This study investigate the effect of each type of search volume on the number of Facebook fans and the number of tourists. According to the hierarchy effect model, the effect of communication appears to be the sequentiality of cognition-attitude-behavior. Applying this theory, this study predicted that when consumers who have higher involvement and knowledge on specific cities through search behavior, they will be more active in information search through Facebook fan page subscription and will lead to direct tourism behavior. To verify the prediction, we examined the influences among search volume of Seoul shown in Google Trend, the number of fans of official facebook page named 'Seoul Korea', and the number of foreign tourists. As a result, the type of search keyword was divided into four categories: tourism attraction keyword, natural environment keyword, symbolic keyword, and accessibility keyword. The regression analysis showed that tourism attraction keyword and symbolic keyword have influence on Facebook fanpage 'Like'. In addition, facebook fanpage fan size have mediation effect between search volume and number of tourists. All in all, it would be useful to appeal to foreign tourists with a message that emphasizes tourism attraction and Korea-related contents.
Cytokines expressed specifically in leukocytes subsets and in activated cells, which are involved in chemotaxis and activation of leukocytes, are recently defined as chemokines. Macrophage inflammatory $protein-1{\alpha}(MIP-1{\alpha})$ and $MIP-1{\beta}$ are members of C-C chemokine subfamily which produces wide immunomodulatory, proinflammatory, and hematopoietic modulatory actions. We have studied their gene expression by using Northern blot analysis in various blood cells such as cytolytic T lymphocyte(CTL), helper T lymphocyte(HTL), macrophage, and B lymphocyte. Resting CTL line CTLL-R8 expressed $MIP-1{\alpha}$ mRNA which was downregulated by ConA stimulation. Both of resting and ConA stimulated HTL line Hut78 and Jurkat did not express $MIP-1{\alpha}$ mRNA. There was detectable $MIP-1{\alpha}$ transcript in HTL hybridoma 2B4.11 which was a little upstimulated by ConA stimulation. B cell line 230, and macrophage cell line RAW264.7 and WR19M.1 showed distinct $MIP-1{\alpha}$ message which were induced after LPS stimulation. Expression pattern of $MIP-1{\beta}$ in all cell lines or cell were almost identical to that of $MIP-1{\alpha}$. Also strategies employed to identify and characterize the biological functions was preceded by receptor cloning to trace the shorcut to the final goal of cytokine research. For the cloning of $MIP-1{\alpha}$ receptor(R), we used synthetic oligonucleotides of transmembrane(T) conserved sequences of already cloned human(h) IL-8-R, and performed reverse transcription-polymerase chain reaction(RT-PCR) amplification using murine(m) macrophage cell line mRNA. Among 5RT-PCR products, we isolated a homologous cDNA with hIL-8-R which were shown to be putative mIL-8-R cDNA.
Human polymorphonuclear leukocytes(PMN) are the most numerous host cell in periodontal pockets and their presumed role is to form a protective barrier between the bacteria and periodontal tissues. Microbial component LPS activates macrophages to produce $IL-1{\beta}$, $MIP-1{\alpha}$, $-1{\beta}$, $TNF-{\alpha}$ and IL-6, etc. These cytokines have autocrine function to the macrophages, and paracrine function to other cell such as PMN and affect them to produce some biological functions. In the present study, human PMN were tested for the expression of $IL-1{\beta}$ and $MIP-1{\alpha}$ mRNA. Also we performed the receptor binding assay and in vitro assay for the antimicrobial action of HL-60 cell to determine whether HL-60 can replace the peripheral PMN in analyzing the biological functions. PMN were stimulated with $IL-1{\beta}$, TPA, $MIP-1{\alpha}$, LPS, IL-2 and total cytoplasmic RNA were extracted for the northern blot analysis. In order to determine the induction kinetics of $IL-1{\beta}$ or $MIP-1{\alpha}$ mRNA expression, cells were stimulated for 0,1,2,3 hours. We found peak expression of $IL-1{\beta}$ mRNA after 1hr of induction with $IL-1{\beta}$, LPS and after 2hr of induction with TPA. $MIP-l{\alpha}$ also induced but a scarce $IL-l{\beta}$ message from PMN. In contrast to the $IL-l{\beta}$ mRNA expression, $MIP-1{\alpha}$ were not induced from PMN in any culture conditions. Receptors for $MIP-1{\alpha}$ were identified on dibutyryl cyclic AMP(dbcAMP)-treated HL-60 as well as peripheral PMN. dbcAMP treatment significantly enhanced antimicrobial action of undifferentiated HL-60 cell. MIP-1 further increased enhancing effect of dbcAMP. $IL-1{\beta}$, to a lesser extent, also increased dbcAMP-induced enhancing effect of antimicrobial action of HL-60 cell.
Journal of the Society of Naval Architects of Korea
/
v.47
no.4
/
pp.628-645
/
2010
To perform the engagement level simulation between the underwater vehicle model and the surface model those are constituted with various systems/ sub-systems, we implemented four different federates as a federation according to the IEEE 1516 HLA (High Level Architecture) protocol that is the international standard in the distributed simulation. Those are CFCS (Command and Fire Control System) federate, motion federate, external entities (torpedos, countermeasure and surfaceship) federate, and visualization federate that interacts with OSG (Open Scene Graph)-based visualization rendering module. In this paper, we present the detailed method about the model constitution for discrete event simulation in the distributed environment. For the sake of this purpose, we introduce the DEVS (Discrete Event System Specification)-HLA-based modeling method of the CFCS federate that reflects not only the interations between models, but also commands from user and tactics manager that is separated from the model. The CFCS federate makes decisions in various missions such as the normal diving, the barrier misision, the target motion analysis, the torpedo launch, and the torpedo evasion. In the perspective of DEVS modeling, the CFCS federate is the coupled model that has the tactical data process model, command model and fire control model as an atomic model. The message passing and time synchronization with other three federates are settled by the $m\ddot{a}k$ RTI (Runtime Infrastructure) that supports IEEE 1516. In this paper, we provides the detailed modeling method of the complicated model that has hierarchical relationship such as the CFCS system in the submarine and that satisfies both of DEVS modeling method for the discrete event simulation and HLA modeling method for the distributed simulation.
Certain complex forces are existing at the other side of a canvas. These are visual arrangements and within the arrangement, even the simple combination of dots and lines create more than visual patterns. No matter what form that visual art has taken, it is performed in a certain space and it is constucted with various visual elements. For effective communication, visual elements must form a stable sturcture by extablishing organic relationship among each other. These requires an understanding of the human visual characteristics and psychonology, because human sight senses the same biological and psychological visual elements differently in its force and weight, according to the position within a given space. Although the structure which controls such force and weight exists within a peice of work, it is a internal plan of the work that actually controls the communication through a man\ulcorner psychological reactions towards the horizontal and virtical structures within it. Moreover it is a visual statement that effectively expresses a theme or a message. This thesis has studied visual structures through the analysis of art pieces regarding of these kind of a visual picture plane, characteristics of a picture plane formed by a structure of force existing on the other side of the picture and the theory of visual balance. In addition, the aim of this study is to help designers who deals with visual image works to understand the visual structures and psychological recognitions and to apply these picture plane compositions at their real work by recognizing the psychological power within the construction elements.
Kon Satoshi is a representative animation film director who explores human's intrinsic self-identity based on ambivalence and delivers a message for self-reflection of entity. The aim of this study is to analyze the persona of character according to the way how a self incorporates with another self in his film; that is to say, how a mask of the personality expresses and realizes itself from the perspectives of the Jung's analytical psychology. The persona, defined as the upmost external personality, involves social behavior playing a specific role to establish constant relationship with others in a society. With increasing demand in a society, individuals get to adapt to outer environment by playing his/her given role in various masks of personality. In this way, although persona acts as a major function in relationship with outer world, it would exert a negative influence on formation of self-identity because of the inconsistency between consciousness and unconsciousness when immersed only in mask of personality, complying excessively with the demand of group. However, persona does not always have a negative effect on relationships. Developed adequately to fulfill its social function, persona is helpful to establish a healthy self-identity with balanced control between inner world of unconsciousness and outer world of consciousness. From these perspectives, this study can identify how the desire of mask hidden inside of each character expresses to function in a positive or negative way by analyzing characters in the film according to integrated pattern and correlation between consciousness and unconsciousness. Additionally, I hope that the psychological research methods in this study will be full of help for interpreting on a character analysis as a theoretical approach.
Mobile IP provides an efficient and scalable mechanism for host mobility within the Internet. Using Mobile If, mobile nodes may change their point of attachment to the Internet without changing their If address. However, it would result in a high signaling cost. To reduce the signaling cost, we factor in the fact that mobile users will not be actively communicating much of the time. In fact, there Is no necessity to send a binding update message to the home agent when an mobile node does not communicates with others while moving. From this point of view, we propose a lazy update strategy for minimizing signaling cost using the forwarding pointer in hierarchical Mobile IPv6. In our proposal, binding updates are sent only when a mobile node is in a busy mode. If an mobile node is in a dormant mode, binding update messages are delayed until busy mode using the forwarding pointer. As a result, our proposal can reduce the total signaling cost by eliminating unnecessary binding update messages when a mobile node Is in a dormant mode. In addition to, our proposal reduces unnecessary location update cost resulting from ping-pong effect under mobile node's dormant mode. Analysis results using the discrete analytic model presented in this paper shows that our proposal can has superior performance than hierarchical Mobile nv6 when the call-to-mobility ratio is low and the length of the forwarding pointer chain K is low.
The Journal of Korean Institute of Communications and Information Sciences
/
v.34
no.10B
/
pp.1050-1061
/
2009
The Tactical Internet(TI) managed by Infantry Brigades is used for the purpose of sharing information of Command Control and Situation Awareness. When there are more than two destinations to transmit data in the TI system, a multicasting is utilized based on pre-defined multicast groups. However even in the case when a source node needs to send some messages like weathercast and attack alarm etc to only a part of Battalion or Brigades in a specific geographical region (destination region), the current TI multicasting protocol is designed to transmit the messages to the pre-defined group or all of the Battalion/Brigade nodes, resulting in inefficiency in terms of end-to-end delay and overhead. In this paper, we propose more efficient protocol for such cases, named as "Tactical Internet Geocasting (TIG)". The proposed scheme firstly checks whether the destination region belongs to one Battalion region or more than two Battalion regions using location information, and then performs a greedy forwarding from the source node to the destination region, followed by a local flooding inside of the destination region. With performance analysis and simulations using NS-2, TIG is compared to the current TI multicasting protocol (i.e., Simplified MDP) and the LBM (Location-based Multicast). The simulation results show that the proposed TIG is more efficient than both in terms of delay and network overhead.
The video image in the movie has become more spectacular than ever, and the expression area and the subject have been infinitely expanded, but it can not be said that the range of imagination has expanded. Instead, the 60s and 70s, which were the epochs of popular culture, The film that implements the artististic visual style and expression style of the artist. Stanley Kubrick's "Clockwork Orange", which has been pursuing technological perfection and experimental style, was created using traditional video grammar and gained a great repercussion with outstanding material and high artistic expression technique at that time. These techniques have led audiences to rational observation through irony, rather than emotional sympathy for the situation, for extreme violence and sensational films. This is because the purpose of the director was not to be in technological perfection but to reveal the contradictions of the real society and to reflect on the meaning of the existence of society itself. These creative traditional visual grammar and expression methods are a good visual style that enables the intentionally transmitted message to be transmitted more intensely and effectively, and the artistic depth can be created at the same time by unconsciously perceiving the meaning present on the back to the audience.
We are at the onset of a major revolution in education, a revolution unparalleled since the invention of the printing press. The computer will be the instrument of this revolution. Computers and computer application are everywhere these days. Everyone can't avoid the influence of the computer in today's world. The computer is no longer a magical, unfamiliar tool that is used only by researchers or scholars or scientists. The computer helps us do our jobs and even routine tasks more effectively and efficiently. More importantly, it gives us power never before available to solve complex problems. Mathematics instruction in secondary schools is frequently perceived to be more a amendable to the use of computers than are other areas of the school curriculum. This is based on the perception of mathematics as a subject with clearly defined objectives and outcomes that can be reliably measured by devices readily at hand or easily constructed by teachers or researchers. Because of this reason, the first large-scale computerized curriculum projects were in mathematics, and the first educational computer games were mathematics games. And now, the entire mathematics curriculum appears to be the first of the traditional school curriculum areas to be undergoing substantial trasformation because of computers. Recently, many research-Institutes of our country are going to study on computers in orders to use it in mathematics education, but the study is still start ing-step. In order to keep abreast of this trend necessity, and to enhance mathematics teaching/learning which is instructed lecture-based teaching/learning at the present time, this study aims to develop/present practical method of computer-using. This is devided into three methods. 1. Programming teaching/learning method This part is presented the following five types which can teach/learn the mathematical concepts and principle through concise program. (Type 1) Complete a program. (Type 2) Know the given program's content and predict the output. (Type 3) Write a program of the given flow-chart and solve the problem. (Type 4) Make an inference from an error message, find errors and correct them. (Type 5) Investigate complex mathematical fact through program and annotate a program. 2. Problem-solving teaching/learning method solving This part is illustrated how a computer can be used as a tool to help students solve realistic mathematical problems while simultaneously reinforcing their understanding of problem-solving processes. Here, four different problems are presented. For each problem, a four-stage problem-solving model of polya is given: Problem statement, Problem analysis, Computer program, and Looking back/Looking ahead. 3. CAI program teaching/learning method This part is developed/presented courseware of sine theorem section (Mathematics I for high school) in order to avail individualized learning or interactive learning with teacher. (Appendix I, II)
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.