• Title/Summary/Keyword: Converging

Search Result 689, Processing Time 0.022 seconds

The Chronotope of Medical Drama (메디컬 드라마의 크로노토프)

  • Won, Yong-Jin;Lee, Jun-Hyung;Park, Seo-Yeon;Lim, Cho-Yi
    • Journal of Popular Narrative
    • /
    • v.25 no.2
    • /
    • pp.169-216
    • /
    • 2019
  • This study proposes the concept of Bachchin's Chronotope as a tool for analyzing coevolution between the genre of the epic and society. Bachchin says through the concept of chronotope, literary works are on the foundation on which the axs of time and space intersect, and the literary works standsuch intersections are always conversing with social and historical chronotopes and mutually penetrating. Thus, finding and analyzing chronotope in literary works and extended things such as films and dramas reveals how chronotope and chronotope of a society have created specific social realities through a process of resonance. To make analytical use of this concept, we proposed a "cronotope drama analysis method" and concretely analyzed the genre of Korean medical dramas. The naturalized categories of health care, health, and disease are socially constructed entities, and the analysis of public works that has a significant impact on this process of social construction is essential but was underperformed. According to the analysis, the Korean medical drama's "Chronotope" has evolved using "Chronotope of the school" and "Chronotope of the secret chamber". At this time, the genre of Chronotope was expanding spatially and converging in time. In other words, the influence of structures and systems within the genre has grown, and the capacity of individual actors has decreased. This change in chronotope was interpreted as resonating with the social reality of neo-liberalistic spatial expansion and simultaneous production. The neo-liberalistic trend that dominates Korean society has embraced the category of health care and was further influencing the chronotope of drama text. It can also be inferred that the popular understanding of health care produced by the medical drama genre has taken a break in the process of forming a social reality of health care again.

An Analysis on the Textbook Implementation Process of 'Library and Information Life' Curriculum Standards: Focusing on the Extrinsic Cohension between Curriculum and Textbooks ('도서관과 정보생활' 교육과정 기준의 교과서 실현 양상에 대한 분석 - 외재적 응집성을 중심으로 -)

  • Kang-Sun Kim;Kyung-Kuk Noh;Sun-Ah Shin;Min-Su Lee;Byoung-Moon So
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.2
    • /
    • pp.67-88
    • /
    • 2023
  • The aim of this study is to survey the process in which the curriculum standards of 'library and information life' are implemented as textbooks and to find implications for improving of textbook publication. In the development process of accredited textbooks, it is essential for the curriculum standards and textbooks to align, both in form and content. 『Library and Information Life』(2011) are recognized textbooks systematically developed based on curriculum standards. To this end, the level of response to the numbers of 'topic' in the curriculum standard and the numbers of 'midle unit' in the textbook was identified. As a result, elementary and middle school textbooks exhibited a "one-to-many" response level, where one topic spanned approximately around two middle units, while high school textbook tended to have a "many-to-one" response level, converging two topics into one middle unit. In the case of elementary schools, the curriculum standard follows a single content-system, whereas textbooks are developed separately for lower and higher-grade levels. Therefore, some adjustments, such as curriculum content and subject titles, need to be considered for each elementary school level.

Data-Driven Technology Portfolio Analysis for Commercialization of Public R&D Outcomes: Case Study of Big Data and Artificial Intelligence Fields (공공연구성과 실용화를 위한 데이터 기반의 기술 포트폴리오 분석: 빅데이터 및 인공지능 분야를 중심으로)

  • Eunji Jeon;Chae Won Lee;Jea-Tek Ryu
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.71-84
    • /
    • 2021
  • Since small and medium-sized enterprises fell short of the securement of technological competitiveness in the field of big data and artificial intelligence (AI) field-core technologies of the Fourth Industrial Revolution, it is important to strengthen the competitiveness of the overall industry through technology commercialization. In this study, we aimed to propose a priority related to technology transfer and commercialization for practical use of public research results. We utilized public research performance information, improving missing values of 6T classification by deep learning model with an ensemble method. Then, we conducted topic modeling to derive the converging fields of big data and AI. We classified the technology fields into four different segments in the technology portfolio based on technology activity and technology efficiency, estimating the potential of technology commercialization for those fields. We proposed a priority of technology commercialization for 10 detailed technology fields that require long-term investment. Through systematic analysis, active utilization of technology, and efficient technology transfer and commercialization can be promoted.

The Perception Analysis of Autonomous Vehicles using Network Graph (네트워크 그래프를 활용한 자율주행차에 대한 인식 분석)

  • Hyo-gyeong Park;Yeon-hwi You;Sung-jung Yong;Seo-young Lee;Il-young Moon
    • Journal of Practical Engineering Education
    • /
    • v.15 no.1
    • /
    • pp.97-105
    • /
    • 2023
  • Recently, with the development of artificial intelligence technology, many technologies for user convenience are being developed. Among them, interest in autonomous vehicles is increasing day by day. Currently, many automobile companies are aiming to commercialize autonomous vehicles. In order to lay the foundation for the government's new and reasonable policy establishment to support commercialization, we tried to analyze changes and perceptions of public opinion through news article data. Therefore, in this paper, 35,891 news article data mentioning terms similar to 'autonomous vehicles' over the past three years were collected and network analyzed. As a result of the analysis, major keywords such as 'autonomous driving', 'AI', 'future', 'Hyundai Motor', 'autonomous driving vehicle', 'automobile', 'industrial', and 'electric vehicle' were derived. In addition, the autonomous vehicle industry is developing into a faster and more diverse platform and service industry by converging with various industries such as semiconductor companies and big tech companies as well as automobile companies and is paying attention to the convergence of industries. To continuously confirm changes and perceptions in public opinion, it is necessary to analyze perceptions through continuous analysis of SNS data or technology trends.

Plant Species Richness in Korea Utilizing Integrated Biological Survey Data (생물기초조사 통합자료를 활용한 우리나라 식물종 풍부도 분석)

  • Seungbum Hong;Jieun Oh;Jaegyu Cha;Kyungeun Lee
    • Korean Journal of Ecology and Environment
    • /
    • v.56 no.4
    • /
    • pp.363-374
    • /
    • 2023
  • The limitation in deriving the species richness representing the entire country of South Korea lies in its relatively short history of species field observations and the scattered observation data, which has been collected by various organizations in different fields. In this study, a comprehensive compilation of the observation data for plants held by agencies under the Ministry of Environment was conducted, enabling the construction of a time series dataset spanning over 100 years. The data integration was carried out using minimal criteria such as species name, observed location, and time (year) followed by data verification and correction processes. Based on the integrated plant species data, the comprehensive collection of plant species in South Korea has occurred predominantly since 2000, and the number of plant species explored through these surveys appears to be converging recently. The collection of species survey data necessary for deriving national-level biodiversity information has recently begun to meet the necessary conditions. Applying the Chao 2 method, the species richness of indigenous plants estimated at 3,182.6 for the 70-year period since 1951. A minimum cumulative period of 7 years is required for this estimation. This plant species richness from this study can be a baseline to study future changes in species richness in South Korea. Moreover, the integrated data with the estimation method for species richness used in this study appears to be applicable to derive regional biodiversity indices such as for local government units as well.

Recent Progress in Micro In-Mold Process Technologies and Their Applications (마이크로 인몰드 공정기술 기반 전자소자 제조 및 응용)

  • Sung Hyun Kim;Young Woo Kwon;Suck Won Hong
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.30 no.2
    • /
    • pp.1-12
    • /
    • 2023
  • In the current era of the global mobile smart device revolution, electronic devices are required in all spaces that people interact with. The establishment of the internet of things (IoT) among smart devices has been recognized as a crucial objective to advance towards creating a comfortable and sustainable future society. In-mold electronic (IME) processes have gained significant industrial significance due to their ability to utilize conventional high-volume methods, which involve printing functional inks on 2D substrates, thermoforming them into 3D shapes, and injection-molded, manufacturing low-cost, lightweight, and functional components or devices. In this article, we provide an overview of IME and its latest advances in application. We review biomimetic nanomaterials for constructing self-supporting biosensor electronic materials on the body, energy storage devices, self-powered devices, and bio-monitoring technology from the perspective of in-mold electronic devices. We anticipate that IME device technology will play a critical role in establishing a human-machine interface (HMI) by converging with the rapidly growing flexible printed electronics technology, which is an integral component of the fourth industrial revolution.

A Study on the Perceived Value and Intention of Use of Mobile Shopping Apps Using Value-Based Adoption Model (VAM) (가치기반수용모델(VAM)을 활용한 모바일 쇼핑 앱의 지각된 가치와 사용의도에 관한 연구)

  • Jhee, Seon Young;Kim, Mun-Ki;Han, Sang-Lin
    • Journal of Service Research and Studies
    • /
    • v.14 no.2
    • /
    • pp.101-116
    • /
    • 2024
  • As the spread of smartphones has become more common and the utilization rate has increased, the mobile shopping market is also growing and expectations for related industries are also increasing. Mobile shopping apps are converging with various industries such as fashion, beauty, and lifestyle, and competition among companies to increase the number of users is intensifying with the activation of non-face-to-face. Accordingly, in this study, a study on the perceived value and intention to use mobile shopping apps was conducted based on a VAM. In order to test the hypothesis of this study, a questionnaire was conducted on 266 people who had used a mobile shopping app and it was used for analysis. Looking at the results, it was confirmed that both usefulness and enjoyment among the perceived benefit of mobile shopping apps have a positive (+) effect on the perceived value. However, it was found that the technicality and perceived risk among the perceived sacrifices of mobile shopping apps did not significantly affect the perceived value. Finally, it was confirmed that the perceived value of the mobile shopping app had a positive (+) effect on the intention to use. Through this study, we would like to examine the factors that can affect perceived value and usage intention in the mobile shopping app industry, which is increasingly competitive among companies along with the rapid growth of mobile technology and market, and suggest practical implications for related companies and officials to establish efficient strategies to further increase mobile shopping app users.

A Study on the Renmai(任脈)·Dumai(督脈)·Chongmai(衝脈) Pulse Pattern in the Qikoujiudaomai(氣口九道脈) Diagnostic Method (기구구도맥진(氣口九道脈診)에서 임맥(任脈)·독맥(督脈)·충맥(衝脈)의 맥상(脈狀)에 관한 연구)

  • Lee Byong Wook;Yoon Hong Geol;Hwang Su Kyung;Kim Ki Wook;Park Geon Woo;Hwang Min Sub;Yoon Jong Hwa
    • Journal of Korean Medical classics
    • /
    • v.37 no.2
    • /
    • pp.31-48
    • /
    • 2024
  • Objectives : The purpose of this paper is to find the corresponding pathological situation of the Renmai(任脈), Dumai(督脈), and Chongmai(衝脈) at the Cun(寸), Guan(關), Chi(尺) pulse positions using the Qikoujiudaomai diagnostic method in order to find the pathological pattern of the Eight Extra Meridians. The pulse positions are divided into nine parts, using a three dimensional surface-middle-bottom concept. Methods : Relevant contents in classical texts such as the Maijing, Qijingbamaikao, Zabingyuanliuxizhu, Maiyijianmo were examined, along with previous studies on the topic. The findings were that the Renmai, Dumai, Chongmai examination of the Qikoujiudaomai manifested as floating, tight, firm patterns in the Cun, Guan, Chi positions. Results & Conclusions : n terms of the Renmai, the converging and fast Qi manifested in the three positions as a tight pattern; in the Dumai, the extended and scattering Qi manifested in the three positions as a floating pattern; in the Chongmai, the excessive, solid and full Qi manifested in the three positions as a firm pattern. Once the pathological qi overflows in the 12 meridians, disease happens in the Eight Extra Meridians. As such, disease in the Renmai, Dumai, Chongmai were connected to the main meridians as three branches from one root. Through this study, it could be concluded that diagnosis and acupuncture treatment through the Qikoujiudaomai method is possible.

Investigating Key Security Factors in Smart Factory: Focusing on Priority Analysis Using AHP Method (스마트팩토리의 주요 보안요인 연구: AHP를 활용한 우선순위 분석을 중심으로)

  • Jin Hoh;Ae Ri Lee
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.185-203
    • /
    • 2020
  • With the advent of 4th industrial revolution, the manufacturing industry is converging with ICT and changing into the era of smart manufacturing. In the smart factory, all machines and facilities are connected based on ICT, and thus security should be further strengthened as it is exposed to complex security threats that were not previously recognized. To reduce the risk of security incidents and successfully implement smart factories, it is necessary to identify key security factors to be applied, taking into account the characteristics of the industrial environment of smart factories utilizing ICT. In this study, we propose a 'hierarchical classification model of security factors in smart factory' that includes terminal, network, platform/service categories and analyze the importance of security factors to be applied when developing smart factories. We conducted an assessment of importance of security factors to the groups of smart factories and security experts. In this study, the relative importance of security factors of smart factory was derived by using AHP technique, and the priority among the security factors is presented. Based on the results of this research, it contributes to building the smart factory more securely and establishing information security required in the era of smart manufacturing.

Design of Authentication Mechinism for Command Message based on Double Hash Chains (이중 해시체인 기반의 명령어 메시지 인증 메커니즘 설계)

  • Park Wang Seok;Park Chang Seop
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2024
  • Although industrial control systems (ICSs) recently keep evolving with the introduction of Industrial IoT converging information technology (IT) and operational technology (OT), it also leads to a variety of threats and vulnerabilities, which was not experienced in the past ICS with no connection to the external network. Since various control command messages are sent to field devices of the ICS for the purpose of monitoring and controlling the operational processes, it is required to guarantee the message integrity as well as control center authentication. In case of the conventional message integrity codes and signature schemes based on symmetric keys and public keys, respectively, they are not suitable considering the asymmetry between the control center and field devices. Especially, compromised node attacks can be mounted against the symmetric-key-based schemes. In this paper, we propose message authentication scheme based on double hash chains constructed from cryptographic hash function without introducing other primitives, and then propose extension scheme using Merkle tree for multiple uses of the double hash chains. It is shown that the proposed scheme is much more efficient in computational complexity than other conventional schemes.