As part of the digital era, a digital twin that simulates the weak part of a product by performing a stress test that reduces the lifespan of some expensive equipment that cannot be done in reality by accurately moving the real world to virtual reality is being actively used in the manufacturing industry. Due to the development of IoT, the digital twin, which accurately collects data collected from the real world and makes it the same in the virtual space, is mutually beneficial through accurate prediction of urban life problems such as traffic, disaster, housing, quarantine, energy, environment, and aging. Based on its action, it is positioned as a necessary tool for smart city construction. Although digital twin is widely applied to the manufacturing field, this study proposes a smart city model suitable for the 4th industrial revolution era by using it to smart cities and increasing citizens' safety, welfare, and convenience through the proposed model. In addition, when a digital twin is applied to a smart city, it is expected that more accurate prediction and analysis will be possible by real-time synchronization between the real and virtual by maintaining realism and immediacy through real-time interaction.
Journal of the Korean Institute of Landscape Architecture
/
v.49
no.5
/
pp.27-45
/
2021
The purpose of this study is to trace the path of policy for urban parks and greenbelts (PUPG) pursued by Seoul Mayor Kim Hyeon-ok, who was a protagonist of Seoul's modernization and to reveal the policy's characteristics. A high modernism perspective was projected to advance his PUPG discussion. High modernism was an unavoidable phenomenon that appeared in post-war urban reconstruction projects and emerged in the form of a belief that the national elite creates the ideal social order and rational planning. Its characteristics were to build with legibility, immediacy, and convenience by power, with private participation and profit creation, while realizing the spectacle of "the city being built". As a high-modernist, Seoul Mayor Kim Hyun-ok's urban planning aimed to deal with the booming population and the expansion of Seoul's territory. Although his PUPG extended the parks to the outskirts of Seoul, he showed a dualistic attitude, diverting parks away from the city center. On the other hand, he induced the participation of the private sector to create parks. However, he showed the other side of modernization, eliminating the placeness and excluding related systems. The path taken by Mayor Kim Hyun-ok's PUPG was started to respond to population growth and resolve the encroachment of parks. The ultimate goal was to accept the realization of urban planning and experiment with non-financial methods. The characteristics of his PUPG reflecting high modernism were: First, elites were represented in the National Land Planning Association, HURPI, and Jang Moon-gi participated; second, legibility was ensured by using east-west and north-south axes, elevation standards, and rational planning. Third, parks were quickly released to respond to the rapid urban change. Fourth, it showed off events and spectacles to attract private capital.
When video composes mise-en-scene during the performance, it reflects the aspect of contemporary image culture, where the individual as creator joins in the image culture through the device of cell phone and computer remediating the former video technology. It also closely related with the contemporary theatre culture in which 1960's and 1970's video art was weaved into the contemporary performance theatre. With these cultural background, theatre practitioners regarded media-friendly mise-en-scene as an alternative facing the cultural landscape the linear representational narrative did not correspond to the present culture. Nonetheless, it can not be ignored that video in the performance theatre is remediating its historical function: to criticize the social reality. to enrich the aesthetic or emotional reality. I focused video in the performance theatre could feature the object with the image by realizing the realtime relay, emphasizing the situation within the frame, and strengthening the reality by alluding the object as a gesutre. So I explored its two historical manuel. First, video recorded the spot, communicated the information, and arose the audience's recognition of the object to its critical function. Second, video in performance theatre could redistribute perceptual way according to the editing method like as close up, slow motion, multiple perspective, montage and collage, and transformation of the image to the aesthetic function. Reminding the historical function of video in contemporary performance theatre, I analyzed two shows, Schaubuhne's Hamlet and Lenea de Sombra's Amarillo which were introduced to Korean audiences during the 2010 Seoul Theatre Olympics. It is known to us that Ostermeir found real social reality as a text and made the play the context. In this, he used video as a vehicle to penetrate the social reality through the hero's perspective. It is also noteworthy that Ostermeir understood Hamlet's dilemma as these days' young generation's propensity. They delayed action while being involved in image culture. Besides his use of video in the piece revitalized the aesthetic function of video by hypermedial perceptual method. Amarillo combined documentary theatre method with installation, physical theatre, and video relay on the spot, and activated aesthetic function with the intermediality, its interacting co-relationship between the media. In this performance theatre, video has recorded and pursued the absent presence of the real people who died or lost in the desert. At the same time it fantasized the emotional aspect of the people at the moment of their death, which would be opaque or non prominent otherwise. As a conclusion, I found the video in contemporary performance theatre visualized the rupture between the media and perform their intermediality. It attempted to disturb the transparent immediacy to invoke the spectator's perception to the theatrical situation, to open its emotional and spiritual aspect, and to remind the realities as with Schaubuhne's Hamlet and Lenea de Sombra's Amarillo.
Sang-Hyeak Yoon;Yoon-Jin Choi;So-Hyun Lee;Hee-Woong Kim
Information Systems Review
/
v.22
no.4
/
pp.75-92
/
2020
As population and generation structures change, more and more customers tend to avoid facing relation due to the development of information technology and spread of smart phones. This phenomenon consists with efficiency and immediacy, which are the consumption patterns of modern customers who are used to information technology, so offline network-oriented distribution companies actively try to switch their sales and services to untact patterns. Recently, untact services are boosted in various fields, but beauty products are not easy to be recommended through untact services due to many options depending on skin types and conditions. There have been many studies on recommendations and development of recommendation systems in the online beauty field, but most of them are the ones that develop recommendation algorithm using survey or social data. In other words, there were not enough studies that classify segments based on user information such as skin types and product preference. Therefore, this study classifies customer segments using machine learning technique K-prototypesalgorithm based on customer information and search log data of mobile application, which is one of untact services in the beauty field, based on which, untact marketing strategy is suggested. This study expands the scope of the previous literature by classifying customer segments using the machine learning technique. This study is practically meaningful in that it classifies customer segments by reflecting new consumption trend of untact service, and based on this, it suggests a specific plan that can be used in untact services of the beauty field.
Kim, Byung-Kyu;Kang, Mu-Yeong;Choi, Seon-Heui;Kim, Soon-Young;You, Beom-Jong;Shin, Jae-Do
Journal of the Korean Society for information Management
/
v.28
no.2
/
pp.117-133
/
2011
There have been little comprehensive research for studying impact of foreign journals on Korean scientists. The main reason for this is because there was no extensive citation index database of domestic journals for analysis. Korea Institute of Science and Technology Information (KISTI) built the Korea Science Citation Database (KSCD), and have provided Korea Science Citation Index (KSCI) and Korea Journal Citation Reports (KJCR) services. In this article, citing behavior of Korean scientists on foreign journals was examined by using KSCD that covers Korean core journals. This research covers (1) analysis of foreign document types cited, (2) analysis of citation counts of foreign journals by subject and the ratio of citing different disciplines, (3) analysis of language and country of foreign documents cited, (4) analysis of publishers of journals and whether or not journals are listed on global citation index services and (5) analysis for current situation of subscribing to foreign electronic journals in Korea. The results of this research would be useful for establishing strategies for licensing foreign electronic journals and for information services. From this research, immediacy citation rate (average 1.46%), peak-time (average 3.9 years) and half-life (average 8 years) of cited foreign journals were identified. It was also found that Korean scientistis tend to cite journals covered in SCI(E) or SCOPUS, and 90% of cited foreign journals have been licensed by institutions in Korea.
Our country security industry 1960's service expense of the beginning U.S. army unit it accomplishes the growth which is quick with start, currently about 2,500 triumph the security enterprises which it goes over are being active. But the majority in these enterprise about lower cotton can a forever characteristic with pressure and the manpower civil official ability insufficient back of faithlessness management and capital power. To sleep with afterwords it presents the security dogs deployment plan for an efficient security together from the research which it sees hereupon and it does. First, it cultivates the domestic mountain progress dog which is a breed which is suitable with the security dogs and the shovel flesh dog back with the security dogs. Specially the Jindo of the breed which is excellent training which is suitable in task of the security dogs it leads and if it uses appropriately, it industrializes our specific the Jindo and protection there is a possibility of getting the effect which falls to also the gist which it rears rightly. It cultivate the second, security dogs and it magnifies training. The security dogs consequently is it will be able to accomplish the task above 2 branches to training method. Namely, after finishing obedience training, it is to be in security activity it will execute guard or detection back special training which is suitable in task and it will be able to commit. Third, it uses the security dogs which is trained rightly in task. The security dogs the adult escorts, facility expense, the explosive and narcotic drug detection, it will be able to use with the other blind man guidance dogs back. The narcotic drug detection dogs which currently is used specially technique intelligence anger, when considering the tendency of the narcotic drug smuggling offense field which becomes diversification that the role very it is important is a possibility of saying at day. It cultivate a fourth, escort relation specialty manpower and it improves the breed of the security dogs. The hazard which cultivate the security dogs use necessary personnel the breed of security dogs, the security dogs training center it opens the security crane relation subject of the college which stands and (university) it improves it establishes and training which is suitable in task it is to do to execute letting in the training map company. Specially, the hazard which improves the breed of security dogs in the progress mind quality which stands against the portion where the breed improvement is demanded as the portion where the internal organs research and investment are necessary sees. The security dogs compares in labor cost and the expense holds few, if it uses the our specific domestic dogs it will be able to use efficiently in the task which is various it solves the multi branch plans for wisly with the security dogs industrial development security of course contemporary history sliced raw fish sees demands compared to being immediacy and the life which is happy business the place where it does it sees it will be able to contribute a lot as.
The purpose of this study is to examine the mobile phone service usage patterns of Korean teenagers and their motivation to use it, and to explore the relationships between the teenagers' social-psychological characteristics and their trails of mobile phone usage. After reviewing prior theoretical studios, three hypotheses regarding the research questions shown above were generated. Questionnaire study was conducted with 400 high school students in Busan and Ulsan metropolitan areas. They were to answer three categories of questions, such as frequencies of voice calls and text messaging services and the other mobile services, questions asking their social-psychological characteristics, and their motivations for using mobile phone services. Findings show that the teenagers more likely to tend to use voice calls when communicating family members. They tend to avoid those services with high rate of use as multimedia, game, and broadcasting services via mobile phones. The teenagers use mobile phone services for the similar purposes to conventional telephone uses. Therefore, the classical theories showing the alternative purposes or motivations to use conventional telephone usage, which divided the main purposes for phone uses in to two; work/instrumental and socializing/entertaining, proved to be reasonable. The cheap messaging services with texts are popular among the teenagers and are used for socializing/entertaining purposes rather than instrumental/functional purposes. In addition, the teenagers' social-psychological characteristicss are significantly associated with the amount of mobile phone uses. A characteristic of "individual-centeredness" is positively related with non-voice service uses, while "group-centeredness" explains heavy amount of using voice calls and text messaging services. Such characteristics as "immediacy," "directness," "innovativeness," and "other-direction" are positively associated with the frequencies and amounts of mobile phone uses, while "inner-direction" and "tradition-direction" are negatively correlated.
Trauma studies have provided useful models for dealing with the catastrophic and disastrous events that an individual and collective group experience. Most important of all, the perspective of post-structuralist trauma study, including Cathy Caruth, became a paradigmatic model and it has been applied to almost all contexts of life. The perspective of this study model, which is called an "event-based model of trauma," focuses on the literal registration of the traumatic event and the accurate and immediate recall of the past. The person directly involved in the event becomes the passive bearer transmitting the truth of a traumatic event. From this perspective, the traumatic subject only undergoes and endures the event and cannot play an active role in constructing trauma and dealing with it. Eventually, the truth of trauma has to be obtained at the cost of the traumatic subject's autonomy and the possibility of his/her agency. The problem here is that the truth, which is reencountered through the literal return of the past, obtained at the cost of the subject's autonomy, strikes a rather fatal blow to the person, than gives help for resolving many of matters surrounding traumatic experience and curing trauma. This suggests that the active way of dealing with trauma on the part of the traumatic subject, rather than the traumatic event itself, is demanded. Furthermore, because more recently, images of disastrous events were viewed "live" by audiences and an immediacy to the event is replicated in public discourse about them, the event becomes more immediately traumatic and there is a more strong presumption that people regard themselves as traumatic victims than before. This is the reason that we must explore an active way dealing with trauma on more human position at this time. This essay aims to examine the limits of the paradigmatic model of trauma study, an "event-based model of trauma," critically through a literary, theoretical text in which it reveals how the literal return of the traumatic past have a fatal effect on the victim; and hopes to suggest "the narrative memory" as a way to deal with trauma from a more humanistic perspective.
As social data become into the spotlight, mainstream web search engines provide data indicate how many people searched specific keyword: Web Search Traffic data. Web search traffic information is collection of each crowd that search for specific keyword. In a various area, web search traffic can be used as one of useful variables that represent the attention of common users on specific interests. A lot of studies uses web search traffic data to nowcast or forecast social phenomenon such as epidemic prediction, consumer pattern analysis, product life cycle, financial invest modeling and so on. Also web search traffic data have begun to be applied to predict tourist inbound. Proper demand prediction is needed because tourism is high value-added industry as increasing employment and foreign exchange. Among those tourists, especially Chinese tourists: Youke is continuously growing nowadays, Youke has been largest tourist inbound of Korea tourism for many years and tourism profits per one Youke as well. It is important that research into proper demand prediction approaches of Youke in both public and private sector. Accurate tourism demands prediction is important to efficient decision making in a limited resource. This study suggests improved model that reflects latest issue of society by presented the attention from group of individual. Trip abroad is generally high-involvement activity so that potential tourists likely deep into searching for information about their own trip. Web search traffic data presents tourists' attention in the process of preparation their journey instantaneous and dynamic way. So that this study attempted select key words that potential Chinese tourists likely searched out internet. Baidu-Chinese biggest web search engine that share over 80%- provides users with accessing to web search traffic data. Qualitative interview with potential tourists helps us to understand the information search behavior before a trip and identify the keywords for this study. Selected key words of web search traffic are categorized by how much directly related to "Korean Tourism" in a three levels. Classifying categories helps to find out which keyword can explain Youke inbound demands from close one to far one as distance of category. Web search traffic data of each key words gathered by web crawler developed to crawling web search data onto Baidu Index. Using automatically gathered variable data, linear model is designed by multiple regression analysis for suitable for operational application of decision and policy making because of easiness to explanation about variables' effective relationship. After regression linear models have composed, comparing with model composed traditional variables and model additional input web search traffic data variables to traditional model has conducted by significance and R squared. after comparing performance of models, final model is composed. Final regression model has improved explanation and advantage of real-time immediacy and convenience than traditional model. Furthermore, this study demonstrates system intuitively visualized to general use -Youke Mining solution has several functions of tourist decision making including embed final regression model. Youke Mining solution has algorithm based on data science and well-designed simple interface. In the end this research suggests three significant meanings on theoretical, practical and political aspects. Theoretically, Youke Mining system and the model in this research are the first step on the Youke inbound prediction using interactive and instant variable: web search traffic information represents tourists' attention while prepare their trip. Baidu web search traffic data has more than 80% of web search engine market. Practically, Baidu data could represent attention of the potential tourists who prepare their own tour as real-time. Finally, in political way, designed Chinese tourist demands prediction model based on web search traffic can be used to tourism decision making for efficient managing of resource and optimizing opportunity for successful policy.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.