• Title/Summary/Keyword: collection time

Search Result 2,307, Processing Time 0.029 seconds

A Study on the Florence Renaissance and the Medici's Libraries (피렌체 르네상스와 메디치가 도서관 연구)

  • Yoon, Hee-Yoon
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.3
    • /
    • pp.73-94
    • /
    • 2022
  • Florence is the cradle of the Italian Renaissance. It is the result of a combination of medieval humanists' exploration of ancient Greek and Roman knowledge and culture, the leadership of great monarchs and priests, patronage of the Medici family, etc., free-thinking and creativity of artists, and critical consciousness and cultural needs of citizens. However, the Florentine Renaissance could not have blossomed unless the Medici family had collected ancient manuscripts and translations, and built libraries to preserve and provide literature. Based on this logical basis, this study outlined the Florentine renaissance and historic libraries, analyzed the collection and composition of favorite books of the Medici family, and traced the architectural characteristics and metaphors of the Medici libraries, The San Marco Library (Michelozzo Library), Library of Badia Fiesolana, and the San Lorenzo Library (Laurentian Library) were the priming and birthplace of the Florentine Renaissance despite of many difficulties, including earthquake, fire, restoration, transfer, seizure, and closure. In particular, the San Marco Library, which was opened in 1444 based on the financial support of Cosimo de' Medici, Michelozzo's design, and Niccoli's private collections was the first common library in the Renaissance period. And the architectural highlight of the Laurentian Library, which opened in 1571 under the leadership of Giulio (Papa Clemente VII), is Michelangelo's staircase, which symbolizes 'from ignorance to wisdom', and the real value of the content is the ancient manuscripts and early printed books, which were collected by the humanist Niccoli and the Medici family. In short, when discussing the Florentine Renaissance, Medici's collection and historic libraries are very important points. The reason is that the ancient collections were not stuffed products, but syntactic semiotics, and the libraries are telescopes that view the history of human knowledge and culture and microscopes that create knowledge and wisdom. If records dominate memories, libraries accumulate records. Therefore, long breathing and time capsule strategies are also required for the development and preservation of retroactive books in domestic libraries with a relatively long history.

Surgical Results and Risk Facor Analysis of the Patients with Single Ventricle Associated with Total Anomalous Pulmonary Venous Connection (총폐정맥연결이상증을 동반한 단심증 환아의 수술결과 및 위험인자 분석)

  • 이정렬;김창영;김홍관;이정상;김용진;노준량
    • Journal of Chest Surgery
    • /
    • v.35 no.12
    • /
    • pp.862-870
    • /
    • 2002
  • The surgical results of the patients with single ventricle(SV) associated with total anomalous pulmonary venous connection(TAPVC) has been reported with high mortality and morbidity due to their morphologic and hemodynamic complexity. A retrospective review was undertaken to report the outcome of the first-stage palliative surgery in our institution and to determine the factors influencing early death. Material and Method: Between January 1987 and June 2002, 39 patients with SV and TAPVC underwent surgical intervention with or without TAPVC repair. Age at operation ranged from 1day to 10.7months (median age, 2.4month), and 29 patients were male. Preoperative diagnosis included 20 right-dominant SV, 15 SV with endocardial cushion defect, 3 left-dominant SV, and 1 tricuspid atresia. The pulmonary venous connection was supracardiac in 22, cardiac in 5, infracardiac in 11, and mixed in 1, Obstructed TAPVC was present in 11. First-stage palliative surgery was performed in 37. Repair of TAPVC, either alone or in association with other procedures, was performed during the initial operation in 31. Univariate and multivariate analyses were performed to analyze the risk factors influencing the operative death. Result: A mean follow-up period of survivors was 34.3 $\pm$ 43.0(0.53 ~ 146.2)months. Overall early operative mortality was 43.6%(17/39). The causes were low cardiac output in 8, failure of weaning from cardiopulmonary bypass in 3, sepsis in 2, pulmonary hypertensive crisis in 1, pulmonary edema in 1, pneumonia in 1, and postoperative arrhythmia in 1. Risk factors influencing early death in univariate analysis were body weight, surgical intervention in neonate, obstructive TAPVC, preoperative conditions including metabolic acidosis, and need for inotropic support, TAPVC repair in initial operation, operative time, and cardiopulmonary bypass(CPB) time. In multivariable analysis, body weight, age at initial operation, surgical intervention in neonate, preoperative conditions including metabolic acidosis, need for inotropic support and CPB time were the risk factors. Conclusion: In this study, we demonstrated that the patients with SV and TAPVC had high perioperative mortality. Preoperative poor condition, young age, the length of operative and CPB time, the presence of obstructive TAPVC had been proven to be the risk factors. This fact suggests that the avoidance of unnecessarily additional procedures may improve the surgical outcomes of the first-stage palliative surgery. However further observation and collection of the data is mandatory to determine the ideal surgical strategy.

A Comparative Case Study on the Adaptation Process of Advanced Information Technology: A Grounded Theory Approach for the Appropriation Process (신기술 사용 과정에 관한 비교 사례 연구: 기술 전유 과정의 근거이론적 접근)

  • Choi, Hee-Jae;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.99-124
    • /
    • 2009
  • Many firms in Korea have adopted and used advanced information technology in an effort to boost efficiency. The process of adapting to the new technology, at the same time, can vary from one firm to another. As such, this research focuses on several relevant factors, especially the roles of social interaction as a key variable that influences the technology adaptation process and the outcomes. Thus far, how a firm goes through the adaptation process to the new technology has not been yet fully explored. Previous studies on changes undergone by a firm or an organization due to information technology have been pursued from various theoretical points of views, evolved from technological and institutional views to an integrated social technology views. The technology adaptation process has been understood to be something that evolves over time and has been regarded as cycles between misalignments and alignments, gradually approaching the stable aligned state. The adaptation process of the new technology was defined as "appropriation" process according to Poole and DeSanctis (1994). They suggested that this process is not automatically determined by the technology design itself. Rather, people actively select how technology structures should be used; accordingly, adoption practices vary. But concepts of the appropriation process in these studies are not accurate while suggested propositions are not clear enough to apply in practice. Furthermore, these studies do not substantially suggest which factors are changed during the appropriation process and what should be done to bring about effective outcomes. Therefore, research objectives of this study lie in finding causes for the difference in ways in which advanced information technology has been used and adopted among organizations. The study also aims to explore how a firm's interaction with social as well as technological factors affects differently in resulting organizational changes. Detail objectives of this study are as follows. First, this paper primarily focuses on the appropriation process of advanced information technology in the long run, and we look into reasons for the diverse types of the usage. Second, this study is to categorize each phases in the appropriation process and make clear what changes occur and how they are evolved during each phase. Third, this study is to suggest the guidelines to determine which strategies are needed in an individual, group and organizational level. For this, a substantially grounded theory that can be applied to organizational practice has been developed from a longitudinal comparative case study. For these objectives, the technology appropriation process was explored based on Structuration Theory by Giddens (1984), Orlikoski and Robey (1991) and Adaptive Structuration Theory by Poole and DeSanctis (1994), which are examples of social technology views on organizational change by technology. Data have been obtained from interviews, observations of medical treatment task, and questionnaires administered to group members who use the technology. Data coding was executed in three steps following the grounded theory approach. First of all, concepts and categories were developed from interviews and observation data in open coding. Next, in axial coding, we related categories to subcategorize along the lines of their properties and dimensions through the paradigm model. Finally, the grounded theory about the appropriation process was developed through the conditional/consequential matrix in selective coding. In this study eight hypotheses about the adaptation process have been clearly articulated. Also, we found that the appropriation process involves through three phases, namely, "direct appropriation," "cooperate with related structures," and "interpret and make judgments." The higher phases of appropriation move, the more users represent various types of instrumental use and attitude. Moreover, the previous structures like "knowledge and experience," "belief that other members know and accept the use of technology," "horizontal communication," and "embodiment of opinion collection process" are evolved to higher degrees in their dimensions of property. Furthermore, users continuously create new spirits and structures, while removing some of the previous ones at the same time. Thus, from longitudinal view, faithful and unfaithful appropriation methods appear recursively, but gradually faithful appropriation takes over the other. In other words, the concept of spirits and structures has been changed in the adaptation process over time for the purpose of alignment between the task and other structures. These findings call for a revised or extended model of structural adaptation in IS (Information Systems) literature now that the vague adaptation process in previous studies has been clarified through the in-depth qualitative study, identifying each phrase with accuracy. In addition, based on these results some guidelines can be set up to help determine which strategies are needed in an individual, group, and organizational level for the purpose of effective technology appropriation. In practice, managers can focus on the changes of spirits and elevation of the structural dimension to achieve effective technology use.

The Politics and Governance of 'Maeul' Community Archives in South Korea (마을공동체 아카이브의 거버넌스 모델 연구)

  • Lee, Kyong Rae
    • The Korean Journal of Archival Studies
    • /
    • no.45
    • /
    • pp.51-82
    • /
    • 2015
  • Maeul-making, which is to restore inherent characteristics of maeul as a living community has been proceeded by local communities themselves since the 1990s when political democracy and local government in Korean society has been progressed in full-scale. Although New Maeul Movement has been done in the 1970s before and after, it is different from maeul-making because it was focused mainly on improving physical environments of rural communities and initiated by government. The development of maeul community archives in Korea has been related closely to such a maeul-making since the 1990s. Maeul-based community archives, maeul community archives had been begun to build as part of maeul-making and grass-root movement by the 2000s. Initiated by self-motivated communities, maeul community archives were carried out through cooperations between civic activists and residents in maeul communities and voluntary professional archivists from outside. Although records about the maeul community has been collected by mainstream cultural institutions such as public archives, museum, local historical association, and local cultural center, it was at this time to collect records of the maeul community by self-motivated local residents. This tendency of 'independent' maeul community archives, however, is currently entering upon a new phase with the city of Seoul's project (2012) to support making a maeul community, that is, the governance phase based on private-government partnership. At this point of time, it is important for maeul community archives to be built on privately-led governance model that guarantees their autonomy and at the same time bring government's knowhow and supports into them, as opposed to the way captured or driven unilaterally by government. This article explores the growth of maeul community archives and collections in Korean society through a range of self-motivated bodies; the interaction with government; and as a result of those interactions, the creation of maeul community archives based on governance. To introduce and explicate the motivations behind maeul archiving endeavors, this article will first sketch something of the historical, social, and political context in which 'maeul' communities have arisen, collapsed, and restored. It will then examine in more detail some specific examples of maeul community archives as grass-root movement of maeul community. The third section will attempt to identify the governance model of maeul community archives under the auspices of the city of Seoul and its limitations. Finally through these activities, it will suggest the ways in which maeul community archives commit themselves to their duty of grass-root movement of community and at the same time, secure sustainability, that is, concrete ways of privately initiated governance model.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

The actual aspects of North Korea's 1950s Changgeuk through the Chunhyangjeon in the film Moranbong(1958) and the album Corée Moranbong(1960) (영화 <모란봉>(1958)과 음반 (1960) 수록 <춘향전>을 통해 본 1950년대 북한 창극의 실제적 양상)

  • Song, Mi-Kyoung
    • (The) Research of the performance art and culture
    • /
    • no.43
    • /
    • pp.5-46
    • /
    • 2021
  • The film Moranbong is the product of a trip to North Korea in 1958, when Armangati, Chris Marker, Claude Lantzmann, Francis Lemarck and Jean-Claude Bonardo left at the invitation of Joseon Film. However, for political reasons, the film was not immediately released, and it was not until 2010 that it was rediscovered and received attention. The movie consists of the narratives of Young-ran and Dong-il, set in the Korean War, that are folded into the narratives of Chunhyang and Mongryong in the classic Chunhyangjeon of Joseon. At this time, Joseon's classics are reproduced in the form of the drama Chunhyangjeon, which shares the time zone with the two main characters, and the two narratives are covered in a total of six scenes. There are two layers of middle-story frames in the movie, and if the same narrative is set in North Korea in the 1950s, there is an epic produced by the producers and actors of the Changgeuk Chunhyangjeon and the Changgeuk Chunhyangjeon as a complete work. In the outermost frame of the movie, Dong-il is the main character, but in the inner double frame, Young-ran, who is an actor growing up with the Changgeuk Chunhyangjeon and a character in the Changgeuk Chunhyangjeon, is the center. The following three OST albums are Corée Moranbong released in France in 1960, Musique de corée released in 1970, and 朝鮮の伝統音樂-唱劇 「春香伝」と伝統樂器- released in 1968 in Japan. While Corée Moranbong consists only of the music from the film Moranbong, the two subsequent albums included additional songs collected and recorded by Pyongyang National Broadcasting System. However, there is no information about the movie Moranbong on the album released in Japan. Under the circumstances, it is highly likely that the author of the record label or music commentary has not confirmed the existence of the movie Moranbong, and may have intentionally excluded related contents due to the background of the film's ban on its release. The results of analyzing the detailed scenes of the Changgeuk Chunhyangjeon, Farewell Song, Sipjang-ga, Chundangsigwa, Bakseokti and Prison Song in the movie Moranbong or OST album in the 1950s are as follows. First, the process of establishing the North Korean Changgeuk Chunhyangjeon in the 1950s was confirmed. The play, compiled in 1955 through the Joseon Changgeuk Collection, was settled in the form of a Changgeuk that can be performed in the late 1950s by the Changgeuk Chunhyangjeon between 1956 and 1958. Since the 1960s, Chunhyangjeon has no longer been performed as a traditional pansori-style Changgeuk, so the film Moranbong and the album Corée moranbong are almost the last records to capture the Changgeuk Chunhyangjeon and its music. Second, we confirmed the responses of the actors to the controversy over Takseong in the North Korean creative world in the 1950s. Until 1959, there was a voice of criticism surrounding Takseong and a voice of advocacy that it was also a national characteristic. Shin Woo-sun, who almost eliminated Takseong with clear and high-pitched phrases, air man who changed according to the situation, who chose Takseong but did not actively remove Takseong, Lim So-hyang, who tried to maintain his own tone while accepting some of modern vocalization. Although Cho Sang-sun and Lim So-hyang were also guaranteed roles to continue their voices, the selection/exclusion patterns in the movie Moranbong were linked to the Takseong removal guidelines required by North Korean musicians in the name of Dang and People in the 1950s. Second, Changgeuk actors' response to the controversy over the turbidity of the North Korean Changgeuk community in the 1950s was confirmed. Until 1959, there were voices of criticism and support surrounding Taksung in North Korea. Shin Woo-sun, who showed consistent performance in removing turbidity with clear, high-pitched vocal sounds, Gong Gi-nam, who did not actively remove turbidity depending on the situation, Cho Sang-sun, who accepted some of the vocalization required by the party, while maintaining his original tone. On the other hand, Cho Sang-seon and Lim So-hyang were guaranteed roles to continue their sounds, but the selection/exclusion patterns of Moranbong was independently linked to the guidelines for removing turbidity that the Gugak musicians who crossed to North Korea had been asked for.

Changes of Somatosensory Evoked Potential and Functional Recovery in Patients of Cerebrovascular disease (뇌혈관 질환자의 기능 회복과 체성감각 유발전위의 변화)

  • Kim, Yoon-Hwan;Kim, Chan-Kyu;Park, Jong-Hang;Lee, Seung-Yub;Choi, Won-Jye
    • Journal of Korean Physical Therapy Science
    • /
    • v.15 no.1
    • /
    • pp.11-20
    • /
    • 2008
  • This study was designed to test the effects of comprehensive rehabilitation management on functional recovery after attack of cerebrovascular disease. 16 cerebrovascular disease patients applied comprehensive rehabilitation management of physical therapy at department of physical Therapy, C medical center in Gwang-ju. The collection of the data had been executed for 4months(April 15, 2007${\sim}$July 15, 2007). For evaluating, Functional Independence measure(FIM) and Somatosensory Evoked Potential(SSEP) were used to assess functional recovery. The results of this study were as follows: 1. In the comparison of latency of median nerve SSEP before and after treatment, the lat. N20 and P25 increased, the ampl. P25/N20 was decreased. In the comparison difference data of median nerve SSEP, however there was no significant difference in the group(p>0.05). 2. In the comparison of latency of Post Tibial nerve SSEP before and after treatment, the lat. P40, P50, P60 increased, the ampl. P40 was decreased. In the comparison difference data of post tibial nerve SSEP, however there was no significant difference in the group(p>0.05). 3. In the comparison of FIM scores of Self-care, Sphincter Control, Mobility: Transfer, Locomotion before and after treatment, the scores of FIM was significantly increased. In the comparison of difference of the motor part of FIM, however there was significant difference(p<0.05). 4. In the comparison of FIM scores of Communication, Social Cognition before and after treatment, the scores of FIM was significantly increased. In the comparison of difference of the motor part of FIM, however there was no significant difference in the group(p>0.05). Based on these results, it is concluded that the comprehensive rehabilitation management for cerebrovascular disease case was not significant difference in the SSEP, was significant difference in the motor part of FIM. Further study should be done to analyze the effect of intervention duration of treatment, optimal time to apply the treatment in more long period.

  • PDF

Video-assisted Thoracoscopic Surgery in Posttraumatic Localized Clotted Hemothorax (외상 후 국소적으로 응고된 혈흉의 비디오흉강경수술)

  • 이정희;김정중;이석기;임진수;최형호
    • Journal of Chest Surgery
    • /
    • v.37 no.12
    • /
    • pp.987-991
    • /
    • 2004
  • Background: Inadequate drainage of traumatic hemothoraces may result in prolonged hospitalization and complication such as empyema, fibrothorax and pleural calcification. This needs to be the placement of a tube thorascostomy which is efficacious in more than 80% of cases. Other cases require surgical treatment. Material and Method: From March 2002 to February 2003, there were 123 patients who was done closed thorascostomy in traumatic hemothorax. 10 patients (group I) were undergone early retained clot evacuation with video assisted thoracoscopic surgery, but 5 patients (group II) who developed a localized hematoma or empyema were operated. Male were more than female and mean average was similar in both group. The most common cause of injury was traffic accidents and frequently combined lesions were a abdomen. Result: Interval from injury and operation, mean operation time, duration of tube drainage and hospital stay in group I were shorter than group II (p<0.05). Operation-related complication and recurrence of fluid collection within follow up period (17.8$\pm$3.8 months) in group I were none, but in group II (21.5$\pm$5.3 months) were 2 cases. Conclusion: Video assisted thoracoscopic surgery can be utilized as an effective and safe method for the removal of retained clotted hemothorax within 7 days.

National Genetic Evaluation (System) of Hanwoo (Korean Native Cattle)

  • Park, B.;Choi, T.;Kim, S.;Oh, S.H.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.26 no.2
    • /
    • pp.151-156
    • /
    • 2013
  • Hanwoo (Also known as Korean native cattle; Bos taurus coreanae) have been used for transportation and farming for a long time in South Korea. It has been about 30 yrs since Hanwoo improvement began in earnest as beef cattle for meat yield. The purpose of this study was to determine the trend of improvement as well as to estimate genetic parameters of the traits being used for seedstock selection based on the data collected from the past. Hanwoo proven bulls in South Korea are currently selected through performance and progeny tests. National Hanwoo genetic evaluations are implemented with yearling weight (YW), carcass weight (CW), eye muscle area (EMA), backfat thickness (BF) and marbling score (MS). Yearling weights and MS are used for selecting young bulls, and EMA, BF, and MS are used for selecting proven bulls. One individual per testing room was used for performance tests, and five individuals per room for progeny tests. Individuals tested were not allowed to graze pasture, but there was enough space for them to move around in the testing room. Feeds including roughages and minerals were fed ad libitum, and concentrates were provided at the rate of about 1.8% of individual weight. Overall means of the traits were $352.8{\pm}38.56$ kg, $335.09{\pm}44.61$ kg, $77.85{\pm}8.838\;cm^2$, $8.6{\pm}3.7$ mm and $3.293{\pm}1.648$ for YW, CW, EMA, BF and MS. Heritabilities estimated in this study were 0.30, 0.30, 0.42, 0.50 and 0.63 in YW, CW, EMA, BF and MS, respectively, which are similar to results from previous research. Yearling weight was 315.54 kg in 1998, and had increased to 355.06 kg in 2011, resulting in about 40 kg of improvement over 13 yrs. YW and CW have improved remarkably over the past 15 yrs. Breeding values between 1996 and 2000 decreased or did not change much, but have moved in a desirable direction since 2001. These improvements correspond with the substantial increase in use of animal models since the late 1990s in Korea. Hanwoo testing programs have practically contributed to the improvement in aspects of quality and quantity. In sum, the current selection system is good enough to accommodate circumstances where fewer sires are used on many more cows. Although progeny tests take longer and cost more, they seem to be appropriate under the circumstances of the domestic market with its higher requirement for better meat quality. Consequently, accumulative data collection, genetic evaluation model development, revision of selection indices, as well as cooperation among farms, associations, National Agricultural Cooperative Federation, universities, research institutes, and government agencies must be applied to the Hanwoo selection program. All these efforts will assist the domestic market to secure a competitive position against imported beef under Free Trade Agreement trade system and will provide farmers with higher profits as well as the public with a higher quality of beef.

Development of Realtime Temperature & Humidity Logging and Monitoring System using Ubiquitous Sensor Network (유비쿼터스 센서 네트워크를 이용한 실시간 온.습도 기록 및 모니터링 시스템 개발)

  • Cheon, Seong-Sim;Kim, Jung-Ja;Won, Yong-Gwan;Pham, Hai Trieu
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.2
    • /
    • pp.96-105
    • /
    • 2011
  • Ubiquitos sensor network(USN) is a technology which is widely used in our life. This paper introduces an example of design and implementation for a system which is based on the USN technology and can provide an efficient management tool for a space that should be precisely controlled for a certain range of uniformity in temperature and humidity. This introduced system builds a wireless sensor network using a number of sensor modules that are equipped with temperature and humidity sensors, and collects temperature and humidity information in real-time while simultaneously providing a method for monitoring the status of temperature and humidity by the graphical user interface. Also, the system will give a warning signal if the monitored values are differ from the pre-specified values of temperature and humidity for each sensor module more than a certain amount of tolerance. This temperature and humidity logging and monitoring system can perform better management for the space easily and efficiently by automating the existing manual method for data collection and management. Furthermore, using the stored data, it can make possible to perform post-analysis on the problems caused by temperature and humidity and to obtain information for environmental enhancement for the space.