individuals in the purchase style. Product involvement refers to the extent to which a product is perceived to be important to a consumer (Zaichkowsky, 2001). Product involvement is an important factor that strongly influences consumer's purchase decision-making process, and thus has been of prime interest to consumer behavior researchers. Furthermore, researchers found that involvement is closely related to perceived risk (Dholakia, 2001). While abundant research exists addressing how product involvement relates to overall perceived risk, little attention has been paid to the relationship between involvement and different types of perceived risk in an electronic commerce setting. Given that perceived risk can be a substantial barrier to the online purchase (Jarvenpaa, 2000), research addressing such an issue will offer useful implications on what specific types of perceived risk an online firm should focus on mitigating if it is to increase sales to a fullest potential. Meanwhile, past research has focused on such consumer responses as information search and dissemination as a consequence of involvement, neglecting other behavioral responses like online merchant selection. For one example, will a consumer seriously considering the purchase of a pricey Guzzi bag perceive a great degree of risk associated with online buying and therefore choose to buy it from a digital storefront rather than from an online marketplace to mitigate risk? Will a consumer require greater trust on the part of the online merchant when the perceived risk of online buying is rather high? We intend to find answers to these research questions through an empirical study. This paper explores the impact of enduring product involvement and perceived risks on required trust level, and further on online merchant choice. For the purpose of the research, five types or components of perceived risk are taken into consideration, including financial, performance, delivery, psychological, and social risks. A research model has been built around the constructs under consideration, and 12 hypotheses have been developed based on the research model to examine the relationships between enduring involvement and five components of perceived risk, between five components of perceived risk and required trust level, between enduring involvement and required trust level, and finally between required trust level and preference toward an e-tailer. To attain our research objectives, we conducted an empirical analysis consisting of two phases of data collection: a pilot test and main survey. The pilot test was conducted using 25 college students to ensure that the questionnaire items are clear and straightforward. Then the main survey was conducted using 295 college students at a major university for nine days between December 13, 2010 and December 21, 2010. The measures employed to test the model included eight constructs: (1) enduring involvement, (2) financial risk, (3) performance risk, (4) delivery risk, (5) psychological risk, (6) social risk, (7) required trust level, (8) preference toward an e-tailer. The statistical package, SPSS 17.0, was used to test the internal consistency among the items within the individual measures. Based on the Cronbach's ${\alpha}$ coefficients of the individual measure, the reliability of all the variables is supported. Meanwhile, the Amos 18.0 package was employed to perform a confirmatory factor analysis designed to assess the unidimensionality of the measures. The goodness of fit for the measurement model was satisfied. Unidimensionality was tested using convergent, discriminant, and nomological validity. The statistical evidences proved that the three types of validity were all satisfied. Now the structured equation modeling technique was used to analyze the individual paths along the relationships among the research constructs. The results indicated that enduring involvement has significant positive relationships with all the five components of perceived risk, while only performance risk is significantly related to trust level required by consumers for purchase. It can be inferred from the findings that product performance problems are mostly likely to occur when a merchant behaves in an opportunistic manner. Positive relationships were also found between involvement and required trust level and between required trust level and online merchant choice. Enduring involvement is concerned with the pleasure a consumer derives from a product class and/or with the desire for knowledge for the product class, and thus is likely to motivate the consumer to look for ways of mitigating perceived risk by requiring a higher level of trust on the part of the online merchant. Likewise, a consumer requiring a high level of trust on the merchant will choose a digital storefront rather than an e-marketplace, since a digital storefront is believed to be trustworthier than an e-marketplace, as it fulfills orders by itself rather than acting as an intermediary. The findings of the present research provide both academic and practical implications. The first academic implication is that enduring product involvement is a strong motivator of consumer responses, especially the selection of a merchant, in the context of electronic shopping. Secondly, academicians are advised to pay attention to the finding that an individual component or type of perceived risk can be used as an important research construct, since it would allow one to pinpoint the specific types of risk that are influenced by antecedents or that influence consequents. Meanwhile, our research provides implications useful for online merchants (both online storefronts and e-marketplaces). Merchants may develop strategies to attract consumers by managing perceived performance risk involved in purchase decisions, since it was found to have significant positive relationship with the level of trust required by a consumer on the part of the merchant. One way to manage performance risk would be to thoroughly examine the product before shipping to ensure that it has no deficiencies or flaws. Secondly, digital storefronts are advised to focus on symbolic goods (e.g., cars, cell phones, fashion outfits, and handbags) in which consumers are relatively more involved than others, whereas e- marketplaces should put their emphasis on non-symbolic goods (e.g., drinks, books, MP3 players, and bike accessories).

  • PDF

Ensemble of Nested Dichotomies for Activity Recognition Using Accelerometer Data on Smartphone (Ensemble of Nested Dichotomies 기법을 이용한 스마트폰 가속도 센서 데이터 기반의 동작 인지)

  • Ha, Eu Tteum;Kim, Jeongmin;Ryu, Kwang Ryel
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2013
  • As the smartphones are equipped with various sensors such as the accelerometer, GPS, gravity sensor, gyros, ambient light sensor, proximity sensor, and so on, there have been many research works on making use of these sensors to create valuable applications. Human activity recognition is one such application that is motivated by various welfare applications such as the support for the elderly, measurement of calorie consumption, analysis of lifestyles, analysis of exercise patterns, and so on. One of the challenges faced when using the smartphone sensors for activity recognition is that the number of sensors used should be minimized to save the battery power. When the number of sensors used are restricted, it is difficult to realize a highly accurate activity recognizer or a classifier because it is hard to distinguish between subtly different activities relying on only limited information. The difficulty gets especially severe when the number of different activity classes to be distinguished is very large. In this paper, we show that a fairly accurate classifier can be built that can distinguish ten different activities by using only a single sensor data, i.e., the smartphone accelerometer data. The approach that we take to dealing with this ten-class problem is to use the ensemble of nested dichotomy (END) method that transforms a multi-class problem into multiple two-class problems. END builds a committee of binary classifiers in a nested fashion using a binary tree. At the root of the binary tree, the set of all the classes are split into two subsets of classes by using a binary classifier. At a child node of the tree, a subset of classes is again split into two smaller subsets by using another binary classifier. Continuing in this way, we can obtain a binary tree where each leaf node contains a single class. This binary tree can be viewed as a nested dichotomy that can make multi-class predictions. Depending on how a set of classes are split into two subsets at each node, the final tree that we obtain can be different. Since there can be some classes that are correlated, a particular tree may perform better than the others. However, we can hardly identify the best tree without deep domain knowledge. The END method copes with this problem by building multiple dichotomy trees randomly during learning, and then combining the predictions made by each tree during classification. The END method is generally known to perform well even when the base learner is unable to model complex decision boundaries As the base classifier at each node of the dichotomy, we have used another ensemble classifier called the random forest. A random forest is built by repeatedly generating a decision tree each time with a different random subset of features using a bootstrap sample. By combining bagging with random feature subset selection, a random forest enjoys the advantage of having more diverse ensemble members than a simple bagging. As an overall result, our ensemble of nested dichotomy can actually be seen as a committee of committees of decision trees that can deal with a multi-class problem with high accuracy. The ten classes of activities that we distinguish in this paper are 'Sitting', 'Standing', 'Walking', 'Running', 'Walking Uphill', 'Walking Downhill', 'Running Uphill', 'Running Downhill', 'Falling', and 'Hobbling'. The features used for classifying these activities include not only the magnitude of acceleration vector at each time point but also the maximum, the minimum, and the standard deviation of vector magnitude within a time window of the last 2 seconds, etc. For experiments to compare the performance of END with those of other methods, the accelerometer data has been collected at every 0.1 second for 2 minutes for each activity from 5 volunteers. Among these 5,900 ($=5{\times}(60{\times}2-2)/0.1$) data collected for each activity (the data for the first 2 seconds are trashed because they do not have time window data), 4,700 have been used for training and the rest for testing. Although 'Walking Uphill' is often confused with some other similar activities, END has been found to classify all of the ten activities with a fairly high accuracy of 98.4%. On the other hand, the accuracies achieved by a decision tree, a k-nearest neighbor, and a one-versus-rest support vector machine have been observed as 97.6%, 96.5%, and 97.6%, respectively.

A New Approach to Automatic Keyword Generation Using Inverse Vector Space Model (키워드 자동 생성에 대한 새로운 접근법: 역 벡터공간모델을 이용한 키워드 할당 방법)

  • Cho, Won-Chin;Rho, Sang-Kyu;Yun, Ji-Young Agnes;Park, Jin-Soo
    • Asia pacific journal of information systems
    • /
    • v.21 no.1
    • /
    • pp.103-122
    • /
    • 2011
  • Recently, numerous documents have been made available electronically. Internet search engines and digital libraries commonly return query results containing hundreds or even thousands of documents. In this situation, it is virtually impossible for users to examine complete documents to determine whether they might be useful for them. For this reason, some on-line documents are accompanied by a list of keywords specified by the authors in an effort to guide the users by facilitating the filtering process. In this way, a set of keywords is often considered a condensed version of the whole document and therefore plays an important role for document retrieval, Web page retrieval, document clustering, summarization, text mining, and so on. Since many academic journals ask the authors to provide a list of five or six keywords on the first page of an article, keywords are most familiar in the context of journal articles. However, many other types of documents could not benefit from the use of keywords, including Web pages, email messages, news reports, magazine articles, and business papers. Although the potential benefit is large, the implementation itself is the obstacle; manually assigning keywords to all documents is a daunting task, or even impractical in that it is extremely tedious and time-consuming requiring a certain level of domain knowledge. Therefore, it is highly desirable to automate the keyword generation process. There are mainly two approaches to achieving this aim: keyword assignment approach and keyword extraction approach. Both approaches use machine learning methods and require, for training purposes, a set of documents with keywords already attached. In the former approach, there is a given set of vocabulary, and the aim is to match them to the texts. In other words, the keywords assignment approach seeks to select the words from a controlled vocabulary that best describes a document. Although this approach is domain dependent and is not easy to transfer and expand, it can generate implicit keywords that do not appear in a document. On the other hand, in the latter approach, the aim is to extract keywords with respect to their relevance in the text without prior vocabulary. In this approach, automatic keyword generation is treated as a classification task, and keywords are commonly extracted based on supervised learning techniques. Thus, keyword extraction algorithms classify candidate keywords in a document into positive or negative examples. Several systems such as Extractor and Kea were developed using keyword extraction approach. Most indicative words in a document are selected as keywords for that document and as a result, keywords extraction is limited to terms that appear in the document. Therefore, keywords extraction cannot generate implicit keywords that are not included in a document. According to the experiment results of Turney, about 64% to 90% of keywords assigned by the authors can be found in the full text of an article. Inversely, it also means that 10% to 36% of the keywords assigned by the authors do not appear in the article, which cannot be generated through keyword extraction algorithms. Our preliminary experiment result also shows that 37% of keywords assigned by the authors are not included in the full text. This is the reason why we have decided to adopt the keyword assignment approach. In this paper, we propose a new approach for automatic keyword assignment namely IVSM(Inverse Vector Space Model). The model is based on a vector space model. which is a conventional information retrieval model that represents documents and queries by vectors in a multidimensional space. IVSM generates an appropriate keyword set for a specific document by measuring the distance between the document and the keyword sets. The keyword assignment process of IVSM is as follows: (1) calculating the vector length of each keyword set based on each keyword weight; (2) preprocessing and parsing a target document that does not have keywords; (3) calculating the vector length of the target document based on the term frequency; (4) measuring the cosine similarity between each keyword set and the target document; and (5) generating keywords that have high similarity scores. Two keyword generation systems were implemented applying IVSM: IVSM system for Web-based community service and stand-alone IVSM system. Firstly, the IVSM system is implemented in a community service for sharing knowledge and opinions on current trends such as fashion, movies, social problems, and health information. The stand-alone IVSM system is dedicated to generating keywords for academic papers, and, indeed, it has been tested through a number of academic papers including those published by the Korean Association of Shipping and Logistics, the Korea Research Academy of Distribution Information, the Korea Logistics Society, the Korea Logistics Research Association, and the Korea Port Economic Association. We measured the performance of IVSM by the number of matches between the IVSM-generated keywords and the author-assigned keywords. According to our experiment, the precisions of IVSM applied to Web-based community service and academic journals were 0.75 and 0.71, respectively. The performance of both systems is much better than that of baseline systems that generate keywords based on simple probability. Also, IVSM shows comparable performance to Extractor that is a representative system of keyword extraction approach developed by Turney. As electronic documents increase, we expect that IVSM proposed in this paper can be applied to many electronic documents in Web-based community and digital library.

Pareto Ratio and Inequality Level of Knowledge Sharing in Virtual Knowledge Collaboration: Analysis of Behaviors on Wikipedia (지식 공유의 파레토 비율 및 불평등 정도와 가상 지식 협업: 위키피디아 행위 데이터 분석)

  • Park, Hyun-Jung;Shin, Kyung-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.19-43
    • /
    • 2014
  • The Pareto principle, also known as the 80-20 rule, states that roughly 80% of the effects come from 20% of the causes for many events including natural phenomena. It has been recognized as a golden rule in business with a wide application of such discovery like 20 percent of customers resulting in 80 percent of total sales. On the other hand, the Long Tail theory, pointing out that "the trivial many" produces more value than "the vital few," has gained popularity in recent times with a tremendous reduction of distribution and inventory costs through the development of ICT(Information and Communication Technology). This study started with a view to illuminating how these two primary business paradigms-Pareto principle and Long Tail theory-relates to the success of virtual knowledge collaboration. The importance of virtual knowledge collaboration is soaring in this era of globalization and virtualization transcending geographical and temporal constraints. Many previous studies on knowledge sharing have focused on the factors to affect knowledge sharing, seeking to boost individual knowledge sharing and resolve the social dilemma caused from the fact that rational individuals are likely to rather consume than contribute knowledge. Knowledge collaboration can be defined as the creation of knowledge by not only sharing knowledge, but also by transforming and integrating such knowledge. In this perspective of knowledge collaboration, the relative distribution of knowledge sharing among participants can count as much as the absolute amounts of individual knowledge sharing. In particular, whether the more contribution of the upper 20 percent of participants in knowledge sharing will enhance the efficiency of overall knowledge collaboration is an issue of interest. This study deals with the effect of this sort of knowledge sharing distribution on the efficiency of knowledge collaboration and is extended to reflect the work characteristics. All analyses were conducted based on actual data instead of self-reported questionnaire surveys. More specifically, we analyzed the collaborative behaviors of editors of 2,978 English Wikipedia featured articles, which are the best quality grade of articles in English Wikipedia. We adopted Pareto ratio, the ratio of the number of knowledge contribution of the upper 20 percent of participants to the total number of knowledge contribution made by the total participants of an article group, to examine the effect of Pareto principle. In addition, Gini coefficient, which represents the inequality of income among a group of people, was applied to reveal the effect of inequality of knowledge contribution. Hypotheses were set up based on the assumption that the higher ratio of knowledge contribution by more highly motivated participants will lead to the higher collaboration efficiency, but if the ratio gets too high, the collaboration efficiency will be exacerbated because overall informational diversity is threatened and knowledge contribution of less motivated participants is intimidated. Cox regression models were formulated for each of the focal variables-Pareto ratio and Gini coefficient-with seven control variables such as the number of editors involved in an article, the average time length between successive edits of an article, the number of sections a featured article has, etc. The dependent variable of the Cox models is the time spent from article initiation to promotion to the featured article level, indicating the efficiency of knowledge collaboration. To examine whether the effects of the focal variables vary depending on the characteristics of a group task, we classified 2,978 featured articles into two categories: Academic and Non-academic. Academic articles refer to at least one paper published at an SCI, SSCI, A&HCI, or SCIE journal. We assumed that academic articles are more complex, entail more information processing and problem solving, and thus require more skill variety and expertise. The analysis results indicate the followings; First, Pareto ratio and inequality of knowledge sharing relates in a curvilinear fashion to the collaboration efficiency in an online community, promoting it to an optimal point and undermining it thereafter. Second, the curvilinear effect of Pareto ratio and inequality of knowledge sharing on the collaboration efficiency is more sensitive with a more academic task in an online community.

A Study on the Meaning and Strategy of Keyword Advertising Marketing

  • Park, Nam Goo
    • Journal of Distribution Science
    • /
    • v.8 no.3
    • /
    • pp.49-56
    • /
    • 2010
  • At the initial stage of Internet advertising, banner advertising came into fashion. As the Internet developed into a central part of daily lives and the competition in the on-line advertising market was getting fierce, there was not enough space for banner advertising, which rushed to portal sites only. All these factors was responsible for an upsurge in advertising prices. Consequently, the high-cost and low-efficiency problems with banner advertising were raised, which led to an emergence of keyword advertising as a new type of Internet advertising to replace its predecessor. In the beginning of 2000s, when Internet advertising came to be activated, display advertisement including banner advertising dominated the Net. However, display advertising showed signs of gradual decline, and registered minus growth in the year 2009, whereas keyword advertising showed rapid growth and started to outdo display advertising as of the year 2005. Keyword advertising refers to the advertising technique that exposes relevant advertisements on the top of research sites when one searches for a keyword. Instead of exposing advertisements to unspecified individuals like banner advertising, keyword advertising, or targeted advertising technique, shows advertisements only when customers search for a desired keyword so that only highly prospective customers are given a chance to see them. In this context, it is also referred to as search advertising. It is regarded as more aggressive advertising with a high hit rate than previous advertising in that, instead of the seller discovering customers and running an advertisement for them like TV, radios or banner advertising, it exposes advertisements to visiting customers. Keyword advertising makes it possible for a company to seek publicity on line simply by making use of a single word and to achieve a maximum of efficiency at a minimum cost. The strong point of keyword advertising is that customers are allowed to directly contact the products in question through its more efficient advertising when compared to the advertisements of mass media such as TV and radio, etc. The weak point of keyword advertising is that a company should have its advertisement registered on each and every portal site and finds it hard to exercise substantial supervision over its advertisement, there being a possibility of its advertising expenses exceeding its profits. Keyword advertising severs as the most appropriate methods of advertising for the sales and publicity of small and medium enterprises which are in need of a maximum of advertising effect at a low advertising cost. At present, keyword advertising is divided into CPC advertising and CPM advertising. The former is known as the most efficient technique, which is also referred to as advertising based on the meter rate system; A company is supposed to pay for the number of clicks on a searched keyword which users have searched. This is representatively adopted by Overture, Google's Adwords, Naver's Clickchoice, and Daum's Clicks, etc. CPM advertising is dependent upon the flat rate payment system, making a company pay for its advertisement on the basis of the number of exposure, not on the basis of the number of clicks. This method fixes a price for advertisement on the basis of 1,000-time exposure, and is mainly adopted by Naver's Timechoice, Daum's Speciallink, and Nate's Speedup, etc, At present, the CPC method is most frequently adopted. The weak point of the CPC method is that advertising cost can rise through constant clicks from the same IP. If a company makes good use of strategies for maximizing the strong points of keyword advertising and complementing its weak points, it is highly likely to turn its visitors into prospective customers. Accordingly, an advertiser should make an analysis of customers' behavior and approach them in a variety of ways, trying hard to find out what they want. With this in mind, her or she has to put multiple keywords into use when running for ads. When he or she first runs an ad, he or she should first give priority to which keyword to select. The advertiser should consider how many individuals using a search engine will click the keyword in question and how much money he or she has to pay for the advertisement. As the popular keywords that the users of search engines are frequently using are expensive in terms of a unit cost per click, the advertisers without much money for advertising at the initial phrase should pay attention to detailed keywords suitable to their budget. Detailed keywords are also referred to as peripheral keywords or extension keywords, which can be called a combination of major keywords. Most keywords are in the form of texts. The biggest strong point of text-based advertising is that it looks like search results, causing little antipathy to it. But it fails to attract much attention because of the fact that most keyword advertising is in the form of texts. Image-embedded advertising is easy to notice due to images, but it is exposed on the lower part of a web page and regarded as an advertisement, which leads to a low click through rate. However, its strong point is that its prices are lower than those of text-based advertising. If a company owns a logo or a product that is easy enough for people to recognize, the company is well advised to make good use of image-embedded advertising so as to attract Internet users' attention. Advertisers should make an analysis of their logos and examine customers' responses based on the events of sites in question and the composition of products as a vehicle for monitoring their behavior in detail. Besides, keyword advertising allows them to analyze the advertising effects of exposed keywords through the analysis of logos. The logo analysis refers to a close analysis of the current situation of a site by making an analysis of information about visitors on the basis of the analysis of the number of visitors and page view, and that of cookie values. It is in the log files generated through each Web server that a user's IP, used pages, the time when he or she uses it, and cookie values are stored. The log files contain a huge amount of data. As it is almost impossible to make a direct analysis of these log files, one is supposed to make an analysis of them by using solutions for a log analysis. The generic information that can be extracted from tools for each logo analysis includes the number of viewing the total pages, the number of average page view per day, the number of basic page view, the number of page view per visit, the total number of hits, the number of average hits per day, the number of hits per visit, the number of visits, the number of average visits per day, the net number of visitors, average visitors per day, one-time visitors, visitors who have come more than twice, and average using hours, etc. These sites are deemed to be useful for utilizing data for the analysis of the situation and current status of rival companies as well as benchmarking. As keyword advertising exposes advertisements exclusively on search-result pages, competition among advertisers attempting to preoccupy popular keywords is very fierce. Some portal sites keep on giving priority to the existing advertisers, whereas others provide chances to purchase keywords in question to all the advertisers after the advertising contract is over. If an advertiser tries to rely on keywords sensitive to seasons and timeliness in case of sites providing priority to the established advertisers, he or she may as well make a purchase of a vacant place for advertising lest he or she should miss appropriate timing for advertising. However, Naver doesn't provide priority to the existing advertisers as far as all the keyword advertisements are concerned. In this case, one can preoccupy keywords if he or she enters into a contract after confirming the contract period for advertising. This study is designed to take a look at marketing for keyword advertising and to present effective strategies for keyword advertising marketing. At present, the Korean CPC advertising market is virtually monopolized by Overture. Its strong points are that Overture is based on the CPC charging model and that advertisements are registered on the top of the most representative portal sites in Korea. These advantages serve as the most appropriate medium for small and medium enterprises to use. However, the CPC method of Overture has its weak points, too. That is, the CPC method is not the only perfect advertising model among the search advertisements in the on-line market. So it is absolutely necessary that small and medium enterprises including independent shopping malls should complement the weaknesses of the CPC method and make good use of strategies for maximizing its strengths so as to increase their sales and to create a point of contact with customers.

  • PDF

Pharmacokinetic Study of Isoniazid and Rifampicin in Healthy Korean Volunteers (정상 한국인에서의 Isoniazid와 Rifampicin 약동학 연구)

  • Chung, Man-Pyo;Kim, Ho-Cheol;Suh, Gee-Young;Park, Jeong-Woong;Kim, Ho-Joong;Kwon, O-Jung;Rhee, Chong-H.;Han, Yong-Chol;Park, Hyo-Jung;Kim, Myoung-Min;Choi, Kyung-Eob
    • Tuberculosis and Respiratory Diseases
    • /
    • v.44 no.3
    • /
    • pp.479-492
    • /
    • 1997
  • Background : Isoniazid(INH) and rifampicin(RFP) are potent antituberculous drugs which have made tuberculous disease become decreasing. In Korea, prescribed doses of INH and RFP have been different from those recommended by American Thoracic Society. In fact they were determined by clinical experience rather than by scientific basis. Even there has been. few reports about pharmacokintic parameters of INH and RFP in healthy Koreans. Method : Oral pharmacokinetics of INH were studied in 22 healthy native Koreans after administration of 300 mg and 400mg of INH to each same person successively at least 2 weeks apart. After an overnight fast, subjects received medication and blood samples were drawn at scheduled times over a 24-hour period. Urine collection was also done for 24 hours. Pharmacokinetics of RFP were studied in 20 subjects in a same fashion with 450mg and 600mg of RFP. Plasma and urinary concentrations of INH and RFP were determined by high-performance liquid chromatography(HPLC). Results : Time to reach peak serum concentration (Tmax) of INH was $1.05{\pm}0.34\;hrs$ at 300mg dose and $0.98{\pm}0.59\;hrs$ at 400mg dose. Half-life was $2.49{\pm}0.88\;hrs$ and $2.80{\pm}0.75\;hrs$, respectively. They were not different significantly(p > 0.05). Peak serum concentration(Cmax) after administration of 400mg of INH was $7.14{\pm}1.95mcg/mL$ which was significantly higher than Cmax ($4.37{\pm}1.28mcg/mL$) by 300mg of INH(p < 0.01). Total clearance(CLtot) of INH at 300mg dose was $26.76{\pm}11.80mL/hr$. At 400mg dose it was $21.09{\pm}8.31mL/hr$ which was significantly lower(p < 0.01) than by 300mg dose. While renal clearance(CLr) was not different among two groups, nonrenal clearance(CLnr) at 400mg dose ($18.18{\pm}8.36mL/hr$) was significantly lower than CLnr ($23.71{\pm}11.52mL/hr$) by 300mg dose(p < 0.01). Tmax of RFP was $1.11{\pm}0.41\;hrs$ at 450mg dose and $1.15{\pm}0.43\;hrs$ at 600mg dose. Half-life was $4.20{\pm}0.73\;hrs$ and $4.95{\pm}2.25\;hrs$, respectively. They were not different significantly(p > 0.05). Cmax after administration of 600mg of RFP was $13.61{\pm}3.43mcg/mL$ which was significantly higher than Cmax($10.12{\pm}2.25mcg/mL$) by 450mg of RFP(p < 0.01). CLtot of RFP at 450mg dose was $7.60{\pm}1.34mL/hr$. At 600mg dose it was $7.05{\pm}1.20mL/hr$ which was significantly lower(p < 0.05) than by 450mg dose. While CLr was not different among two groups, CLnr at 600 mg dose($5.36{\pm}1.20mL/hr$) was significantly lower than CLnr($6.19{\pm}1.56mL/hr$) by 450mg dose(p < 0.01). Conclusion : Considering Cmax and CLnr, 300mg, of INH and 450mg RFP might be sufficient doses for the treatment of tuberculosis in Koreans. But it remains to be clarified in the patients with tuberculosis.

  • PDF

A Study on the Costume Style of Civil Servants' Stone Images Erected at Tombs of the Kings for Yi-dynasty (조선왕조(朝鮮王朝) 왕릉(王陵) 문인석상(文人石像)의 복식형태(服飾形態)에 관한 연구)

  • Kwon, Yong-Ok
    • Journal of the Korean Society of Costume
    • /
    • v.4
    • /
    • pp.87-114
    • /
    • 1981
  • A costume reveals the social characteristics of the era in which it is worn, thus we can say that the history of change of the costume is the history of change of the living culture of the era. Since the Three States era, the costume structure of this country had been affected by the costume system of the China's historical dynasties in the form of the grant therefrom because of geographical conditions, which affection was conspicuous for the bureaucrat class, particularly including but not limited to the Kings' familities. Such a grant of the costume for the bureaucrat class (i.e., official uniform) was first given by the Dang-dynasty at the age of Queen Jinduck, the 28th of the Shilla-dynasty. Since then, the costume for the bureaucrats had consecutively been affected as the ages had gone from the unified Shilla, to the Koryo and to the Yi-dynasty. As the full costumes officially used by government officials (generally called "Baek Gwan") in the Yidynasty, there existed Jo-bok, Gong-bok and Sang-bok. Of such official costumes, Gong-bok was worn at the time of conducting official affairs of the dynasty, making a respectful visit for the expression of thanks or meeting diplomatic missions of foreign countries. It appears no study was made yet with regard to the Gong-bok while the studies on the Jo-bok and the Sangbok were made. Therefore, this article is, by rendering a study and research on the styles of costumes of civil servants' stone images erected at the Kings' tombs of the Yi-dynasty, to help the persons concerned understand the Gong-bok, one of the official costume for Baek Kwan of that age and further purports to specifically identify the styles and changes of the Gong-bok, worn by Baek Gwan during the Yi-dynasty, consisting of the Bok-doo (a hat, four angled and two storied with flat top), Po (gown), Dae (belt), and Hol (small and thin plate which was officially held by the government officials in hand, showing the courtesy to and writing brief memorandums before the King) and Hwa (shoes). For that purpose, I investigated by actually visiting the tombs of the Kings of the Yi-dynasty including the Geonwon-neung, the tomb of the first King Tae-jo and the You-neung, the tomb of the 27th King Soon-jong as well as the tombs of the lawful wives and concubines of various Kings, totalling 29 tombs and made reference to relevant books and records. Pursuant. to this study, of the 29 Kings' tombs the costume styles of civil servants' stone images erected at the 26 Kings' tombs are those of Gong-bok for Baek-gwan of the Yi-dynasty wearing Bok-doo as a hat and Ban-ryeong or Dan-ryenog Po as a gown with Dae, holding Hol in hand and wearing shoes. Other than those of the 26 tombs, the costume styles of the Ryu-neung, the tomb of the Moon-jo who was the first son of 23rd King Soon-jo and given the King's title after he died and of the You-neung, the tomb of the 27th King Soon-jong are those of Jobok with Yang-gwan (a sort of hat having stripes erected, which is different from the Bok-doo), and that of the Hong-neung, the tomb of the 26th King Go-jong shows an exceptional one wearing Yang-gwan and Ban-ryeong Po ; these costume styles other than Gongbok remain as the subject for further study. Gong-bok which is the costume style of civil servants' stone images of most of the Kings' tombs had not been changed in its basic structure for about 500 years of the Yi-dynasty and Koryo categorized by the class of officials pursuant to the color of Po and materials of Dae and Hol. Summary of this costume style follows: (1) Gwan-mo (hat). The Gwan-mo style of civil servants' stone images of the 26 Kings' tombs, other than Ryu-neung, Hong-neung and You-neung which have Yang-gwan, out of the 29 Kings' tombs of the Yi-dynasty reveals the Bok-doo with four angled top, having fore-part and back-part divided. Back part of the Bok-doo is double the fore-part in height. The expression of the Gak (wings of the Bokdoo) varies: the Gyo-gak Bok-doo in that the Gaks, roundly arisen to the direction of the top, are clossed each other (tombs of the Kings Tae-jong), the downward style Jeon-gak Bok-doo in that soft Gaks are hanged on the shoulders (tombs of the Kings Joong-jong and Seong-jong) and another types of Jeon-gak Bok-doo having Gaks which arearisen steeply or roundly to the direction of top and the end of which are treated in a rounded or straight line form. At the lower edge one protrusive line distinctly reveals. Exceptionally, there reveals 11 Yang-gwan (gwan having 11 stripes erected) at the Ryu-neung of the King Moon-jo, 9 Yang-gwan at the Hong-neung of the King Go-jong and 11 Yang-gwan at the You-neung of the King Soon-jong; noting that the Yang-gwan of Baek Kwan, granted by the Myeong-dynasty of the China during the Yi-dynasty, was in the shape of 5 Yang-gwan for the first Poom (class) based on the principle of "Yideung Chaegang" (gradual degrading for secondary level), the above-mentioned Yang-gwans are very contrary to the principle and I do not touch such issue in this study, leaving for further study. (2) Po (gown). (a) Git (collar). Collar style of Po was the Ban-ryeong (round collar) having small neck-line in the early stage and was changed to the Dan-ryeong (round collar having deep neck-line) in the middle of the: dynasty. In the Dan-ryeong style of the middle era (shown at the tomb of the King Young-jo); a, thin line such as bias is shown around the internal side edge and the width of collar became wide a little. It is particularly noted that the Ryu-neung established in the middle stage and the You-neung in the later stage show civil servants in Jo-bok with the the Jikryeong (straight collar) Po and in case of the Hong-neung, the Hong-neung, the tomb of the King Go-jong, civil servants, although they wear Yang-gwan, are in the Ban-ryeong Po with Hoo-soo (back embroidery) and Dae and wear shoes as used in the Jo-bok style. As I could not make clear the theoretical basis of why the civil servants' costume styles revealed, at these tombs of the Kings are different from those of other tombs, I left this issue for further study. It is also noted that all the civil servants' stone images show the shape of triangled collar which is revealed over the Godae-git of Po. This triangled collar, I believe, would be the collar of the Cheomri which was worn in the middle of the Po and the underwear, (b) Sleeve. The sleeve was in the Gwan-soo (wide sleeve) style. having the width of over 100 centimeter from the early stage to the later stage arid in the Doo-ri sleeve style having the edge slightly rounded and we can recognize that it was the long sleeve in view of block fold shaped protrusive line, expressed on the arms. At the age of the King Young-jo, the sleeve-end became slightly narrow and as a result, the lower line of the sleeve were shaped curved. We can see another shape of narrow sleeve inside the wide sleeve-end, which should be the sleeve of the Cheom-ri worn under the Gong-bok. (c) Moo. The Moo revealed on the Po of civil servants' stone images at the age of the King Sook-jong' coming to the middle era. Initially the top of the Moo was expressed flat but the Moo was gradually changed to the triangled shape with the acute top. In certain cases, top or lower part of the Moo are not reveald because of wear and tear. (d) Yeomim. Yeomim (folding) of the Po was first expressed on civil servants' stone images of the Won-neung, the tomb of the King Young-jo and we can seemore delicate expression of the Yeomim and Goreum (stripe folding and fixing the lapel of the Po) at the tomb of the Jeongseong-wanghoo, the wife of the King Young-jo, At the age of the King Soon-jo, we can see the shape of Goreum similar to a string rather than the Goreum and the upper part of the Goreum which fixes Yeomim was expressed on the right sleeve. (3) Dae. Dae fixed on the Po was placed half of the length of Po from the shoulders in the early stage. Thereafter, at the age of the King Hyeon-jong it was shown on the slightly upper part. placed around one third of the length of Po. With regard to the design of Dae, all the civil servants' stone images of the Kings' tombs other than those of the Geonwon-neung of the King Tae-jo show single or double protrusive line expressed at the edge of Dae and in the middle of such lines, cloud pattern, dangcho (a grass) pattern, chrysanthemum pattern or other various types of flowery patterns were designed. Remaining portion of the waist Dae was hanged up on the back, which was initially expressed as directed from the left to the right but thereafter expressed. without orderly fashion,. to the direction of the left from the right and vice versa, Dae was in the shape of Yaja Dae. In this regard, an issue of when or where such a disorderly fashion of the direction of the remaining portion of waist Dae was originated is also presented to be clarified. In case of the Ryuneung, Hong-neung and You-neung which have civil servants' stone images wearing exceptional costume (Jo-bok), waist Dae of the Ryu-neung and Hong-neung are designed in the mixture of dual cranes pattern, cosecutive beaded pattern and chrvsenthemum pattern and that of You-neung is designed in cloud pattern. (4) Hol. Although materials of the Hol held in hand of civil servants' stone images are not identifiable, those should be the ivory Hol as all the Baek Gwan's erected as stone images should be high class officials. In the styles, no significant changes were found, however the Hol's expressed on civil servants' stone images of the Yi-dynasty were shaped in round top and angled bottom or round top and bottom. Parcicularly, at the age of the King Young-jo the Hol was expressed in the peculiar type with four angles all cut off. (5) Hwa (shoes). As the shoes expressed on civil servants' stone images are covered with the lower edges of the Po, the styles thereof are not exactly identifiable. However, reading the statement "black leather shoes for the first class (1 Poom) to ninth class (9 Poom)," recorded in the Gyeongkook Daejon, we can believe that the shoes were worn. As the age went on, the front tips of the shoes were soared and particularly, at the Hong-neung of the King Go-jong the shoes were obviously expressed with modern sense as the country were civilized.

  • PDF