• Title/Summary/Keyword: Triple Data

Search Result 393, Processing Time 0.022 seconds

Online Social Support: Which Posts Were Answered?

  • Chang, Hui-Jung
    • Journal of Contemporary Eastern Asia
    • /
    • v.8 no.1
    • /
    • pp.31-46
    • /
    • 2009
  • The purpose of the study was to find out which posts were answered in a text-based computer-mediated social support group. Specifically, the present study examined the effects of two variables on support-seeking behaviors: support-seeking strategies and gender. A revised typology of support-seeking strategies originally proposed in the Sensitive Interaction Systems Theory (SIST) model was employed for the study. Data were collected from the PTT psychosis discussion group, the largest BBS in the Chinese-speaking community, for a period of 30 months from February 2004 to July 2006. In general, the results indicated that posts with more asking, less crying and less hinting were answered more than posts with more hinting, more crying and less asking. However, although different support-seeking strategies did affect support-seeking behaviors, gender did not have an impact on which posts were answered.

Effect of Natural Disasters on Local Economies: Forecasting Sales Tax Revenue after Hurricane Ike

  • Ismayilov, Orkhan;Andrew, Simon A.
    • Journal of Contemporary Eastern Asia
    • /
    • v.15 no.2
    • /
    • pp.177-190
    • /
    • 2016
  • One of the main objectives of this paper is to provide insight to understand the effect of natural disasters on local government finance. That is, to analyze local governments' sales tax revenues after Hurricane Ike. Three Texas cities are examined: League City, Pearland, and Sugarland. Based on data collected from the Texas Comptroller's Office and the US Census, we found local governments experience a short-term increase in sales tax revenues and a long-term decline after the hurricane strike the region. On average, a major hurricane has a two-year impact on local government economy. The findings are essential for practitioners because in order to have a prosperous recovery after natural disasters, public managers have to prepare financially for short term changes in their sales tax revenues.

Analyzing the Architecture of EPON Network for CATV Overlay (CATV Overlay를 위한 EPON 망 구조에 대한 분석)

  • 이상연;김용태;이재정;이형섭
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.117-120
    • /
    • 2003
  • PON (Passive Optical Network) is an emerging local subscriber access architecture that provides more bandwidth and services to subscriber than DSL (Digital Subscriber Line and HFC (Hybrid-Fiber Coaxial) network. A PON is a point-to-multipoint optical network with no active elements in the signals' path from source to destination. Advantages of using PON for a subscriber access network include large coverage area, reduced fiber deployment, multicast and broadcast capabilities, reduced cost of maintenance (due to devices being passive), and ease of upgrades to higher bit rate or additional wavelengths. PON uses WDM (Wavelength Division Multiplexing) technique that transmits the downstream and upstream data at each different wavelength. For transmitting the CATV (Community Antenna television) service through PON network, we give out additional wavelength. This study shows the available TPS (Triple play service) architecture using CATV overlay EPON (Ethernet PON) architecture and analyzes the effects of EPON-based CATV transmission by measuring the power loss fur each wavelength and the power range of the available analog wavelength and RF.

  • PDF

Design and Implementation of Triple-DES Coprocessor for 32-bits Data Bus (32 비트 데이터 버스를 이용한 3-DES Coprocessor의 설계 및 구현)

  • Choi, Hong-Mook;Kim, Yong-Bum;Cho, Hwa-Hyun;Choi, Myung-Ryul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2209-2212
    • /
    • 2003
  • 정보 통신 기술의 발전이 우리 생활을 편리하게 만들고 있지만, 한편으로는 해킹, 도청 등의 부작용이 발생하고 있다. 이러한 부작용을 최소화시키는 결정적인 역할을 하는 분야가 암호 학이다. 현재의 정보 보호 시스템 대부분이 소프트웨어 방식으로 구현되어 있어 암호화 속도 문제 및 해킹에 의한 불법 정보 유출의 위험성이 높은 현실이다. 이러한 점을 해결하기 위해 암호 알고리즘의 하드웨어 구현은 필수적이다. 따라서 본 논문에서는 암호 알고리즘의 속도 및 안전성 문제를 향상시키기 위해 기존에 많이 이용되고 있는 3-DES를 32 비트 데이터 버스를 이용한 하드웨어로 선계 및 구현하여 검증하고 성능 분석을 하였다.

  • PDF

Location Analysis for Emergency Medical Service Vehicle in Sub District Area

  • Nanthasamroeng, Natthapong
    • Industrial Engineering and Management Systems
    • /
    • v.11 no.4
    • /
    • pp.339-345
    • /
    • 2012
  • This research aims to formulate a mathematical model and develop an algorithm for solving a location problem in emergency medical service vehicle parking. To find an optimal parking location which has the least risk score or risk priority number calculated from severity, occurrence, detection, and distance from parking location for emergency patients, data were collected from Pratoom sub-district Disaster Prevention and Mitigation Center from October 2010 to April 2011. The criteria of risk evaluation were modified from Automotive Industry Action Group's criteria. An adaptive simulated annealing algorithm with multiple cooling schedules called multi-agent simulated quenching (MASQ) is proposed for solving the problem in two schemes of algorithms including dual agent and triple agent quenching. The result showed that the solution obtained from both scheme of MASQ was better than the traditional solution. The best locations obtained from MASQ-dual agent quenching scheme was nodes #5 and #133. The risk score was reduced 61% from 6,022 to 2,371 points.

Validation of the Reynolds Stress Turbulence Models in Turbulent Jet Diffusion Flames (난류분류확산화염에 대한 레이놀즈응력모델의 적용성 검토)

  • 한지웅;이태우;이근오;이창언
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.3
    • /
    • pp.66-74
    • /
    • 1996
  • Numerical simulations were carried out using standard Reynolds stress turbulence model(LRR model) and modified RSM(Janicka model ) to validate these models in combustion flow fields. Two flames were selected for use as a benchmark data for model testing. One is a conventional jet diffusion flame that has the effect of suppression of turbulence by combustion. The other is a triple jet diffusion flame that designed to give high turbulence to the periphery of the flame and to remove the low Reynolds-number flow fields. As a result, it was found that the modification of standard RSM model is indispensable in the modelling of flames with low turbulence region. And it is also necessary to improve the existing modified models for the universal use.

  • PDF

Backbone assignment and structural analysis of anti-CRISPR AcrIF7 from Pseudomonas aeruginosa prophages

  • Kim, Iktae;Suh, Jeong-Yong
    • Journal of the Korean Magnetic Resonance Society
    • /
    • v.25 no.3
    • /
    • pp.39-44
    • /
    • 2021
  • The CRISPR-Cas system provides adaptive immunity for bacteria and archaea against invading phages and foreign plasmids. In the Class 1 CRISPR-Cas system, multi-subunit Cas proteins assemble with crRNA to bind to DNA targets. To disarm the bacterial defense system, bacteriophages evolved anti-CRISPR (Acr) proteins that actively inhibit the host CRISPR-Cas function. Here we report the backbone resonance assignments of AcrIF7 protein that inhibits the type I-F CRISPR-Cas system of Pseudomonas aeruginosa using triple-resonance nuclear magnetic resonance spectroscopy. We employed various computational methods to predict the structure and binding interface of AcrIF7, and assessed the model with experimental data. AcrIF7 binds to Cas8f protein via flexible loop regions to inhibit target DNA binding, suggesting that conformational heterogeneity is important for the Cas-Acr interaction.

Examining China's Internet Policies through a Bibliometric Approach

  • Li, Jiang;Xu, Weiai Wayne;Wang, Fang;Chen, Si;Sun, Jianjun
    • Journal of Contemporary Eastern Asia
    • /
    • v.17 no.2
    • /
    • pp.237-253
    • /
    • 2018
  • In order to understand China's internet governance, this paper examined 1,931 Internet policies of China by bibliometric techniques. Specifically, the bibliometric techniques include simple document counting, co-word analysis, collaboration network analysis and citation analysis. The findings include: (1) China's Internet legislations mainly emphasized e-commerce and Internet governance, and, to some extent, neglected personal data protection; (2) China's Internet is under intensive multiple regulatory controls by central government. A large number of government agencies are involved in Internet policy-making. The Propaganda Department of the Central Committee of the Communist Party of China and the State Information Leading Group of the State Council, enforced fewer policy documents, but occupy higher positions in the Internet governance hierarchy; (3) China's Internet legislation system is primarily composed of industry-specific administrative rules, rather than laws or administrative regulations. Nevertheless, laws and administrative regulations received significantly more citations owing to their superior force. This paper also discussed current gaps in China's internet governance and how the country's internet policies are situated in the broader global context.

Backbone assignment of the intrinsically disordered N-terminal region of Bloom syndrome protein

  • Min June Yang;Chin-Ju Park
    • Journal of the Korean Magnetic Resonance Society
    • /
    • v.27 no.3
    • /
    • pp.17-22
    • /
    • 2023
  • Bloom syndrome protein (BLM) is a pivotal RecQ helicase necessary for genetic stability through DNA repair processes. Our investigation focuses on the N-terminal region of BLM, which has been considered as an intrinsically disordered region (IDR). This IDR plays a critical role in DNA metabolism by interacting with other proteins. In this study, we performed triple resonance experiments of BLM220-300 and presented the backbone chemical shifts. The secondary structure prediction based on chemical shifts of the backbone atoms shows the region is disordered. Our data could help further interaction studies between BLM220-300 and its binding partners using NMR.

Emergency Management Policy Issues during and after COVID-19: Focusing on South Korea

  • Ki Woong Cho;Dongkyun Park
    • Journal of Contemporary Eastern Asia
    • /
    • v.22 no.1
    • /
    • pp.49-81
    • /
    • 2023
  • South Korea is currently facing many changes and challenges. To make matters worse, society has struggled to function as it did before COVID-19. This study describes the past and current COVID-19 situation to offer lessons on management during and after COVID-19. We provide implications from COVID-19 and the foundation for future disasters by employing the strengths, weaknesses, opportunities, and threats (SWOT) analysis and indigenous administrative conceptual framework on culture, institution, and instrument to add a circumstance perspective. This study used secondary data from prior research and literature. Resolutions for these policy issues are presented using the strength-opportunity (SO), strength-threat (ST), weakness-opportunity (WO), and weakness-threat (WT) strategies. We suggest utilizing instruments that consider diverse societies and preventing the disease with climate change by collaborating with social institutions. We hope these implications and resolutions will provide insights for the future and other countries.