• Title/Summary/Keyword: intentional

Search Result 641, Processing Time 0.037 seconds

Projecting the Spatio-Temporal Change in Yield Potential of Kimchi Cabbage (Brassica campestris L. ssp. pekinensis) under Intentional Shift of Planting Date (정식일 이동에 따른 배추 잠재수량성의 시공간적 변화 전망)

  • Kim, Jin-Hee;Yun, Jin I.
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.18 no.4
    • /
    • pp.298-306
    • /
    • 2016
  • Planting date shift is one of the means of adapting to climate change in Kimchi Cabbage growers in major production areas in Korea. This study suggests a method to estimate the potential yield of Kimchi Cabbage based on daily temperature accumulation during the growth period from planting to maturity which is determined by a plant phenology model tuned to Kimchi Cabbage. The phenology model converts any changes in the thermal condition caused by the planting date shift into the heat unit accumulation during the growth period, which can be calculated from daily temperatures. The physiological maturity is estimated by applying this model to a variable development rate function depending either on growth or heading stage. The cabbage yield prediction model (Ahn et al., 2014) calculates the potential yield of summer cabbage by accumulating daily heat units for the growth period. We combined these two models and applied to the 1km resolution climate scenario (2000-2100) based on RCP8.5 for South Korea. Potential yields in the current normal year (2001-2010) and the future normal year (2011-2040, 2041-2070, and 2071-2100) were estimated for each grid cell with the planting dates of July 1, August 1, September 1, and October 1. Based on the results, we divided the whole South Korea into 810 watersheds, and devised a three - dimensional evaluation chart of the time - space - yield that enables the user to easily find the optimal planting date for a given watershed. This method is expected to be useful not only for exploring future new cultivation sites but also for developing cropping systems capable of adaptation to climate change without changing varieties in existing production areas.

Youth Risk Behavior Survey of Middle School Students in Daegu Metropolitan City (대구시 일부지역 중학생들의 건강관련 위험행동과 관련요인조사)

  • 이중정;이충원
    • Korean Journal of Health Education and Promotion
    • /
    • v.19 no.3
    • /
    • pp.51-72
    • /
    • 2002
  • This research was conducted to understand and analyze the health-related behaviors of middle school students and get fundamental research data essential to provide efficient student guidance and public health service at school. The interview using Youth Risk Behavior Surveillance System(YRBSS). Translation and modification for Korean students of the YRBS. The Korean version of YRBS(Youth Risk Behavior Surveillance System) that translation and modification for Korean students of the YRBS developed by the Centers for Disease Control and Prevention(CDC)was used to assessment to health-related behaviors of youth. The interviewees were 1040 enrolled students at middle school in Daegu metropolitan city. YRBSS monitors six categories of priority health behaviors among youth and young adults behaviors that contribute to unintentional and intentional injuries; tobacco use; alcohol and other drug use, sexual behaviors that contribute to unintended pregnancy and sexually transmitted diseases(STDs)(including human immunodeficiency virus infection); unhealthy dietary behaviors; and physical activity. The result shows that over 30% of students rarely or never used safety belt and almost students were rarely or never wore a bicycle helmet. During the 12 months preceding the survey, 21.9% female students had felt so sad or hopeless almost every day for $\geq$ 2weeks in a row that they stopped doing some usually activities 20.5% of male middle school students have ever tried cigarette smoking. 26.2% of male students and 27.2% do female students had had over one drinks of alcohol during their lifetime(lifetime alcohol use). 47% of male students had had over one drinks of alcohol on $\geq$ 1 of the 30 days preceding the survey(current alcohol use). Over one half of female student were thought they were overweight. These results suggest that some risk behaviors be very prevalent in a korean middle school students and priority health-risk behaviors, which contribute to the leading cause of mortality and morbidity among youth and adult, often are establish during middle school age, extend into adulthood, are interrelated. Among both children and adults, the leading causes of death are closely linked to these behaviors. Among adults, chronic diseases such as cardiovascular disease, cancer, and diabetes are the national leading killers. Practicing healthy behaviors, such as eating low-fat, high-fruit-and-vegetable diets, getting regular physical activity, and refraining from tobacco use, would prevent many premature deaths. Because health-related behaviors are usually established in childhood, positive choices need to be promoted before damaging behaviors are initiated or become ingrained.

e-Business Security Framework and applied to Architecture (e-Business Security 프레임웍과 적용 방안)

  • 홍승필;김명철;김재현;김민형
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.87-97
    • /
    • 2002
  • Many firms are utilizing the Internet and various information technologies to effectively manage their business operations with a goal of gaining a competitive advantage in the rapidly changing business environments. Today, the business is characterized as digital economy where information freely flows and business processes are improved with the use of information technologies. Internet technology is playing a key role in transforming the organization and creating new business models. It has become the infrastructure of choice for electronic commerce because it provides process efficiency, cost reduction, and open standards that can easily be adopted by different organizations. Here, the vast amount of data and information slow among the related parties and security issues are very critical matter of research interests by academicians and practitioners. In this research, we address the importance of security framework in managing the data shared among the related parties in the e-business and suggest the security architecture for effectively supporting the needs of e-business in an organization. This research provides valuable contributions both in academics and industry in terms of how security framework and architecture should be set in order to provide the necessary e-business.

  • PDF

A Study on the Protection for Personal Information in Private Security Provider's (경비업자의 개인정보보호에 관한 연구)

  • Ahn, Hwang-Kwon;Kim, Il-Gon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.99-108
    • /
    • 2011
  • The purpose of this study is to profile actual conditions of personal information protection systems operated in overseas countries and examine major considerations of personal information that security service providers must know in the capacity of privacy information processor, so that it may contribute to preventing potential occurrence of any legal disputes in advance. Particularly, this study further seeks to describe fundamental idea and principle of said Personal Information Protection Act; enhancement of various safety measures (e.g. collection / use of privacy data, processing of sensitive information / personal ID information, and encryption of privacy information); restrictions on installation / operation of video data processing devices; and penal regulations as a means of countermeasure against leakage of personal information, while proposing possible solutions to cope with these matters. Using cases among foreign countries for this study. Possible solutions proposed by this study can be summed up as follows: By changing minds with sufficient legal reviews, it is required for security service providers to 1) clearly and further specify any purposes of collecting and using privacy information, if possible, 2) obtain any privacy information by legitimate means as it is necessary to collect such information, 3) stop providing any personal information for the 3rd parties or for any other purposes except fundamental purposes of using privacy information, and 4) have full knowledge about duty of safety measure in accordance with safe maintenance of privacy information and protect any personal information from unwanted or intentional leakage to others.

On Adaptive Narrowband Interference Cancellers for Direct-Sequence Spread-Spectrum Communication Systems (주파수대역 직접 확산 통신시스템에서 협대역 간섭 신호 제거를 위한 적응 간섭제거기에 관한 연구)

  • 장원석;이재천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10C
    • /
    • pp.967-983
    • /
    • 2003
  • In wireless spread-spectrum communication systems utilizing PN (pseudo noise) sequences, a variety of noise sources from the channel affect the data reception performance. Among them, in this paper we are concerned with the narrowband interference that may arise from the use of the spectral bands overlapped by the existing narrowband users or the intentional jammers as in military communication. The effect of this interference can be reduced to some extent at the receiver with the PN demodulation by processing gain. It is known, however, that when the interferers are strong, the reduction cannot be sufficient and thereby requiring the extra use of narrowband interference cancellers (NIC's) at the receivers. A class of adaptive NIC's are studied here based on different two cost functions. One is the chip mean-squared error (MSE) computed prior to the PN demodulation and used in the conventional cancellers. Since thses conventional cancellers should be operated at the chip rate, the computational requirements are enormous. The other is the symbol MSE computed after the PN demodulation in which case the weights of the NIC's can be updated at a lot lower symbol rate. To compare the performance of these NIC's, we derive a common measure of performance, i.e., the symbol MSE after the PN demodulation. The analytical results are verified by computer simulation. As a result, it is shown that the cancellation capability of the symbol-rate NIC's are similar or better than the conventional one while the computational complexity can be reduced a lot.

An Analysis of Gas Accident between 1995 and 1998, and Suggestion of Accident Reduction Countermeasures. (1995 ${\~}$ 1998년 가스사고 분석 및 사고감소대척 제시)

  • Park Kyo-Shik;Kim Ji-Yoon
    • Journal of the Korean Institute of Gas
    • /
    • v.4 no.3 s.11
    • /
    • pp.1-8
    • /
    • 2000
  • It is required that gas accidents should be managed carefully as the consumption of fuel gas increases and high pressure gas process becomes more complex, which may cause a catastrophic accident. Factors to cause accidents were investigated through a systematic analysis of gas accidents between 1995 and 1998, which could be applied to prepare countermeasures to reduce gas accidents. As a result, it was suggested that the effective countermeasures to gas accidents should be kept applied, while new countermeasures were suggested in the field of increasing or not-decreasing number of accident. Totally 2,027 of accidents were reported during this term, and were found to decrease by about $12\%$ every year from 1996. The number of fuel gas such as LPG and city gas accident took up $96\%$, and most of accidents occurred at end-user's facility such as residential house and restaurant business. According to the kind of gas and facility, trend of accident by cause varies, while dominant causes are defective installation, appliance failure, or user's carelessness. Intentional accidents by fuel gas was excluded in this study because of its occurring mechanism and will be analyzed further elsewhere, although it took up $15\%$ and increased by $38\%$ every year.

  • PDF

Does Additional Aortic Procedure Carry a Higher Risk in Patients Undergoing Aortic Valve Replacement?

  • Kim, Tae-Hun;Park, Kay-Hyun;Yoo, Jae Suk;Lee, Jae Hang;Lim, Cheong
    • Journal of Chest Surgery
    • /
    • v.45 no.5
    • /
    • pp.295-300
    • /
    • 2012
  • Background: With growing attention to the aortopathy associated with aortic valve diseases, the number of candidates for accompanying ascending aorta and/or root replacement is increasing among the patients who require aortic valve replacement (AVR). However, such procedures have been considered more risky than AVR alone. This study aimed to compare the surgical outcome of isolated AVR and AVR combined with aortic procedures. Materials and Methods: A total of 86 patients who underwent elective AVR between 2004 and June 2010 were divided into two groups: complex AVR (n=50, AVR with ascending aorta replacement in 24 and the Bentall procedure in 26) and simple AVR (n=36). Preoperative characteristics, surgical data, intra- and postoperative allogenic blood transfusion requirement, the postoperative clinical course, and major complications were retrospectively reviewed and compared. Results: The preoperative mean logistic European System for Cardiac Operative Risk Evaluation (%) did not differ between the groups: $11.0{\pm}7.8%$ in the complex AVR group and $12.3{\pm}8.0%$ in the simple AVR group. Although complex AVR required longer cardiopulmonary bypass ($152.4{\pm}52.6$ minutes vs. $109.7{\pm}22.7$ minutes, p=0.001), the quantity of allogenic blood products did not differ ($13.4{\pm}14.7$ units vs. $13.9{\pm}11.2$ units). There was no mortality, mechanical circulatory support, stroke, or renal failure requiring hemodialysis/filtration. No difference was found in the incidence of bleeding (40% vs. 33.3%) which was defined as red blood cell transfusion ${\geq}5$ units, reoperation, or intentional delayed closure. The incidence of mediastinitis (2.0% vs. 0%), ventilator ${\geq}24$ hours (4.0% vs. 2.8%), atrial fibrillation (18.0% vs. 25.0%), mean intensive care unit stay (34.5 hours vs. 38.8 hours), and median hospital stay (8 days vs. 7 days) did not differ, either. Conclusion: AVR combined with additional aortic or root replacement showed an excellent outcome and recovery course equivalent to that after isolated AVR.

Large-Area Synthesis of High-Quality Graphene Films with Controllable Thickness by Rapid Thermal Annealing

  • Chu, Jae Hwan;Kwak, Jinsung;Kwon, Tae-Yang;Park, Soon-Dong;Go, Heungseok;Kim, Sung Youb;Park, Kibog;Kang, Seoktae;Kwon, Soon-Yong
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.08a
    • /
    • pp.130.2-130.2
    • /
    • 2013
  • Today, chemical vapor deposition (CVD) of hydrocarbon gases has been demonstrated as an attractive method to synthesize large-area graphene layers. However, special care should be taken to precisely control the resulting graphene layers in CVD due to its sensitivity to various process parameters. Therefore, a facile synthesis to grow graphene layers with high controllability will have great advantages for scalable practical applications. In order to simplify and create efficiency in graphene synthesis, the graphene growth by thermal annealing process has been discussed by several groups. However, the study on growth mechanism and the detailed structural and optoelectronic properties in the resulting graphene films have not been reported yet, which will be of particular interest to explore for the practical application of graphene. In this study, we report the growth of few-layer, large-area graphene films using rapid thermal annealing (RTA) without the use of intentional carbon-containing precursor. The instability of nickel films in air facilitates the spontaneous formation of ultrathin (<2~3 nm) carbon- and oxygen-containing compounds on a nickel surface and high-temperature annealing of the nickel samples results in the formation of few-layer graphene films with high crystallinity. From annealing temperature and ambient studies during RTA, it was found that the evaporation of oxygen atoms from the surface is the dominant factor affecting the formation of graphene films. The thickness of the graphene layers is strongly dependent on the RTA temperature and time and the resulting films have a limited thickness less than 2 nm even for an extended RTA time. The transferred films have a low sheet resistance of ~380 ${\Omega}/sq$, with ~93% optical transparency. This simple and potentially inexpensive method of synthesizing novel 2-dimensional carbon films offers a wide choice of graphene films for various potential applications.

  • PDF

The Origin of Thinking Mind (우리는 왜 생각하는 존재가 되었는가?)

  • Park, Man-joon
    • Journal of Korean Philosophical Society
    • /
    • v.131
    • /
    • pp.131-163
    • /
    • 2014
  • This Paper aims to elaborate on the origin of thinking mind. And this is a cooperative project between philosophy and neuroscience and brain science. I have written this paper in admiration for the achievements of twentieth century neuroscience and brain science, and out of desire to assist the subject in future. Much of the history of modern philosophy, from Descartes and Kant forward, consists of failed models of brain. As Edward O. Wilson precisely said, the shortcoming is not the fault of the philosophers, who have doggedly pushed their methods to the limit, but a straightforward consequence of the biological evolution of the brain. Guiding that investigation down pathways that will illuminate brain research is a task of neuroscience and brain science. Investigating logical relations among concepts is a philosophical task. If we are to understand the neural structures and dynamics that make perception, thought, intentional behaviour possible, clarity about these concepts and categories and their relations is essential. Hence our joint venture of philosophy and science. Sure, it is human beings that perceives, not parts of its brain. And it is human beings that who think and reason, not their brain. But the brain and its activities make it possible for human beings-not for it-to perceive and think, to feel emotions, and to form and pursue projects. Thus We try to investigate and reveal the origin of thinking mind as follow: 1) The difference between chimpanzee and human beings 2) brain and mind 3) the origin of thinking 4) the wisdom of nature.

Habitual Fallacy or Intentional Propaganda: Understanding the Mechanism of Re-constructing North Korean Myth (관습적 오류 혹은 의도적 프로파간다: 북한관련 '의혹'의 실체적 진실과 담론 왜곡의 구조)

  • Kim, Sunghae;Lu, Liu;Kim, Tongkyu
    • Korean Journal of Legislative Studies
    • /
    • v.23 no.1
    • /
    • pp.187-226
    • /
    • 2017
  • North Korea discourse is doubtful. A considerable portion is distorted under political objectives, group identity, and interests. Surely, there are facts based on North Korea's conducts. Apparent deceptions commonly exist as well though. Korean media does not endeavor to set the records straight and there are no revision towards mislead information. This is substantially dangerous as it can misjudge North Korean policies, beget national antipathy, and interferes with rational and constructive policy making. This study stems from such concerns and takes such cases as HEU(Highly Enriched Uranium) suspicion of 2002, dispute covering BDA(Banco Delta Asia)'s counterfeiting, and the abandonment of the Geneva Agreed Framework into consideration. The first part concentrates on fathoming the truth of the three cases. References from US government, academia, think tanks, media were inquired with an addition of secondary material from Korea and China. Secondly it examines whether domestic news properly reflects the precedent facts along the process of discovery. The cause and solution suggested by domestic media were organized and inductively reconstituted to frames. The last study questions the structural factors that reproduces suspicion analogs. Today's dangers facing Korean society are essentially not natural but artificial. This research hopes to foster peace by analyzing related discourses that are infamous to reinterpret reality.