• Title/Summary/Keyword: Access Benefit

Search Result 195, Processing Time 0.021 seconds

A Study on Distribution Characteristics of Corylopsis coreana Using SDM (종분포모형을 이용한 히어리 서식지의 분포 특성 연구)

  • Kwon, Hyuksoo;Ryu, Ji-Eun;Seo, Changwan;Kim, Jiyeon;Lim, Dong-Ok;Suh, Min-Hwan
    • Journal of Environmental Impact Assessment
    • /
    • v.21 no.5
    • /
    • pp.735-743
    • /
    • 2012
  • Since the CBD(Conservation on Biological Diversity)'s 10th Conference of the Parties adopted the protocol on access to genetic resources and benefit sharing in Nagoya 2010, the importance of endangered species studies such as habitat distribution, protection and management have been more emerged. Corylopsis coreana, an endangered species in Korea, was isolated nationally and has been damaged by anthropogenic factors. In this paper, we identified the factors affecting C. coreana habitat at the national scale and regional scale using National Survey of Natural Environment and predicted the distribution of C. coreana. Annual precipitation, precipitation of wettest quarter, temperature seasonality and Digital Elevation Model(DEM) were derived as important factors at the national scale, and precipitation of wettest quarter, DEM and solar radiation on spring were identified as important factors at regional scale. Colylopsis distribution was affected by an effect of climate significantly at the national scale, and by additionally the microclimate and topography at regional scale. These findings will be used as the basis on habitat conservation and restoration plan and climate change.

Pre and Post Surgery Management and Practicality of Prosthesis for Patients with Lower Limb Amputation (하지 절단환자의 수술 전후 관리와 의지의 실용성에 대한 연구)

  • Ahn, Wang-Hun;Lee, Kang-Noh;Choi, Yoo-Jung
    • Journal of Korean Physical Therapy Science
    • /
    • v.12 no.4
    • /
    • pp.89-97
    • /
    • 2005
  • Objective: The purpose of this study was to access quality of life and evaluate pre and post surgery management for persons with lower limb amputations. Method: This study was designed as a telephone survey. The subjects were patients who underwent their lower limb amputation between January 1994, and February 2005 at Asan Medical Center in seoul. sixty one of 203 subjects had granted consent and were studied. Results: The major cause of below knee amputations was vascular disease. Traumatic injuries were more common among subjects with above knee amputations. 93.4% of subjects were in use of prosthesis and 70.1 days were required to fit the prosthesis. 68.4% of subjects were able to ambulate with single point cane or without assistive devices. 80.3% of subjects complained phantom pain. Most subjects expressed the unsatisfactory result regarding the functional usage of prosthesis and education from hospital. Conclusion: Pre and post surgery rehabilitation program will benefit to promote better functional status and quality of life for persons with lower limb amputations.

  • PDF

A Study on the Remedies in Digital Information Transaction - Focusing on the urn A Part 8 - (디지털정보거래에 있어 계약위반에 대한 구제에 관한 연구 - UCITA 제8장을 중심으로 -)

  • Han, Byoung-Wan;Seo, Min-Kyo
    • International Commerce and Information Review
    • /
    • v.12 no.3
    • /
    • pp.79-98
    • /
    • 2010
  • The National Conference of Commissioners on Uniform State Laws promulgated the Uniform Computer Information Transactions Act (UCITA) in 1999. In 2000 and 2002, this Act was also Amended. UCITA provides a comprehensive set of rules for licensing computer information, whether computer software or other clearly identified forms of computer information. Computerized databases and computerized music are other examples of computer information that would be subject to UCITA. It would also govern access contracts to sites containing computer information, whether on or off the Internet. UCITA would not govern contracts, even though they may be licensing contracts, for the traditional distribution of movies, books, periodicals, newspapers, or the like. Part 8 of UCITA provides a remedy structure somewhat modeled on that of Article 2 but adapted in significant respects to the different context of a computer information transaction. For example, 808 of UCITA recognizes the focus in a license context for a licensor's remedy should properly be on recovery for benefit conferred or for lost profit, rather than on damage measurement by a substitute transaction, where the license is non-exclusive so additional transactions are permitted and there is very little cost in reproduction of the information and its redistribution. Section 816 of UCITA also contains very important limitations on the generally recognized common law right of self-help as applicable in the electronic context.

  • PDF

An Advanced Adaptive Garbage Collection Policy by Considering the Operation Characteristics (연산 특성을 고려한 향상된 적응적 가비지 컬렉션 정책)

  • Park, Song-Hwa;Lee, Jung-Hoon;Lee, Won-Oh;Kim, Hyun-Woo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.5
    • /
    • pp.269-277
    • /
    • 2018
  • NAND flash memory has widely been used because of non-volatility, low power consumption and fast access time. However, it suffers from inability to provide update-in-place and the erase cycle is limited. The unit of read/write operation is a page and the unit of erase operation is a block. Moreover erase operation is slower than other operations. We proposed the Adaptive Garbage Collection (called "AGC") policy which focuses on not only reducing garbage collection process time for real-time guarantee but also wear-leveling for a flash memory lifetime. The AGC performs better than Cost-benefit policy and Greedy policy. But the AGC does not consider the operation characteristics. So we proposed the Advanced Adaptive Garbage Collection (called "A-AGC") policy which considers the page write operation count and block erase operation count. The A-AGC reduces the write operations by considering the data update frequency and update data size. Also, it reduces the erase operations by considering the file fragmentation. We implemented the A-AGC policy and measured the performance compared with the AGC policy. Simulation results show that the A-AGC policy performs better than AGC, specially for append operation.

Data Security Technology for the Desktop Virtualization Environment using the Graphic Offloading (SW 분할 실행을 이용한 데스크탑 가상화 환경에서 데이터 보안 기술)

  • Chung, Moonyoung;Choi, Won-Hyuk;Jang, Su-Min;Yang, Kyung-Ah;Kim, Won-Young;Choi, Jihoon
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.10
    • /
    • pp.555-560
    • /
    • 2014
  • This paper proposes the data security technology for the desktop virtualization environment using the separated software execution method. In the virtual environment where allocates separate VMs to the users, there is a benefit that the programs in one guest machine are isolated from the programs running in another guest machine, whereas in the separated execution environment that supports application virtualization, the isolation is not offered and it causes the data security problem because the applications are executed by the one root privilege in the server. To solve this problem, we provides the data security method using the server storage filter, the viewer filter, and the file mapping table in this paper.

Microbial Diversity in Swamp

  • Hong Soon Gyu;Lee Kang Hyun;Bae Kyung Sook
    • Proceedings of the Microbiological Society of Korea Conference
    • /
    • 2002.10a
    • /
    • pp.90-93
    • /
    • 2002
  • The revolution in molecular biology has given us greatly increased ability to obtain and to modify biological resources and to use them for the benefit of all humankind. The sequencing and the associated analysis of gene functions for a growing number of genomes will have an unprecedented effect on the uses of biological resources and the need for access to them. To investigate the diversity of microbial community in swamp, molecular systematic methods were applied. By amplified rDNA restriction analysis (ARDRA) and rDNA partial sequence analysis, $75\%$ of the isolates were known species. In case of uncultured analysis, almost all the selected clones were new species candidate. Especially archea and uncultured bacterial analyses, all clones were new taxon candidates. As for the eukaryotic diversity, several yeast form cultures were isolated from various samples of swamp. Among them, about $60\%$ of the isolates were easily identified. In case of a new species candidate, most strain were included in hymenomycetal yeasts.

  • PDF

Neutrality between a Vertically Integrated Cable Provider and an Over-the-Top Video Provider

  • Dai, Wei;Baek, Ji Won;Jordan, Scott
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.962-974
    • /
    • 2016
  • We are concerned with whether a vertically integrated broadband and content provider can unreasonably advantage itself over competing content providers, either by selling quality-of-service (QoS) to content providers at unreasonably high prices, or by refusing to provide access to QoS to competing content. We address this question by modeling the competition between one such vertically integrated provider and one over-the-top (OTT) content provider. The broadband provider decides whether to deploy QoS, and if so it also determines the QoS price if sold to either the OTT content provider or directly to users. We analytically determine when the broadband provider will sell QoS and when the OTT content provider or users will purchase QoS. We characterize the optimal QoS and video service prices. The Internet service provider (ISP)'s market share increases with the difference in the value of the two video services and decreases with the difference in the corresponding costs. Numerical results illustrate the effect of QoS price on content price, the variation of prices and profit with QoS price, and the variation of prices and market shares with the benefit of QoS. The ISP may sell QoS to users at a lower price than when QoS is sold to the OTT provider.

Sum Transmission Rate Maximization Based Cooperative Spectrum Sharing with Both Primary and Secondary QoS-Guarantee

  • Lu, Weidang;Zhu, Yufei;Wang, Mengyun;Peng, Hong;Liu, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2015-2028
    • /
    • 2016
  • In this paper, we propose a sum transmission rate maximization based cooperative spectrum sharing protocol with quality-of-service (QoS) support for both of the primary and secondary systems, which exploits the situation when the primary system experiences a weak channel. The secondary transmitter STb which provides the best performance for the primary and secondary systems is selected to forward the primary signal. Specifically, STb helps the primary system achieve the target rate by using a fraction of its power to forward the primary signal. As a reward, it can gain spectrum access by using the remaining power to transmit its own signal. We study the secondary user selection and optimal power allocation such that the sum transmission rate of primary and secondary systems is maximized, while the QoS of both primary and secondary systems can be guaranteed. Simulation results demonstrate the efficiency of the proposed spectrum sharing protocol and its benefit to both primary and secondary systems.

The Role of Intellectual Property Rights for Conserving Biological Diversity - Patent Law Treaty for Protecting Genetic Resources and Traditional Knowledge - (생물다양성보전을 위한 지적재산권의 역할 연구 - 유전자원과 전통지식 보호를 위한 특허법의 역할 중심으로 -)

  • Kang, Gil-Mo;Yeom, Jae-Ho;Doh, Seong-Jae;Lee, C. Mi-Jin;Kwon, Suk-Jae
    • Ocean and Polar Research
    • /
    • v.29 no.1
    • /
    • pp.43-53
    • /
    • 2007
  • Recently, controversy over intellectual property rights for protecting genetic resources and traditional knowledge has been emerging. Very active debates and global discussions are being carried out in various international organizations for possible approaches to be taken for these properties, and for the fair and equal sharing of the benefits from these intellectual properties. There is a need to evaluate adopting a sui generis system which is being pushed by developing nations, or adopting a policy which will guaranteee benefit sharing such as sharing royalties from marketing final products, technical transfers, capacity building, and participating in research activities. Also, it is very important to examine the legal issues concerning genetic resources based on Convention on Biological Diversity for the fair and equal sharing of the benefits with developing nations, at the same time assuring developed nations of access to genetic resources.

Autonomous vision-based damage chronology for spatiotemporal condition assessment of civil infrastructure using unmanned aerial vehicle

  • Mondal, Tarutal Ghosh;Jahanshahi, Mohammad R.
    • Smart Structures and Systems
    • /
    • v.25 no.6
    • /
    • pp.733-749
    • /
    • 2020
  • This study presents a computer vision-based approach for representing time evolution of structural damages leveraging a database of inspection images. Spatially incoherent but temporally sorted archival images captured by robotic cameras are exploited to represent the damage evolution over a long period of time. An access to a sequence of time-stamped inspection data recording the damage growth dynamics is premised to this end. Identification of a structural defect in the most recent inspection data set triggers an exhaustive search into the images collected during the previous inspections looking for correspondences based on spatial proximity. This is followed by a view synthesis from multiple candidate images resulting in a single reconstruction for each inspection round. Cracks on concrete surface are used as a case study to demonstrate the feasibility of this approach. Once the chronology is established, the damage severity is quantified at various levels of time scale documenting its progression through time. The proposed scheme enables the prediction of damage severity at a future point in time providing a scope for preemptive measures against imminent structural failure. On the whole, it is believed that the present study will immensely benefit the structural inspectors by introducing the time dimension into the autonomous condition assessment pipeline.