• Title/Summary/Keyword: mobile contents

Search Result 2,325, Processing Time 0.042 seconds

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.

Study for making movie poster applied Augmented Reality (증강현실 영화포스터 제작연구)

  • Lee, Ki Ho
    • Cartoon and Animation Studies
    • /
    • s.48
    • /
    • pp.359-383
    • /
    • 2017
  • 3,000 years ago, since the first poster of humanity appeared in Egypt, the invention of printing technique and the development of civilization have accelerated the poster production technology. In keeping with this, the expression of poster has also been developed as an attempt to express artistic sensibility in a simple arrangement of characters, and now it has become an art form that has become a domain of professional designers. However, the technological development in the expression of poster is keep staying in two-dimensional, and is dependent on printing only that it is irrelevant to the change of ICT environment based on modern multimedia. Especially, among the many kinds of posters, the style of movie posters, which are the only objects for video, are still printed on paper, and many attempts have been made so far, but the movie industry still does not consider ICT integration at all. This study started with the feature that the object of the movie poster dealt with the video and attempted to introduce the augmented reality to apply the dynamic image of the movie to the static poster. In the graduation work of the media design major of a university in Korea, the poster of each works for promoting the visual work of the students was designed and printed in the form of a commercial film poster. Among them, 6 artworks that are considered to be suitable for augmented reality were selected and augmented reality was introduced and exhibited. Content that appears matched to the poster through the mobile device is reproduced on a poster of a scene of the video, but the text informations of the original poster are kept as they are, so that is able to build a moving poster looked like a wanted from the movie "Harry Potter". In order to produce this augmented reality poster, we applied augmented reality to posters of existing commercial films produced in two different formats, and found a way to increase the characteristics of AR contents. Through this, we were able to understand poster design suitable for AR representation, and technical expression for stable operation of augmented reality can be summarized in the matching process of augmented reality contents production.

Establishment of Choline Analysis in Infant Formulas and Follow-up Formulas by Ion Chromatograph (이온크로마토그래프를 이용한 조제유류 및 영아용·성장기용 조제식 중 콜린 함량 분석법 연구)

  • Hwang, Kyung Mi;Ham, Hyeon Suk;Lee, Hwa Jung;Kang, Yoon Jung;Yoon, Hae Seong;Hong, Jin Hwan;Lee, Hyoun Young;Kim, Cheon Hoe;Oh, Keum Soon
    • Journal of Food Hygiene and Safety
    • /
    • v.32 no.5
    • /
    • pp.411-417
    • /
    • 2017
  • This study was conducted to establish the analysis method for the contents of choline in infant formulas and follow-up formulas by ion chromatograph (IC). To optimize the method, we compared several conditions for extraction, purification and instrumental measurement using spiked samples and certified reference material (CRM; NIST SRM 1849a) as test materials. IC method for choline was established using Ion Pac CG column and 18 mM $H_2SO_4$ mobile phase. The parameters of validation were specificity, linearity, LOD, LOQ, recovery, accuracy, precision and repeatability. The specificity was confirmed by the retention time and the linearity, $R_2$ was over 0.999 in range of 0.5~10 mg/L. The detection limit and quantification limit were 0.14, 0.43 mg/L. The accuracy and precision of this method using CRM were 95%, 2.1% respectively. Optimized methods were applied in sample analysis to verify the reliability. All the tested products were acceptable contents of choline compared with component specification for nutrition labeling. The standard operating procedures were prepared for choline to provide experimental information and to strengthen the management of nutrient in infant formula and follow-up formula.

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

Analysis of Emerging Geo-technologies and Markets Focusing on Digital Twin and Environmental Monitoring in Response to Digital and Green New Deal (디지털 트윈, 환경 모니터링 등 디지털·그린 뉴딜 정책 관련 지질자원 유망기술·시장 분석)

  • Ahn, Eun-Young;Lee, Jaewook;Bae, Junhee;Kim, Jung-Min
    • Economic and Environmental Geology
    • /
    • v.53 no.5
    • /
    • pp.609-617
    • /
    • 2020
  • After introducing the industry 4.0 policy, Korean government announced 'Digital New Deal' and 'Green New Deal' as 'Korean New Deal' in 2020. We analyzed Korea Institute of Geoscience and Mineral Resources (KIGAM)'s research projects related to that policy and conducted markets analysis focused on Digital Twin and environmental monitoring technologies. Regarding 'Data Dam' policy, we suggested the digital geo-contents with Augmented Reality (AR) & Virtual Reality (VR) and the public geo-data collection & sharing system. It is necessary to expand and support the smart mining and digital oil fields research for '5th generation mobile communication (5G) and artificial intelligence (AI) convergence into all industries' policy. Korean government is suggesting downtown 3D maps for 'Digital Twin' policy. KIGAM can provide 3D geological maps and Internet of Things (IoT) systems for social overhead capital (SOC) management. 'Green New Deal' proposed developing technologies for green industries including resource circulation, Carbon Capture Utilization and Storage (CCUS), and electric & hydrogen vehicles. KIGAM has carried out related research projects and currently conducts research on domestic energy storage minerals. Oil and gas industries are presented as representative applications of digital twin. Many progress is made in mining automation and digital mapping and Digital Twin Earth (DTE) is a emerging research subject. The emerging research subjects are deeply related to data analysis, simulation, AI, and the IoT, therefore KIGAM should collaborate with sensors and computing software & system companies.

Characterization of Burcucumber Biochar and its Potential as an Adsorbent for Veterinary Antibiotics in Water (가시박 유래 바이오차의 특성 및 항생물질 흡착제로서의 활용가능성 평가)

  • Lim, Jung Eun;Kim, Hae Won;Jeong, Se Hee;Lee, Sang Soo;Yang, Jae E;Kim, Kye Hoon;Ok, Yong Sik
    • Journal of Applied Biological Chemistry
    • /
    • v.57 no.1
    • /
    • pp.65-72
    • /
    • 2014
  • Biochar (BC) from biomass pyrolysis is a carbonaceous material that has been used to remove various contaminants in the environment. The eliminatory action for burcucumber (Sicyos angulatus L.) as an invasive plant is being consistently carried out because of its harmfulness and ecosystem disturbance. In this study, burcucumber biomass was converted into BCs at different pyrolysis temperatures of 300 and $700^{\circ}C$ under a limited oxygen condition. Produced BCs were characterized and investigated to ensure its efficiency on antibiotics' removal in water. The adsorption experiment was performed using two different types of antibiotics, tetracycline (TC) and sulfamethazine (SMZ). For the BC pyrolyzed at a high temperature ($700^{\circ}C$), the values of pH, electrical conductivity, and the contents of ash and carbon increased whereas the yield, mobile matter, molar ratios of H/C and O/C, and functional groups decreased. Results showed that the efficiency of BCs on antibiotics' removal increased as pyrolysis temperature increased from 300 to $700^{\circ}C$ (38 to 99% for TC and 6 to 35% for SMZ). The reaction of ${\pi}-{\pi}$ EDA (electron-donor-acceptor) might be involved in antibiotics' adsorption to BCs. BC has potential to be a superior antibiotics' adsorbent with environmental benefit by recycling of waste/invasive biomass.

A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks (위치기반서비스 사용자의 지각된 가치와 위험이 보안강화의도와 지속이용의도에 미치는 영향에 관한 연구: 지각된 혜택과 위험을 중심으로)

  • Park, Kyung Ah;Lee, Dae Yong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.299-323
    • /
    • 2014
  • The reason location based service is drawing attention recently is because smart phones are being supplied increasingly. Smart phone, basically equipped with GPS that can identify location information, has the advantage that it can provide contents and services suitable for the user by identifying user location accurately. Offering such diverse advantages, location based services are increasingly used. In addition, for use of location based services, release of user's personal information and location data is essentially required. Regarding personal information and location data, in addition to IT companies, general companies also are conducting various profitable businesses and sales activities based on personal information, and in particular, personal location data, comprehending high value of use among personal information, are drawing high attentions. Increase in demand of personal information is raising the risk of personal information infringement, and infringements of personal location data also are increasing in frequency and degree. Therefore, infringements of personal information should be minimized through user's action and efforts to reinforce security along with Act on the Protection of Personal Information and Act on the Protection of Location Information. This study aimed to improve the importance of personal information privacy by empirically analyzing the effect of perceived values on the intention to strengthen location information security and continuously use location information for users who received location-based services (LBS) in mobile environments with the privacy calculation model of benefits and risks as a theoretical background. This study regarded situation-based provision, the benefit which users perceived while using location-based services, and the risk related to personal location information, a risk which occurs while using services, as independent variables and investigated the perceived values of the two variables. It also examined whether there were efforts to reduce risks related to personal location information according to the values of location- based services, which consumers perceived through the intention to strengthen security. Furthermore, it presented a study model which intended to investigate the effect of perceived values and intention of strengthening security on the continuous use of location-based services. A survey was conducted for three hundred ten users who had received location-based services via their smartphones to verify study hypotheses. Three hundred four questionnaires except problematic ones were collected. The hypotheses were verified, using a statistical method and a logical basis was presented. An empirical analysis was made on the data collected through the survey with SPSS 12.0 and SmartPLS 2.0 to verify respondents' demographic characteristics, an exploratory factor analysis and the appropriateness of the study model. As a result, it was shown that the users who had received location-based services were significantly influenced by the perceived value of their benefits, but risk related to location information did not have an effect on consumers' perceived values. Even though users perceived the risk related to personal location information while using services, it was viewed that users' perceived value had nothing to do with the use of location-based services. However, it was shown that users significantly responded to the intention of strengthening security in relation to location information risks and tended to use services continuously, strengthening positive efforts for security when their perceived values were high.

Simultaneous HPLC Determination of Marker Compounds for the Standardization of Hedyotis diffusa (백운풀의 지표성분 설정 및 품질표준화를 위한 정량 분석법)

  • Bang, Han-Yeol;Yang, Eun-Ju;Kim, Jeong-Ah;Song, Kyung-Sik
    • Journal of Life Science
    • /
    • v.23 no.8
    • /
    • pp.1025-1031
    • /
    • 2013
  • From a 95% ethanolic extract of H. diffusa, four marker compounds (HD1~HD4) were isolated, which were relatively unique and exist in comparably high contents. The structures of marker compounds were identified as digitolutein (1), 2-hydroxy-3-methylanthraquinone (2), (E/Z)-6-O-p-coumaroyl scandoside methyl ester (4:1 mixture) (3), and (E/Z)-6-O-p-methoxycinnamoyl scandoside methyl ester (4:1 mixture) (4), respectively, on the basis of $^{13}C$ and $^1H$-NMR analyses. The calibration curves of marker compounds showed high linearity, as their correlation coefficient ($R^2$) were in the range of 0.9991~0.9999. In addition, the limit of detection (LOD) and the limit of quantification (LOQ) were $0.03{\sim}0.07{\mu}g/ml$ and $0.099{\sim}0.231{\mu}g/ml$, respectively. The intra-day/inter-day precision and accuracy were 0.23~2.00%/0.25~1.16% and 94.60~108.44%/94.73-110.23%, respectively. The optimal HPLC conditions for the simultaneous quantification of HD1~HD4 were as follows: stationary phase; Merck Chromolith RP-18e ($100{\times}4.6mm$, $5{\mu}m$), column temp.; room temperature, UV detection at 280 nm, flow rate; 2.0 ml/min, injection volume; $10{\mu}l$, mobile phase; start with the mixture of 80% solvent A ($H_2O$ containing 0.5% acetic acid) and 20% solvent B (methanol containing 0.5% acetic acid) and gradually decrease solvent A to 40% in 9 min., then retain this condition to 18 min. Under the HPLC condition, the four marker compounds 1~4 were successfully separated without any interference of other constituents. The results obtained in this study are expected to be helpful for the development of nutraceutics and natural medicines and for the quality control of this plant.

Magnetic Properties of Electroless Co-Mn-P Alloy Deposits (무전해 Co-Mn-P 합금 도금층의 자기적 특성)

  • Yun, Seong-Ryeol;Han, Seung-Hui;Kim, Chang-Uk
    • Korean Journal of Materials Research
    • /
    • v.9 no.3
    • /
    • pp.274-281
    • /
    • 1999
  • Usually sputtering and electroless plating methods were used for manufacturing metal-alloy thin film magnetic memory devices. Since electroless plating method has many merits in mass production and product variety com­pared to sputtering method, many researches about electroless plating have been performed in the United State of America and Japan. However, electroless plating method has not been studied frequently in Korea. In these respects the purpose of this research is manufacturing Co-Mn-P alloy thin film on the corning glass 2948 by electroless plating method using sodium hypophosphite as a reductant, and analyzing deposition rate, alloy composition, microstructure, and magnetic characteristics at various pH's and temperatures. For Co-P alloy thin film, the reductive deposition reaction 0$\alpha$urred only in basic condition, not in acidic condition. The deposition rate increased as the pH and temperature increased, and the optimum condition was found at the pH of 10 and the temperature of $80^{\circ}C$. Also magnetic charac­teristics was found to be most excellent at the pH of 9 and the temperature of $70^{\circ}C$, resulting in the coercive force of 8700e and the squareness of 0.78. At this condition, the contents of P was 2.54% and the thickness of the film was $0.216\mu\textrm{m}$. For crystal orientation, we could not observe fcc for $\beta$-Co. On the other hand,(1010), (0002), (1011) orientation of hcp for a-Co was observed. We could confirm the formation of longitudinal magnetization from dominant (1010) and (1011) orientation of Co-P alloy. For Co-Mn-P alloy deposition, coercive force was about 1000e more than that of Co P alloy, but squareness had no difference. For crystal orientation, (l01O) and (lOll) orientation of $\alpha$-Co was dominant as same as that of Co- P alloy. Likewise we could confirm the formation of longitudinal magnetization.

  • PDF