• Title/Summary/Keyword: Partial Key

Search Result 410, Processing Time 0.036 seconds

The Role of Relational Commitment and its Antecedents in User Loyalty of Mobile Messenger Services (모바일 메신저 서비스에서 관계적 몰입과 선행 요인이 사용자 충성도에 미치는 영향)

  • Kim, Byoungsoo
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.241-251
    • /
    • 2014
  • Mobile messenger services (MMSs), such as Kakaotalk, Wetalk, Line, and Whatsapp, are gaining popularity worldwide because of communicating with other people without any cost. We examined key antecedents of user loyalty to understand user's decision-making process in the MMS environment. To capture a long-term relationship with service providers, we posit relational commitment and user satisfaction as key predictors of user loyalty. Moreover, the effects of perceived usefulness, perceived enjoyment, and corporate image on user's decision-making processes were examined. The proposed model was tested by applying partial least squares to data from 220 experienced Kakaotalk users. The findings of this study found that both relational commitment and user satisfaction play an important role in enhancing user loyalty in the MMS context. The analysis results indicate that corporate image influences relational commitment and user loyalty through user satisfaction. The analysis results help MMS providers establish management or marketing strategies to effectively improve user loyalty.

A Range Query Method using Index in Large-scale Database Systems (대규모 데이터베이스 시스템에서 인덱스를 이용한 범위 질의 방법)

  • Kim, Chi-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1095-1101
    • /
    • 2012
  • As the amount of data increases explosively, a large scale database system is emerged to store, retrieve and manipulate it. There are several issues in this environments such as, consistency, availability and fault tolerance. In this paper, we address a efficient range-query method where data management services are separated from transaction management services in large-scale database systems. A study had been proposed using partitions to protect independence of two modules and to resolve the phantom problem, but this method was efficient only when range-query is specified by a key. So, we present a new method that can improve the efficiency when range-query is specified by a key attribute as well as other attributes. The presented method can guarantee the independence of separated modules and alleviate overheads for range-query using partial index.

A low damage and ductile rocking timber wall with passive energy dissipation devices

  • Loo, Wei Yuen;Quenneville, Pierre;Chouw, Nawawi
    • Earthquakes and Structures
    • /
    • v.9 no.1
    • /
    • pp.127-143
    • /
    • 2015
  • In conventional seismic design, structures are assumed to be fixed at the base. To reduce the impact of earthquake loading, while at the same time providing an economically feasible structure, minor damage is tolerated in the form of controlled plastic hinging at predefined locations in the structure. Uplift is traditionally not permitted because of concerns that it would lead to collapse. However, observations of damage to structures that have been through major earthquakes reveal that partial and temporary uplift of structures can be beneficial in many cases. Allowing a structure to move as a rigid body is in fact one way to limit activated seismic forces that could lead to severe inelastic deformations. To further reduce the induced seismic energy, slip-friction connectors could be installed to act both as hold-downs resisting overturning and as contributors to structural damping. This paper reviews recent research on the concept, with a focus on timber shear walls. A novel approach used to achieve the desired sliding threshold in the slip-friction connectors is described. The wall uplifts when this threshold is reached, thereby imparting ductility to the structure. To resist base shear an innovative shear key was developed. Recent research confirms that the proposed system of timber wall, shear key, and slip-friction connectors, are feasible as a ductile and low-damage structural solution. Additional numerical studies explore the interaction between vertical load and slip-friction connector strength, and how this influences both the energy dissipation and self-centring capabilities of the rocking structure.

Shear strength of match-cast-free dry joint in precast girders

  • Jiang, Haibo;Feng, Jiahui;Xiao, Jie;Chen, Mingzhu;Liang, Weibin
    • Computers and Concrete
    • /
    • v.26 no.2
    • /
    • pp.161-173
    • /
    • 2020
  • Shear keys in precast concrete segmental bridges (PCSBs) are usually match-casting which is very labour intensive. In this research, an innovative match-casting-free construction was proposed by leaving small gap between the convex and the concave castellated shear keys in the joints of PCSBs. Specimen experiment, shear strength analysis and numerical simulation were conducted, investigating the loading performance of this new type of dry joints, the gap dry joints. Compared with match-casting joint specimens, it has been found from experiment that shear capacity of gap joint specimens significantly decreased ranging from 17.75% to 42.43% due to only partially constrained and contacted in case of gap dry joints. Through numerical simulation, the effects of bottom contacting location, the heights of the gap and the shear key base were analyzed to investigate strength reduction and methods to enhance shear capacity of gap joint specimens. Numerical results proved that shear capacity of gap dry joints under full contact condition was higher than that under partial contact. In addition, left contact destroyed the integrity of shear keys, resulting in significant strength reduction. Larger shear key base remarkably increased shear capacity of the gap joint. Experimental tests indicated that AASHTO provision underestimated shear capacity of the match-casting dry joint specimens, while the numerical results for the gap dry joint showed that AASHTO provision underestimated shear capacity of full contact specimens, but overestimated that of left contact specimens.

Protection and Dissection of Recurrent Laryngeal Nerve in Salvage Thyroid Cancer Surgery to Patients with Insufficient Primary Operation Extent and Suspicious Residual Tumor

  • Yu, Wen-Bin;Zhang, Nai-Song
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.17
    • /
    • pp.7457-7461
    • /
    • 2015
  • Some thyroid cancer patients undergone insufficient tumor removal in the primary surgery in China. our aim is to evaluate the impact of dissection of the recurrent laryngeal nerve during a salvage thyroid cancer operation in these patients to prevent nerve injury. Clinical data of 49 enrolled patients who received a salvage thyroid operation were retrospectively reviewed. Primary pathology was thyroid papillary cancer. The initial procedure performed included nodulectomy (20 patients), partial thyroidectomy (19 patients) and subtotal thyroidectomy (10 patients). The effect of dissection and protection of the recurrent laryngeal nerve and the mechanism of nerve injury were studied. The cervical courses of the recurrent laryngeal nerves were successfully dissected in all cases. Nerves were adherent to or involved by scars in 22 cases. Three were ligated near the place where the nerve entered the larynx, while another three were cut near the intersection of inferior thyroid artery with the recurrent laryngeal nerve. Light hoarseness occurred to four patients without a preoperative voice change. In conclusion, accurate primary diagnosis allows for a sufficient primary operation to be performed, avoiding insufficient tumor removal that requires a secondary surgery. The most important cause of nerve damage resulted from not identifying the recurrent laryngeal nerve during first surgery, and meticulous dissection during salvage surgery was the most efficient method to avoid nerve damage.

A Novel Recombinant BCG Vaccine Encoding Eimeria tenella Rhomboid and Chicken IL-2 Induces Protective Immunity Against Coccidiosis

  • Wang, Qiuyue;Chen, Lifeng;Li, Jianhua;Zheng, Jun;Cai, Ning;Gong, Pengtao;Li, Shuhong;Li, He;Zhang, Xichen
    • Parasites, Hosts and Diseases
    • /
    • v.52 no.3
    • /
    • pp.251-256
    • /
    • 2014
  • A novel recombinant Bacille Calmette-Guerin (rBCG) vaccine co-expressed Eimeria tenella rhomboid and cytokine chicken IL-2 (chIL-2) was constructed, and its efficacy against E. tenella challenge was observed. The rhomboid gene of E. tenella and chIL-2 gene were subcloned into integrative expression vector pMV361, producing vaccines rBCG pMV361-rho and pMV361-rho-IL2. Animal experiment via intranasal and subcutaneous route in chickens was carried out to evaluate the immune efficacy of the vaccines. The results indicated that these rBCG vaccines could obviously alleviate cacal lesions and oocyst output. Intranasal immunization with pMV361-rho and pMV361-rho-IL2 elicited better protective immunity against E. tenella than subcutaneous immunization. Splenocytes from chickens immunized with either rBCG pMV361-rho and pMV361-rho-IL2 had increased $CD4^+$ and $CD8^+$ cell production. Our data indicate recombinant BCG is able to impart partial protection against E. tenella challenge and co-expression of cytokine with antigen was an effective strategy to improve vaccine immunity.

System Design for the Safe store and Issue Service Assurance of the E-Document (전자문서의 안전한 보관 및 발급 서비스 확보를 위한 시스템 설계)

  • Sung, Kyung-Sang;Kim, Jung-Jae;Oh, Hae-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.173-180
    • /
    • 2008
  • Certified e-Document Authority keep it with protection legal as a system a guarantee and identifies originality of an e-Record, It presume to be authenticity e-Records and contents of an e-Record prove what was not changed. But, e-Records has high medium degree of dependence and loss danger of information has very high problems. In addition, Because correction(attachment and deletion) and a revision of information are easy, a problem for integrity and the originality of an e-Record is caused. Existing system show the following inefficient. For the originality guarantee, an existing e-Documents encryption method accomplishes a encrypted process of a whole document with a symmetric key, if the information revised midway, the whole documents content must accomplish re-scanning and re-encryption process again. To get over such inefficient, this paper maximize efficiency which occurred at the time of partial information revision request by encryption and managing using the link information based on the linkage characteristics of the each page on the registered requested e-Documents, It was able to increase security configuration by minimizing problems on an information exposure through increasing complicated of the key management.

  • PDF

Effects of Customer Satisfaction and Switching Costs on Customer Loyalty in a Coffee Chain Context (커피 전문점 고객 만족과 전환 비용이 고객 충성도에 미치는 영향)

  • Kim, Byoungsoo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.433-443
    • /
    • 2015
  • This study aims to analyze key antecedents of customer loyalty based on dedication-based and constraint-based mechanisms. Our framework provides a theoretical lens of how two distinctive mechanisms influence customer loyalty in a coffee chain context. In this regard, this study examines the effects of customer satisfaction and switching costs on customer loyalty in a coffee shop market. In order to test the proposed model, data collected from 263 university students were empirically tested by using partial least squares regression. The analysis results reveal that customer loyalty is jointly influenced by both a dedication-based and a constraint-based mechanisms. Coffee quality service quality, price and value, and service atmosphere significantly affect user satisfaction. Habit and brand image were found to be the key factors of forming perceived switching costs.

A Leverage Strategy of the Cyber warfare Security Policy Based on systems Thinking (시스템 사고를 이용한 사이버전 보안 정책 레버리지 전략 연구)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.77-83
    • /
    • 2013
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. The concept of the battlefield is also changing to one that includes not only physical spaces but all areas including the networks of the nation's key industries and military facilities, energy facilities, transportation, and communication networks. In light of the changing warfare in terms of how it is conducted and what form it takes, the Korea military has to seek ways to effectively respond to threats of cyber warfare. In the past, although partial strategies on cyber warfare were studied, no research was done through the overall system flow. In this paper, key variables related to cyber warfare security are classified into personnel, management, and technology. A simple model and an extended model are suggested for each area, and based on the technology area of the extended model, formal methods are used to verify the validity and a detailed response strategy is suggested according to the identified leverage.

Molecular evolutionary analysis reveals Arctic-like rabies viruses evolved and dispersed independently in North and South Asia

  • Yu, Xin;Zhu, Hongwei;Bo, Yongheng;Li, Youzhi;Zhang, Jianlong;Jiang, Linlin;Chen, Guozhong;Zhang, Xingxiao;Wen, Yongjun
    • Journal of Veterinary Science
    • /
    • v.22 no.1
    • /
    • pp.5.1-5.16
    • /
    • 2021
  • Background: Arctic-like (AL) lineages of rabies viruses (RABVs) remains endemic in some Arctic and Asia countries. However, their evolutionary dynamics are largely unappreciated. Objectives: We attempted to estimate the evolutionary history, geographic origin and spread of the Arctic-related RABVs. Methods: Full length or partial sequences of the N and G genes were used to infer the evolutionary aspects of AL RABVs by Bayesian evolutionary analysis. Results: The most recent common ancestor (tMRCA) of the current Arctic and AL RABVs emerged in the 1830s and evolved independently after diversification. Population demographic analysis indicated that the viruses experienced gradual growth followed by a sudden decrease in its population size from the mid-1980s to approximately 2000. Genetic flow patterns among the regions reveal a high geographic correlation in AL RABVs transmission. Discrete phylogeography suggests that the geographic origin of the AL RABVs was in east Russia in approximately the 1830s. The ancestral AL RABV then diversified and immigrated to the countries in Northeast Asia, while the viruses in South Asia were dispersed to the neighboring regions from India. The N and G genes of RABVs in both clades sustained high levels of purifying selection, and the positive selection sites were mainly found on the C-terminus of the G gene. Conclusions: The current AL RABVs circulating in South and North Asia evolved and dispersed independently.