and have come to be featured in cemeteries. These works were based on bringing landscape-harmony to long unclaimed tombs as well as abandoned tombs. Artists want to communicate with their intentions to their audience by directly reflecting it in their works. Furthermore, if the nature itself and the purpose of the artwork are clear, the viewers can easily maximize their understanding of the work they are viewing. This paper tries to add meaning to my works by introducing my portfolio to date and interpreting in via Daesoon Thought. Therefore, this paper may be considered as an attempt to interpret the chronological ideology behind my art. In order to examine the connection between my works and Daesoon Thought, commentary on the works should be presented first. , are on display in Yeonju Cemetery in Naju, Daegu, Anseong, Gyeonggi-do, and at the Gamyeon Academy in Ansan, Gyeonggi-do. In particular, honors those who lost their lives in April Third Jeju Uprising of 1948-1949. This work is subtitled, . As interpreted through Daesoon Thought, the work (Body Scape) relates to Virtuous Concordance of Yin and Yang (陰陽合德) for the unmarked graves in Naju of pauper's graves. And Sincerity, Respectfulness, and Faithfulness (誠·敬·信) correspond with the unmarked graves for the death-row convicts of Daegu prison house. The unmarked graves related to the scandal involving Ansan Sungam Academy are honored by the work titled . Along with the previously mentioned 'Unnamed Monument' for the Jeju Uprising, corresponds to the Resolution of Grievances for Mutual Beneficence.

  • Meta-cognitive awareness and prospective memory retrieval process: The effect of voluntary attention allocation strategy (메타 인지적 인식과 미래계획기억 인출 과정: 자발적 주의 할당 전략의 효과)

    • Yoon, Yong-Sik;Sohn, Young-Woo
      • Korean Journal of Cognitive Science
      • /
      • v.22 no.2
      • /
      • pp.145-172
      • /
      • 2011
    • Prospective memory (PM) is memory for activities to be performed in the future, such as remembering to purchase a piece of fruit on the way home or remembering to give someone a telephone message. Theoretically, PM retrieval can be accomplished either by controlled monitoring of intended action or by a more automatic process that spontaneously responds to the presence of intended event. The present study examined the effect of meta-cognitive awareness in PM retrieval process. In Experiment 1, we manipulated PM condition with a salient cue to stimulate participants' meta-cognitive awareness. Results showed the salient cue condition spontaneously triggered remembering to perform an intended action. In Experiment 2, we manipulated participants' meta-cognitive awareness about PM task difficulty and about the degree to which cognitive capacity is required to realize the PM task. Results showed that PM retrieval process varied with meta-cognitive awareness (i.e., more resources were allocated if the PM task was expected to be difficult). These results imply that participants' meta-cognitive awareness play an important role in PM retrieval process.

    • PDF

    A Scheme for Secure Storage and Retrieval of (ID, Password) Pairs Using Smart Cards as Secure and Portable Storages (안전한 휴대 저장장치로서의 스마트카드를 활용한 (ID, 패스워드) 쌍들의 안전한 저장 및 검색 기법)

    • Park, Jun-Cheol
      • The Journal of Korean Institute of Communications and Information Sciences
      • /
      • v.39B no.6
      • /
      • pp.333-340
      • /
      • 2014
    • Despite the security weakness of reusing passwords, many Internet users are likely to use a single ID and password on various sites to avoid the inconvenience of remembering multiple credentials. This paper proposes a scheme for securely storing, retrieving, and updating randomly chosen (ID, password) pairs by using smart cards as secure and portable storages. The scheme makes a user free from remembering her (ID, password) pairs for Internet accesses. By splitting and scattering the (ID, password) pairs of a user across the user's smart card memory and a remote server's storage, it can protect the logon credentials even from the theft or loss of the smart card. Also, a user, if deemed necessary, can issue and let the server to delete all information belonging to the user. Hence even an attacker who cracked the smart card memory would not be able to obtain any (ID, password) pair of the victim thereafter. The scheme requires a user to input a site information and pass-phrase to her smart card to obtain the logon credentials, but it should be an acceptable overhead considering the benefits of not remembering the freely chosen (ID, password) pairs at all.


    (34141) Korea Institute of Science and Technology Information, 245, Daehak-ro, Yuseong-gu, Daejeon
    Copyright (C) KISTI. All Rights Reserved.