• Title/Summary/Keyword: Evolution

Search Result 9,464, Processing Time 0.042 seconds

Paleomagnetism, Stratigraphy and Geologic Structure of the Tertiary Pohang and Changgi Basins; K-Ar Ages for the Volcanic Rocks (포항(浦項) 및 장기분지(盆地)에 대한 고지자기(古地磁氣), 층서(層序) 및 구조연구(構造硏究); 화산암류(火山岩類)의 K-Ar 연대(年代))

  • Lee, Hyun Koo;Moon, Hi-Soo;Min, Kyung Duck;Kim, In-Soo;Yun, Hyesu;Itaya, Tetsumaru
    • Economic and Environmental Geology
    • /
    • v.25 no.3
    • /
    • pp.337-349
    • /
    • 1992
  • The Tertiary basins in Korea have widely been studied by numerous researchers producing individual results in sedimentology, paleontology, stratigraphy, volcanic petrology and structural geology, but interdisciplinary studies, inter-basin analysis and basin-forming process have not been carried out yet. Major work of this study is to elucidate evidences obtained from different parts of a basin as well as different Tertiary basins (Pohang, Changgi, Eoil, Haseo and Ulsan basins) in order to build up the correlation between the basins, and an overall picture of the basin architecture and evolution in Korea. According to the paleontologic evidences the geologic age of the Pohang marine basin is dated to be late Lower Miocence to Middle Miocene, whereas other non-marine basins are older as being either Early Miocene or Oligocene(Lee, 1975, 1978: Bong, 1984: Chun, 1982: Choi et al., 1984: Yun et al., 1990: Yoon, 1982). However, detailed ages of the Tertiary sediments, and their correlations in a basin and between basins are still controversial, since the basins are separated from each other, sedimentary sequence is disturbed and intruded by voncanic rocks, and non-marine sediments are not fossiliferous to be correlated. Therefore, in this work radiometric, magnetostratigraphic, and biostratigraphic data was integrated for the refinement of chronostratigraphy and synopsis of stratigraphy of Tertiary basins of Korea. A total of 21 samples including 10 basaltic, 2 porphyritic, and 9 andesitic rocks from 4 basins were collected for the K-Ar dating of whole rock method. The obtained age can be grouped as follows: $14.8{\pm}0.4{\sim}15.2{\pm}0.4Ma$, $19.9{\pm}0.5{\sim}22.1{\pm}0.7Ma$, $18.0{\pm}1.1{\sim}20.4+0.5Ma$, and $14.6{\pm}0.7{\sim}21.1{\pm}0.5Ma$. Stratigraphically they mostly fall into the range of Lower Miocene to Mid Miocene. The oldest volcanic rock recorded is a basalt (911213-6) with the age of $22.05{\pm}0.67Ma$ near Sangjeong-ri in the Changgi (or Janggi) basin and presumed to be formed in the Early Miocene, when Changgi Conglomerate began to deposit. The youngest one (911214-9) is a basalt of $14.64{\pm}0.66Ma$ in the Haseo basin. This means the intrusive and extrusive rocks are not a product of sudden voncanic activity of short duration as previously accepted but of successive processes lasting relatively long period of 8 or 9 Ma. The radiometric age of the volcanic rocks is not randomly distributed but varies systematically with basins and localities. It becomes generlly younger to the south, namely from the Changgi basin to the Haseo basin. The rocks in the Changgi basin are dated to be from $19.92{\pm}0.47$ to $22.05{\pm}0.67Ma$. With exception of only one locality in the Geumgwangdong they all formed before 20 Ma B.P. The Eoil basalt by Tateiwa in the Eoil basin are dated to be from $20.44{\pm}0.47$ to $18.35{\pm}0.62Ma$ and they are younger than those in the Changgi basin by 2~4 Ma. Specifically, basaltic rocks in the sedimentary and voncanic sequences of the Eoil basin can be well compared to the sequence of associated sedimentary rocks. Generally they become younger to the stratigraphically upper part. Among the basin, the Haseo basin is characterized by the youngest volcanic rocks. The basalt (911214-7) which crops out in Jeongja-ri, Gangdong-myon, Ulsan-gun is $16.22{\pm}0.75Ma$ and the other one (911214-9) in coastal area, Jujon-dong, Ulsan is $14.64{\pm}0.66Ma$ old. The radiometric data are positively collaborated with the results of paleomagnetic study, pull-apart basin model and East Sea spreading theory. Especially, the successively changing age of Eoil basalts are in accordance with successively changing degree of rotation. In detail, following results are discussed. Firstly, the porphyritic rocks previously known as Cretaceous basement (911213-2, 911214-1) show the age of $43.73{\pm}1.05$$49.58{\pm}1.13Ma$(Eocene) confirms the results of Jin et al. (1988). This means sequential volcanic activity from Cretaceous up to Lower Tertiary. Secondly, intrusive andesitic rocks in the Pohang basin, which are dated to be $21.8{\pm}2.8Ma$ (Jin et al., 1988) are found out to be 15 Ma old in coincindence with the age of host strata of 16.5 Ma. Thirdly, The Quaternary basalt (911213-5 and 911213-6) of Tateiwa(1924) is not homogeneous regarding formation age and petrological characteristics. The basalt in the Changgi basin show the age of $19.92{\pm}0.47$ and $22.05{\pm}0.67$ (Miocene). The basalt (911213-8) in Sangjond-ri, which intruded Nultaeri Trachytic Tuff is dated to be $20.55{\pm}0.50Ma$, which means Changgi Group is older than this age. The Yeonil Basalt, which Tateiwa described as Quaternary one shows different age ranging from Lower Miocene to Upper Miocene(cf. Jin et al., 1988: sample no. 93-33: $10.20{\pm}0.30Ma$). Therefore, the Yeonil Quarterary basalt should be revised and divided into different geologic epochs. Fourthly, Yeonil basalt of Tateiwa (1926) in the Eoil basin is correlated to the Yeonil basalt in the Changgi basin. Yoon (1989) intergrated both basalts as Eoil basaltic andesitic volcanic rocks or Eoil basalt (Yoon et al., 1991), and placed uppermost unit of the Changgi Group. As mentioned above the so-called Quarternary basalt in the Eoil basin are not extruded or intruaed simultaneously, but differentiatedly (14 Ma~25 Ma) so that they can not be classified as one unit. Fifthly, the Yongdong-ri formation of the Pomgogri Group is intruded by the Eoil basalt (911214-3) of 18.35~0.62 Ma age. Therefore, the deposition of the Pomgogri Group is completed before this age. Referring petrological characteristics, occurences, paleomagnetic data, and relationship to other Eoil basalts, it is most provable that this basalt is younger than two others. That means the Pomgogri Group is underlain by the Changgi Group. Sixthly, mineral composition of the basalts and andesitic rocks from the 4 basins show different ground mass and phenocryst. In volcanic rocks in the Pohang basin, phenocrysts are pyroxene and a small amount of biotite. Those of the Changgi basin is predominant by Labradorite, in the Eoil by bytownite-anorthite and a small amount pyroxene.

  • PDF

Essay on Form and Function Design (디자인의 형태와 기능에 관한 연구)

  • 이재국
    • Archives of design research
    • /
    • v.2 no.1
    • /
    • pp.63-97
    • /
    • 1989
  • There is nothing more important than the form and function in design, because every design product can be done on the basis of them. Form and Function are already existed before the word of design has been appeared and all the natural and man-made things' basic organization is based on their organic relations. The organic relations is the source of vitality which identifies the subsistance of all the objects and the evolution of living creatures has been changed their appearances by the natural law and order. Design is no exception. Design is a man-made organic thing which is developed its own way according to the purposed aim and given situations. If so, what is the ultimate goal of design. It is without saying that the goal is to make every effort to contribute to the -human beings most desirable life by the designer who is devoting himself to their convenience and well-being. Therefore, the designer can be called the man of rich life practitioner. This word implies a lot of meanings since the essence of design is improving the guality of life by the man-made things which are created by the designer. Also, the things are existed through the relations between form and function, and the things can keep their value when they are answered to the right purpose. In design, thus, it is to be a main concern how to create valuable things and to use them in the right way, and the subject of study is focused on the designer's outlook of value and uk relations between form and function. Christopher Alexander mentioned the importance of form as follows. The ultimate object of design is form. Every design problem begins with an effort to achieve fittness between the form and its context. The form is the solution to the problem: the context defmes the problem. In other words, when we speak of design, the real object of discussion is not form alone, but the ensemble comprising the form and its context. Good fit is a desirable property of this ensemble which relates to some particular division of the ensemble into form and context. Max Bill mainatined how important form is in design. Form represents a self-contained concept, and its embodiment in an object results in that object becoming a work of art. Futhermore, this explains why we use form so freguently in a comparative sense for determining whether one thing is less or more beautiful than another, and why the ideal of absolute beauty is always the standard by which we appraise form, and through form, art itself. Hence form has became synonymous with beauty. On the other hand, Laszlo Moholy-Nagy stated the importance of function as follows. Function means the task an object is designed to fulfill the task instrument is shaping the form. Unfortunately, this principle was not appreciated at the same time but through the endeavors of Frank Lloyd Wright and of the Bauhaus group and its many collegues in Europe, the idea of functionalism became the keynote of the twenites. Functionalism soon became a cheap slogan, however, and its original meaning blurred. It is neccessary to reexamine it in the light of present circumstances. Charles William Eliot expressed his idea on the relations between function and beauty. Beauty often results chiefly from fittness: indeed it is easy to manitain that nothing is fair except what is fit its uses or functions. If the function of the product of a machine be useful and valuable, an the machine be eminently fit for its function, it conspicuously has the beauty of fittness. A locomotive or a steamship has the same sort of beauty, derived from the supreme fittness for its function. As functions vary, so will those beauty..vary. However, it is impossible to study form and function in separate beings. Function can't be existed without form, and without function, form is nothing. In other words, form is a function's container, and function is content in form. It can be said that, therefore, the form and function are indispensable and commensal individuals which have coetemal relations. From the different point of view, sometimes, one is more emphasized than the other, but in this case, the logic is only accepted on the assumption of recognizing the importance of the other's entity. The fact can be proved what Frank Hoyd wright said that form and function are one. In spite of that, the form and function should be considered as independent indivisuals, because they are too important to be treated just as the simple single one. Form and function have flexible properties to the context. In other words, the context plays a role as the barometer to define the form and function, also which implies every meaning of surroun'||'&'||'not;dings. Thus, design is formed under the influence of situations. Situations are dynamic, like the design process itself, in which fixed focus can be cripping. Moreover, situations control over making the good design. Judging from the respect, I defined the good design in my thesis An Analytic Research on Desigh Ethic, "good design is to solve the problem by the most proper way in the situations." Situations are changeable, and so is design. There is no progress without change, but change is not neccessarily progress. It is highly desirable that there changes be beneficial to mankind. Our main problem is to be able to discriminate between that which should be discarded and that which should be kept, built upon, and improved. Form and Function are no exception. The practical function gives birth to the inevitable form and the $$\mu$ti-classified function is delivered to the varieties of form. All of these are depended upon changeable situations. That is precisely the situations of "situation de'||'&'||'not;sign", the concept of moving from the design of things to the design of the circumstances in which things are used. From this point of view, the core of form and function is depended upon how the designer can manage it efficiently in given situations. That is to say that the creativity designer plays an important role to fulfill the purpose. Generally speaking, creativity is the organization of a concept in response to a human need-a solution that is both satisfying and innovative. In order to meet human needs, creative design activities require a special intuitive insight which is set into motion by purposeful imagination. Therefore, creativity is the most essential quality of every designer. In addition, designers share with other creative people a compulsive ingenuity and a passion for imaginative solutions which will meet their criteria for excellence. Ultimately, it is said that the form and function is the matter which belongs to the desire of creative designers who constantly try to bring new thing into being to create new things. In accordance with that the main puppose of this thesis is to catch every meaning of the form and function and to close analyze their relations for the promotion of understanding and devising practical application to gradual progression in design. The thesis is composed of four parts: Introduction, Form, Function and Conclusion. Introduction, the purpose and background of the research are presented. In Chapter I, orgin of form, perception of form, and classification of form are studied. In Chapter II, generation of function, development of function, and diversification of function are considered. Conclusion, some concluding words are mentioned.ioned.

  • PDF

A study on Operation Rules of Korean Air Defence Identification Zone (한국 방공식별구역 운영규칙에 관한 고찰)

  • Kwon, Jong-Pil;Lee, Yeong H.
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.189-217
    • /
    • 2017
  • Declaration of Air Defense and Identification Zones started with the United States in 1950, which was followed by declaration of KADIZ by the Republic of Korea in 1951. Initial ADIZ were solely linked with air defense missions, but their roles have changed as nations around the globe manifested a tendency to expand their influence over maritime resources and rights. In particular, China declared ADIZ over the East China Sea in October 2013 and forced all passing aircraft to submit flight plan to ATC or military authority, saying failure of submission will be followed by armed engagement. China announced it would declare another zone over the South China Sea despite the ongoing conflict in the area, clearly showing ADIZ's direct connection with territorial claim and EEZ and that it serves as a zone within which a nation can execute its rights. The expanded KADIZ, which was expanded in Dec 15, 2013 in response to Chinese actions, overlaps with the Chinese ADIZ over the East China Sea and the Japanese ADIZ. The overlapping zone is an airspace over waters where not only the Republic of Korea but also of China and Japan argue to be covering their continental shelf and EEZ. Military conventions were signed to prevent contingencies among the neighboring nations while conducting identifications in KADIZ, including the overlapping zone. If such military conventions and practice of air defense identification continue to be respected among states, it is under the process of turning into a regional customary law, although ADIZ is not yet recognized by international law or customary law. Moreover, identification within ADIZ is carried out by military authorities of states, and misguided customary procedures may cause serious negative consequences for national security since it may negatively impact neighboring countries in marking the maritime border, which calls for formulation of operation rules that account for other state activities and military talks among regional stake holders. Legal frameworks need to be in place to guarantee freedom of flights over international seas which UN Maritime Law protects, and laws regarding military aircraft operation need to be supplemented to not make it a requirement to submit flight plan if the aircraft does not invade sovereign airspace. Organizational instructions that require approval of Chairman of Joint Chiefs of Staff for entrance and exit of ADIZ for military aircraft need to be amended to change the authority to Minister of National Defense or be promoted to a law to be applicable for commercial aircraft. Moreover, in regards to operation and management of ADIZ, transfer of authority should be prohibited to account for its evolution into a regional customary law in South East Asia. In particular, since ADIZ is set over EEZ, military conventions that yield authority related to national security should never be condoned. Among Korea, China, Japan and Russia, there are military conventions that discuss operation and management of ADIZ in place or under negotiation, meaning that ADIZ is becoming a regional customary law in North East Asia region.

  • PDF

A Study on the Application of Outlier Analysis for Fraud Detection: Focused on Transactions of Auction Exception Agricultural Products (부정 탐지를 위한 이상치 분석 활용방안 연구 : 농수산 상장예외품목 거래를 대상으로)

  • Kim, Dongsung;Kim, Kitae;Kim, Jongwoo;Park, Steve
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.93-108
    • /
    • 2014
  • To support business decision making, interests and efforts to analyze and use transaction data in different perspectives are increasing. Such efforts are not only limited to customer management or marketing, but also used for monitoring and detecting fraud transactions. Fraud transactions are evolving into various patterns by taking advantage of information technology. To reflect the evolution of fraud transactions, there are many efforts on fraud detection methods and advanced application systems in order to improve the accuracy and ease of fraud detection. As a case of fraud detection, this study aims to provide effective fraud detection methods for auction exception agricultural products in the largest Korean agricultural wholesale market. Auction exception products policy exists to complement auction-based trades in agricultural wholesale market. That is, most trades on agricultural products are performed by auction; however, specific products are assigned as auction exception products when total volumes of products are relatively small, the number of wholesalers is small, or there are difficulties for wholesalers to purchase the products. However, auction exception products policy makes several problems on fairness and transparency of transaction, which requires help of fraud detection. In this study, to generate fraud detection rules, real huge agricultural products trade transaction data from 2008 to 2010 in the market are analyzed, which increase more than 1 million transactions and 1 billion US dollar in transaction volume. Agricultural transaction data has unique characteristics such as frequent changes in supply volumes and turbulent time-dependent changes in price. Since this was the first trial to identify fraud transactions in this domain, there was no training data set for supervised learning. So, fraud detection rules are generated using outlier detection approach. We assume that outlier transactions have more possibility of fraud transactions than normal transactions. The outlier transactions are identified to compare daily average unit price, weekly average unit price, and quarterly average unit price of product items. Also quarterly averages unit price of product items of the specific wholesalers are used to identify outlier transactions. The reliability of generated fraud detection rules are confirmed by domain experts. To determine whether a transaction is fraudulent or not, normal distribution and normalized Z-value concept are applied. That is, a unit price of a transaction is transformed to Z-value to calculate the occurrence probability when we approximate the distribution of unit prices to normal distribution. The modified Z-value of the unit price in the transaction is used rather than using the original Z-value of it. The reason is that in the case of auction exception agricultural products, Z-values are influenced by outlier fraud transactions themselves because the number of wholesalers is small. The modified Z-values are called Self-Eliminated Z-scores because they are calculated excluding the unit price of the specific transaction which is subject to check whether it is fraud transaction or not. To show the usefulness of the proposed approach, a prototype of fraud transaction detection system is developed using Delphi. The system consists of five main menus and related submenus. First functionalities of the system is to import transaction databases. Next important functions are to set up fraud detection parameters. By changing fraud detection parameters, system users can control the number of potential fraud transactions. Execution functions provide fraud detection results which are found based on fraud detection parameters. The potential fraud transactions can be viewed on screen or exported as files. The study is an initial trial to identify fraud transactions in Auction Exception Agricultural Products. There are still many remained research topics of the issue. First, the scope of analysis data was limited due to the availability of data. It is necessary to include more data on transactions, wholesalers, and producers to detect fraud transactions more accurately. Next, we need to extend the scope of fraud transaction detection to fishery products. Also there are many possibilities to apply different data mining techniques for fraud detection. For example, time series approach is a potential technique to apply the problem. Even though outlier transactions are detected based on unit prices of transactions, however it is possible to derive fraud detection rules based on transaction volumes.

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Animal Infectious Diseases Prevention through Big Data and Deep Learning (빅데이터와 딥러닝을 활용한 동물 감염병 확산 차단)

  • Kim, Sung Hyun;Choi, Joon Ki;Kim, Jae Seok;Jang, Ah Reum;Lee, Jae Ho;Cha, Kyung Jin;Lee, Sang Won
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.137-154
    • /
    • 2018
  • Animal infectious diseases, such as avian influenza and foot and mouth disease, occur almost every year and cause huge economic and social damage to the country. In order to prevent this, the anti-quarantine authorities have tried various human and material endeavors, but the infectious diseases have continued to occur. Avian influenza is known to be developed in 1878 and it rose as a national issue due to its high lethality. Food and mouth disease is considered as most critical animal infectious disease internationally. In a nation where this disease has not been spread, food and mouth disease is recognized as economic disease or political disease because it restricts international trade by making it complex to import processed and non-processed live stock, and also quarantine is costly. In a society where whole nation is connected by zone of life, there is no way to prevent the spread of infectious disease fully. Hence, there is a need to be aware of occurrence of the disease and to take action before it is distributed. Epidemiological investigation on definite diagnosis target is implemented and measures are taken to prevent the spread of disease according to the investigation results, simultaneously with the confirmation of both human infectious disease and animal infectious disease. The foundation of epidemiological investigation is figuring out to where one has been, and whom he or she has met. In a data perspective, this can be defined as an action taken to predict the cause of disease outbreak, outbreak location, and future infection, by collecting and analyzing geographic data and relation data. Recently, an attempt has been made to develop a prediction model of infectious disease by using Big Data and deep learning technology, but there is no active research on model building studies and case reports. KT and the Ministry of Science and ICT have been carrying out big data projects since 2014 as part of national R &D projects to analyze and predict the route of livestock related vehicles. To prevent animal infectious diseases, the researchers first developed a prediction model based on a regression analysis using vehicle movement data. After that, more accurate prediction model was constructed using machine learning algorithms such as Logistic Regression, Lasso, Support Vector Machine and Random Forest. In particular, the prediction model for 2017 added the risk of diffusion to the facilities, and the performance of the model was improved by considering the hyper-parameters of the modeling in various ways. Confusion Matrix and ROC Curve show that the model constructed in 2017 is superior to the machine learning model. The difference between the2016 model and the 2017 model is that visiting information on facilities such as feed factory and slaughter house, and information on bird livestock, which was limited to chicken and duck but now expanded to goose and quail, has been used for analysis in the later model. In addition, an explanation of the results was added to help the authorities in making decisions and to establish a basis for persuading stakeholders in 2017. This study reports an animal infectious disease prevention system which is constructed on the basis of hazardous vehicle movement, farm and environment Big Data. The significance of this study is that it describes the evolution process of the prediction model using Big Data which is used in the field and the model is expected to be more complete if the form of viruses is put into consideration. This will contribute to data utilization and analysis model development in related field. In addition, we expect that the system constructed in this study will provide more preventive and effective prevention.

Development of Beauty Experience Pattern Map Based on Consumer Emotions: Focusing on Cosmetics (소비자 감성 기반 뷰티 경험 패턴 맵 개발: 화장품을 중심으로)

  • Seo, Bong-Goon;Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.179-196
    • /
    • 2019
  • Recently, the "Smart Consumer" has been emerging. He or she is increasingly inclined to search for and purchase products by taking into account personal judgment or expert reviews rather than by relying on information delivered through manufacturers' advertising. This is especially true when purchasing cosmetics. Because cosmetics act directly on the skin, consumers respond seriously to dangerous chemical elements they contain or to skin problems they may cause. Above all, cosmetics should fit well with the purchaser's skin type. In addition, changes in global cosmetics consumer trends make it necessary to study this field. The desire to find one's own individualized cosmetics is being revealed to consumers around the world and is known as "Finding the Holy Grail." Many consumers show a deep interest in customized cosmetics with the cultural boom known as "K-Beauty" (an aspect of "Han-Ryu"), the growth of personal grooming, and the emergence of "self-culture" that includes "self-beauty" and "self-interior." These trends have led to the explosive popularity of cosmetics made in Korea in the Chinese and Southeast Asian markets. In order to meet the customized cosmetics needs of consumers, cosmetics manufacturers and related companies are responding by concentrating on delivering premium services through the convergence of ICT(Information, Communication and Technology). Despite the evolution of companies' responses regarding market trends toward customized cosmetics, there is no "Intelligent Data Platform" that deals holistically with consumers' skin condition experience and thus attaches emotions to products and services. To find the Holy Grail of customized cosmetics, it is important to acquire and analyze consumer data on what they want in order to address their experiences and emotions. The emotions consumers are addressing when purchasing cosmetics varies by their age, sex, skin type, and specific skin issues and influences what price is considered reasonable. Therefore, it is necessary to classify emotions regarding cosmetics by individual consumer. Because of its importance, consumer emotion analysis has been used for both services and products. Given the trends identified above, we judge that consumer emotion analysis can be used in our study. Therefore, we collected and indexed data on consumers' emotions regarding their cosmetics experiences focusing on consumers' language. We crawled the cosmetics emotion data from SNS (blog and Twitter) according to sales ranking ($1^{st}$ to $99^{th}$), focusing on the ample/serum category. A total of 357 emotional adjectives were collected, and we combined and abstracted similar or duplicate emotional adjectives. We conducted a "Consumer Sentiment Journey" workshop to build a "Consumer Sentiment Dictionary," and this resulted in a total of 76 emotional adjectives regarding cosmetics consumer experience. Using these 76 emotional adjectives, we performed clustering with the Self-Organizing Map (SOM) method. As a result of the analysis, we derived eight final clusters of cosmetics consumer sentiments. Using the vector values of each node for each cluster, the characteristics of each cluster were derived based on the top ten most frequently appearing consumer sentiments. Different characteristics were found in consumer sentiments in each cluster. We also developed a cosmetics experience pattern map. The study results confirmed that recommendation and classification systems that consider consumer emotions and sentiments are needed because each consumer differs in what he or she pursues and prefers. Furthermore, this study reaffirms that the application of emotion and sentiment analysis can be extended to various fields other than cosmetics, and it implies that consumer insights can be derived using these methods. They can be used not only to build a specialized sentiment dictionary using scientific processes and "Design Thinking Methodology," but we also expect that these methods can help us to understand consumers' psychological reactions and cognitive behaviors. If this study is further developed, we believe that it will be able to provide solutions based on consumer experience, and therefore that it can be developed as an aspect of marketing intelligence.

The Conceptual Intersection between the Old and the New and the Transformation of the Traditional Knowledge System (신구(新舊) 관념의 교차와 전통 지식 체계의 변용)

  • Lee, Haenghoon
    • The Journal of Korean Philosophical History
    • /
    • no.32
    • /
    • pp.215-249
    • /
    • 2011
  • This essay reflects on the modernity of Korea by examining the transformation of the traditional knowledge system from a historico-semantic perspective with its focus on the opposition and collision of the old and the new conception occurred in the early period(1890~1910) of the acceptance of the Western modern civilization. With scientific success, trick of reason, Christianity and evolutionary view of history, the Western modernity regarded itself as a peak of civilization and forced the non-Western societies into the world system in which they came to be considered as 'barbarism(野蠻)' or 'half-enlightened(半開).' The East Asian civilization, which had its own history for several centuries, became degraded as kind of delusion and old-fashioned customs from which it ought to free itself. The Western civilization presented itself as exemplary future which East Asian people should achieve, while East Asian past traditions came to be conceived as just unnecessary vestiges which it was better to wipe out. It can be said that East Asian modernization was established through the propagation and acceptance of the modern products of the Western civilization rather than through the preservation of its past experience and pursuit of the new at the same time. Accordingly, it is difficult to apply directly to East Asian societies Koselleck's hypothesis; while mapping out his Basic Concept of History, he assumed that, in the so-called 'age of saddle,' semantic struggle over concepts becomes active between the past experience and the horizon of expectation on the future, and concepts undergoes 'temporalization', 'democratization', 'ideologization', 'politicization.'The struggle over the old and new conceptions in Korea was most noticeable in the opposition of the Neo-Confucian scholars of Hwangseongsinmun and the theorists of civilization of Doknipsinmun. The opposition and struggle demanded the change of understanding in every field, but there was difference of opinion over the conception of the past traditional knowledge system. For the theorists of civilization, 'the old(舊)' was not just 'past' and 'old-fashioned' things, but rather an obstacle to the building of new civilization. On the other hand, it contained the possibility of regeneration(新) for the Neo-Confucian scholars; that is, they suggested finding a guide into tomorrow by taking lessons from the past. The traditional knowledge system lost their holy status of learning(聖學) in the process of its change into a 'new learning(新學),' and religion and religious tradition also weakened. The traditional knowledge system could change itself into modern learning by accepting scientific methodology which pursues objectivity and rationality. This transformation of the traditional knowledge system and 'the formation of the new learning from the old learning' was accompanied by the intersection between the old and new conceptions. It is necessary to pay attention to the role played by the concept of Sil(hak)(實學) or Practical Learning in the intersection of the old and new conceptions. Various modern media published before and after the 20th century show clearly the multi-layered development of the old and new conceptions, and it is noticeable that 'Sil(hak)' as conceptual frame of reference contributed to the transformation of the traditional knowledge system into the new learning. Although Silhak often designated, or was even considered equivalent to, the Western learning, Neo-Confucian scholars reinterpreted the concept of 'Silhak' which the theorists of civilization had monopolized until then, and opened the way to change the traditional knowledge system into the new learning. They re-appropriated the concept of Silhak, and enabled it to be invested with values, which were losing their own status due to the overwhelming scientific technology. With Japanese occupation of Korea by force, the attempt to transform the traditional knowledge system independently was obliged to reach its own limit, but its theory of 'making new learning from old one' can be considered to get over both the contradiction of Dondoseogi(東道西器: principle of preserving Eastern philosophy while accepting Western technology) and the de-subjectivity of the theory of civilization. While developing its own logic, the theory of Dongdoseogi was compelled to bring in the contradiction of considering the indivisible(道and 器) as divisible, though it tried to cope with the reality where the principle of morality and that of competition were opposed each other and the ideologies of 'evolution' and 'progress' prevailed. On the other hand, the theory of civilization was not free from the criticism that it brought about a crack in subjectivity due to its internalization of the West, cutting itself off from the traditional knowledge system.

The Factors Affecting Attitudes Toward HSDPA Service and Intention to Use: A Cross-Cultural Comparison between Asia and Europe (대영향(对影响)HSDPA복무적태도화사용의도적인소적연구(服务的态度和使用意图的因素的研究): 재아주화구주지간적(在亚洲和欧洲之间的)-개과문화비교(个跨文化比较))

  • Jung, Hae-Sung;Shin, Jong-Kuk;Park, Min-Sook;Jung, Hong-Seob;Hooley, Graham;Lee, Nick;Kwak, Hyok-Jin;Kim, Sung-Hyun
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.4
    • /
    • pp.11-23
    • /
    • 2009
  • HSDPA (High-Speed Downlink Packet Access) is a 3.5-generation asynchronous mobile communications service based on the third generation of W-CDMA. In Korea, it is mainly provided in through videophone service. Because of the diffusion of more powerful and diversified services, along with steep advances in mobile communications technology, consumers demand a wide range of choices. However, because of the variety of technologies, which tend to overflow the market regardless of consumer preferences, consumers feel increasingly confused. Therefore, we should not adopt strategies that focus only on developing new technology on the assumption that new technologies are next-generation projects. Instead, we should understand the process by which consumers accept new forms of technology and devise schemes to lower market entry barriers through strategies that enable developers to understand and provide what consumers really want. In the Technology Acceptance Model (TAM), perceived usefulness and perceived ease of use are suggested as the most important factors affecting the attitudes of people adopting new technologies (Davis, 1989; Taylor and Todd, 1995; Venkatesh, 2000; Lee et al., 2004). Perceived usefulness is the degree to which a person believes that a particular technology will enhance his or her job performance. Perceived ease of use is the degree of subjective belief that using a particular technology will require little physical and mental effort (Davis, 1989; Morris and Dillon, 1997; Venkatesh, 2000). Perceived pleasure and perceived usefulness have been shown to clearly affect attitudes toward accepting technology (Davis et al., 1992). For example, pleasure in online shopping has been shown to positively impact consumers' attitudes toward online sellers (Eighmey and McCord, 1998; Mathwick, 2002; Jarvenpaa and Todd, 1997). The perceived risk of customers is a subjective risk, which is distinguished from an objective probabilistic risk. Perceived risk includes a psychological risk that consumers perceive when they choose brands, stores, and methods of purchase to obtain a particular item. The ability of an enterprise to revolutionize products depends on the effective acquisition of knowledge about new products (Bierly and Chakrabarti, 1996; Rothwell and Dodgson, 1991). Knowledge acquisition is the ability of a company to perceive the value of novelty and technology of the outside (Cohen and Levinthal, 1990), to evaluate the outside technology that has newly appeared (Arora and Gambaradella, 1994), and to predict the future evolution of technology accurately (Cohen and Levinthal, 1990). Consumer innovativeness is the degree to which an individual adopts innovation earlier than others in the social system (Lee, Ahn, and Ha, 2001; Gatignon and Robertson, 1985). That is, it shows how fast and how easily consumers adopt new ideas. Innovativeness is regarded as important because it has a significant effect on whether consumers adopt new products and on how fast they accept new products (Midgley and Dowling, 1978; Foxall, 1988; Hirschman, 1980). We conducted cross-national comparative research using the TAM model, which empirically verified the relationship between the factors that affect attitudes - perceived usefulness, ease of use, perceived pleasure, perceived risk, innovativeness, and perceived level of knowledge management - and attitudes toward HSDPA service. We also verified the relationship between attitudes and usage intention for the purpose of developing more effective methods of management for HSDPA service providers. For this research, 346 questionnaires were distributed among 350 students in the Republic of Korea. Because 26 of the returned questionnaires were inconsistent or had missing data, 320 questionnaires were used in the hypothesis tests. In UK, 192 of the total 200 questionnaires were retrieved, and two incomplete ones were discarded, bringing the total to 190 questionnaires used for statistical analysis. The results of the overall model analysis are as follows: Republic of Korea x2=333.27(p=0.0), NFI=0.88, NNFI=0.88, CFI=0.91, IFI=0.91, RMR=0.054, GFI=0.90, AGFI=0.84, UK x2=176.57(p=0.0), NFI=0.88, NNFI=0.90, CFI=0.93, IFI=0.93, RMR=0.062, GFI=0.90, AGFI=0.84. From the results of the hypothesis tests of Korean consumers about the relationship between factors that affect intention to use HSDPA services and attitudes, we can conclude that perceived usefulness, ease of use, pleasure, a high level of knowledge management, and innovativeness promote positive attitudes toward HSDPA mobile phones. However, ease of use and perceived pleasure did not have a direct effect on intention to use HSDPA service. This may have resulted from the fact that the use of video phones is not necessary for everyday life yet. Moreover, it has been shown that attitudes toward HSDPA video phones are directly correlated with usage intention, which means that perceived usefulness, ease of use, pleasure, a high level of knowledge management, and innovativeness. These relationships form the basis of the intention to buy, contributing to a situation in which consumers decide to choose carefully. A summary of the results of the hypothesis tests of European consumers revealed that perceived usefulness, pleasure, risk, and the level of knowledge management are factors that affect the formation of attitudes, while ease of use and innovativeness do not have an effect on attitudes. In particular, with regard to the effect value, perceived usefulness has the largest effect on attitudes, followed by pleasure and knowledge management. On the contrary, perceived risk has a smaller effect on attitudes. In the Asian model, ease of use and perceived pleasure were found not to have a direct effect on intention to use. However, because attitudes generally affect the intention to use, perceived usefulness, pleasure, risk, and knowledge management may be considered key factors in attitude development from which usage intention arises. In conclusion, perceived usefulness, pleasure, and the level of knowledge management have an effect on attitude formation in both Asian and European consumers, and such attitudes shape these consumers' intention to use. Furthermore, the hypotheses that ease of use and perceived pleasure affect usage intention are rejected. However, ease of use, perceived risk, and innovativeness showed different results. Perceived risk had no effect on attitude formation among Asians, while ease of use and innovativeness had no effect on attitudes among Europeans.

  • PDF

Emoticon by Emotions: The Development of an Emoticon Recommendation System Based on Consumer Emotions (Emoticon by Emotions: 소비자 감성 기반 이모티콘 추천 시스템 개발)

  • Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.1
    • /
    • pp.227-252
    • /
    • 2018
  • The evolution of instant communication has mirrored the development of the Internet and messenger applications are among the most representative manifestations of instant communication technologies. In messenger applications, senders use emoticons to supplement the emotions conveyed in the text of their messages. The fact that communication via messenger applications is not face-to-face makes it difficult for senders to communicate their emotions to message recipients. Emoticons have long been used as symbols that indicate the moods of speakers. However, at present, emoticon-use is evolving into a means of conveying the psychological states of consumers who want to express individual characteristics and personality quirks while communicating their emotions to others. The fact that companies like KakaoTalk, Line, Apple, etc. have begun conducting emoticon business and sales of related content are expected to gradually increase testifies to the significance of this phenomenon. Nevertheless, despite the development of emoticons themselves and the growth of the emoticon market, no suitable emoticon recommendation system has yet been developed. Even KakaoTalk, a messenger application that commands more than 90% of domestic market share in South Korea, just grouped in to popularity, most recent, or brief category. This means consumers face the inconvenience of constantly scrolling around to locate the emoticons they want. The creation of an emoticon recommendation system would improve consumer convenience and satisfaction and increase the sales revenue of companies the sell emoticons. To recommend appropriate emoticons, it is necessary to quantify the emotions that the consumer sees and emotions. Such quantification will enable us to analyze the characteristics and emotions felt by consumers who used similar emoticons, which, in turn, will facilitate our emoticon recommendations for consumers. One way to quantify emoticons use is metadata-ization. Metadata-ization is a means of structuring or organizing unstructured and semi-structured data to extract meaning. By structuring unstructured emoticon data through metadata-ization, we can easily classify emoticons based on the emotions consumers want to express. To determine emoticons' precise emotions, we had to consider sub-detail expressions-not only the seven common emotional adjectives but also the metaphorical expressions that appear only in South Korean proved by previous studies related to emotion focusing on the emoticon's characteristics. We therefore collected the sub-detail expressions of emotion based on the "Shape", "Color" and "Adumbration". Moreover, to design a highly accurate recommendation system, we considered both emotion-technical indexes and emoticon-emotional indexes. We then identified 14 features of emoticon-technical indexes and selected 36 emotional adjectives. The 36 emotional adjectives consisted of contrasting adjectives, which we reduced to 18, and we measured the 18 emotional adjectives using 40 emoticon sets randomly selected from the top-ranked emoticons in the KakaoTalk shop. We surveyed 277 consumers in their mid-twenties who had experience purchasing emoticons; we recruited them online and asked them to evaluate five different emoticon sets. After data acquisition, we conducted a factor analysis of emoticon-emotional factors. We extracted four factors that we named "Comic", Softness", "Modernity" and "Transparency". We analyzed both the relationship between indexes and consumer attitude and the relationship between emoticon-technical indexes and emoticon-emotional factors. Through this process, we confirmed that the emoticon-technical indexes did not directly affect consumer attitudes but had a mediating effect on consumer attitudes through emoticon-emotional factors. The results of the analysis revealed the mechanism consumers use to evaluate emoticons; the results also showed that consumers' emoticon-technical indexes affected emoticon-emotional factors and that the emoticon-emotional factors affected consumer satisfaction. We therefore designed the emoticon recommendation system using only four emoticon-emotional factors; we created a recommendation method to calculate the Euclidean distance from each factors' emotion. In an attempt to increase the accuracy of the emoticon recommendation system, we compared the emotional patterns of selected emoticons with the recommended emoticons. The emotional patterns corresponded in principle. We verified the emoticon recommendation system by testing prediction accuracy; the predictions were 81.02% accurate in the first result, 76.64% accurate in the second, and 81.63% accurate in the third. This study developed a methodology that can be used in various fields academically and practically. We expect that the novel emoticon recommendation system we designed will increase emoticon sales for companies who conduct business in this domain and make consumer experiences more convenient. In addition, this study served as an important first step in the development of an intelligent emoticon recommendation system. The emotional factors proposed in this study could be collected in an emotional library that could serve as an emotion index for evaluation when new emoticons are released. Moreover, by combining the accumulated emotional library with company sales data, sales information, and consumer data, companies could develop hybrid recommendation systems that would bolster convenience for consumers and serve as intellectual assets that companies could strategically deploy.