• Title/Summary/Keyword: 시각정보체계

Search Result 441, Processing Time 0.025 seconds

A Concept of Media-Environment and Its Policy Implications: Focusing on the Policy Discussions Concerning the Public Interest Idea (미디어 환경개념의 정책적 함의: 공익성 관련 논의를 중심으로)

  • Kim, Pyung-Ho
    • Korean journal of communication and information
    • /
    • v.43
    • /
    • pp.152-172
    • /
    • 2008
  • The convergence of media poses serious challenges to technologies, industries and policy makers. At the core of the challenges lies a socially and culturally problematic condition of 'media unlimited.' Under the circumstances, the idea of public interest of the media seems to lose its intervening leverage as it flounders in countering 'the media torrent' rushing from the exponential growth of ICTs that overwhelms contemporary life and society. It is an urgent task for the critical community to blaze fresh new thoughts about the idea to intervene in the current age of media excess. Beyond the conventional content-conduit-centered perspective on the media, this study suggests a media-environment concept based on media ecology as an engaging leverage to replenish the public interest idea. The environmental approach to the media means literally to conceptualize the media as environment--a cultural eco-system. This study explores the potential of ecological approach in enriching the conceptual terrain of policy discussions and policy-making processes concerning the public interest idea that hopefully enlightens all the media actors concerned.

  • PDF

A Study on the Practical Use of Rich-Media in the Internet Advertisement (인터넷 광고에서의 리치미디어 활용에 관한 연구)

  • 임은정;손은미;이현주
    • Archives of design research
    • /
    • v.14 no.2
    • /
    • pp.187-196
    • /
    • 2001
  • Today's internet advertisement market is growing rapidly placing great importance on banner advertisements. Still, banner advertisements are being ignored by the users because most of these banners are exaggerated, visually distracted and they usually interfere with internet surfing. These banners make the agents and the users feel displeased and furthermore, make internet market unstable. 'Rich-Media'came in sight as the new way of advertising means in the internet market as the users demand for more dynamic and interactive media. In Rich-Media, sound and animation interact with former animated banner advertisements. Internet advertising businesses inducing web agencies have positive views about Rich-Media, because more information and ideas are shared through aural and visual integration and it is very effective way to draw attentions from the users. In this study, we have examined the effects of Rich-Media advertisements through surveys. As a result, Rich-Media advertisements are superior to ordinary banner advertisements in visual effect, leading interests of users, inducing mouse did(s and providing of information. The recent uses of Rich-Media is just a mere beginning, but we expect to make the Rich-Media an essential medium of internet advertisement as we continue studying the uses and effects of Rich-Media.

  • PDF

Debelppment of C++ Compiler and Programming Environment (C++컴파일러 및 프로그래밍 환경 개발)

  • Jang, Cheon-Hyeon;O, Se-Man
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.831-845
    • /
    • 1997
  • In this paper,we proposed and developed a compiler and interactive programming enviroments for C++ wich is mostly worth of nitice among the object -oriented languages.To develope the compiler for C++ we took front=end/back-end model using EM virtual machine.In develpoing Front-End,we formailized C++ gram-mar with the context semsitive tokens which must be manipulated by dexical scanner and designed a AST class li-brary which is the hierarchy of AST node class and well defined interface among them,In develpoing Bacik-End,we proposed model for three major components :code oprtimizer,code generator and run-time enviroments.We emphasized the retargatable back-end which can be systrmatically reconfigured to genrate code for a variety of distinct target computers.We also developed terr pattern matching algorithm and implemented target code gen-erator which produce SPARC code.We also proposed the theroy and model for construction interative pro-gramming enviroments. To represent language features we adopt AST as internal reprsentation and propose uncremental analysis algorithm and viseal digrams.We also studied unparsing scheme, visual diagram,graphical user interface to generate interactive environments automatically Results of our resarch will be very useful for developing a complier and programming environments, and also can be used in compilers for parallel and distributed enviroments.

  • PDF

A Study on the Korean National Police's Protesting Policing Policy through the Analysis of Negotiated Management Model (협의관리모델 분석을 통한 한국 경찰의 집회시위 관리정책 연구)

  • Hwang, Kyu-Jin;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.65-77
    • /
    • 2011
  • In Western Europo and the US, there has been a general trend over 30 years of reducing the amount of force by the police, through a paradigm shift from 'Escalated Force Model' towards 'Negotiated Management Model'. In tune with this trend, for example, the Swedish Police have implemented the uniformed 'Dialogue Police' system, in order to establish communication contact with demonstrators, before, during, and after their events, The Negotiated Management Model involves a greater respect for the rights of protesters, a more tolerant approach to community, and improved intelligence, communication, and flexibility, in order to facilitate lawful protests and to reduce the possibility of an escalation of major public disorder. The Korean National Police (KNP) appears to be operated within this negotiated management framework, since in preparation for the G20 Seoul Summit, they have also emphasized good communication between the police and protest groups, by newly creating the concept of 'Protest Policing Through Facilitation of Lawful Protests'. In this context, this study first attempts to analyze not only the negotiated management model, but also the Swedish dialogue police. Secondly, the study conducts a comparative study between the KNP's Protest Policing Through Facilitation of Lawful Protest and the Swedish dialogue police system, particularly, in conjunction with the negotiated management. Although Korean and western police have different system and history, protest policing model is now approaching with each other through a link between conflict resolution techniques, such as dialogue, negotiation, mediation and facilitation. Finally, the study is to prove if the KNP's protest policing model corresponds with the negotiated management model, and further to suggest new 'Facilitation of Conflict Resolution Model' as a desirable future of the KNP's protest policing.

Model Design and Applicability Analysis of Interactive Electronic Technical Manual for Planning Stage of Construction Projects (건설공사 기획단계 전자매뉴얼의 적용 모형 구성 및 효과 분석)

  • Kwak, Joong-Min;Kang, Leen-Seok
    • Land and Housing Review
    • /
    • v.12 no.2
    • /
    • pp.121-139
    • /
    • 2021
  • Technical documents in the construction field are changing from paper documents to electronic ones. As a result, the industry witnesses a trend of using portable electronic devices in searching or retrieving necessary information such as relevant regulations. Despite the improvement in the accessibility to general technical documents, a limitation is still found in accessing the electronic documents on the regulations. We see the barrier for field engineers to enhance their technical knowledge. One of major barriers is that videos, animations, and virtual reality information to enhance the visual understanding of technical content related to regulations are not linked. It is the interactive electronic technical manual (IETM) that can address such issues. The IETM is an electronic document system that enables real-time information acquisition while operating in the form of conversations with users by linking multimedia functions to document types such as specifications and guidelines. This study establishes a model of the IETM that can be operated in the planning stage of a construction project. The study also verifies its usability with a hypothetical case study. This study aims to improve the usability of the IETM in the construction project by analyzing the application effect of the IETM using the AHP technique.

A Study on the Classification of Unstructured Data through Morpheme Analysis

  • Kim, SungJin;Choi, NakJin;Lee, JunDong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.105-112
    • /
    • 2021
  • In the era of big data, interest in data is exploding. In particular, the development of the Internet and social media has led to the creation of new data, enabling the realization of the era of big data and artificial intelligence and opening a new chapter in convergence technology. Also, in the past, there are many demands for analysis of data that could not be handled by programs. In this paper, an analysis model was designed and verified for classification of unstructured data, which is often required in the era of big data. Data crawled DBPia's thesis summary, main words, and sub-keyword, and created a database using KoNLP's data dictionary, and tokenized words through morpheme analysis. In addition, nouns were extracted using KAIST's 9 part-of-speech classification system, TF-IDF values were generated, and an analysis dataset was created by combining training data and Y values. Finally, The adequacy of classification was measured by applying three analysis algorithms(random forest, SVM, decision tree) to the generated analysis dataset. The classification model technique proposed in this paper can be usefully used in various fields such as civil complaint classification analysis and text-related analysis in addition to thesis classification.

A Study on the Expressive Technique of Sando(山圖) Included in 『Seonweon Bogam(璿源寶鑑)』 (『선원보감(璿源寶鑑)』에 수록된 산도(山圖)의 표현기법(表現技法)에 관한 연구)

  • Hwang, In-Hyuk;Kim, Taeg-Jin;Kim, Ki-Duk
    • Journal of Korean Historical Folklife
    • /
    • no.44
    • /
    • pp.39-70
    • /
    • 2014
  • "Seonweon Bogam" was made for the purpose of delivering information on the tomb of members of the royal family of the Joseon Dynasty. Accordingly, it covered all of Sando making a pictorial expression of the tomb. But its value has been doubted as it is roughly expressed and different from the picture of the actual scene. But "Seonweon Bogam" is the only book that covers Sando of all the kings of the Joseon Dynasty but contains the elements making it possible to estimate the possibility that the original Sando might be used in making Sando. Accordingly, it is a high time to make an in-deep study of this. This study attempted to investigate Sando included in "Seonweon Bogam" with a focus on the expressive style. For this purpose, it sought to analyze seven elements such as the exposure, the legend, locational information, direction, waterway and road, expression on water and Fengshui(風水) terminology. As a result, the following conclusion was drawn: Sando concerning the tombs of members of the Joseon Dynasty was continually made. It was made in two ways such as the way of drawing the scene on spot and the way of imitating the existing made material. And it could be estimated that there is a possibility that Sando of "Seonweon Bogam" might be copied by the figure with only a little expertise about Sando but on the basis of several materials about the existing Sando of the royal family.

The Effect of Artificial Intelligence on Human Life by the Role of Increasing Value Added in the Industrial Sector (인공지능의 산업 분야 부가 가치 증대 역할에 따른 정책 수립 및 인간 생활에 미치는 영향)

  • Kim, Ji-Hyun;Yu, Ji-in;Jung, Ji-Won;Choi, Hun;Han, Jeong-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.505-508
    • /
    • 2022
  • Artificial intelligence itself has the value of advancing technology, and it is used in various industrial fields to enhance the added value of products and services produced in various industries. Therefore, regulations and policies related to artificial intelligence should be considered from a broader perspective. However, researchers have different understandings, and there is no agreement on how to regulate artificial intelligence. Therefore, we will examine the direction of government regulation on artificial intelligence technology in an exploratory manner. First, accountability, transparency, stability, and fairness are derived as the goals of artificial intelligence regulation, and the system itself, development process, and utilization process are set as the scope of regulation, and users and developers are subject to regulation. The academic significance of this study can be seen as analyzing the current level of artificial intelligence technology and laying the foundation for consistent discussions on artificial intelligence regulations in the future. Considering the life cycle from AI development to application, what is important is the balance of promotion policies to promote the artificial intelligence industry and regulatory policies to respond to the resulting risks. The goal of law related to artificial intelligence is to establish a system in which artificial intelligence can be accommodated in a positive direction to all participants, including developers, companies, and users.

  • PDF

Customer Voices in Telehealth: Constructing Positioning Maps from App Reviews (고객 리뷰를 통한 모바일 앱 서비스 포지셔닝 분석: 비대면 진료 앱을 중심으로)

  • Minjae Kim;Hong Joo Lee
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.69-90
    • /
    • 2023
  • The purpose of this study is to evaluate the service attributes and consumer reactions of telemedicine apps in South Korea and visualize their differentiation by constructing positioning maps. We crawled 23,219 user reviews of 6 major telemedicine apps in Korea from the Google Play store. Topics were derived by BERTopic modeling, and sentiment scores for each topic were calculated through KoBERT sentiment analysis. As a result, five service characteristics in the application attribute category and three in the medical service category were derived. Based on this, a two-dimensional positioning map was constructed through principal component analysis. This study proposes an objective service evaluation method based on text mining, which has implications. In sum, this study combines empirical statistical methods and text mining techniques based on user review texts of telemedicine apps. It presents a system of service attribute elicitation, sentiment analysis, and product positioning. This can serve as an effective way to objectively diagnose the service quality and consumer responses of telemedicine applications.

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.