This study aims to account for electoral choice in the 2020 presidential election by focusing on social identity which forms the basis for core partisan groups. Two views compete to explain the origins of polarization, policy versus party. One emphasizes policy as more influential in choosing presidential candidates. This follows the tradition of retrospective voting theory in which voters' choice rely on government performance. Incumbent president whose performance proves well are rewarded to be reelected. Policy performance is based on measures around distinctive preferences for government spending. Republican Individuals prefer individual responsibility to government support, while Democratic counterparts support government support. Another perspective put an emphasis on the role partisanship which favors in-party members and disfavors partisan out-groups. Interparty animosity plays the key role in determining electoral behavior. This study relies on the Views of the Electorate Research (VOTER) Survey which provides a panel data of several waves from 2011 to 2020. A comparative evaluation of two views highlights three findings. First, policy matters. Policy preferences of voters are the primary drives of political behavior. Electoral outcomes in 2020 turned out to be the results of policy considerations of voters. 53.7 percent of voters tilted toward individual responsibility voted for Trump, whereas 70.4 percent of those favorable views of government support than individual responsibility voted for Biden. Thus effects of policy correspond to a positive difference of 26.4 percent points. Second, partisanship effects are of similar extent in influencing electoral choice of candidates: Democrats are less likely to vote for Trump by 42.4 percent points, while Republicans are less likely to vote for Biden by 48.7 percent points. Third, animosity of Republicans toward Democrat core groups creates 26.5 percent points of favoring Trump over Biden. Democrat animosity toward Republican core groups creates a positive difference of 13.7 percent points of favoring Biden.
Space is becoming more commercialized. Despite of its delayed start-up, space activities in Korea are attracting more nation-wide supports from both investors and government. May 25, 2023, KSLV II, also called Nuri, successfully transported, and inserted seven satellites to a sun-synchronous orbit of 550 km altitude. However, Starlink has over 4,000 satellites around this altitude for its commercial activities. Hence, it is necessary for us to constantly monitor the collision risks of these satellites against resident space objects including Starlink. Here we report a quantitative research output regarding the conjunctions, particularly between the Nuri satellites and Starlink. Our calculation shows that, on average, three times everyday, the Nuri satellites encounter Starlink within 1 km distance with the probability of collision higher than 1.0E-5. A comparative study with KOMPSAT-5, also called Arirang-5, shows that its distance of closest approach distribution significantly differs from those of Nuri satellites. We also report a quantitative analysis of collision-avoiding maneuver cost of Starlink satellites and a strategy for Korea, being a delayed starter, to speed up to position itself in the space leading countries. We used the AstroOne program for analyses and compared its output with that of Socrates Plus of Celestrak. The two line element data was used for computation.
Park, Myung-Hwan;Lee, Jin-Wan;Lee, Kang-Won;Ryu, Chang-Woo;Jahng, Geon-Ho
Investigative Magnetic Resonance Imaging
/
v.13
no.2
/
pp.161-170
/
2009
Purpose : A parallel imaging method provides us to improve temporal resolution to obtain three-dimensional (3D) MR images. The objective of this study was to optimize three 3D MRI techniques by adjusting 2D SESNE factors of the parallel imaging method in phantom and human brain. Materials and Methods : With a 3 Tesla MRI system and an 8-channel phase-array sensitivity-encoding (SENSE) coil, three 3D MRI techniques of 3D T1-weighted imaging (3D T1WI), 3D T2-weighted imaging (3D T2WI) and 3D fluid attenuated inversion recovery (3D FLAIR) imaging were optimized with adjusting SESNE factors in a water phantom and three human brains. The 2D SENSE factor was applied on the phase-encoding and the slice-encoding directions. Signal-to-noise ratio(SNR), percent signal reduction rate(%R), and contrast-to-noise ratio(CNR) were calculated by using signal intensities obtained in specific regions-of-interest (ROI). Results : In the phantom study, SENSE factor = 3 was provided in 0.2% reduction of signals against without using SENSE with imaging within 5 minutes for 3D T1WI. SENSE factor = 2 was provided in 0.98% signal reduction against without using SENSE with imaging within 5 minutes for 3D T2WI. SENSE factor = 4 was provided in 0.2% signal reduction against without using SENSE with imaging around 6 minutes for 3D FLAIR. In the human brain study, SNR and CNR were higher with SENSE factors = 3 than 4 for all three imaging techniques. Conclusion : This study was performed to optimize 2D SENSE factors in the three 3D MRI techniques that can be scanned in clinical time limitations with minimizing SNR reductions. Without compromising SNR and CNR, the optimum 2D SENSE factors were 3 and 4, yielding the scan time of about 5 to 6 minutes. Further studies are necessary to optimize 3D MRI techniques in other areas in human body.
Today, design is not free from fashion, which emerges and vanishes temporarily, and aims at equalization. As a result, products quickly become obsolete because of fashion. This means that the span of products is determined by a social concept, which is not clarified, regardless of their functions. Usable products will gradually disappear from us and it will cause serious environmental problems, unless we can find out measures against fashion. As such, it is important to study the characteristics of the shaker's design in this circumstance. The Shaker's community has a distinguishable difference from other general societies. Temporary fashion and misled information cannot interfere with their consciousness. Religion, the life and the principle of design have developed on the same level in their community. Especially, any decoration or the difference of materials is not allowed in shaker's design. It reflects their thinking that all people are equal in the sight of God. Therefore, any decoration for social and economical superiority can not be used. Through this consciousness, they can be free from fashion or decoration. They, also, believe that they can reach perfection through practicality and simplicity. The reason why shaker's design is not disturbed by fashion is that their belief is involved in their design. Consequently, if religious or conscious contents are primarily set up, design can be free from fashion and products can be used for a long time.
Specific protocols to increase the differentiation of neuronal cells from embryonic stem (ES) cells have been well established, such as retinoic acid induction and lineage selection of neuronal cells. For the neuropathological studies, ES-derived neurons (ES neurons) must show normal physiological characteristics related to cell death and survival and should be maintained in vitro for a sufficient time to show insults-specific cell death without spontaneous death. When mouse ES cells were plated onto astrocytes monolayer after retinoic acid induction, most ES cells differentiated into neuronal cells, which were confirmed by the presence of specific neuronal markers, and the cultures were viable for at least four weeks. When these cultures were examined for vulnerability to glutamate excitotoxicity, ES neurons were vulnerable to excitotoxic insults mediated by agonist-specific receptors. The vulnerability to excitotoxic death increased with developmental age of ES neurons in vitro. Specific receptors for Neurotrophin and GDNF family ligands were present in ES neurons. GDNF and NT-3 could modulate the survival and excitotoxic vulnerability of ES neurons. The vulnerability and resistance to toxic insults, which are essential requirements of model culture systems for neuropathological studies, make ES neurons to a useful model culture system. Especially ES cell are highly amenable to genetic modification unlikely to primary neuronal cells, which will give us a chance to answer more complicated neurophysiological questions. Recently there was an outstanding attempt to explore the cellular toxicity using human ES cells (Schrattenholz & Klemm, 2007) and it suggested that ES cells could be a new model system for neurophysiological studies soon and go further a large-scale screening system for pharmacological compounds in the future.
The purpose of our paper was to investigate the migration level of 4,4'-MDA(4,4'-methylenedianiline), 2,4-TDA(2,4-toluenediamine), aniline, acrylonitrile and methylmeth acrylate from plastic cookwares into food simulants and to evaluate the safety of each monomers. The test articles for monomers were PA (polyamide) items for 4,4'-MDA, 2,4-TDA and aniline, PU (polyurethane) items for 4,4'-MDA, ABS (acrylonitrile-butadiene- styrene) items for acrylonitrile, and acrylic resin items for methylmethacrylate. All the article samples of 321 intended for contact with foods were purchased in domestic market. 4,4'-MDA, 2,4-TDA and aniline were analyzed by LC-MS/MS (liquid chromatography -tandem mass spectrometer), acrylonitrile by GC-NPD (gas chromatography-nitrogen phos phorus detector) and methyl methacrylate by GC-FID (gas chromatography-flame ionization detector). The migration level of monomers were within the migration limits of Ministry of Food and Drug Safety (MFDS). As a result of safety evaluation, our results showed that the estimated daily intake (EDI, mg/kg bw/day)s were $2.39{\times}10^{-9}$ and $1.20{\times}10^{-9}$ for 4,4'-MDA and 2,4-TDA of PA, $4.32{\times}10^{-9}$ for acrylonitrile of ABS and $2.27{\times}10^{-7}$ for methylmethacrylate of acrylic resin. Reference Dose (RfD, mg/kg bw/day) of acrylonitrile and tolerable daily intake (TDI, mg/kg bw/day) of methacrylate were established respectively as 0.001 by EPA (US Environmental Protection Agency) and as 1.2 by WHO (World Health Organization). When comparing with RfD and TDI, the EDIs of acrylonitrile and methylmethacrylate accounted for $4.32{\times}10^{-4}%$ and $1.89{\times}10^{-5}%$ respectively.
Kim, Jae-Hyuck;Choi, Hong-Lim;Kown, So-Young;Lim, Hong-Lae;McConnell, Laura L.;Arispe, Susana;Park, Chul-Hwi;Kim, Hyun-Ook
Journal of Korean Society of Environmental Engineers
/
v.28
no.2
/
pp.158-164
/
2006
Offensive odor from CAFO(concentrated animal feeding operation) and its control have become a significant issue in Korea. Control of odors from the CAFO requires to identify major odorant and their generation mechanisms. In this study, an easy method to collect gas sample and to quantify its odorants is proposed. The method involves on-site odorant extraction with solid-phase microextraction and quantitation with GC/MSD or GC/FID. Analytes of the current study include: trimethylamine(TMA), carbon disulfide($CS_2$), dimethyl sulfide(DMS), dimethyl disulfide(DMDS), acetic acid(AA), propionic acid(PA) and n-butyric acid(BA). The resulting linearity($R^2$) of calibration curve for each analyte was good over the range from several ppbv to ppmv; 0.984 for TMA(0.056-1.437), 0.996 for $CS_2$(0.039-0.999), 0.994 for DMS(0.029-0.756), 0.995 for DMDS(0.024-0.623), 0.992 for AA(0.068-1.314), 0.955 for PA(0.047-0.940), and 0.976 for BA(0.036-0.712). Method detection limits were 5.67, 6.39, 5.78, 25.2, 0.098, 0.363 and 0.099 ppbv for AA, PA, BA, TMA, DMS, $CS_2$, and DMDS, respectively. With the developed method, odorants from poultry, swine, and cattle barns were analysed. All the compounds but DMDS were detected from the sample collected in the poultry barn, and their levels exceeded the representative published human olfactory threshold.
Terrorism which became today's common phenomena over the world is one of the most serious threats the world confront. Although International society make and operate outstanding anti-terrorism system, terror would never end without solving fundamental problems. The main body of terrorism converts from nation to organization and from organization to cell, which makes it difficult for us to recognize the main body. Since the target of today's new terrorism is many and unspecified persons, terrorists will never hesitate to use mass destruction weapons such as nuclear, biological, chemical weapons, and also use cyber-technique or cyber-terrorism. So, effective counter-terrorism measures should be performed as follows. First, it must be better for international society should make long-time plan of solving fundamental problems of terrorism other than to operate directly on terror organization and its means. Second, preventive method should be made. The most effective method of eradicating terrorism is prevention. For this, it is necessary to remove environmental elements of terrorism and terrorist bases, and to stop inflow of money and mass destruction weapons to terrorists. Third, integrated anti-terror organization should be organized and operated for continuous counter-terrorism operations. Also international alliance for anti-terrorism should be maintained to share informations and measures. Fourth, concerned department in the government should prepare counter-terrorism plans in their own parts as follows and make efforts to integrate the plans. - Ministry of Government Administration and Home Affairs : conventional terror - Ministry of Health and Welfare : bio-terror - Ministry of Science and Technology : nuclear-terror Especially, they should convert their policy and operation from post-terror actions to pre-terror actions, designate terror as national disaster and organize integrated emergency response organization including civil, government, and military elements. In conclusion, pre-terror activities and remedy of fundamental causes is the best way to prevent terror. Also, strengthening of intelligence activities, international cooperations, and preventive and comprehensive counter-measures must not ignored.
This study will evaluate the effectiveness of various pretreatments when fiber-reinforced composite (FRC) post is bonded to endodontically treated tooth with resin cement. Materials and methods: Canal shaping of FRC post (DT Light post, Size 3, Bisco Inc., Schaumburg, IL, USA) was performed on endodontically treated premolars at 1.5 cm from CEJ. Samples were divided into 6 groups of surface treatment after conventional washing and drying to the canal. Total of 24 FRC posts were randomly divided into 6 groups of surface treatment as follows: Group C: control - no surface treatment, Group A: airborne-particle abrasion (Cojet sand, 3M ESPE), Group S: silanization (Bis-silane, Bisco Inc.), Group M: universal primer (Monobond-plus primer, Ivoclar Vivadent Inc.), Group AS: silanization after airborne-particle abrasion, Group AM: universal primer treatment after airborne-particle abrasion. Pretreated fiber posts were cemented with resin-based luting material and photo-polymerized and cut to the thickness of 1 mm. Push-out test using a universal testing machine was performed. Bonding failure strength of post dislodgement was measured and the type of bonding failure was classified. Data were analyzed with Kruskal-Wallis test and multiple comparison groups were performed using Tukey HSD value of rank test (${\alpha}=0.05$). Results: Group AS showed significantly highest bonding strength. Group S, group AM, group A, and group M showed lower bonding strength in order. The control group showed the lowest bonding strength. Conclusion: Surface treatment with silane showed to be the most effective of the surface pretreatment methods for cementation of FRC post. Surface treatment with universal primer showed no significant difference compared with no surface treatment group as for bonding strength.
Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.